Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
340s -
max time network
341s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/12/2024, 11:47
General
-
Target
virussign.com_20241209_LimitedFree.zip
-
Size
12.6MB
-
MD5
6b3d9c02066b33e120cc70909c5806d7
-
SHA1
0af21bb623041bbe95792d11fe64cc4001757409
-
SHA256
8455503a13bf1290304f2cc41b0f3bfbfa88ca7d5276d34c9e42514c270117a6
-
SHA512
84863e117e43246485c51db1dba46f8c014fc9a48bd57861654f0454c80dfa5adf688fdd41f328583d43fad5ef0fba2ac836ade4375a38177b039d7ec81695b6
-
SSDEEP
393216:n9FMWw1QRAZ8PyF8vhNRzVa/8EfDX9SnziNjcP:tw1KBPyWvLRo/8JWla
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqojclne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcifkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Filapfbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koajmepf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found -
Berbew family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x001900000002adf6-2068.dat family_phorphiex -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 37224 created 3368 37224 Process not Found 52 PID 37224 created 3368 37224 Process not Found 52 PID 25788 created 3368 25788 Process not Found 52 -
Xmrig family
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x001900000002ab29-134.dat xmrig behavioral1/files/0x001c00000002aaf9-292.dat xmrig -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1FC5F3D4-64EE-4eea-A708-E350A9876BD2} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1FC5F3D4-64EE-4eea-A708-E350A9876BD2}\stubpath = "C:\\Windows\\{1FC5F3D4-64EE-4eea-A708-E350A9876BD2}.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E26B916-056F-4cd9-914F-DB7C6ABCA051} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{015CDE89-EE49-4fd1-96CB-BABFCE2F009A} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{302A6A52-3312-4d76-B3B2-7E383749BB9C} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{302A6A52-3312-4d76-B3B2-7E383749BB9C}\stubpath = "C:\\Windows\\{302A6A52-3312-4d76-B3B2-7E383749BB9C}.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E26B916-056F-4cd9-914F-DB7C6ABCA051}\stubpath = "C:\\Windows\\{3E26B916-056F-4cd9-914F-DB7C6ABCA051}.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B26642F2-3179-40c1-AA98-29C34AA5BF32} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B26642F2-3179-40c1-AA98-29C34AA5BF32}\stubpath = "C:\\Windows\\{B26642F2-3179-40c1-AA98-29C34AA5BF32}.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{015CDE89-EE49-4fd1-96CB-BABFCE2F009A}\stubpath = "C:\\Windows\\{015CDE89-EE49-4fd1-96CB-BABFCE2F009A}.exe" Process not Found -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 31496 Process not Found 21480 Process not Found 14384 Process not Found 10012 Process not Found -
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x001900000002aae6-214.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 4648 virussign.com_02086fe70be8b2f98a26c8976ebffa50.vir 4768 virussign.com_02086fe70be8b2f98a26c8976ebffa50.vir 3236 virussign.com_02430a5aa0fade970b559057312773f0.vir 1280 virussign.com_05c3078160025e055e31b207b2c9fae0.vir 4876 virussign.com_0a048f1cdb9480e46de3c80728806f10.vir 920 virussign.com_0b9d792e46792ac3ae996fab5d916810.vir 3276 virussign.com_0dd8d726d0931d83c953ba0e2abbb9a0.vir 3120 microsofthelp.exe 5092 virussign.com_116ce2a1fd49210068a0f473842d5040.vir 2284 virussign.com_176ead841fd513c687d7bb949df1b790.vir 3816 virussign.com_1c03261b3c48f6ee44730d62e5c70ec0.vir 1000 virussign.com_1c6a0eb754eb16314dc4cdfaf6297330.vir 4708 virussign.com_20bb9d6e02a7abd5ed80b5211a3f6020.vir 2860 virussign.com_26dd5367688cd475f2ff8d7ec0410230.vir 4172 virussign.com_2d9a6d9b9052b149d0f080b2f1a9f0b0.vir 3920 virussign.com_3480729f9572c299fcc9e8cd77904ca0.vir 2068 virussign.com_37c7709ab0aed9b20b56ed66a7d12100.vir 2332 virussign.com_3bb1202078a92cea11a60eb07a588940.vir 2324 virussign.com_43e1fe6e5f9bab4195ccda4978913650.vir 4112 virussign.com_48c9dc42ce81f9c3af8c82aa6517f370.vir 1020 virussign.com_5189ffb7311dfb72033379662d41ce60.vir 4924 virussign.com_5884d29c32afb422ab56a704852d5d10.vir 940 virussign.com_5d7e49a025c7561f46a4243448cd8850.vir 2604 virussign.com_5e3faf8e84b4daf17f924222348b7e40.vir 2288 virussign.com_63b60ea31621845106b84ffadd595450.vir 3060 virussign.com_69a1ca89bba5eaf5c37d957e5dfa2100.vir 3388 virussign.com_6fa46e2ce246a8b475b1e9ab31ff9a90.vir 4084 virussign.com_77c61a9112891c7e9515b8c233057ce0.vir 2036 virussign.com_7e107c53eca43a4993f3217ecdf067e0.vir 2388 virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir 4048 virussign.com_8909a327b78df6f1393349086fed94f0.vir 3468 virussign.com_83718ff205885ef58de7f4bd0066b8c0.vir 1272 YkpgUdx.exe 4680 nTaSbpd.exe 4864 tDgMlTj.exe 4504 dWvjqLX.exe 4840 NvcUeug.exe 2612 FB67.exe 4396 XdmrKJp.exe 4428 PWIuFCQ.exe 4296 FfxmTHa.exe 3776 cATTAQN.exe 4968 AdfpKfT.exe 4416 grsOIvi.exe 384 zplrGRr.exe 2432 xqwFlWk.exe 4824 PxRqrWb.exe 4692 vdfpMaZ.exe 3352 DbMNmnr.exe 2704 CDjlnLY.exe 2740 wauIVcS.exe 3404 qyPGCOg.exe 652 tIAoOgG.exe 1656 CSpOGBL.exe 900 hdgsUZl.exe 1856 QikCIUV.exe 2836 rIfmBSx.exe 424 NbcQWyP.exe 1972 NKuFdxP.exe 3340 jrKMTEM.exe 568 bBwzfrB.exe 2304 YKQyLic.exe 5092 jvRNQHD.exe 3028 PCQJOkz.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" virussign.com_0dd8d726d0931d83c953ba0e2abbb9a0.vir Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 3247319787.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Process not Found File opened (read-only) \??\P: Process not Found File opened (read-only) \??\X: Process not Found File opened (read-only) \??\G: Process not Found File opened (read-only) \??\Y: Process not Found File opened (read-only) \??\M: Process not Found File opened (read-only) \??\N: Process not Found File opened (read-only) \??\R: Process not Found File opened (read-only) \??\P: Process not Found File opened (read-only) \??\K: Process not Found File opened (read-only) \??\Y: Process not Found File opened (read-only) \??\A: Process not Found File opened (read-only) \??\X: Process not Found File opened (read-only) \??\O: Process not Found File opened (read-only) \??\B: Process not Found File opened (read-only) \??\V: Process not Found File opened (read-only) \??\E: Process not Found File opened (read-only) \??\J: Process not Found File opened (read-only) \??\W: Process not Found File opened (read-only) \??\A: Process not Found File opened (read-only) \??\S: Process not Found File opened (read-only) \??\B: Process not Found File opened (read-only) \??\R: Process not Found File opened (read-only) \??\T: Process not Found File opened (read-only) \??\Z: Process not Found File opened (read-only) \??\L: Process not Found File opened (read-only) \??\Q: Process not Found File opened (read-only) \??\I: Process not Found File opened (read-only) \??\L: Process not Found File opened (read-only) \??\O: Process not Found File opened (read-only) \??\Q: Process not Found File opened (read-only) \??\S: Process not Found File opened (read-only) \??\I: Process not Found File opened (read-only) \??\K: Process not Found File opened (read-only) \??\U: Process not Found File opened (read-only) \??\H: Process not Found File opened (read-only) \??\J: Process not Found File opened (read-only) \??\U: Process not Found File opened (read-only) \??\W: Process not Found File opened (read-only) \??\T: Process not Found File opened (read-only) \??\V: Process not Found File opened (read-only) \??\Z: Process not Found File opened (read-only) \??\G: Process not Found File opened (read-only) \??\H: Process not Found File opened (read-only) \??\M: Process not Found File opened (read-only) \??\N: Process not Found -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Hcmhel32.dll Iajdgcab.exe File created C:\Windows\SysWOW64\Mjbaohka.dll Process not Found File created C:\Windows\SysWOW64\Qhekaejj.exe Process not Found File created C:\Windows\SysWOW64\Lofllk32.dll Process not Found File created C:\Windows\SysWOW64\Ejiiippb.exe Process not Found File created C:\Windows\SysWOW64\Npbhdogo.dll Process not Found File opened for modification C:\Windows\SysWOW64\Hjcllilo.exe Process not Found File created C:\Windows\SysWOW64\Mapchaef.dll Process not Found File created C:\Windows\SysWOW64\Ddpgfjhm.dll Process not Found File opened for modification C:\Windows\SysWOW64\Idljll32.exe Process not Found File created C:\Windows\SysWOW64\Jcanll32.exe Jgkmgk32.exe File opened for modification C:\Windows\SysWOW64\Omopjcjp.exe Process not Found File created C:\Windows\SysWOW64\Cefked32.dll Process not Found File opened for modification C:\Windows\SysWOW64\Ifqoehhl.exe Process not Found File opened for modification C:\Windows\SysWOW64\Nmajbnha.exe Process not Found File created C:\Windows\SysWOW64\Elmmem32.dll Process not Found File created C:\Windows\SysWOW64\Fjhmbihg.exe Process not Found File created C:\Windows\SysWOW64\Bnblognf.dll Process not Found File created C:\Windows\SysWOW64\Giofggia.exe Process not Found File created C:\Windows\SysWOW64\Migcpneb.exe Process not Found File opened for modification C:\Windows\SysWOW64\Lkhbko32.exe Process not Found File created C:\Windows\SysWOW64\Amjbbfgo.exe Qacameaj.exe File created C:\Windows\SysWOW64\Fbmohmoh.exe Ekcgkb32.exe File created C:\Windows\SysWOW64\Oqmhqapg.exe Process not Found File opened for modification C:\Windows\SysWOW64\Bnlfqngm.exe Process not Found File opened for modification C:\Windows\SysWOW64\Bjjmfn32.exe Process not Found File created C:\Windows\SysWOW64\Ipbaobme.dll Process not Found File created C:\Windows\SysWOW64\Billqhgi.dll Process not Found File created C:\Windows\SysWOW64\Cdpcal32.exe Cocjiehd.exe File created C:\Windows\SysWOW64\Gdknpp32.exe Process not Found File opened for modification C:\Windows\SysWOW64\Jnpjlajn.exe Process not Found File created C:\Windows\SysWOW64\Lelmqm32.dll Process not Found File opened for modification C:\Windows\SysWOW64\Nmfcok32.exe Ngjkfd32.exe File created C:\Windows\SysWOW64\Ebaplnie.exe Dglkoeio.exe File created C:\Windows\SysWOW64\Filapfbo.exe Fnfmbmbi.exe File opened for modification C:\Windows\SysWOW64\Cohkinob.exe Process not Found File created C:\Windows\SysWOW64\Digjeg32.dll Process not Found File created C:\Windows\SysWOW64\Iojbpo32.exe Ifomll32.exe File created C:\Windows\SysWOW64\Gbkkik32.exe Gegkpf32.exe File created C:\Windows\SysWOW64\Ellpmolj.exe Process not Found File created C:\Windows\SysWOW64\Pjngbdgb.dll Process not Found File created C:\Windows\SysWOW64\Ekcgkb32.exe Eiekog32.exe File opened for modification C:\Windows\SysWOW64\Apnndj32.exe Process not Found File opened for modification C:\Windows\SysWOW64\Flmonbbp.exe Process not Found File created C:\Windows\SysWOW64\Mlgpjh32.dll Process not Found File opened for modification C:\Windows\SysWOW64\Dfphmp32.exe Process not Found File created C:\Windows\SysWOW64\Diblgnen.dll Process not Found File created C:\Windows\SysWOW64\Aknbkjfh.exe Amjbbfgo.exe File created C:\Windows\SysWOW64\Leboon32.dll Koajmepf.exe File created C:\Windows\SysWOW64\Lennpb32.exe Process not Found File created C:\Windows\SysWOW64\Ijbbfc32.exe Process not Found File created C:\Windows\SysWOW64\Omhglnhm.dll Process not Found File created C:\Windows\SysWOW64\Ojqnlp32.dll Process not Found File opened for modification C:\Windows\SysWOW64\Opkfjgmh.exe Process not Found File created C:\Windows\SysWOW64\Lojmcdgl.exe Lcclncbh.exe File created C:\Windows\SysWOW64\Amikgpcc.exe Process not Found File opened for modification C:\Windows\SysWOW64\Ijedehgm.exe Process not Found File created C:\Windows\SysWOW64\Pcbdcf32.exe Process not Found File created C:\Windows\SysWOW64\Gccmaack.exe Process not Found File opened for modification C:\Windows\SysWOW64\Mnochl32.exe Process not Found File created C:\Windows\SysWOW64\Ajdbmf32.exe Process not Found File opened for modification C:\Windows\SysWOW64\Hjolie32.exe Process not Found File created C:\Windows\SysWOW64\Efqigigj.dll Process not Found File created C:\Windows\SysWOW64\Oicimc32.dll Process not Found -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4876 set thread context of 36084 4876 virussign.com_0a048f1cdb9480e46de3c80728806f10.vir 2163 PID 25788 set thread context of 1140 25788 Process not Found 5619 PID 25788 set thread context of 14764 25788 Process not Found 5658 -
resource yara_rule behavioral1/files/0x001c00000002aadb-22.dat upx behavioral1/files/0x001900000002aaca-145.dat upx behavioral1/memory/4648-146-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/4648-148-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x001900000002aad1-165.dat upx behavioral1/memory/920-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1000-203-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/4768-237-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/920-255-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1000-296-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\System\jURkMId.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\QeZSNZN.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\hdrFBOa.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\yhVuWTo.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\NPKmqJY.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\CusjwHC.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\AAFIoLE.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\QNPLwPn.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\dTKyCjw.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\jhQSoZh.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\FYaIWlz.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\eKzhpmX.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\hYAtTFV.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\STllQVw.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\EVmwZTS.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\dKAYWPx.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\igoUTGo.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\SomMtrV.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\HDClfiJ.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\EjKjJZV.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\FyHVsrH.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\RGSpSmv.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\GKibona.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\riDqDNq.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\eLXrTFt.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\GqgXMfg.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\occWBox.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\pLQJGRN.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\tIuEkdL.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File opened for modification C:\Windows\Installer\ Process not Found File created C:\Windows\System\xYvwLeE.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\eaWulrn.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\XrNrJnY.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\YuWldSB.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\DjCingo.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\keIrEvf.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\NAVnYaG.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\EIhMvNw.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\TbhrPDA.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\msjhPKe.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\cQRqaGk.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\WdBXngX.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\zIdPGsb.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\GrvqqCg.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\ZgvbDOD.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\XqLCkqJ.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\rhEMvpQ.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\KLVMfer.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\SdyNMnB.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\qTSqtjf.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\RFxDPNQ.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\JaYWpIo.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\qWPqJoO.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\GvMugxS.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\AArFIho.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\wayjCDL.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\LpNXUrv.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\vieDIBf.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\xsscwRv.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\GnpoLkw.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\VUZWGjt.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\znCOPhA.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\uSHCfHv.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir File created C:\Windows\System\ENlDRjZ.exe virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 3552 5092 WerFault.exe 94 224 2068 WerFault.exe 104 3496 1280 WerFault.exe 86 38384 39540 Process not Found 2378 10828 10212 Process not Found 2796 31032 32472 Process not Found 3600 34516 37208 Process not Found 3663 40340 42928 Process not Found 4528 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opnbae32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dndgfpbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dqpfmlce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fbmohmoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hlbcnd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nfcabp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language virussign.com_8909a327b78df6f1393349086fed94f0.vir Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iefgbh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lojmcdgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 29716 Process not Found -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Leecmgpa.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngpekcgb.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boldhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkdhjjqh.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diohqplg.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gginjc32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phbcfe32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmcniamb.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Johmahhb.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdbmge32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbjlkd32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fiqjke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjemge32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Leboon32.dll" Koajmepf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgnmff32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epmani32.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfiddm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iefgbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnijfj32.dll" Enmjlojd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcanll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljnjmcie.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfpjlgdl.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojajin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ombcji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mneoha32.dll" Jafdcbge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjemgpnb.dll" Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 35056 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 21480 Process not Found 21480 Process not Found 21480 Process not Found 21480 Process not Found 26004 Process not Found 26004 Process not Found 31496 Process not Found 31496 Process not Found 31496 Process not Found 31496 Process not Found 36084 Process not Found 36084 Process not Found 36084 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 38360 Process not Found 37224 Process not Found 37224 Process not Found 14384 Process not Found 14384 Process not Found 14384 Process not Found 37224 Process not Found 37224 Process not Found 30996 Process not Found 30996 Process not Found 38928 Process not Found 38928 Process not Found 25788 Process not Found 25788 Process not Found 25788 Process not Found 10012 Process not Found 10012 Process not Found 10012 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2136 7zFM.exe 2388 virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2136 7zFM.exe Token: 35 2136 7zFM.exe Token: SeSecurityPrivilege 2136 7zFM.exe Token: SeDebugPrivilege 21480 Process not Found Token: SeDebugPrivilege 26004 Process not Found Token: SeDebugPrivilege 31496 Process not Found Token: SeDebugPrivilege 36084 Process not Found Token: SeDebugPrivilege 14384 Process not Found Token: SeIncBasePriorityPrivilege 38020 Process not Found Token: SeIncreaseQuotaPrivilege 14384 Process not Found Token: SeSecurityPrivilege 14384 Process not Found Token: SeTakeOwnershipPrivilege 14384 Process not Found Token: SeLoadDriverPrivilege 14384 Process not Found Token: SeSystemProfilePrivilege 14384 Process not Found Token: SeSystemtimePrivilege 14384 Process not Found Token: SeProfSingleProcessPrivilege 14384 Process not Found Token: SeIncBasePriorityPrivilege 14384 Process not Found Token: SeCreatePagefilePrivilege 14384 Process not Found Token: SeBackupPrivilege 14384 Process not Found Token: SeRestorePrivilege 14384 Process not Found Token: SeShutdownPrivilege 14384 Process not Found Token: SeDebugPrivilege 14384 Process not Found Token: SeSystemEnvironmentPrivilege 14384 Process not Found Token: SeRemoteShutdownPrivilege 14384 Process not Found Token: SeUndockPrivilege 14384 Process not Found Token: SeManageVolumePrivilege 14384 Process not Found Token: 33 14384 Process not Found Token: 34 14384 Process not Found Token: 35 14384 Process not Found Token: 36 14384 Process not Found Token: SeIncreaseQuotaPrivilege 14384 Process not Found Token: SeSecurityPrivilege 14384 Process not Found Token: SeTakeOwnershipPrivilege 14384 Process not Found Token: SeLoadDriverPrivilege 14384 Process not Found Token: SeSystemProfilePrivilege 14384 Process not Found Token: SeSystemtimePrivilege 14384 Process not Found Token: SeProfSingleProcessPrivilege 14384 Process not Found Token: SeIncBasePriorityPrivilege 14384 Process not Found Token: SeCreatePagefilePrivilege 14384 Process not Found Token: SeBackupPrivilege 14384 Process not Found Token: SeRestorePrivilege 14384 Process not Found Token: SeShutdownPrivilege 14384 Process not Found Token: SeDebugPrivilege 14384 Process not Found Token: SeSystemEnvironmentPrivilege 14384 Process not Found Token: SeRemoteShutdownPrivilege 14384 Process not Found Token: SeUndockPrivilege 14384 Process not Found Token: SeManageVolumePrivilege 14384 Process not Found Token: 33 14384 Process not Found Token: 34 14384 Process not Found Token: 35 14384 Process not Found Token: 36 14384 Process not Found Token: SeIncreaseQuotaPrivilege 14384 Process not Found Token: SeSecurityPrivilege 14384 Process not Found Token: SeTakeOwnershipPrivilege 14384 Process not Found Token: SeLoadDriverPrivilege 14384 Process not Found Token: SeSystemProfilePrivilege 14384 Process not Found Token: SeSystemtimePrivilege 14384 Process not Found Token: SeProfSingleProcessPrivilege 14384 Process not Found Token: SeIncBasePriorityPrivilege 14384 Process not Found Token: SeCreatePagefilePrivilege 14384 Process not Found Token: SeBackupPrivilege 14384 Process not Found Token: SeRestorePrivilege 14384 Process not Found Token: SeShutdownPrivilege 14384 Process not Found Token: SeDebugPrivilege 14384 Process not Found -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2136 7zFM.exe 2136 7zFM.exe 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found 14764 Process not Found -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 1280 virussign.com_05c3078160025e055e31b207b2c9fae0.vir 2436 OpenWith.exe 2284 virussign.com_176ead841fd513c687d7bb949df1b790.vir 5092 virussign.com_116ce2a1fd49210068a0f473842d5040.vir 2020 OpenWith.exe 3816 virussign.com_1c03261b3c48f6ee44730d62e5c70ec0.vir 4708 virussign.com_20bb9d6e02a7abd5ed80b5211a3f6020.vir 4172 virussign.com_2d9a6d9b9052b149d0f080b2f1a9f0b0.vir 2324 virussign.com_43e1fe6e5f9bab4195ccda4978913650.vir 4924 virussign.com_5884d29c32afb422ab56a704852d5d10.vir 2604 virussign.com_5e3faf8e84b4daf17f924222348b7e40.vir 2288 virussign.com_63b60ea31621845106b84ffadd595450.vir 784 OpenWith.exe 4084 virussign.com_77c61a9112891c7e9515b8c233057ce0.vir 2036 virussign.com_7e107c53eca43a4993f3217ecdf067e0.vir 3468 virussign.com_83718ff205885ef58de7f4bd0066b8c0.vir 1780 OpenWith.exe 3932 virussign.com_8df053c876529979fc9aa0b52c344150.vir 7480 OpenWith.exe 21096 Process not Found 25568 Process not Found 38360 Process not Found 38360 Process not Found 35416 Process not Found 14424 Process not Found 11148 Process not Found 12340 Process not Found 21628 Process not Found 24772 Process not Found 17872 Process not Found 23444 Process not Found 39968 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4648 2796 cmd.exe 82 PID 2796 wrote to memory of 4648 2796 cmd.exe 82 PID 2796 wrote to memory of 4648 2796 cmd.exe 82 PID 2796 wrote to memory of 4768 2796 cmd.exe 83 PID 2796 wrote to memory of 4768 2796 cmd.exe 83 PID 2796 wrote to memory of 4768 2796 cmd.exe 83 PID 2796 wrote to memory of 3236 2796 cmd.exe 85 PID 2796 wrote to memory of 3236 2796 cmd.exe 85 PID 2796 wrote to memory of 3236 2796 cmd.exe 85 PID 2796 wrote to memory of 1280 2796 cmd.exe 86 PID 2796 wrote to memory of 1280 2796 cmd.exe 86 PID 2796 wrote to memory of 1280 2796 cmd.exe 86 PID 2796 wrote to memory of 4876 2796 cmd.exe 88 PID 2796 wrote to memory of 4876 2796 cmd.exe 88 PID 2796 wrote to memory of 4876 2796 cmd.exe 88 PID 2796 wrote to memory of 920 2796 cmd.exe 89 PID 2796 wrote to memory of 920 2796 cmd.exe 89 PID 2796 wrote to memory of 920 2796 cmd.exe 89 PID 2796 wrote to memory of 3276 2796 cmd.exe 90 PID 2796 wrote to memory of 3276 2796 cmd.exe 90 PID 2796 wrote to memory of 3276 2796 cmd.exe 90 PID 3276 wrote to memory of 3120 3276 virussign.com_0dd8d726d0931d83c953ba0e2abbb9a0.vir 93 PID 3276 wrote to memory of 3120 3276 virussign.com_0dd8d726d0931d83c953ba0e2abbb9a0.vir 93 PID 3276 wrote to memory of 3120 3276 virussign.com_0dd8d726d0931d83c953ba0e2abbb9a0.vir 93 PID 2796 wrote to memory of 5092 2796 cmd.exe 163 PID 2796 wrote to memory of 5092 2796 cmd.exe 163 PID 2796 wrote to memory of 5092 2796 cmd.exe 163 PID 2796 wrote to memory of 2284 2796 cmd.exe 95 PID 2796 wrote to memory of 2284 2796 cmd.exe 95 PID 2796 wrote to memory of 2284 2796 cmd.exe 95 PID 2796 wrote to memory of 3816 2796 cmd.exe 96 PID 2796 wrote to memory of 3816 2796 cmd.exe 96 PID 2796 wrote to memory of 3816 2796 cmd.exe 96 PID 2796 wrote to memory of 1000 2796 cmd.exe 97 PID 2796 wrote to memory of 1000 2796 cmd.exe 97 PID 2796 wrote to memory of 1000 2796 cmd.exe 97 PID 2796 wrote to memory of 4708 2796 cmd.exe 100 PID 2796 wrote to memory of 4708 2796 cmd.exe 100 PID 2796 wrote to memory of 4708 2796 cmd.exe 100 PID 2796 wrote to memory of 2860 2796 cmd.exe 174 PID 2796 wrote to memory of 2860 2796 cmd.exe 174 PID 2796 wrote to memory of 2860 2796 cmd.exe 174 PID 2796 wrote to memory of 4172 2796 cmd.exe 102 PID 2796 wrote to memory of 4172 2796 cmd.exe 102 PID 2796 wrote to memory of 4172 2796 cmd.exe 102 PID 2796 wrote to memory of 3920 2796 cmd.exe 103 PID 2796 wrote to memory of 3920 2796 cmd.exe 103 PID 2796 wrote to memory of 3920 2796 cmd.exe 103 PID 2796 wrote to memory of 2068 2796 cmd.exe 104 PID 2796 wrote to memory of 2068 2796 cmd.exe 104 PID 2796 wrote to memory of 2068 2796 cmd.exe 104 PID 2796 wrote to memory of 2332 2796 cmd.exe 105 PID 2796 wrote to memory of 2332 2796 cmd.exe 105 PID 2796 wrote to memory of 2332 2796 cmd.exe 105 PID 2796 wrote to memory of 2324 2796 cmd.exe 113 PID 2796 wrote to memory of 2324 2796 cmd.exe 113 PID 2796 wrote to memory of 2324 2796 cmd.exe 113 PID 2796 wrote to memory of 4112 2796 cmd.exe 243 PID 2796 wrote to memory of 4112 2796 cmd.exe 243 PID 2796 wrote to memory of 4112 2796 cmd.exe 243 PID 2796 wrote to memory of 1020 2796 cmd.exe 115 PID 2796 wrote to memory of 1020 2796 cmd.exe 115 PID 2796 wrote to memory of 1020 2796 cmd.exe 115 PID 2796 wrote to memory of 4924 2796 cmd.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3368
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\virussign.com_20241209_LimitedFree.zip"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2136
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\Desktop\malwar\virussign.com_02086fe70be8b2f98a26c8976ebffa50.virvirussign.com_02086fe70be8b2f98a26c8976ebffa50.vir3⤵
- Executes dropped EXE
PID:4648
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_02086fe70be8b2f98a26c8976ebffa50.virvirussign.com_02086fe70be8b2f98a26c8976ebffa50.vir3⤵
- Executes dropped EXE
PID:4768
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_02430a5aa0fade970b559057312773f0.virvirussign.com_02430a5aa0fade970b559057312773f0.vir3⤵
- Executes dropped EXE
PID:3236
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_05c3078160025e055e31b207b2c9fae0.virvirussign.com_05c3078160025e055e31b207b2c9fae0.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 5924⤵
- Program crash
PID:3496
-
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_0a048f1cdb9480e46de3c80728806f10.virvirussign.com_0a048f1cdb9480e46de3c80728806f10.vir3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4876
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_0b9d792e46792ac3ae996fab5d916810.virvirussign.com_0b9d792e46792ac3ae996fab5d916810.vir3⤵
- Executes dropped EXE
PID:920
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_0dd8d726d0931d83c953ba0e2abbb9a0.virvirussign.com_0dd8d726d0931d83c953ba0e2abbb9a0.vir3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"4⤵
- Executes dropped EXE
PID:3120
-
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_116ce2a1fd49210068a0f473842d5040.virvirussign.com_116ce2a1fd49210068a0f473842d5040.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 5324⤵
- Program crash
PID:3552
-
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_176ead841fd513c687d7bb949df1b790.virvirussign.com_176ead841fd513c687d7bb949df1b790.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_1c03261b3c48f6ee44730d62e5c70ec0.virvirussign.com_1c03261b3c48f6ee44730d62e5c70ec0.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3816
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_1c6a0eb754eb16314dc4cdfaf6297330.virvirussign.com_1c6a0eb754eb16314dc4cdfaf6297330.vir3⤵
- Executes dropped EXE
PID:1000
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_20bb9d6e02a7abd5ed80b5211a3f6020.virvirussign.com_20bb9d6e02a7abd5ed80b5211a3f6020.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_26dd5367688cd475f2ff8d7ec0410230.virvirussign.com_26dd5367688cd475f2ff8d7ec0410230.vir3⤵
- Executes dropped EXE
PID:2860
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_2d9a6d9b9052b149d0f080b2f1a9f0b0.virvirussign.com_2d9a6d9b9052b149d0f080b2f1a9f0b0.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4172
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_3480729f9572c299fcc9e8cd77904ca0.virvirussign.com_3480729f9572c299fcc9e8cd77904ca0.vir3⤵
- Executes dropped EXE
PID:3920
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_37c7709ab0aed9b20b56ed66a7d12100.virvirussign.com_37c7709ab0aed9b20b56ed66a7d12100.vir3⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 4204⤵
- Program crash
PID:224
-
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_3bb1202078a92cea11a60eb07a588940.virvirussign.com_3bb1202078a92cea11a60eb07a588940.vir3⤵
- Executes dropped EXE
PID:2332
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_43e1fe6e5f9bab4195ccda4978913650.virvirussign.com_43e1fe6e5f9bab4195ccda4978913650.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_48c9dc42ce81f9c3af8c82aa6517f370.virvirussign.com_48c9dc42ce81f9c3af8c82aa6517f370.vir3⤵
- Executes dropped EXE
PID:4112
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_5189ffb7311dfb72033379662d41ce60.virvirussign.com_5189ffb7311dfb72033379662d41ce60.vir3⤵
- Executes dropped EXE
PID:1020
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_5884d29c32afb422ab56a704852d5d10.virvirussign.com_5884d29c32afb422ab56a704852d5d10.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_5d7e49a025c7561f46a4243448cd8850.virvirussign.com_5d7e49a025c7561f46a4243448cd8850.vir3⤵
- Executes dropped EXE
PID:940 -
C:\Users\Admin\AppData\Local\Temp\FB67.exe"C:\Users\Admin\AppData\Local\Temp\FB67.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3247319787.exeC:\Users\Admin\AppData\Local\Temp\3247319787.exe5⤵
- Adds Run key to start application
PID:9212 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe6⤵PID:6692
-
-
-
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_5e3faf8e84b4daf17f924222348b7e40.virvirussign.com_5e3faf8e84b4daf17f924222348b7e40.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_63b60ea31621845106b84ffadd595450.virvirussign.com_63b60ea31621845106b84ffadd595450.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_69a1ca89bba5eaf5c37d957e5dfa2100.virvirussign.com_69a1ca89bba5eaf5c37d957e5dfa2100.vir3⤵
- Executes dropped EXE
PID:3060
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_6fa46e2ce246a8b475b1e9ab31ff9a90.virvirussign.com_6fa46e2ce246a8b475b1e9ab31ff9a90.vir3⤵
- Executes dropped EXE
PID:3388
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_77c61a9112891c7e9515b8c233057ce0.virvirussign.com_77c61a9112891c7e9515b8c233057ce0.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4084
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_7e107c53eca43a4993f3217ecdf067e0.virvirussign.com_7e107c53eca43a4993f3217ecdf067e0.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_83718ff205885ef58de7f4bd0066b8c0.virvirussign.com_83718ff205885ef58de7f4bd0066b8c0.vir3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3468
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.virvirussign.com_83bcae31c2be9cfb988eb4cb5150a6a0.vir3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
PID:2388 -
C:\Windows\System\YkpgUdx.exeC:\Windows\System\YkpgUdx.exe4⤵
- Executes dropped EXE
PID:1272
-
-
C:\Windows\System\nTaSbpd.exeC:\Windows\System\nTaSbpd.exe4⤵
- Executes dropped EXE
PID:4680
-
-
C:\Windows\System\tDgMlTj.exeC:\Windows\System\tDgMlTj.exe4⤵
- Executes dropped EXE
PID:4864
-
-
C:\Windows\System\dWvjqLX.exeC:\Windows\System\dWvjqLX.exe4⤵
- Executes dropped EXE
PID:4504
-
-
C:\Windows\System\NvcUeug.exeC:\Windows\System\NvcUeug.exe4⤵
- Executes dropped EXE
PID:4840
-
-
C:\Windows\System\XdmrKJp.exeC:\Windows\System\XdmrKJp.exe4⤵
- Executes dropped EXE
PID:4396
-
-
C:\Windows\System\PWIuFCQ.exeC:\Windows\System\PWIuFCQ.exe4⤵
- Executes dropped EXE
PID:4428
-
-
C:\Windows\System\FfxmTHa.exeC:\Windows\System\FfxmTHa.exe4⤵
- Executes dropped EXE
PID:4296
-
-
C:\Windows\System\cATTAQN.exeC:\Windows\System\cATTAQN.exe4⤵
- Executes dropped EXE
PID:3776
-
-
C:\Windows\System\AdfpKfT.exeC:\Windows\System\AdfpKfT.exe4⤵
- Executes dropped EXE
PID:4968
-
-
C:\Windows\System\grsOIvi.exeC:\Windows\System\grsOIvi.exe4⤵
- Executes dropped EXE
PID:4416
-
-
C:\Windows\System\zplrGRr.exeC:\Windows\System\zplrGRr.exe4⤵
- Executes dropped EXE
PID:384
-
-
C:\Windows\System\xqwFlWk.exeC:\Windows\System\xqwFlWk.exe4⤵
- Executes dropped EXE
PID:2432
-
-
C:\Windows\System\PxRqrWb.exeC:\Windows\System\PxRqrWb.exe4⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\System\vdfpMaZ.exeC:\Windows\System\vdfpMaZ.exe4⤵
- Executes dropped EXE
PID:4692
-
-
C:\Windows\System\DbMNmnr.exeC:\Windows\System\DbMNmnr.exe4⤵
- Executes dropped EXE
PID:3352
-
-
C:\Windows\System\CDjlnLY.exeC:\Windows\System\CDjlnLY.exe4⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\System\wauIVcS.exeC:\Windows\System\wauIVcS.exe4⤵
- Executes dropped EXE
PID:2740
-
-
C:\Windows\System\qyPGCOg.exeC:\Windows\System\qyPGCOg.exe4⤵
- Executes dropped EXE
PID:3404
-
-
C:\Windows\System\tIAoOgG.exeC:\Windows\System\tIAoOgG.exe4⤵
- Executes dropped EXE
PID:652
-
-
C:\Windows\System\CSpOGBL.exeC:\Windows\System\CSpOGBL.exe4⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\System\hdgsUZl.exeC:\Windows\System\hdgsUZl.exe4⤵
- Executes dropped EXE
PID:900
-
-
C:\Windows\System\QikCIUV.exeC:\Windows\System\QikCIUV.exe4⤵
- Executes dropped EXE
PID:1856
-
-
C:\Windows\System\rIfmBSx.exeC:\Windows\System\rIfmBSx.exe4⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\System\NbcQWyP.exeC:\Windows\System\NbcQWyP.exe4⤵
- Executes dropped EXE
PID:424
-
-
C:\Windows\System\NKuFdxP.exeC:\Windows\System\NKuFdxP.exe4⤵
- Executes dropped EXE
PID:1972
-
-
C:\Windows\System\jrKMTEM.exeC:\Windows\System\jrKMTEM.exe4⤵
- Executes dropped EXE
PID:3340
-
-
C:\Windows\System\bBwzfrB.exeC:\Windows\System\bBwzfrB.exe4⤵
- Executes dropped EXE
PID:568
-
-
C:\Windows\System\YKQyLic.exeC:\Windows\System\YKQyLic.exe4⤵
- Executes dropped EXE
PID:2304
-
-
C:\Windows\System\gavtdsw.exeC:\Windows\System\gavtdsw.exe4⤵PID:4300
-
-
C:\Windows\System\jvRNQHD.exeC:\Windows\System\jvRNQHD.exe4⤵
- Executes dropped EXE
PID:5092
-
-
C:\Windows\System\PCQJOkz.exeC:\Windows\System\PCQJOkz.exe4⤵
- Executes dropped EXE
PID:3028
-
-
C:\Windows\System\AgEaCsM.exeC:\Windows\System\AgEaCsM.exe4⤵PID:4004
-
-
C:\Windows\System\ONbQlxG.exeC:\Windows\System\ONbQlxG.exe4⤵PID:3508
-
-
C:\Windows\System\ifllUGC.exeC:\Windows\System\ifllUGC.exe4⤵PID:964
-
-
C:\Windows\System\moUEsnt.exeC:\Windows\System\moUEsnt.exe4⤵PID:2500
-
-
C:\Windows\System\IzODZtb.exeC:\Windows\System\IzODZtb.exe4⤵PID:5064
-
-
C:\Windows\System\aYGfMzo.exeC:\Windows\System\aYGfMzo.exe4⤵PID:1944
-
-
C:\Windows\System\pGdeoCR.exeC:\Windows\System\pGdeoCR.exe4⤵PID:2264
-
-
C:\Windows\System\qxaJqLp.exeC:\Windows\System\qxaJqLp.exe4⤵PID:3928
-
-
C:\Windows\System\BvWysvE.exeC:\Windows\System\BvWysvE.exe4⤵PID:1056
-
-
C:\Windows\System\NdHIqFI.exeC:\Windows\System\NdHIqFI.exe4⤵PID:2860
-
-
C:\Windows\System\DKDQWTc.exeC:\Windows\System\DKDQWTc.exe4⤵PID:3480
-
-
C:\Windows\System\BeegioP.exeC:\Windows\System\BeegioP.exe4⤵PID:2728
-
-
C:\Windows\System\kyjJEyl.exeC:\Windows\System\kyjJEyl.exe4⤵PID:2200
-
-
C:\Windows\System\moyUybU.exeC:\Windows\System\moyUybU.exe4⤵PID:2600
-
-
C:\Windows\System\zhvjbam.exeC:\Windows\System\zhvjbam.exe4⤵PID:3524
-
-
C:\Windows\System\EZVhlEu.exeC:\Windows\System\EZVhlEu.exe4⤵PID:1872
-
-
C:\Windows\System\rnexFTh.exeC:\Windows\System\rnexFTh.exe4⤵PID:3780
-
-
C:\Windows\System\IGpZcwq.exeC:\Windows\System\IGpZcwq.exe4⤵PID:1688
-
-
C:\Windows\System\gJuenmD.exeC:\Windows\System\gJuenmD.exe4⤵PID:4836
-
-
C:\Windows\System\VTSQBDz.exeC:\Windows\System\VTSQBDz.exe4⤵PID:2020
-
-
C:\Windows\System\FuZqITx.exeC:\Windows\System\FuZqITx.exe4⤵PID:3896
-
-
C:\Windows\System\ZMFOOFB.exeC:\Windows\System\ZMFOOFB.exe4⤵PID:3824
-
-
C:\Windows\System\kAGPshs.exeC:\Windows\System\kAGPshs.exe4⤵PID:5088
-
-
C:\Windows\System\ZgugEmb.exeC:\Windows\System\ZgugEmb.exe4⤵PID:1448
-
-
C:\Windows\System\VyuCJFG.exeC:\Windows\System\VyuCJFG.exe4⤵PID:4552
-
-
C:\Windows\System\JQTEoce.exeC:\Windows\System\JQTEoce.exe4⤵PID:4592
-
-
C:\Windows\System\BstYjIX.exeC:\Windows\System\BstYjIX.exe4⤵PID:3040
-
-
C:\Windows\System\VPfzbYu.exeC:\Windows\System\VPfzbYu.exe4⤵PID:580
-
-
C:\Windows\System\BIRlLip.exeC:\Windows\System\BIRlLip.exe4⤵PID:1304
-
-
C:\Windows\System\pzdUaBY.exeC:\Windows\System\pzdUaBY.exe4⤵PID:3424
-
-
C:\Windows\System\xTWOHtj.exeC:\Windows\System\xTWOHtj.exe4⤵PID:3536
-
-
C:\Windows\System\wDyNwDl.exeC:\Windows\System\wDyNwDl.exe4⤵PID:5152
-
-
C:\Windows\System\zNQyGjc.exeC:\Windows\System\zNQyGjc.exe4⤵PID:5180
-
-
C:\Windows\System\bAMRIKm.exeC:\Windows\System\bAMRIKm.exe4⤵PID:5200
-
-
C:\Windows\System\hkKopfg.exeC:\Windows\System\hkKopfg.exe4⤵PID:5216
-
-
C:\Windows\System\CSSqMMQ.exeC:\Windows\System\CSSqMMQ.exe4⤵PID:5232
-
-
C:\Windows\System\jDsbjFl.exeC:\Windows\System\jDsbjFl.exe4⤵PID:5248
-
-
C:\Windows\System\gDMdIuz.exeC:\Windows\System\gDMdIuz.exe4⤵PID:5316
-
-
C:\Windows\System\aFnukGw.exeC:\Windows\System\aFnukGw.exe4⤵PID:5360
-
-
C:\Windows\System\sCGwkOt.exeC:\Windows\System\sCGwkOt.exe4⤵PID:5376
-
-
C:\Windows\System\iLRMXRU.exeC:\Windows\System\iLRMXRU.exe4⤵PID:5392
-
-
C:\Windows\System\aLBfsWy.exeC:\Windows\System\aLBfsWy.exe4⤵PID:5408
-
-
C:\Windows\System\URWLfPQ.exeC:\Windows\System\URWLfPQ.exe4⤵PID:5428
-
-
C:\Windows\System\WMDmIvY.exeC:\Windows\System\WMDmIvY.exe4⤵PID:5452
-
-
C:\Windows\System\rPOQdUl.exeC:\Windows\System\rPOQdUl.exe4⤵PID:5472
-
-
C:\Windows\System\JcGtRGX.exeC:\Windows\System\JcGtRGX.exe4⤵PID:5488
-
-
C:\Windows\System\dPrVfgD.exeC:\Windows\System\dPrVfgD.exe4⤵PID:5512
-
-
C:\Windows\System\lwHpxgF.exeC:\Windows\System\lwHpxgF.exe4⤵PID:5556
-
-
C:\Windows\System\OxEmUnt.exeC:\Windows\System\OxEmUnt.exe4⤵PID:5584
-
-
C:\Windows\System\HeSHdrz.exeC:\Windows\System\HeSHdrz.exe4⤵PID:5628
-
-
C:\Windows\System\OzpbWaf.exeC:\Windows\System\OzpbWaf.exe4⤵PID:5660
-
-
C:\Windows\System\ewkYEBX.exeC:\Windows\System\ewkYEBX.exe4⤵PID:5684
-
-
C:\Windows\System\azhAsHr.exeC:\Windows\System\azhAsHr.exe4⤵PID:5704
-
-
C:\Windows\System\fVmtRgL.exeC:\Windows\System\fVmtRgL.exe4⤵PID:5736
-
-
C:\Windows\System\tQzHoLQ.exeC:\Windows\System\tQzHoLQ.exe4⤵PID:5776
-
-
C:\Windows\System\tNJUMfc.exeC:\Windows\System\tNJUMfc.exe4⤵PID:5800
-
-
C:\Windows\System\swCFOvd.exeC:\Windows\System\swCFOvd.exe4⤵PID:5816
-
-
C:\Windows\System\vfTbWUT.exeC:\Windows\System\vfTbWUT.exe4⤵PID:5832
-
-
C:\Windows\System\XYygtLr.exeC:\Windows\System\XYygtLr.exe4⤵PID:5880
-
-
C:\Windows\System\EquCaQk.exeC:\Windows\System\EquCaQk.exe4⤵PID:5900
-
-
C:\Windows\System\xZwgdHe.exeC:\Windows\System\xZwgdHe.exe4⤵PID:5932
-
-
C:\Windows\System\tPkAzmM.exeC:\Windows\System\tPkAzmM.exe4⤵PID:5980
-
-
C:\Windows\System\WPhxKQr.exeC:\Windows\System\WPhxKQr.exe4⤵PID:6004
-
-
C:\Windows\System\XQojKiE.exeC:\Windows\System\XQojKiE.exe4⤵PID:6052
-
-
C:\Windows\System\LSHEAsw.exeC:\Windows\System\LSHEAsw.exe4⤵PID:6068
-
-
C:\Windows\System\ipSUcFh.exeC:\Windows\System\ipSUcFh.exe4⤵PID:6088
-
-
C:\Windows\System\SKkqxVJ.exeC:\Windows\System\SKkqxVJ.exe4⤵PID:6120
-
-
C:\Windows\System\jhXnyyf.exeC:\Windows\System\jhXnyyf.exe4⤵PID:1116
-
-
C:\Windows\System\QPBldqJ.exeC:\Windows\System\QPBldqJ.exe4⤵PID:2072
-
-
C:\Windows\System\TGhxeCW.exeC:\Windows\System\TGhxeCW.exe4⤵PID:4112
-
-
C:\Windows\System\tEfomLr.exeC:\Windows\System\tEfomLr.exe4⤵PID:5188
-
-
C:\Windows\System\RJhkoZC.exeC:\Windows\System\RJhkoZC.exe4⤵PID:4612
-
-
C:\Windows\System\gceclBi.exeC:\Windows\System\gceclBi.exe4⤵PID:5176
-
-
C:\Windows\System\dzhgAJz.exeC:\Windows\System\dzhgAJz.exe4⤵PID:5356
-
-
C:\Windows\System\ysdfZbf.exeC:\Windows\System\ysdfZbf.exe4⤵PID:5168
-
-
C:\Windows\System\mhKNASg.exeC:\Windows\System\mhKNASg.exe4⤵PID:5448
-
-
C:\Windows\System\TtuVafl.exeC:\Windows\System\TtuVafl.exe4⤵PID:5528
-
-
C:\Windows\System\KBhVvHw.exeC:\Windows\System\KBhVvHw.exe4⤵PID:5388
-
-
C:\Windows\System\FdwziSG.exeC:\Windows\System\FdwziSG.exe4⤵PID:5468
-
-
C:\Windows\System\AyXgnqA.exeC:\Windows\System\AyXgnqA.exe4⤵PID:5812
-
-
C:\Windows\System\uyfCPFT.exeC:\Windows\System\uyfCPFT.exe4⤵PID:5896
-
-
C:\Windows\System\XZKRcSl.exeC:\Windows\System\XZKRcSl.exe4⤵PID:5996
-
-
C:\Windows\System\VwNdDKM.exeC:\Windows\System\VwNdDKM.exe4⤵PID:5916
-
-
C:\Windows\System\BETUoaF.exeC:\Windows\System\BETUoaF.exe4⤵PID:5788
-
-
C:\Windows\System\HjUrmhZ.exeC:\Windows\System\HjUrmhZ.exe4⤵PID:6132
-
-
C:\Windows\System\aEXXTGJ.exeC:\Windows\System\aEXXTGJ.exe4⤵PID:6076
-
-
C:\Windows\System\uZHxDAh.exeC:\Windows\System\uZHxDAh.exe4⤵PID:1348
-
-
C:\Windows\System\vrlOsjo.exeC:\Windows\System\vrlOsjo.exe4⤵PID:5416
-
-
C:\Windows\System\muKEDOo.exeC:\Windows\System\muKEDOo.exe4⤵PID:3388
-
-
C:\Windows\System\ZNrJgIy.exeC:\Windows\System\ZNrJgIy.exe4⤵PID:6176
-
-
C:\Windows\System\EWNEtVj.exeC:\Windows\System\EWNEtVj.exe4⤵PID:6212
-
-
C:\Windows\System\QsTMgOl.exeC:\Windows\System\QsTMgOl.exe4⤵PID:6248
-
-
C:\Windows\System\ehOkqnJ.exeC:\Windows\System\ehOkqnJ.exe4⤵PID:6300
-
-
C:\Windows\System\vvMpmoL.exeC:\Windows\System\vvMpmoL.exe4⤵PID:6364
-
-
C:\Windows\System\UgiZaPQ.exeC:\Windows\System\UgiZaPQ.exe4⤵PID:6400
-
-
C:\Windows\System\DqZXDiJ.exeC:\Windows\System\DqZXDiJ.exe4⤵PID:6420
-
-
C:\Windows\System\WwbggSl.exeC:\Windows\System\WwbggSl.exe4⤵PID:6452
-
-
C:\Windows\System\ETxWdKX.exeC:\Windows\System\ETxWdKX.exe4⤵PID:6484
-
-
C:\Windows\System\dtLejSt.exeC:\Windows\System\dtLejSt.exe4⤵PID:6500
-
-
C:\Windows\System\btGZWmf.exeC:\Windows\System\btGZWmf.exe4⤵PID:6544
-
-
C:\Windows\System\nIVVDcz.exeC:\Windows\System\nIVVDcz.exe4⤵PID:6592
-
-
C:\Windows\System\dDbHnPi.exeC:\Windows\System\dDbHnPi.exe4⤵PID:6624
-
-
C:\Windows\System\QzDCtDm.exeC:\Windows\System\QzDCtDm.exe4⤵PID:6652
-
-
C:\Windows\System\vkhcgEz.exeC:\Windows\System\vkhcgEz.exe4⤵PID:6684
-
-
C:\Windows\System\iLroPke.exeC:\Windows\System\iLroPke.exe4⤵PID:6720
-
-
C:\Windows\System\UpOStnB.exeC:\Windows\System\UpOStnB.exe4⤵PID:6760
-
-
C:\Windows\System\pAWRqpH.exeC:\Windows\System\pAWRqpH.exe4⤵PID:6796
-
-
C:\Windows\System\ZNGxEVb.exeC:\Windows\System\ZNGxEVb.exe4⤵PID:6820
-
-
C:\Windows\System\aInoYBj.exeC:\Windows\System\aInoYBj.exe4⤵PID:6844
-
-
C:\Windows\System\jtDMUaO.exeC:\Windows\System\jtDMUaO.exe4⤵PID:6876
-
-
C:\Windows\System\zRIyarP.exeC:\Windows\System\zRIyarP.exe4⤵PID:6908
-
-
C:\Windows\System\LuonjPz.exeC:\Windows\System\LuonjPz.exe4⤵PID:6944
-
-
C:\Windows\System\ZWifWrL.exeC:\Windows\System\ZWifWrL.exe4⤵PID:6968
-
-
C:\Windows\System\EuAXPxM.exeC:\Windows\System\EuAXPxM.exe4⤵PID:6996
-
-
C:\Windows\System\YcwvgVu.exeC:\Windows\System\YcwvgVu.exe4⤵PID:7036
-
-
C:\Windows\System\CWVUUOR.exeC:\Windows\System\CWVUUOR.exe4⤵PID:7068
-
-
C:\Windows\System\sVYcNOU.exeC:\Windows\System\sVYcNOU.exe4⤵PID:7096
-
-
C:\Windows\System\grEVzTA.exeC:\Windows\System\grEVzTA.exe4⤵PID:7120
-
-
C:\Windows\System\MgTrxLE.exeC:\Windows\System\MgTrxLE.exe4⤵PID:7144
-
-
C:\Windows\System\nOiThgW.exeC:\Windows\System\nOiThgW.exe4⤵PID:6028
-
-
C:\Windows\System\uDIZaNS.exeC:\Windows\System\uDIZaNS.exe4⤵PID:5520
-
-
C:\Windows\System\xUmbOZz.exeC:\Windows\System\xUmbOZz.exe4⤵PID:5228
-
-
C:\Windows\System\RWJDvFS.exeC:\Windows\System\RWJDvFS.exe4⤵PID:6060
-
-
C:\Windows\System\xnMpKeq.exeC:\Windows\System\xnMpKeq.exe4⤵PID:6156
-
-
C:\Windows\System\kQvkaiI.exeC:\Windows\System\kQvkaiI.exe4⤵PID:6276
-
-
C:\Windows\System\oHlDDKN.exeC:\Windows\System\oHlDDKN.exe4⤵PID:5892
-
-
C:\Windows\System\pWckpcd.exeC:\Windows\System\pWckpcd.exe4⤵PID:6468
-
-
C:\Windows\System\kEKMdDZ.exeC:\Windows\System\kEKMdDZ.exe4⤵PID:6492
-
-
C:\Windows\System\dXGCXBW.exeC:\Windows\System\dXGCXBW.exe4⤵PID:6524
-
-
C:\Windows\System\cusyToE.exeC:\Windows\System\cusyToE.exe4⤵PID:6608
-
-
C:\Windows\System\GaelGbE.exeC:\Windows\System\GaelGbE.exe4⤵PID:6708
-
-
C:\Windows\System\shjiRir.exeC:\Windows\System\shjiRir.exe4⤵PID:6648
-
-
C:\Windows\System\OtNytmD.exeC:\Windows\System\OtNytmD.exe4⤵PID:6568
-
-
C:\Windows\System\fkTbOiG.exeC:\Windows\System\fkTbOiG.exe4⤵PID:7024
-
-
C:\Windows\System\VpQuZEh.exeC:\Windows\System\VpQuZEh.exe4⤵PID:7104
-
-
C:\Windows\System\NSNAmim.exeC:\Windows\System\NSNAmim.exe4⤵PID:6916
-
-
C:\Windows\System\mETqwsn.exeC:\Windows\System\mETqwsn.exe4⤵PID:2532
-
-
C:\Windows\System\SxlHQsK.exeC:\Windows\System\SxlHQsK.exe4⤵PID:6788
-
-
C:\Windows\System\CHcQrXF.exeC:\Windows\System\CHcQrXF.exe4⤵PID:6840
-
-
C:\Windows\System\qiGxSBu.exeC:\Windows\System\qiGxSBu.exe4⤵PID:1368
-
-
C:\Windows\System\nBMyLQh.exeC:\Windows\System\nBMyLQh.exe4⤵PID:6476
-
-
C:\Windows\System\BSMSJPe.exeC:\Windows\System\BSMSJPe.exe4⤵PID:5508
-
-
C:\Windows\System\PHYvzrM.exeC:\Windows\System\PHYvzrM.exe4⤵PID:6872
-
-
C:\Windows\System\hdrFBOa.exeC:\Windows\System\hdrFBOa.exe4⤵PID:6664
-
-
C:\Windows\System\FEpXFgr.exeC:\Windows\System\FEpXFgr.exe4⤵PID:6516
-
-
C:\Windows\System\QvImFok.exeC:\Windows\System\QvImFok.exe4⤵PID:6328
-
-
C:\Windows\System\PAWRIAt.exeC:\Windows\System\PAWRIAt.exe4⤵PID:6888
-
-
C:\Windows\System\wsjAVyx.exeC:\Windows\System\wsjAVyx.exe4⤵PID:7176
-
-
C:\Windows\System\cyFNySu.exeC:\Windows\System\cyFNySu.exe4⤵PID:7208
-
-
C:\Windows\System\nIgLGoT.exeC:\Windows\System\nIgLGoT.exe4⤵PID:7236
-
-
C:\Windows\System\jtZHitB.exeC:\Windows\System\jtZHitB.exe4⤵PID:7264
-
-
C:\Windows\System\aOPKDCg.exeC:\Windows\System\aOPKDCg.exe4⤵PID:7308
-
-
C:\Windows\System\pdfyCsr.exeC:\Windows\System\pdfyCsr.exe4⤵PID:7344
-
-
C:\Windows\System\rHdnIfO.exeC:\Windows\System\rHdnIfO.exe4⤵PID:7360
-
-
C:\Windows\System\sUvNnMO.exeC:\Windows\System\sUvNnMO.exe4⤵PID:7376
-
-
C:\Windows\System\qssAHEp.exeC:\Windows\System\qssAHEp.exe4⤵PID:7392
-
-
C:\Windows\System\dGVQxBI.exeC:\Windows\System\dGVQxBI.exe4⤵PID:7408
-
-
C:\Windows\System\UWjaYcb.exeC:\Windows\System\UWjaYcb.exe4⤵PID:7444
-
-
C:\Windows\System\mMpoWKb.exeC:\Windows\System\mMpoWKb.exe4⤵PID:7464
-
-
C:\Windows\System\OZyCOoe.exeC:\Windows\System\OZyCOoe.exe4⤵PID:7484
-
-
C:\Windows\System\fuyJEtc.exeC:\Windows\System\fuyJEtc.exe4⤵PID:7508
-
-
C:\Windows\System\OCTlBcx.exeC:\Windows\System\OCTlBcx.exe4⤵PID:7560
-
-
C:\Windows\System\OAxSpLH.exeC:\Windows\System\OAxSpLH.exe4⤵PID:7636
-
-
C:\Windows\System\juOMGYM.exeC:\Windows\System\juOMGYM.exe4⤵PID:7688
-
-
C:\Windows\System\vZVAPZh.exeC:\Windows\System\vZVAPZh.exe4⤵PID:7720
-
-
C:\Windows\System\smGwXtP.exeC:\Windows\System\smGwXtP.exe4⤵PID:7760
-
-
C:\Windows\System\QLuaKtG.exeC:\Windows\System\QLuaKtG.exe4⤵PID:7784
-
-
C:\Windows\System\EkPpDMW.exeC:\Windows\System\EkPpDMW.exe4⤵PID:7816
-
-
C:\Windows\System\efpjICS.exeC:\Windows\System\efpjICS.exe4⤵PID:7848
-
-
C:\Windows\System\vEdzWLY.exeC:\Windows\System\vEdzWLY.exe4⤵PID:7872
-
-
C:\Windows\System\ETxEExt.exeC:\Windows\System\ETxEExt.exe4⤵PID:7896
-
-
C:\Windows\System\byoLtJQ.exeC:\Windows\System\byoLtJQ.exe4⤵PID:7924
-
-
C:\Windows\System\iueiOsx.exeC:\Windows\System\iueiOsx.exe4⤵PID:7960
-
-
C:\Windows\System\nEgacjn.exeC:\Windows\System\nEgacjn.exe4⤵PID:7992
-
-
C:\Windows\System\clBhUWG.exeC:\Windows\System\clBhUWG.exe4⤵PID:8028
-
-
C:\Windows\System\jhQSoZh.exeC:\Windows\System\jhQSoZh.exe4⤵PID:8052
-
-
C:\Windows\System\PWAnRUE.exeC:\Windows\System\PWAnRUE.exe4⤵PID:8072
-
-
C:\Windows\System\JIgNVuW.exeC:\Windows\System\JIgNVuW.exe4⤵PID:8092
-
-
C:\Windows\System\jTKgefZ.exeC:\Windows\System\jTKgefZ.exe4⤵PID:8144
-
-
C:\Windows\System\pvmrFBy.exeC:\Windows\System\pvmrFBy.exe4⤵PID:8188
-
-
C:\Windows\System\KQYCxpB.exeC:\Windows\System\KQYCxpB.exe4⤵PID:6856
-
-
C:\Windows\System\ITNFCfb.exeC:\Windows\System\ITNFCfb.exe4⤵PID:6576
-
-
C:\Windows\System\ynCifMf.exeC:\Windows\System\ynCifMf.exe4⤵PID:6188
-
-
C:\Windows\System\jnNcqvh.exeC:\Windows\System\jnNcqvh.exe4⤵PID:6804
-
-
C:\Windows\System\sNisvbc.exeC:\Windows\System\sNisvbc.exe4⤵PID:7280
-
-
C:\Windows\System\ZqENmNw.exeC:\Windows\System\ZqENmNw.exe4⤵PID:3924
-
-
C:\Windows\System\HFCrUhy.exeC:\Windows\System\HFCrUhy.exe4⤵PID:6264
-
-
C:\Windows\System\oSLvTlK.exeC:\Windows\System\oSLvTlK.exe4⤵PID:7300
-
-
C:\Windows\System\nITNSwG.exeC:\Windows\System\nITNSwG.exe4⤵PID:7196
-
-
C:\Windows\System\qJaxnOV.exeC:\Windows\System\qJaxnOV.exe4⤵PID:7244
-
-
C:\Windows\System\WnIOJei.exeC:\Windows\System\WnIOJei.exe4⤵PID:7652
-
-
C:\Windows\System\hfOePGO.exeC:\Windows\System\hfOePGO.exe4⤵PID:7804
-
-
C:\Windows\System\qGBvEqj.exeC:\Windows\System\qGBvEqj.exe4⤵PID:7668
-
-
C:\Windows\System\qzTSAFg.exeC:\Windows\System\qzTSAFg.exe4⤵PID:7604
-
-
C:\Windows\System\ECpJNkA.exeC:\Windows\System\ECpJNkA.exe4⤵PID:8068
-
-
C:\Windows\System\jMOoSeK.exeC:\Windows\System\jMOoSeK.exe4⤵PID:7972
-
-
C:\Windows\System\pSsUIQQ.exeC:\Windows\System\pSsUIQQ.exe4⤵PID:8004
-
-
C:\Windows\System\uwiEuyV.exeC:\Windows\System\uwiEuyV.exe4⤵PID:8088
-
-
C:\Windows\System\zpWjdek.exeC:\Windows\System\zpWjdek.exe4⤵PID:6428
-
-
C:\Windows\System\vEXOvuX.exeC:\Windows\System\vEXOvuX.exe4⤵PID:8104
-
-
C:\Windows\System\LbDAQPK.exeC:\Windows\System\LbDAQPK.exe4⤵PID:7328
-
-
C:\Windows\System\QZjXdxC.exeC:\Windows\System\QZjXdxC.exe4⤵PID:3788
-
-
C:\Windows\System\DrZKNFr.exeC:\Windows\System\DrZKNFr.exe4⤵PID:7664
-
-
C:\Windows\System\KtrRppe.exeC:\Windows\System\KtrRppe.exe4⤵PID:7504
-
-
C:\Windows\System\LNkdTaR.exeC:\Windows\System\LNkdTaR.exe4⤵PID:7868
-
-
C:\Windows\System\bwnCzsm.exeC:\Windows\System\bwnCzsm.exe4⤵PID:8196
-
-
C:\Windows\System\XwhLARr.exeC:\Windows\System\XwhLARr.exe4⤵PID:8224
-
-
C:\Windows\System\bwmfWOY.exeC:\Windows\System\bwmfWOY.exe4⤵PID:8256
-
-
C:\Windows\System\PFLjtIc.exeC:\Windows\System\PFLjtIc.exe4⤵PID:8300
-
-
C:\Windows\System\iHRdYMI.exeC:\Windows\System\iHRdYMI.exe4⤵PID:8336
-
-
C:\Windows\System\TERHveS.exeC:\Windows\System\TERHveS.exe4⤵PID:8368
-
-
C:\Windows\System\nOMTOTb.exeC:\Windows\System\nOMTOTb.exe4⤵PID:8408
-
-
C:\Windows\System\tlQymaT.exeC:\Windows\System\tlQymaT.exe4⤵PID:8436
-
-
C:\Windows\System\nmujaWv.exeC:\Windows\System\nmujaWv.exe4⤵PID:8460
-
-
C:\Windows\System\XjDwTiv.exeC:\Windows\System\XjDwTiv.exe4⤵PID:8568
-
-
C:\Windows\System\rKvEelN.exeC:\Windows\System\rKvEelN.exe4⤵PID:8660
-
-
C:\Windows\System\FWTgymc.exeC:\Windows\System\FWTgymc.exe4⤵PID:8712
-
-
C:\Windows\System\phmnvUP.exeC:\Windows\System\phmnvUP.exe4⤵PID:8756
-
-
C:\Windows\System\KDOoHBm.exeC:\Windows\System\KDOoHBm.exe4⤵PID:8788
-
-
C:\Windows\System\XqgQivY.exeC:\Windows\System\XqgQivY.exe4⤵PID:8824
-
-
C:\Windows\System\dhzuKjZ.exeC:\Windows\System\dhzuKjZ.exe4⤵PID:8864
-
-
C:\Windows\System\ATeuHcC.exeC:\Windows\System\ATeuHcC.exe4⤵PID:8884
-
-
C:\Windows\System\nntPHiB.exeC:\Windows\System\nntPHiB.exe4⤵PID:8908
-
-
C:\Windows\System\yupPjxL.exeC:\Windows\System\yupPjxL.exe4⤵PID:8964
-
-
C:\Windows\System\UeVbRsq.exeC:\Windows\System\UeVbRsq.exe4⤵PID:9008
-
-
C:\Windows\System\hKDREAe.exeC:\Windows\System\hKDREAe.exe4⤵PID:9036
-
-
C:\Windows\System\BGlLays.exeC:\Windows\System\BGlLays.exe4⤵PID:9064
-
-
C:\Windows\System\DyRqjyU.exeC:\Windows\System\DyRqjyU.exe4⤵PID:9100
-
-
C:\Windows\System\cUjxRYS.exeC:\Windows\System\cUjxRYS.exe4⤵PID:9172
-
-
C:\Windows\System\XzpBAIP.exeC:\Windows\System\XzpBAIP.exe4⤵PID:5264
-
-
C:\Windows\System\gWypxDl.exeC:\Windows\System\gWypxDl.exe4⤵PID:7536
-
-
C:\Windows\System\SomMtrV.exeC:\Windows\System\SomMtrV.exe4⤵PID:7908
-
-
C:\Windows\System\VZgDrOU.exeC:\Windows\System\VZgDrOU.exe4⤵PID:8220
-
-
C:\Windows\System\YrGudyj.exeC:\Windows\System\YrGudyj.exe4⤵PID:8216
-
-
C:\Windows\System\DHJBpZI.exeC:\Windows\System\DHJBpZI.exe4⤵PID:4596
-
-
C:\Windows\System\IVLVKNg.exeC:\Windows\System\IVLVKNg.exe4⤵PID:5496
-
-
C:\Windows\System\TlHeIaw.exeC:\Windows\System\TlHeIaw.exe4⤵PID:8348
-
-
C:\Windows\System\nqRZqoK.exeC:\Windows\System\nqRZqoK.exe4⤵PID:8264
-
-
C:\Windows\System\UXyNuiX.exeC:\Windows\System\UXyNuiX.exe4⤵PID:8356
-
-
C:\Windows\System\fplflZD.exeC:\Windows\System\fplflZD.exe4⤵PID:8424
-
-
C:\Windows\System\xgSLVaL.exeC:\Windows\System\xgSLVaL.exe4⤵PID:8656
-
-
C:\Windows\System\wJyFtRP.exeC:\Windows\System\wJyFtRP.exe4⤵PID:8808
-
-
C:\Windows\System\HFqWukA.exeC:\Windows\System\HFqWukA.exe4⤵PID:8872
-
-
C:\Windows\System\bvCaYAl.exeC:\Windows\System\bvCaYAl.exe4⤵PID:8728
-
-
C:\Windows\System\aQuZIiR.exeC:\Windows\System\aQuZIiR.exe4⤵PID:9060
-
-
C:\Windows\System\YyrVGoY.exeC:\Windows\System\YyrVGoY.exe4⤵PID:8796
-
-
C:\Windows\System\YpGhiRc.exeC:\Windows\System\YpGhiRc.exe4⤵PID:8944
-
-
C:\Windows\System\lZCrCEs.exeC:\Windows\System\lZCrCEs.exe4⤵PID:9192
-
-
C:\Windows\System\QyVUOBA.exeC:\Windows\System\QyVUOBA.exe4⤵PID:7980
-
-
C:\Windows\System\qhDEwTE.exeC:\Windows\System\qhDEwTE.exe4⤵PID:9044
-
-
C:\Windows\System\nINIgEN.exeC:\Windows\System\nINIgEN.exe4⤵PID:8332
-
-
C:\Windows\System\roxNlYg.exeC:\Windows\System\roxNlYg.exe4⤵PID:7200
-
-
C:\Windows\System\IJZstdY.exeC:\Windows\System\IJZstdY.exe4⤵PID:7864
-
-
C:\Windows\System\ESzHpSm.exeC:\Windows\System\ESzHpSm.exe4⤵PID:8928
-
-
C:\Windows\System\jYEdPcI.exeC:\Windows\System\jYEdPcI.exe4⤵PID:9056
-
-
C:\Windows\System\kQcNwNT.exeC:\Windows\System\kQcNwNT.exe4⤵PID:8288
-
-
C:\Windows\System\uMEAtsZ.exeC:\Windows\System\uMEAtsZ.exe4⤵PID:8920
-
-
C:\Windows\System\KxILJhI.exeC:\Windows\System\KxILJhI.exe4⤵PID:8896
-
-
C:\Windows\System\cXODQnf.exeC:\Windows\System\cXODQnf.exe4⤵PID:9168
-
-
C:\Windows\System\qBmibfK.exeC:\Windows\System\qBmibfK.exe4⤵PID:8996
-
-
C:\Windows\System\lNZfyFe.exeC:\Windows\System\lNZfyFe.exe4⤵PID:8772
-
-
C:\Windows\System\cvJsbfi.exeC:\Windows\System\cvJsbfi.exe4⤵PID:8320
-
-
C:\Windows\System\ITIwOEF.exeC:\Windows\System\ITIwOEF.exe4⤵PID:8576
-
-
C:\Windows\System\hygOWsM.exeC:\Windows\System\hygOWsM.exe4⤵PID:9248
-
-
C:\Windows\System\LQntdfX.exeC:\Windows\System\LQntdfX.exe4⤵PID:9280
-
-
C:\Windows\System\nMzkcyB.exeC:\Windows\System\nMzkcyB.exe4⤵PID:9320
-
-
C:\Windows\System\tDteltC.exeC:\Windows\System\tDteltC.exe4⤵PID:9352
-
-
C:\Windows\System\YsrFZxN.exeC:\Windows\System\YsrFZxN.exe4⤵PID:9376
-
-
C:\Windows\System\Fqmemot.exeC:\Windows\System\Fqmemot.exe4⤵PID:9436
-
-
C:\Windows\System\YqmmHqY.exeC:\Windows\System\YqmmHqY.exe4⤵PID:9468
-
-
C:\Windows\System\rkuqfXV.exeC:\Windows\System\rkuqfXV.exe4⤵PID:9508
-
-
C:\Windows\System\jfGXqbq.exeC:\Windows\System\jfGXqbq.exe4⤵PID:9528
-
-
C:\Windows\System\IFmDCEE.exeC:\Windows\System\IFmDCEE.exe4⤵PID:9568
-
-
C:\Windows\System\lHolqSw.exeC:\Windows\System\lHolqSw.exe4⤵PID:9604
-
-
C:\Windows\System\XuaihVU.exeC:\Windows\System\XuaihVU.exe4⤵PID:9628
-
-
C:\Windows\System\wjliJYP.exeC:\Windows\System\wjliJYP.exe4⤵PID:9672
-
-
C:\Windows\System\ToGcohI.exeC:\Windows\System\ToGcohI.exe4⤵PID:9736
-
-
C:\Windows\System\yCcrPxJ.exeC:\Windows\System\yCcrPxJ.exe4⤵PID:9772
-
-
C:\Windows\System\ucgZQfG.exeC:\Windows\System\ucgZQfG.exe4⤵PID:9812
-
-
C:\Windows\System\JKVfHJK.exeC:\Windows\System\JKVfHJK.exe4⤵PID:9848
-
-
C:\Windows\System\veEtDJM.exeC:\Windows\System\veEtDJM.exe4⤵PID:9876
-
-
C:\Windows\System\cgUtRLL.exeC:\Windows\System\cgUtRLL.exe4⤵PID:9920
-
-
C:\Windows\System\ADBQqmx.exeC:\Windows\System\ADBQqmx.exe4⤵PID:9952
-
-
C:\Windows\System\XLdwznp.exeC:\Windows\System\XLdwznp.exe4⤵PID:9996
-
-
C:\Windows\System\qICSPvF.exeC:\Windows\System\qICSPvF.exe4⤵PID:10024
-
-
C:\Windows\System\HDlpYpH.exeC:\Windows\System\HDlpYpH.exe4⤵PID:10060
-
-
C:\Windows\System\jBxRtTw.exeC:\Windows\System\jBxRtTw.exe4⤵PID:10088
-
-
C:\Windows\System\AOitUpo.exeC:\Windows\System\AOitUpo.exe4⤵PID:10160
-
-
C:\Windows\System\gqUPvFd.exeC:\Windows\System\gqUPvFd.exe4⤵PID:10196
-
-
C:\Windows\System\iqWTGUU.exeC:\Windows\System\iqWTGUU.exe4⤵PID:10228
-
-
C:\Windows\System\taoWOxp.exeC:\Windows\System\taoWOxp.exe4⤵PID:8976
-
-
C:\Windows\System\JpFcZix.exeC:\Windows\System\JpFcZix.exe4⤵PID:9224
-
-
C:\Windows\System\rKnXOWM.exeC:\Windows\System\rKnXOWM.exe4⤵PID:9308
-
-
C:\Windows\System\tsICqXl.exeC:\Windows\System\tsICqXl.exe4⤵PID:9304
-
-
C:\Windows\System\fXmYBSR.exeC:\Windows\System\fXmYBSR.exe4⤵PID:9368
-
-
C:\Windows\System\JgYVSkI.exeC:\Windows\System\JgYVSkI.exe4⤵PID:9360
-
-
C:\Windows\System\HhKauqw.exeC:\Windows\System\HhKauqw.exe4⤵PID:9488
-
-
C:\Windows\System\KIxawAj.exeC:\Windows\System\KIxawAj.exe4⤵PID:9764
-
-
C:\Windows\System\YUQglDq.exeC:\Windows\System\YUQglDq.exe4⤵PID:9592
-
-
C:\Windows\System\QWBKZKV.exeC:\Windows\System\QWBKZKV.exe4⤵PID:9732
-
-
C:\Windows\System\CsKHYfO.exeC:\Windows\System\CsKHYfO.exe4⤵PID:9620
-
-
C:\Windows\System\WfWmgOs.exeC:\Windows\System\WfWmgOs.exe4⤵PID:9660
-
-
C:\Windows\System\rgDMlTy.exeC:\Windows\System\rgDMlTy.exe4⤵PID:9704
-
-
C:\Windows\System\xRJqcYp.exeC:\Windows\System\xRJqcYp.exe4⤵PID:10132
-
-
C:\Windows\System\tstLits.exeC:\Windows\System\tstLits.exe4⤵PID:10168
-
-
C:\Windows\System\TcOGVzp.exeC:\Windows\System\TcOGVzp.exe4⤵PID:9860
-
-
C:\Windows\System\EBYfezE.exeC:\Windows\System\EBYfezE.exe4⤵PID:9940
-
-
C:\Windows\System\gNrJTXe.exeC:\Windows\System\gNrJTXe.exe4⤵PID:9396
-
-
C:\Windows\System\nsHaSGa.exeC:\Windows\System\nsHaSGa.exe4⤵PID:8776
-
-
C:\Windows\System\uIRxzmc.exeC:\Windows\System\uIRxzmc.exe4⤵PID:9692
-
-
C:\Windows\System\ldWsaDT.exeC:\Windows\System\ldWsaDT.exe4⤵PID:9836
-
-
C:\Windows\System\jEFrtQn.exeC:\Windows\System\jEFrtQn.exe4⤵PID:9500
-
-
C:\Windows\System\QdHLuFb.exeC:\Windows\System\QdHLuFb.exe4⤵PID:9912
-
-
C:\Windows\System\gYlQdEA.exeC:\Windows\System\gYlQdEA.exe4⤵PID:9868
-
-
C:\Windows\System\wsiTHaR.exeC:\Windows\System\wsiTHaR.exe4⤵PID:9300
-
-
C:\Windows\System\RAkOoUg.exeC:\Windows\System\RAkOoUg.exe4⤵PID:10264
-
-
C:\Windows\System\peWpUVK.exeC:\Windows\System\peWpUVK.exe4⤵PID:10328
-
-
C:\Windows\System\FZENwLe.exeC:\Windows\System\FZENwLe.exe4⤵PID:10360
-
-
C:\Windows\System\rGRzprU.exeC:\Windows\System\rGRzprU.exe4⤵PID:10384
-
-
C:\Windows\System\ZxUOEdk.exeC:\Windows\System\ZxUOEdk.exe4⤵PID:10448
-
-
C:\Windows\System\VgPxcTS.exeC:\Windows\System\VgPxcTS.exe4⤵PID:10480
-
-
C:\Windows\System\DwUBQMf.exeC:\Windows\System\DwUBQMf.exe4⤵PID:10516
-
-
C:\Windows\System\IFyjdof.exeC:\Windows\System\IFyjdof.exe4⤵PID:10540
-
-
C:\Windows\System\UpyMOVB.exeC:\Windows\System\UpyMOVB.exe4⤵PID:10564
-
-
C:\Windows\System\qAksnck.exeC:\Windows\System\qAksnck.exe4⤵PID:10584
-
-
C:\Windows\System\tVspedY.exeC:\Windows\System\tVspedY.exe4⤵PID:10604
-
-
C:\Windows\System\JoyFFDh.exeC:\Windows\System\JoyFFDh.exe4⤵PID:10652
-
-
C:\Windows\System\ZdawVZZ.exeC:\Windows\System\ZdawVZZ.exe4⤵PID:10684
-
-
C:\Windows\System\PMIuLHC.exeC:\Windows\System\PMIuLHC.exe4⤵PID:10708
-
-
C:\Windows\System\IpBrikR.exeC:\Windows\System\IpBrikR.exe4⤵PID:10732
-
-
C:\Windows\System\UYuEpRN.exeC:\Windows\System\UYuEpRN.exe4⤵PID:10768
-
-
C:\Windows\System\mNQYTqJ.exeC:\Windows\System\mNQYTqJ.exe4⤵PID:10816
-
-
C:\Windows\System\gPCQskx.exeC:\Windows\System\gPCQskx.exe4⤵PID:10844
-
-
C:\Windows\System\hSGNglh.exeC:\Windows\System\hSGNglh.exe4⤵PID:10872
-
-
C:\Windows\System\pjwJneh.exeC:\Windows\System\pjwJneh.exe4⤵PID:10896
-
-
C:\Windows\System\HMloxYQ.exeC:\Windows\System\HMloxYQ.exe4⤵PID:10948
-
-
C:\Windows\System\cHwfYxj.exeC:\Windows\System\cHwfYxj.exe4⤵PID:10988
-
-
C:\Windows\System\KAKfvoH.exeC:\Windows\System\KAKfvoH.exe4⤵PID:11024
-
-
C:\Windows\System\NnRrmwp.exeC:\Windows\System\NnRrmwp.exe4⤵PID:11048
-
-
C:\Windows\System\pOSktxp.exeC:\Windows\System\pOSktxp.exe4⤵PID:11072
-
-
C:\Windows\System\ixeXyqp.exeC:\Windows\System\ixeXyqp.exe4⤵PID:11128
-
-
C:\Windows\System\sxeOMdN.exeC:\Windows\System\sxeOMdN.exe4⤵PID:11168
-
-
C:\Windows\System\YjuePBU.exeC:\Windows\System\YjuePBU.exe4⤵PID:11208
-
-
C:\Windows\System\DXFgoNP.exeC:\Windows\System\DXFgoNP.exe4⤵PID:11232
-
-
C:\Windows\System\kFcdKty.exeC:\Windows\System\kFcdKty.exe4⤵PID:11248
-
-
C:\Windows\System\hoRdCio.exeC:\Windows\System\hoRdCio.exe4⤵PID:9644
-
-
C:\Windows\System\LbZaNVt.exeC:\Windows\System\LbZaNVt.exe4⤵PID:9264
-
-
C:\Windows\System\DSqndbp.exeC:\Windows\System\DSqndbp.exe4⤵PID:9728
-
-
C:\Windows\System\xXUwjaB.exeC:\Windows\System\xXUwjaB.exe4⤵PID:10104
-
-
C:\Windows\System\JmVZxSB.exeC:\Windows\System\JmVZxSB.exe4⤵PID:10120
-
-
C:\Windows\System\DdqvYwl.exeC:\Windows\System\DdqvYwl.exe4⤵PID:10496
-
-
C:\Windows\System\zEhhUPO.exeC:\Windows\System\zEhhUPO.exe4⤵PID:10396
-
-
C:\Windows\System\rnMQaqr.exeC:\Windows\System\rnMQaqr.exe4⤵PID:10260
-
-
C:\Windows\System\PDfaXFi.exeC:\Windows\System\PDfaXFi.exe4⤵PID:10628
-
-
C:\Windows\System\OlJqxOL.exeC:\Windows\System\OlJqxOL.exe4⤵PID:10512
-
-
C:\Windows\System\yixpMyZ.exeC:\Windows\System\yixpMyZ.exe4⤵PID:10612
-
-
C:\Windows\System\ruRfzjb.exeC:\Windows\System\ruRfzjb.exe4⤵PID:10744
-
-
C:\Windows\System\imnCVzt.exeC:\Windows\System\imnCVzt.exe4⤵PID:11040
-
-
C:\Windows\System\FwquWhc.exeC:\Windows\System\FwquWhc.exe4⤵PID:10908
-
-
C:\Windows\System\VqIfDtv.exeC:\Windows\System\VqIfDtv.exe4⤵PID:10832
-
-
C:\Windows\System\QlhcjHq.exeC:\Windows\System\QlhcjHq.exe4⤵PID:11152
-
-
C:\Windows\System\NIKMiIe.exeC:\Windows\System\NIKMiIe.exe4⤵PID:11240
-
-
C:\Windows\System\JZYMBDV.exeC:\Windows\System\JZYMBDV.exe4⤵PID:10716
-
-
C:\Windows\System\XLEbGbZ.exeC:\Windows\System\XLEbGbZ.exe4⤵PID:11008
-
-
C:\Windows\System\VgzuUKE.exeC:\Windows\System\VgzuUKE.exe4⤵PID:10140
-
-
C:\Windows\System\ICkfwRn.exeC:\Windows\System\ICkfwRn.exe4⤵PID:10536
-
-
C:\Windows\System\ZEEKaYT.exeC:\Windows\System\ZEEKaYT.exe4⤵PID:10420
-
-
C:\Windows\System\EpLWnyr.exeC:\Windows\System\EpLWnyr.exe4⤵PID:10472
-
-
C:\Windows\System\tgnaVIY.exeC:\Windows\System\tgnaVIY.exe4⤵PID:10752
-
-
C:\Windows\System\gfMNgcH.exeC:\Windows\System\gfMNgcH.exe4⤵PID:10336
-
-
C:\Windows\System\KpAcdoD.exeC:\Windows\System\KpAcdoD.exe4⤵PID:10804
-
-
C:\Windows\System\AOQXXLi.exeC:\Windows\System\AOQXXLi.exe4⤵PID:8444
-
-
C:\Windows\System\dYqAYxc.exeC:\Windows\System\dYqAYxc.exe4⤵PID:11300
-
-
C:\Windows\System\QVEkuoB.exeC:\Windows\System\QVEkuoB.exe4⤵PID:11336
-
-
C:\Windows\System\RsiGHKc.exeC:\Windows\System\RsiGHKc.exe4⤵PID:11356
-
-
C:\Windows\System\SwaoPzC.exeC:\Windows\System\SwaoPzC.exe4⤵PID:11404
-
-
C:\Windows\System\XPeNbhY.exeC:\Windows\System\XPeNbhY.exe4⤵PID:11444
-
-
C:\Windows\System\HwJnOEd.exeC:\Windows\System\HwJnOEd.exe4⤵PID:11472
-
-
C:\Windows\System\qUlMJqV.exeC:\Windows\System\qUlMJqV.exe4⤵PID:11508
-
-
C:\Windows\System\ZrPXxYa.exeC:\Windows\System\ZrPXxYa.exe4⤵PID:11544
-
-
C:\Windows\System\MIlLZzB.exeC:\Windows\System\MIlLZzB.exe4⤵PID:11580
-
-
C:\Windows\System\cTSmvNo.exeC:\Windows\System\cTSmvNo.exe4⤵PID:11612
-
-
C:\Windows\System\qINUlWL.exeC:\Windows\System\qINUlWL.exe4⤵PID:11652
-
-
C:\Windows\System\CzKhzxt.exeC:\Windows\System\CzKhzxt.exe4⤵PID:11684
-
-
C:\Windows\System\sfOpHmF.exeC:\Windows\System\sfOpHmF.exe4⤵PID:11728
-
-
C:\Windows\System\JvCBvNT.exeC:\Windows\System\JvCBvNT.exe4⤵PID:11752
-
-
C:\Windows\System\BXUsWRO.exeC:\Windows\System\BXUsWRO.exe4⤵PID:11788
-
-
C:\Windows\System\dEihqPu.exeC:\Windows\System\dEihqPu.exe4⤵PID:11808
-
-
C:\Windows\System\QsCjvjz.exeC:\Windows\System\QsCjvjz.exe4⤵PID:11860
-
-
C:\Windows\System\qJPRuPB.exeC:\Windows\System\qJPRuPB.exe4⤵PID:11932
-
-
C:\Windows\System\ZzsZoDO.exeC:\Windows\System\ZzsZoDO.exe4⤵PID:11956
-
-
C:\Windows\System\RpLfrEO.exeC:\Windows\System\RpLfrEO.exe4⤵PID:12008
-
-
C:\Windows\System\FDQWaEH.exeC:\Windows\System\FDQWaEH.exe4⤵PID:12052
-
-
C:\Windows\System\lqtcbBM.exeC:\Windows\System\lqtcbBM.exe4⤵PID:12092
-
-
C:\Windows\System\cCyTcqY.exeC:\Windows\System\cCyTcqY.exe4⤵PID:12124
-
-
C:\Windows\System\GkZvdQY.exeC:\Windows\System\GkZvdQY.exe4⤵PID:12148
-
-
C:\Windows\System\YBYLRna.exeC:\Windows\System\YBYLRna.exe4⤵PID:12172
-
-
C:\Windows\System\UMttHkD.exeC:\Windows\System\UMttHkD.exe4⤵PID:12208
-
-
C:\Windows\System\LIFoEJf.exeC:\Windows\System\LIFoEJf.exe4⤵PID:12260
-
-
C:\Windows\System\NpKkbXe.exeC:\Windows\System\NpKkbXe.exe4⤵PID:11112
-
-
C:\Windows\System\sXSqHuz.exeC:\Windows\System\sXSqHuz.exe4⤵PID:10408
-
-
C:\Windows\System\DVFrUvX.exeC:\Windows\System\DVFrUvX.exe4⤵PID:11312
-
-
C:\Windows\System\bqOKHID.exeC:\Windows\System\bqOKHID.exe4⤵PID:10116
-
-
C:\Windows\System\ZgLfGsZ.exeC:\Windows\System\ZgLfGsZ.exe4⤵PID:8396
-
-
C:\Windows\System\zqfMnSC.exeC:\Windows\System\zqfMnSC.exe4⤵PID:11352
-
-
C:\Windows\System\hjNJDFY.exeC:\Windows\System\hjNJDFY.exe4⤵PID:10888
-
-
C:\Windows\System\iWFaLAg.exeC:\Windows\System\iWFaLAg.exe4⤵PID:11568
-
-
C:\Windows\System\jJcvwDo.exeC:\Windows\System\jJcvwDo.exe4⤵PID:11636
-
-
C:\Windows\System\IqBSdht.exeC:\Windows\System\IqBSdht.exe4⤵PID:11456
-
-
C:\Windows\System\jYEaGnw.exeC:\Windows\System\jYEaGnw.exe4⤵PID:11524
-
-
C:\Windows\System\cgvuOiR.exeC:\Windows\System\cgvuOiR.exe4⤵PID:11772
-
-
C:\Windows\System\JBLSUHS.exeC:\Windows\System\JBLSUHS.exe4⤵PID:11820
-
-
C:\Windows\System\sAEHOfq.exeC:\Windows\System\sAEHOfq.exe4⤵PID:11672
-
-
C:\Windows\System\HTsYXEu.exeC:\Windows\System\HTsYXEu.exe4⤵PID:11804
-
-
C:\Windows\System\tLesMth.exeC:\Windows\System\tLesMth.exe4⤵PID:12196
-
-
C:\Windows\System\uSHCfHv.exeC:\Windows\System\uSHCfHv.exe4⤵PID:11888
-
-
C:\Windows\System\VsHcbzr.exeC:\Windows\System\VsHcbzr.exe4⤵PID:12084
-
-
C:\Windows\System\GgJjoys.exeC:\Windows\System\GgJjoys.exe4⤵PID:10968
-
-
C:\Windows\System\wunYvNR.exeC:\Windows\System\wunYvNR.exe4⤵PID:11432
-
-
C:\Windows\System\zCJalCv.exeC:\Windows\System\zCJalCv.exe4⤵PID:10252
-
-
C:\Windows\System\LWZNLnF.exeC:\Windows\System\LWZNLnF.exe4⤵PID:6976
-
-
C:\Windows\System\ykqhpoX.exeC:\Windows\System\ykqhpoX.exe4⤵PID:11180
-
-
C:\Windows\System\PKWZIpo.exeC:\Windows\System\PKWZIpo.exe4⤵PID:12120
-
-
C:\Windows\System\SDpXWDe.exeC:\Windows\System\SDpXWDe.exe4⤵PID:12076
-
-
C:\Windows\System\YvLvYgi.exeC:\Windows\System\YvLvYgi.exe4⤵PID:12304
-
-
C:\Windows\System\ViZTHWC.exeC:\Windows\System\ViZTHWC.exe4⤵PID:12344
-
-
C:\Windows\System\cjHmTeE.exeC:\Windows\System\cjHmTeE.exe4⤵PID:12364
-
-
C:\Windows\System\BJzcfVT.exeC:\Windows\System\BJzcfVT.exe4⤵PID:12432
-
-
C:\Windows\System\ukyTrkX.exeC:\Windows\System\ukyTrkX.exe4⤵PID:12480
-
-
C:\Windows\System\RUpUZMF.exeC:\Windows\System\RUpUZMF.exe4⤵PID:12516
-
-
C:\Windows\System\fempriO.exeC:\Windows\System\fempriO.exe4⤵PID:12540
-
-
C:\Windows\System\YqaUEel.exeC:\Windows\System\YqaUEel.exe4⤵PID:12564
-
-
C:\Windows\System\ESCFRcV.exeC:\Windows\System\ESCFRcV.exe4⤵PID:12624
-
-
C:\Windows\System\yvAhiLR.exeC:\Windows\System\yvAhiLR.exe4⤵PID:12656
-
-
C:\Windows\System\ZSfEnEb.exeC:\Windows\System\ZSfEnEb.exe4⤵PID:12688
-
-
C:\Windows\System\LlRJRQf.exeC:\Windows\System\LlRJRQf.exe4⤵PID:12716
-
-
C:\Windows\System\wVGcYqV.exeC:\Windows\System\wVGcYqV.exe4⤵PID:12744
-
-
C:\Windows\System\JMCyJOF.exeC:\Windows\System\JMCyJOF.exe4⤵PID:12800
-
-
C:\Windows\System\EhmUWFX.exeC:\Windows\System\EhmUWFX.exe4⤵PID:12844
-
-
C:\Windows\System\PUukNBx.exeC:\Windows\System\PUukNBx.exe4⤵PID:12872
-
-
C:\Windows\System\NItHBlO.exeC:\Windows\System\NItHBlO.exe4⤵PID:12892
-
-
C:\Windows\System\AZDaSee.exeC:\Windows\System\AZDaSee.exe4⤵PID:12932
-
-
C:\Windows\System\NtunKhR.exeC:\Windows\System\NtunKhR.exe4⤵PID:12972
-
-
C:\Windows\System\FYaIWlz.exeC:\Windows\System\FYaIWlz.exe4⤵PID:13032
-
-
C:\Windows\System\UvavCLP.exeC:\Windows\System\UvavCLP.exe4⤵PID:13052
-
-
C:\Windows\System\XcHnBoM.exeC:\Windows\System\XcHnBoM.exe4⤵PID:13092
-
-
C:\Windows\System\cQRqaGk.exeC:\Windows\System\cQRqaGk.exe4⤵PID:13116
-
-
C:\Windows\System\cpvFynL.exeC:\Windows\System\cpvFynL.exe4⤵PID:13164
-
-
C:\Windows\System\hNChcqC.exeC:\Windows\System\hNChcqC.exe4⤵PID:13204
-
-
C:\Windows\System\UnmbRFf.exeC:\Windows\System\UnmbRFf.exe4⤵PID:13240
-
-
C:\Windows\System\YeUfyQe.exeC:\Windows\System\YeUfyQe.exe4⤵PID:13268
-
-
C:\Windows\System\hlveSCx.exeC:\Windows\System\hlveSCx.exe4⤵PID:13304
-
-
C:\Windows\System\sktEerV.exeC:\Windows\System\sktEerV.exe4⤵PID:11940
-
-
C:\Windows\System\tbTMfic.exeC:\Windows\System\tbTMfic.exe4⤵PID:6660
-
-
C:\Windows\System\vpmVtvW.exeC:\Windows\System\vpmVtvW.exe4⤵PID:12356
-
-
C:\Windows\System\LNaIIKL.exeC:\Windows\System\LNaIIKL.exe4⤵PID:12448
-
-
C:\Windows\System\LQxOiOr.exeC:\Windows\System\LQxOiOr.exe4⤵PID:12292
-
-
C:\Windows\System\UcbWYxc.exeC:\Windows\System\UcbWYxc.exe4⤵PID:12532
-
-
C:\Windows\System\KowMyXz.exeC:\Windows\System\KowMyXz.exe4⤵PID:12584
-
-
C:\Windows\System\WiKeNGN.exeC:\Windows\System\WiKeNGN.exe4⤵PID:12640
-
-
C:\Windows\System\mEtFtYm.exeC:\Windows\System\mEtFtYm.exe4⤵PID:12784
-
-
C:\Windows\System\fWlnybU.exeC:\Windows\System\fWlnybU.exe4⤵PID:12796
-
-
C:\Windows\System\cLmCaZn.exeC:\Windows\System\cLmCaZn.exe4⤵PID:12680
-
-
C:\Windows\System\XydEAoF.exeC:\Windows\System\XydEAoF.exe4⤵PID:12772
-
-
C:\Windows\System\WDZJDUh.exeC:\Windows\System\WDZJDUh.exe4⤵PID:12888
-
-
C:\Windows\System\xXqoMOf.exeC:\Windows\System\xXqoMOf.exe4⤵PID:13152
-
-
C:\Windows\System\nViiOUp.exeC:\Windows\System\nViiOUp.exe4⤵PID:13128
-
-
C:\Windows\System\AVMgkHn.exeC:\Windows\System\AVMgkHn.exe4⤵PID:13224
-
-
C:\Windows\System\JnHHjos.exeC:\Windows\System\JnHHjos.exe4⤵PID:13160
-
-
C:\Windows\System\mnHbISg.exeC:\Windows\System\mnHbISg.exe4⤵PID:13200
-
-
C:\Windows\System\KGrOYLr.exeC:\Windows\System\KGrOYLr.exe4⤵PID:12416
-
-
C:\Windows\System\wHkDHIJ.exeC:\Windows\System\wHkDHIJ.exe4⤵PID:12496
-
-
C:\Windows\System\omaiGGv.exeC:\Windows\System\omaiGGv.exe4⤵PID:12924
-
-
C:\Windows\System\yFptpCt.exeC:\Windows\System\yFptpCt.exe4⤵PID:12192
-
-
C:\Windows\System\aZfXrWJ.exeC:\Windows\System\aZfXrWJ.exe4⤵PID:11928
-
-
C:\Windows\System\vlgMEBR.exeC:\Windows\System\vlgMEBR.exe4⤵PID:12696
-
-
C:\Windows\System\thWAkfy.exeC:\Windows\System\thWAkfy.exe4⤵PID:12824
-
-
C:\Windows\System\XLQqnvt.exeC:\Windows\System\XLQqnvt.exe4⤵PID:12676
-
-
C:\Windows\System\fhTJSjX.exeC:\Windows\System\fhTJSjX.exe4⤵PID:13176
-
-
C:\Windows\System\DVCtdHV.exeC:\Windows\System\DVCtdHV.exe4⤵PID:13196
-
-
C:\Windows\System\uTXsIZN.exeC:\Windows\System\uTXsIZN.exe4⤵PID:13328
-
-
C:\Windows\System\dLiOfxC.exeC:\Windows\System\dLiOfxC.exe4⤵PID:13348
-
-
C:\Windows\System\vPkEpDG.exeC:\Windows\System\vPkEpDG.exe4⤵PID:13372
-
-
C:\Windows\System\rACHGrf.exeC:\Windows\System\rACHGrf.exe4⤵PID:13396
-
-
C:\Windows\System\Nbwkplv.exeC:\Windows\System\Nbwkplv.exe4⤵PID:13428
-
-
C:\Windows\System\VAhRHBT.exeC:\Windows\System\VAhRHBT.exe4⤵PID:13464
-
-
C:\Windows\System\nwaWcdT.exeC:\Windows\System\nwaWcdT.exe4⤵PID:13524
-
-
C:\Windows\System\EWxldpx.exeC:\Windows\System\EWxldpx.exe4⤵PID:13540
-
-
C:\Windows\System\HDClfiJ.exeC:\Windows\System\HDClfiJ.exe4⤵PID:13604
-
-
C:\Windows\System\ewnkzTq.exeC:\Windows\System\ewnkzTq.exe4⤵PID:13636
-
-
C:\Windows\System\EtcSlAX.exeC:\Windows\System\EtcSlAX.exe4⤵PID:13668
-
-
C:\Windows\System\qHOptXb.exeC:\Windows\System\qHOptXb.exe4⤵PID:13720
-
-
C:\Windows\System\gRwdhNV.exeC:\Windows\System\gRwdhNV.exe4⤵PID:13756
-
-
C:\Windows\System\qxzNGUU.exeC:\Windows\System\qxzNGUU.exe4⤵PID:14020
-
-
C:\Windows\System\bjLzycz.exeC:\Windows\System\bjLzycz.exe4⤵PID:14060
-
-
C:\Windows\System\KkoMlps.exeC:\Windows\System\KkoMlps.exe4⤵PID:14104
-
-
C:\Windows\System\yOgMVwc.exeC:\Windows\System\yOgMVwc.exe4⤵PID:14144
-
-
C:\Windows\System\pTnDMVL.exeC:\Windows\System\pTnDMVL.exe4⤵PID:14172
-
-
C:\Windows\System\mvHRADP.exeC:\Windows\System\mvHRADP.exe4⤵PID:14200
-
-
C:\Windows\System\uTzXoJS.exeC:\Windows\System\uTzXoJS.exe4⤵PID:14252
-
-
C:\Windows\System\AzlaYNG.exeC:\Windows\System\AzlaYNG.exe4⤵PID:14276
-
-
C:\Windows\System\hZghCWO.exeC:\Windows\System\hZghCWO.exe4⤵PID:14312
-
-
C:\Windows\System\uNyCNEQ.exeC:\Windows\System\uNyCNEQ.exe4⤵PID:13048
-
-
C:\Windows\System\EorFBlA.exeC:\Windows\System\EorFBlA.exe4⤵PID:12456
-
-
C:\Windows\System\CPktsub.exeC:\Windows\System\CPktsub.exe4⤵PID:12868
-
-
C:\Windows\System\BOnMZjr.exeC:\Windows\System\BOnMZjr.exe4⤵PID:13452
-
-
C:\Windows\System\BTebmmN.exeC:\Windows\System\BTebmmN.exe4⤵PID:13480
-
-
C:\Windows\System\NQJYZvt.exeC:\Windows\System\NQJYZvt.exe4⤵PID:13020
-
-
C:\Windows\System\hSJFqHm.exeC:\Windows\System\hSJFqHm.exe4⤵PID:13412
-
-
C:\Windows\System\VPxPnre.exeC:\Windows\System\VPxPnre.exe4⤵PID:13588
-
-
C:\Windows\System\maumoCO.exeC:\Windows\System\maumoCO.exe4⤵PID:13340
-
-
C:\Windows\System\wgdXTHY.exeC:\Windows\System\wgdXTHY.exe4⤵PID:8636
-
-
C:\Windows\System\OZuoiuU.exeC:\Windows\System\OZuoiuU.exe4⤵PID:13696
-
-
C:\Windows\System\VzkHaHH.exeC:\Windows\System\VzkHaHH.exe4⤵PID:13660
-
-
C:\Windows\System\YqWXRhO.exeC:\Windows\System\YqWXRhO.exe4⤵PID:13868
-
-
C:\Windows\System\YcLGkeG.exeC:\Windows\System\YcLGkeG.exe4⤵PID:14120
-
-
C:\Windows\System\YBOKsjj.exeC:\Windows\System\YBOKsjj.exe4⤵PID:14220
-
-
C:\Windows\System\oNyHJxy.exeC:\Windows\System\oNyHJxy.exe4⤵PID:14068
-
-
C:\Windows\System\lKcBnAA.exeC:\Windows\System\lKcBnAA.exe4⤵PID:14192
-
-
C:\Windows\System\mirWVLM.exeC:\Windows\System\mirWVLM.exe4⤵PID:13404
-
-
C:\Windows\System\IAauwpU.exeC:\Windows\System\IAauwpU.exe4⤵PID:13676
-
-
C:\Windows\System\gaIKkkQ.exeC:\Windows\System\gaIKkkQ.exe4⤵PID:13496
-
-
C:\Windows\System\krwuvee.exeC:\Windows\System\krwuvee.exe4⤵PID:12900
-
-
C:\Windows\System\pLbUmZY.exeC:\Windows\System\pLbUmZY.exe4⤵PID:13644
-
-
C:\Windows\System\EbnIhwX.exeC:\Windows\System\EbnIhwX.exe4⤵PID:13912
-
-
C:\Windows\System\VekuCbK.exeC:\Windows\System\VekuCbK.exe4⤵PID:14032
-
-
C:\Windows\System\UCsIWKy.exeC:\Windows\System\UCsIWKy.exe4⤵PID:14292
-
-
C:\Windows\System\fcuboRX.exeC:\Windows\System\fcuboRX.exe4⤵PID:13680
-
-
C:\Windows\System\bNczoLK.exeC:\Windows\System\bNczoLK.exe4⤵PID:11288
-
-
C:\Windows\System\RSGfarH.exeC:\Windows\System\RSGfarH.exe4⤵PID:14368
-
-
C:\Windows\System\YgLYlaT.exeC:\Windows\System\YgLYlaT.exe4⤵PID:14396
-
-
C:\Windows\System\SFpqwXg.exeC:\Windows\System\SFpqwXg.exe4⤵PID:14432
-
-
C:\Windows\System\PBhAmJF.exeC:\Windows\System\PBhAmJF.exe4⤵PID:14496
-
-
C:\Windows\System\pqVaxAj.exeC:\Windows\System\pqVaxAj.exe4⤵PID:14520
-
-
C:\Windows\System\qSFJmgr.exeC:\Windows\System\qSFJmgr.exe4⤵PID:14564
-
-
C:\Windows\System\qazRtfn.exeC:\Windows\System\qazRtfn.exe4⤵PID:14588
-
-
C:\Windows\System\DAfBTnf.exeC:\Windows\System\DAfBTnf.exe4⤵PID:14636
-
-
C:\Windows\System\CvgJUYa.exeC:\Windows\System\CvgJUYa.exe4⤵PID:14676
-
-
C:\Windows\System\czWeTJd.exeC:\Windows\System\czWeTJd.exe4⤵PID:14700
-
-
C:\Windows\System\rtNvRzT.exeC:\Windows\System\rtNvRzT.exe4⤵PID:14752
-
-
C:\Windows\System\mOSimen.exeC:\Windows\System\mOSimen.exe4⤵PID:14784
-
-
C:\Windows\System\fGvZYDn.exeC:\Windows\System\fGvZYDn.exe4⤵PID:14824
-
-
C:\Windows\System\IxLeAeX.exeC:\Windows\System\IxLeAeX.exe4⤵PID:14872
-
-
C:\Windows\System\BoYSCNG.exeC:\Windows\System\BoYSCNG.exe4⤵PID:14896
-
-
C:\Windows\System\SYDzrgt.exeC:\Windows\System\SYDzrgt.exe4⤵PID:14956
-
-
C:\Windows\System\yhVuWTo.exeC:\Windows\System\yhVuWTo.exe4⤵PID:14984
-
-
C:\Windows\System\rdPVdco.exeC:\Windows\System\rdPVdco.exe4⤵PID:15024
-
-
C:\Windows\System\uhiTVdB.exeC:\Windows\System\uhiTVdB.exe4⤵PID:15080
-
-
C:\Windows\System\QEkFDJu.exeC:\Windows\System\QEkFDJu.exe4⤵PID:15108
-
-
C:\Windows\System\vCVkJPV.exeC:\Windows\System\vCVkJPV.exe4⤵PID:15148
-
-
C:\Windows\System\OsjsgLk.exeC:\Windows\System\OsjsgLk.exe4⤵PID:15196
-
-
C:\Windows\System\ENQwfth.exeC:\Windows\System\ENQwfth.exe4⤵PID:15228
-
-
C:\Windows\System\muNOvFh.exeC:\Windows\System\muNOvFh.exe4⤵PID:15288
-
-
C:\Windows\System\QybbajO.exeC:\Windows\System\QybbajO.exe4⤵PID:15328
-
-
C:\Windows\System\BAvvJNP.exeC:\Windows\System\BAvvJNP.exe4⤵PID:15348
-
-
C:\Windows\System\jPxRIeZ.exeC:\Windows\System\jPxRIeZ.exe4⤵PID:13716
-
-
C:\Windows\System\rzPFmcw.exeC:\Windows\System\rzPFmcw.exe4⤵PID:14504
-
-
C:\Windows\System\BwBRdVu.exeC:\Windows\System\BwBRdVu.exe4⤵PID:14452
-
-
C:\Windows\System\PjJEWrn.exeC:\Windows\System\PjJEWrn.exe4⤵PID:14660
-
-
C:\Windows\System\kjMhVzX.exeC:\Windows\System\kjMhVzX.exe4⤵PID:14736
-
-
C:\Windows\System\riDqDNq.exeC:\Windows\System\riDqDNq.exe4⤵PID:14804
-
-
C:\Windows\System\JETvERV.exeC:\Windows\System\JETvERV.exe4⤵PID:14972
-
-
C:\Windows\System\TdWUllr.exeC:\Windows\System\TdWUllr.exe4⤵PID:15016
-
-
C:\Windows\System\DgwkEfY.exeC:\Windows\System\DgwkEfY.exe4⤵PID:15168
-
-
C:\Windows\System\aCLJyEM.exeC:\Windows\System\aCLJyEM.exe4⤵PID:15096
-
-
C:\Windows\System\EefqgNS.exeC:\Windows\System\EefqgNS.exe4⤵PID:15140
-
-
C:\Windows\System\PMvzOdI.exeC:\Windows\System\PMvzOdI.exe4⤵PID:13552
-
-
C:\Windows\System\HqzvFfI.exeC:\Windows\System\HqzvFfI.exe4⤵PID:15256
-
-
C:\Windows\System\aRLrsIL.exeC:\Windows\System\aRLrsIL.exe4⤵PID:15316
-
-
C:\Windows\System\QgZffPM.exeC:\Windows\System\QgZffPM.exe4⤵PID:13748
-
-
C:\Windows\System\nZIMCWh.exeC:\Windows\System\nZIMCWh.exe4⤵PID:14392
-
-
C:\Windows\System\TDgsspe.exeC:\Windows\System\TDgsspe.exe4⤵PID:14732
-
-
C:\Windows\System\YNGIAUl.exeC:\Windows\System\YNGIAUl.exe4⤵PID:14924
-
-
C:\Windows\System\TJDjOfb.exeC:\Windows\System\TJDjOfb.exe4⤵PID:14992
-
-
C:\Windows\System\aEPDXkr.exeC:\Windows\System\aEPDXkr.exe4⤵PID:14964
-
-
C:\Windows\System\QgGDEPq.exeC:\Windows\System\QgGDEPq.exe4⤵PID:15280
-
-
C:\Windows\System\mkZftfa.exeC:\Windows\System\mkZftfa.exe4⤵PID:14340
-
-
C:\Windows\System\yJAImQo.exeC:\Windows\System\yJAImQo.exe4⤵PID:14624
-
-
C:\Windows\System\EeyVbNu.exeC:\Windows\System\EeyVbNu.exe4⤵PID:14848
-
-
C:\Windows\System\DDLWwGF.exeC:\Windows\System\DDLWwGF.exe4⤵PID:14812
-
-
C:\Windows\System\SLixmRa.exeC:\Windows\System\SLixmRa.exe4⤵PID:15364
-
-
C:\Windows\System\SRmKUNN.exeC:\Windows\System\SRmKUNN.exe4⤵PID:15396
-
-
C:\Windows\System\ihHIWBI.exeC:\Windows\System\ihHIWBI.exe4⤵PID:15448
-
-
C:\Windows\System\mDiKkWG.exeC:\Windows\System\mDiKkWG.exe4⤵PID:15464
-
-
C:\Windows\System\AyTxKTg.exeC:\Windows\System\AyTxKTg.exe4⤵PID:15492
-
-
C:\Windows\System\ohLAGxM.exeC:\Windows\System\ohLAGxM.exe4⤵PID:15532
-
-
C:\Windows\System\sCWqPsR.exeC:\Windows\System\sCWqPsR.exe4⤵PID:15552
-
-
C:\Windows\System\bnQWkkp.exeC:\Windows\System\bnQWkkp.exe4⤵PID:15568
-
-
C:\Windows\System\AbkEkec.exeC:\Windows\System\AbkEkec.exe4⤵PID:15588
-
-
C:\Windows\System\yAIYQAL.exeC:\Windows\System\yAIYQAL.exe4⤵PID:15648
-
-
C:\Windows\System\jTqFajO.exeC:\Windows\System\jTqFajO.exe4⤵PID:15676
-
-
C:\Windows\System\YjlzIga.exeC:\Windows\System\YjlzIga.exe4⤵PID:15708
-
-
C:\Windows\System\MhqhGeE.exeC:\Windows\System\MhqhGeE.exe4⤵PID:15740
-
-
C:\Windows\System\eBfjsvY.exeC:\Windows\System\eBfjsvY.exe4⤵PID:15780
-
-
C:\Windows\System\eNTojPR.exeC:\Windows\System\eNTojPR.exe4⤵PID:15832
-
-
C:\Windows\System\TzvTErP.exeC:\Windows\System\TzvTErP.exe4⤵PID:15852
-
-
C:\Windows\System\TMBWgJP.exeC:\Windows\System\TMBWgJP.exe4⤵PID:15888
-
-
C:\Windows\System\AkQfnSU.exeC:\Windows\System\AkQfnSU.exe4⤵PID:15924
-
-
C:\Windows\System\BQQEJkm.exeC:\Windows\System\BQQEJkm.exe4⤵PID:15984
-
-
C:\Windows\System\WqnUCVk.exeC:\Windows\System\WqnUCVk.exe4⤵PID:16000
-
-
C:\Windows\System\slsVyxl.exeC:\Windows\System\slsVyxl.exe4⤵PID:16020
-
-
C:\Windows\System\HxBHVxn.exeC:\Windows\System\HxBHVxn.exe4⤵PID:16036
-
-
C:\Windows\System\ApPOCSW.exeC:\Windows\System\ApPOCSW.exe4⤵PID:16052
-
-
C:\Windows\System\fXGYXBr.exeC:\Windows\System\fXGYXBr.exe4⤵PID:16068
-
-
C:\Windows\System\RkIuajk.exeC:\Windows\System\RkIuajk.exe4⤵PID:16084
-
-
C:\Windows\System\xrbjhXO.exeC:\Windows\System\xrbjhXO.exe4⤵PID:16104
-
-
C:\Windows\System\QXIWYmJ.exeC:\Windows\System\QXIWYmJ.exe4⤵PID:16120
-
-
C:\Windows\System\FcHtWRQ.exeC:\Windows\System\FcHtWRQ.exe4⤵PID:16148
-
-
C:\Windows\System\uoyGWQT.exeC:\Windows\System\uoyGWQT.exe4⤵PID:16192
-
-
C:\Windows\System\sRHoLTm.exeC:\Windows\System\sRHoLTm.exe4⤵PID:16220
-
-
C:\Windows\System\UPRshUC.exeC:\Windows\System\UPRshUC.exe4⤵PID:16252
-
-
C:\Windows\System\XhHHYoN.exeC:\Windows\System\XhHHYoN.exe4⤵PID:16296
-
-
C:\Windows\System\BWfbclQ.exeC:\Windows\System\BWfbclQ.exe4⤵PID:16312
-
-
C:\Windows\System\cABuRZF.exeC:\Windows\System\cABuRZF.exe4⤵PID:16328
-
-
C:\Windows\System\NfPZaIj.exeC:\Windows\System\NfPZaIj.exe4⤵PID:16344
-
-
C:\Windows\System\MhMhQLc.exeC:\Windows\System\MhMhQLc.exe4⤵PID:16360
-
-
C:\Windows\System\XAorcEg.exeC:\Windows\System\XAorcEg.exe4⤵PID:16380
-
-
C:\Windows\System\QGQXMeG.exeC:\Windows\System\QGQXMeG.exe4⤵PID:14720
-
-
C:\Windows\System\csFKpMy.exeC:\Windows\System\csFKpMy.exe4⤵PID:15488
-
-
C:\Windows\System\uScYNuN.exeC:\Windows\System\uScYNuN.exe4⤵PID:15388
-
-
C:\Windows\System\jRleiqf.exeC:\Windows\System\jRleiqf.exe4⤵PID:15684
-
-
C:\Windows\System\gKvRFKm.exeC:\Windows\System\gKvRFKm.exe4⤵PID:15548
-
-
C:\Windows\System\uFfNvjg.exeC:\Windows\System\uFfNvjg.exe4⤵PID:15640
-
-
C:\Windows\System\vyXgADB.exeC:\Windows\System\vyXgADB.exe4⤵PID:15668
-
-
C:\Windows\System\bQOAGnK.exeC:\Windows\System\bQOAGnK.exe4⤵PID:16012
-
-
C:\Windows\System\fOyMjor.exeC:\Windows\System\fOyMjor.exe4⤵PID:15788
-
-
C:\Windows\System\GMzogdn.exeC:\Windows\System\GMzogdn.exe4⤵PID:16168
-
-
C:\Windows\System\cfGxViU.exeC:\Windows\System\cfGxViU.exe4⤵PID:16128
-
-
C:\Windows\System\chCCgVV.exeC:\Windows\System\chCCgVV.exe4⤵PID:16268
-
-
C:\Windows\System\eZxMjqQ.exeC:\Windows\System\eZxMjqQ.exe4⤵PID:16184
-
-
C:\Windows\System\YtfIASh.exeC:\Windows\System\YtfIASh.exe4⤵PID:16308
-
-
C:\Windows\System\nspYIhn.exeC:\Windows\System\nspYIhn.exe4⤵PID:15384
-
-
C:\Windows\System\RRSgBrU.exeC:\Windows\System\RRSgBrU.exe4⤵PID:15940
-
-
C:\Windows\System\naNMAhB.exeC:\Windows\System\naNMAhB.exe4⤵PID:15512
-
-
C:\Windows\System\xIPUsRW.exeC:\Windows\System\xIPUsRW.exe4⤵PID:16264
-
-
C:\Windows\System\UBTkhwx.exeC:\Windows\System\UBTkhwx.exe4⤵PID:15516
-
-
C:\Windows\System\DqBFypI.exeC:\Windows\System\DqBFypI.exe4⤵PID:16400
-
-
C:\Windows\System\bRlfuzV.exeC:\Windows\System\bRlfuzV.exe4⤵PID:16428
-
-
C:\Windows\System\uMPHLte.exeC:\Windows\System\uMPHLte.exe4⤵PID:16472
-
-
C:\Windows\System\KgYgANU.exeC:\Windows\System\KgYgANU.exe4⤵PID:16508
-
-
C:\Windows\System\tBBSytN.exeC:\Windows\System\tBBSytN.exe4⤵PID:16568
-
-
C:\Windows\System\FqiLdsU.exeC:\Windows\System\FqiLdsU.exe4⤵PID:16616
-
-
C:\Windows\System\qSENYwG.exeC:\Windows\System\qSENYwG.exe4⤵PID:16640
-
-
C:\Windows\System\oYQagrq.exeC:\Windows\System\oYQagrq.exe4⤵PID:16656
-
-
C:\Windows\System\VRwGHJd.exeC:\Windows\System\VRwGHJd.exe4⤵PID:16672
-
-
C:\Windows\System\LThsouy.exeC:\Windows\System\LThsouy.exe4⤵PID:16728
-
-
C:\Windows\System\OztiaEG.exeC:\Windows\System\OztiaEG.exe4⤵PID:16804
-
-
C:\Windows\System\TNgEmcP.exeC:\Windows\System\TNgEmcP.exe4⤵PID:16828
-
-
C:\Windows\System\zIAcWfK.exeC:\Windows\System\zIAcWfK.exe4⤵PID:16860
-
-
C:\Windows\System\yAfLwFA.exeC:\Windows\System\yAfLwFA.exe4⤵PID:16912
-
-
C:\Windows\System\hqaEXYh.exeC:\Windows\System\hqaEXYh.exe4⤵PID:16960
-
-
C:\Windows\System\gxCTPMJ.exeC:\Windows\System\gxCTPMJ.exe4⤵PID:16984
-
-
C:\Windows\System\IYmnJIh.exeC:\Windows\System\IYmnJIh.exe4⤵PID:17044
-
-
C:\Windows\System\aVgNGyK.exeC:\Windows\System\aVgNGyK.exe4⤵PID:17076
-
-
C:\Windows\System\yKUCvZh.exeC:\Windows\System\yKUCvZh.exe4⤵PID:17116
-
-
C:\Windows\System\OuGoLpt.exeC:\Windows\System\OuGoLpt.exe4⤵PID:17172
-
-
C:\Windows\System\gAVDSCV.exeC:\Windows\System\gAVDSCV.exe4⤵PID:17228
-
-
C:\Windows\System\EdzmVZA.exeC:\Windows\System\EdzmVZA.exe4⤵PID:17256
-
-
C:\Windows\System\lKhFQTL.exeC:\Windows\System\lKhFQTL.exe4⤵PID:17280
-
-
C:\Windows\System\fzpvSsX.exeC:\Windows\System\fzpvSsX.exe4⤵PID:17320
-
-
C:\Windows\System\sEYluXI.exeC:\Windows\System\sEYluXI.exe4⤵PID:17388
-
-
C:\Windows\System\yUftbpX.exeC:\Windows\System\yUftbpX.exe4⤵PID:16356
-
-
C:\Windows\System\rkuzONi.exeC:\Windows\System\rkuzONi.exe4⤵PID:15456
-
-
C:\Windows\System\GymFyWq.exeC:\Windows\System\GymFyWq.exe4⤵PID:14840
-
-
C:\Windows\System\lxJUqwi.exeC:\Windows\System\lxJUqwi.exe4⤵PID:16520
-
-
C:\Windows\System\NXMGyVI.exeC:\Windows\System\NXMGyVI.exe4⤵PID:16436
-
-
C:\Windows\System\GpFYgGa.exeC:\Windows\System\GpFYgGa.exe4⤵PID:16468
-
-
C:\Windows\System\GEHKzxQ.exeC:\Windows\System\GEHKzxQ.exe4⤵PID:16608
-
-
C:\Windows\System\dfIoaPl.exeC:\Windows\System\dfIoaPl.exe4⤵PID:16584
-
-
C:\Windows\System\fDDAAzQ.exeC:\Windows\System\fDDAAzQ.exe4⤵PID:16680
-
-
C:\Windows\System\ntdWVKV.exeC:\Windows\System\ntdWVKV.exe4⤵PID:16724
-
-
C:\Windows\System\ZQtNCJC.exeC:\Windows\System\ZQtNCJC.exe4⤵PID:16976
-
-
C:\Windows\System\kTqMDgD.exeC:\Windows\System\kTqMDgD.exe4⤵PID:16928
-
-
C:\Windows\System\IZaEMqF.exeC:\Windows\System\IZaEMqF.exe4⤵PID:16876
-
-
C:\Windows\System\zbItwOl.exeC:\Windows\System\zbItwOl.exe4⤵PID:16904
-
-
C:\Windows\System\hPHvpXX.exeC:\Windows\System\hPHvpXX.exe4⤵PID:17212
-
-
C:\Windows\System\uNALdaz.exeC:\Windows\System\uNALdaz.exe4⤵PID:17308
-
-
C:\Windows\System\BMMFiIs.exeC:\Windows\System\BMMFiIs.exe4⤵PID:16320
-
-
C:\Windows\System\TggNkrY.exeC:\Windows\System\TggNkrY.exe4⤵PID:14688
-
-
C:\Windows\System\Wlyrshs.exeC:\Windows\System\Wlyrshs.exe4⤵PID:15932
-
-
C:\Windows\System\MJIISEV.exeC:\Windows\System\MJIISEV.exe4⤵PID:16116
-
-
C:\Windows\System\ARQJyfa.exeC:\Windows\System\ARQJyfa.exe4⤵PID:16784
-
-
C:\Windows\System\ftEnQlB.exeC:\Windows\System\ftEnQlB.exe4⤵PID:16892
-
-
C:\Windows\System\ZHEwDCM.exeC:\Windows\System\ZHEwDCM.exe4⤵PID:16816
-
-
C:\Windows\System\EwJVtTC.exeC:\Windows\System\EwJVtTC.exe4⤵PID:17328
-
-
C:\Windows\System\hjBMbEo.exeC:\Windows\System\hjBMbEo.exe4⤵PID:17452
-
-
C:\Windows\System\vGtKtPw.exeC:\Windows\System\vGtKtPw.exe4⤵PID:17472
-
-
C:\Windows\System\klPojSM.exeC:\Windows\System\klPojSM.exe4⤵PID:17512
-
-
C:\Windows\System\CcRKiVX.exeC:\Windows\System\CcRKiVX.exe4⤵PID:17560
-
-
C:\Windows\System\dcLzuye.exeC:\Windows\System\dcLzuye.exe4⤵PID:17592
-
-
C:\Windows\System\tThGvQH.exeC:\Windows\System\tThGvQH.exe4⤵PID:17608
-
-
C:\Windows\System\oBDWDBS.exeC:\Windows\System\oBDWDBS.exe4⤵PID:17644
-
-
C:\Windows\System\MMrsFoT.exeC:\Windows\System\MMrsFoT.exe4⤵PID:17692
-
-
C:\Windows\System\rqEVHjs.exeC:\Windows\System\rqEVHjs.exe4⤵PID:17728
-
-
C:\Windows\System\LVcJzjJ.exeC:\Windows\System\LVcJzjJ.exe4⤵PID:17764
-
-
C:\Windows\System\ISUOxFX.exeC:\Windows\System\ISUOxFX.exe4⤵PID:17788
-
-
C:\Windows\System\EVNUEav.exeC:\Windows\System\EVNUEav.exe4⤵PID:17816
-
-
C:\Windows\System\MFvikJu.exeC:\Windows\System\MFvikJu.exe4⤵PID:17852
-
-
C:\Windows\System\tAZRmWi.exeC:\Windows\System\tAZRmWi.exe4⤵PID:17888
-
-
C:\Windows\System\hhnTfzm.exeC:\Windows\System\hhnTfzm.exe4⤵PID:17920
-
-
C:\Windows\System\XjqDMoP.exeC:\Windows\System\XjqDMoP.exe4⤵PID:17948
-
-
C:\Windows\System\WsbmMse.exeC:\Windows\System\WsbmMse.exe4⤵PID:17996
-
-
C:\Windows\System\giMbxwQ.exeC:\Windows\System\giMbxwQ.exe4⤵PID:18012
-
-
C:\Windows\System\NlxPrpK.exeC:\Windows\System\NlxPrpK.exe4⤵PID:18052
-
-
C:\Windows\System\zitRzEa.exeC:\Windows\System\zitRzEa.exe4⤵PID:18084
-
-
C:\Windows\System\hJazMaM.exeC:\Windows\System\hJazMaM.exe4⤵PID:18136
-
-
C:\Windows\System\hYIzoNO.exeC:\Windows\System\hYIzoNO.exe4⤵PID:18160
-
-
C:\Windows\System\ZbhNVUh.exeC:\Windows\System\ZbhNVUh.exe4⤵PID:18200
-
-
C:\Windows\System\oskVmQD.exeC:\Windows\System\oskVmQD.exe4⤵PID:18240
-
-
C:\Windows\System\HFxyuDC.exeC:\Windows\System\HFxyuDC.exe4⤵PID:18268
-
-
C:\Windows\System\eMkdnaO.exeC:\Windows\System\eMkdnaO.exe4⤵PID:18296
-
-
C:\Windows\System\JwjXcpF.exeC:\Windows\System\JwjXcpF.exe4⤵PID:18332
-
-
C:\Windows\System\CHarKHt.exeC:\Windows\System\CHarKHt.exe4⤵PID:18356
-
-
C:\Windows\System\ZdeAxbo.exeC:\Windows\System\ZdeAxbo.exe4⤵PID:18412
-
-
C:\Windows\System\XrNrJnY.exeC:\Windows\System\XrNrJnY.exe4⤵PID:17396
-
-
C:\Windows\System\ENTxEty.exeC:\Windows\System\ENTxEty.exe4⤵PID:17244
-
-
C:\Windows\System\uVXeSra.exeC:\Windows\System\uVXeSra.exe4⤵PID:16556
-
-
C:\Windows\System\FFQuSkn.exeC:\Windows\System\FFQuSkn.exe4⤵PID:17208
-
-
C:\Windows\System\vsOrqMd.exeC:\Windows\System\vsOrqMd.exe4⤵PID:17480
-
-
C:\Windows\System\ZPakoRM.exeC:\Windows\System\ZPakoRM.exe4⤵PID:16880
-
-
C:\Windows\System\nuAMrfY.exeC:\Windows\System\nuAMrfY.exe4⤵PID:17628
-
-
C:\Windows\System\zehheOp.exeC:\Windows\System\zehheOp.exe4⤵PID:17736
-
-
C:\Windows\System\evBIgZh.exeC:\Windows\System\evBIgZh.exe4⤵PID:17656
-
-
C:\Windows\System\niWIAtC.exeC:\Windows\System\niWIAtC.exe4⤵PID:17868
-
-
C:\Windows\System\ewUzuUC.exeC:\Windows\System\ewUzuUC.exe4⤵PID:17668
-
-
C:\Windows\System\ffehgow.exeC:\Windows\System\ffehgow.exe4⤵PID:17976
-
-
C:\Windows\System\kIRNvbR.exeC:\Windows\System\kIRNvbR.exe4⤵PID:18116
-
-
C:\Windows\System\kHrwmlH.exeC:\Windows\System\kHrwmlH.exe4⤵PID:18072
-
-
C:\Windows\System\REiajrs.exeC:\Windows\System\REiajrs.exe4⤵PID:18024
-
-
C:\Windows\System\NLakife.exeC:\Windows\System\NLakife.exe4⤵PID:18248
-
-
C:\Windows\System\oRWACxb.exeC:\Windows\System\oRWACxb.exe4⤵PID:3160
-
-
C:\Windows\System\ULtzfYE.exeC:\Windows\System\ULtzfYE.exe4⤵PID:17164
-
-
C:\Windows\System\qabrkpC.exeC:\Windows\System\qabrkpC.exe4⤵PID:18340
-
-
C:\Windows\System\cFzNURD.exeC:\Windows\System\cFzNURD.exe4⤵PID:18408
-
-
C:\Windows\System\ZYihjrf.exeC:\Windows\System\ZYihjrf.exe4⤵PID:17432
-
-
C:\Windows\System\KqNqMSM.exeC:\Windows\System\KqNqMSM.exe4⤵PID:17992
-
-
C:\Windows\System\OpOPZUi.exeC:\Windows\System\OpOPZUi.exe4⤵PID:17760
-
-
C:\Windows\System\sarJUkP.exeC:\Windows\System\sarJUkP.exe4⤵PID:17784
-
-
C:\Windows\System\KaJrOvP.exeC:\Windows\System\KaJrOvP.exe4⤵PID:17536
-
-
C:\Windows\System\doYizus.exeC:\Windows\System\doYizus.exe4⤵PID:15880
-
-
C:\Windows\System\EgLlADK.exeC:\Windows\System\EgLlADK.exe4⤵PID:17500
-
-
C:\Windows\System\ReEWIwF.exeC:\Windows\System\ReEWIwF.exe4⤵PID:17000
-
-
C:\Windows\System\gMFpUKf.exeC:\Windows\System\gMFpUKf.exe4⤵PID:17460
-
-
C:\Windows\System\dCnIjxz.exeC:\Windows\System\dCnIjxz.exe4⤵PID:18472
-
-
C:\Windows\System\IQzUmZo.exeC:\Windows\System\IQzUmZo.exe4⤵PID:18516
-
-
C:\Windows\System\eKyZyqu.exeC:\Windows\System\eKyZyqu.exe4⤵PID:18556
-
-
C:\Windows\System\QiZRSSp.exeC:\Windows\System\QiZRSSp.exe4⤵PID:18588
-
-
C:\Windows\System\XHXuCLE.exeC:\Windows\System\XHXuCLE.exe4⤵PID:18624
-
-
C:\Windows\System\eDHqwCt.exeC:\Windows\System\eDHqwCt.exe4⤵PID:18660
-
-
C:\Windows\System\auPfdyE.exeC:\Windows\System\auPfdyE.exe4⤵PID:18724
-
-
C:\Windows\System\YpfvwAK.exeC:\Windows\System\YpfvwAK.exe4⤵PID:18764
-
-
C:\Windows\System\yiKmMcX.exeC:\Windows\System\yiKmMcX.exe4⤵PID:18800
-
-
C:\Windows\System\VrAfLMr.exeC:\Windows\System\VrAfLMr.exe4⤵PID:18828
-
-
C:\Windows\System\JjiwYiQ.exeC:\Windows\System\JjiwYiQ.exe4⤵PID:19036
-
-
C:\Windows\System\OneyxhU.exeC:\Windows\System\OneyxhU.exe4⤵PID:19092
-
-
C:\Windows\System\TiFmudq.exeC:\Windows\System\TiFmudq.exe4⤵PID:19112
-
-
C:\Windows\System\kBntlyJ.exeC:\Windows\System\kBntlyJ.exe4⤵PID:19136
-
-
C:\Windows\System\IXvuklu.exeC:\Windows\System\IXvuklu.exe4⤵PID:19184
-
-
C:\Windows\System\isVxLOn.exeC:\Windows\System\isVxLOn.exe4⤵PID:19232
-
-
C:\Windows\System\CRyduzP.exeC:\Windows\System\CRyduzP.exe4⤵PID:19264
-
-
C:\Windows\System\GSkdjNt.exeC:\Windows\System\GSkdjNt.exe4⤵PID:19296
-
-
C:\Windows\System\OxUCXtj.exeC:\Windows\System\OxUCXtj.exe4⤵PID:19348
-
-
C:\Windows\System\GYBTTCD.exeC:\Windows\System\GYBTTCD.exe4⤵PID:19452
-
-
C:\Windows\System\UzyCSIh.exeC:\Windows\System\UzyCSIh.exe4⤵PID:18400
-
-
C:\Windows\System\txurgCK.exeC:\Windows\System\txurgCK.exe4⤵PID:18452
-
-
C:\Windows\System\NmhxaiQ.exeC:\Windows\System\NmhxaiQ.exe4⤵PID:18468
-
-
C:\Windows\System\yXhOnDj.exeC:\Windows\System\yXhOnDj.exe4⤵PID:18512
-
-
C:\Windows\System\FaYTZEM.exeC:\Windows\System\FaYTZEM.exe4⤵PID:18396
-
-
C:\Windows\System\gIuTeva.exeC:\Windows\System\gIuTeva.exe4⤵PID:18748
-
-
C:\Windows\System\RQRxBDR.exeC:\Windows\System\RQRxBDR.exe4⤵PID:18816
-
-
C:\Windows\System\xevSAlr.exeC:\Windows\System\xevSAlr.exe4⤵PID:18920
-
-
C:\Windows\System\cOdYwmL.exeC:\Windows\System\cOdYwmL.exe4⤵PID:19100
-
-
C:\Windows\System\xYuSBmm.exeC:\Windows\System\xYuSBmm.exe4⤵PID:15860
-
-
C:\Windows\System\KgVkkRo.exeC:\Windows\System\KgVkkRo.exe4⤵PID:19192
-
-
C:\Windows\System\kDXLGOY.exeC:\Windows\System\kDXLGOY.exe4⤵PID:19064
-
-
C:\Windows\System\RYJAZwz.exeC:\Windows\System\RYJAZwz.exe4⤵PID:7480
-
-
C:\Windows\System\LazxQIL.exeC:\Windows\System\LazxQIL.exe4⤵PID:19312
-
-
C:\Windows\System\CKrOpAZ.exeC:\Windows\System\CKrOpAZ.exe4⤵PID:19284
-
-
C:\Windows\System\SohInhs.exeC:\Windows\System\SohInhs.exe4⤵PID:19320
-
-
C:\Windows\System\gtZtlqa.exeC:\Windows\System\gtZtlqa.exe4⤵PID:16856
-
-
C:\Windows\System\NjmMeGP.exeC:\Windows\System\NjmMeGP.exe4⤵PID:17932
-
-
C:\Windows\System\YIkHXvm.exeC:\Windows\System\YIkHXvm.exe4⤵PID:18480
-
-
C:\Windows\System\kJIzOng.exeC:\Windows\System\kJIzOng.exe4⤵PID:18676
-
-
C:\Windows\System\RHnYxQf.exeC:\Windows\System\RHnYxQf.exe4⤵PID:18648
-
-
C:\Windows\System\xzctwcR.exeC:\Windows\System\xzctwcR.exe4⤵PID:18636
-
-
C:\Windows\System\PjtPxGt.exeC:\Windows\System\PjtPxGt.exe4⤵PID:18844
-
-
C:\Windows\System\LRrIsxv.exeC:\Windows\System\LRrIsxv.exe4⤵PID:18756
-
-
C:\Windows\System\JkwwoLn.exeC:\Windows\System\JkwwoLn.exe4⤵PID:19080
-
-
C:\Windows\System\uEzmCHM.exeC:\Windows\System\uEzmCHM.exe4⤵PID:19060
-
-
C:\Windows\System\zRhSNVn.exeC:\Windows\System\zRhSNVn.exe4⤵PID:19356
-
-
C:\Windows\System\cKsvKyO.exeC:\Windows\System\cKsvKyO.exe4⤵PID:17664
-
-
C:\Windows\System\iBOYAfZ.exeC:\Windows\System\iBOYAfZ.exe4⤵PID:19148
-
-
C:\Windows\System\wNoIJrl.exeC:\Windows\System\wNoIJrl.exe4⤵PID:19460
-
-
C:\Windows\System\JrZnBAP.exeC:\Windows\System\JrZnBAP.exe4⤵PID:19500
-
-
C:\Windows\System\HxpRGiH.exeC:\Windows\System\HxpRGiH.exe4⤵PID:19548
-
-
C:\Windows\System\tNLzJtO.exeC:\Windows\System\tNLzJtO.exe4⤵PID:19584
-
-
C:\Windows\System\cuLoWKf.exeC:\Windows\System\cuLoWKf.exe4⤵PID:19632
-
-
C:\Windows\System\EbIuGTR.exeC:\Windows\System\EbIuGTR.exe4⤵PID:19664
-
-
C:\Windows\System\bTPZuUX.exeC:\Windows\System\bTPZuUX.exe4⤵PID:19708
-
-
C:\Windows\System\JDfSuPy.exeC:\Windows\System\JDfSuPy.exe4⤵PID:19748
-
-
C:\Windows\System\bBrkIKy.exeC:\Windows\System\bBrkIKy.exe4⤵PID:19764
-
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_8909a327b78df6f1393349086fed94f0.virvirussign.com_8909a327b78df6f1393349086fed94f0.vir3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_8df053c876529979fc9aa0b52c344150.virvirussign.com_8df053c876529979fc9aa0b52c344150.vir3⤵
- Suspicious use of SetWindowsHookEx
PID:3932
-
-
C:\Users\Admin\Desktop\malwar\virussign.com_93c00ea8da25c42b7b096dd91e3cb4b0.virvirussign.com_93c00ea8da25c42b7b096dd91e3cb4b0.vir3⤵PID:5036
-
C:\Windows\SysWOW64\Hplbickp.exeC:\Windows\system32\Hplbickp.exe4⤵PID:428
-
C:\Windows\SysWOW64\Hlbcnd32.exeC:\Windows\system32\Hlbcnd32.exe5⤵
- System Location Discovery: System Language Discovery
PID:5128 -
C:\Windows\SysWOW64\Hpqldc32.exeC:\Windows\system32\Hpqldc32.exe6⤵PID:5348
-
C:\Windows\SysWOW64\Hoeieolb.exeC:\Windows\system32\Hoeieolb.exe7⤵PID:5540
-
C:\Windows\SysWOW64\Ifomll32.exeC:\Windows\system32\Ifomll32.exe8⤵
- Drops file in System32 directory
PID:5864 -
C:\Windows\SysWOW64\Iojbpo32.exeC:\Windows\system32\Iojbpo32.exe9⤵PID:6036
-
C:\Windows\SysWOW64\Iefgbh32.exeC:\Windows\system32\Iefgbh32.exe10⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5328 -
C:\Windows\SysWOW64\Jghpbk32.exeC:\Windows\system32\Jghpbk32.exe11⤵PID:1396
-
C:\Windows\SysWOW64\Jgkmgk32.exeC:\Windows\system32\Jgkmgk32.exe12⤵
- Drops file in System32 directory
PID:6344 -
C:\Windows\SysWOW64\Jcanll32.exeC:\Windows\system32\Jcanll32.exe13⤵
- Modifies registry class
PID:6552 -
C:\Windows\SysWOW64\Jinboekc.exeC:\Windows\system32\Jinboekc.exe14⤵PID:6928
-
C:\Windows\SysWOW64\Kegpifod.exeC:\Windows\system32\Kegpifod.exe15⤵PID:5368
-
C:\Windows\SysWOW64\Kpmdfonj.exeC:\Windows\system32\Kpmdfonj.exe16⤵PID:6416
-
C:\Windows\SysWOW64\Koaagkcb.exeC:\Windows\system32\Koaagkcb.exe17⤵PID:6228
-
C:\Windows\SysWOW64\Kncaec32.exeC:\Windows\system32\Kncaec32.exe18⤵PID:824
-
C:\Windows\SysWOW64\Kjjbjd32.exeC:\Windows\system32\Kjjbjd32.exe19⤵PID:7288
-
C:\Windows\SysWOW64\Lpfgmnfp.exeC:\Windows\system32\Lpfgmnfp.exe20⤵PID:7552
-
C:\Windows\SysWOW64\Ljnlecmp.exeC:\Windows\system32\Ljnlecmp.exe21⤵PID:7676
-
C:\Windows\SysWOW64\Lgdidgjg.exeC:\Windows\system32\Lgdidgjg.exe22⤵PID:8120
-
C:\Windows\SysWOW64\Lqojclne.exeC:\Windows\system32\Lqojclne.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7568 -
C:\Windows\SysWOW64\Modgdicm.exeC:\Windows\system32\Modgdicm.exe24⤵PID:7612
-
C:\Windows\SysWOW64\Mnegbp32.exeC:\Windows\system32\Mnegbp32.exe25⤵PID:1844
-
C:\Windows\SysWOW64\Moipoh32.exeC:\Windows\system32\Moipoh32.exe26⤵PID:8488
-
C:\Windows\SysWOW64\Mnjqmpgg.exeC:\Windows\system32\Mnjqmpgg.exe27⤵PID:8692
-
C:\Windows\SysWOW64\Mjaabq32.exeC:\Windows\system32\Mjaabq32.exe28⤵PID:8936
-
C:\Windows\SysWOW64\Mcifkf32.exeC:\Windows\system32\Mcifkf32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:9112 -
C:\Windows\SysWOW64\Nopfpgip.exeC:\Windows\system32\Nopfpgip.exe30⤵PID:7608
-
C:\Windows\SysWOW64\Nmdgikhi.exeC:\Windows\system32\Nmdgikhi.exe31⤵PID:8580
-
C:\Windows\SysWOW64\Ngjkfd32.exeC:\Windows\system32\Ngjkfd32.exe32⤵
- Drops file in System32 directory
PID:8700 -
C:\Windows\SysWOW64\Nmfcok32.exeC:\Windows\system32\Nmfcok32.exe33⤵PID:9080
-
C:\Windows\SysWOW64\Nmkmjjaa.exeC:\Windows\system32\Nmkmjjaa.exe34⤵PID:9232
-
C:\Windows\SysWOW64\Nfcabp32.exeC:\Windows\system32\Nfcabp32.exe35⤵
- System Location Discovery: System Language Discovery
PID:9404 -
C:\Windows\SysWOW64\Ojajin32.exeC:\Windows\system32\Ojajin32.exe36⤵
- Modifies registry class
PID:9744 -
C:\Windows\SysWOW64\Opnbae32.exeC:\Windows\system32\Opnbae32.exe37⤵
- System Location Discovery: System Language Discovery
PID:9892 -
C:\Windows\SysWOW64\Ombcji32.exeC:\Windows\system32\Ombcji32.exe38⤵
- Modifies registry class
PID:10124 -
C:\Windows\SysWOW64\Ojfcdnjc.exeC:\Windows\system32\Ojfcdnjc.exe39⤵PID:9240
-
C:\Windows\SysWOW64\Ocohmc32.exeC:\Windows\system32\Ocohmc32.exe40⤵PID:9456
-
C:\Windows\SysWOW64\Pnfiplog.exeC:\Windows\system32\Pnfiplog.exe41⤵PID:9964
-
C:\Windows\SysWOW64\Phonha32.exeC:\Windows\system32\Phonha32.exe42⤵PID:10224
-
C:\Windows\SysWOW64\Ppjbmc32.exeC:\Windows\system32\Ppjbmc32.exe43⤵PID:10072
-
C:\Windows\SysWOW64\Pnkbkk32.exeC:\Windows\system32\Pnkbkk32.exe44⤵PID:10412
-
C:\Windows\SysWOW64\Pmpolgoi.exeC:\Windows\system32\Pmpolgoi.exe45⤵PID:10632
-
C:\Windows\SysWOW64\Pfiddm32.exeC:\Windows\system32\Pfiddm32.exe46⤵
- Modifies registry class
PID:10776 -
C:\Windows\SysWOW64\Ppahmb32.exeC:\Windows\system32\Ppahmb32.exe47⤵PID:10928
-
C:\Windows\SysWOW64\Qobhkjdi.exeC:\Windows\system32\Qobhkjdi.exe48⤵PID:11104
-
C:\Windows\SysWOW64\Qjiipk32.exeC:\Windows\system32\Qjiipk32.exe49⤵PID:10288
-
C:\Windows\SysWOW64\Qacameaj.exeC:\Windows\system32\Qacameaj.exe50⤵
- Drops file in System32 directory
PID:10504 -
C:\Windows\SysWOW64\Amjbbfgo.exeC:\Windows\system32\Amjbbfgo.exe51⤵
- Drops file in System32 directory
PID:10860 -
C:\Windows\SysWOW64\Aknbkjfh.exeC:\Windows\system32\Aknbkjfh.exe52⤵PID:11256
-
C:\Windows\SysWOW64\Adfgdpmi.exeC:\Windows\system32\Adfgdpmi.exe53⤵PID:9392
-
C:\Windows\SysWOW64\Aggpfkjj.exeC:\Windows\system32\Aggpfkjj.exe54⤵PID:11384
-
C:\Windows\SysWOW64\Ahfmpnql.exeC:\Windows\system32\Ahfmpnql.exe55⤵PID:11628
-
C:\Windows\SysWOW64\Bdmmeo32.exeC:\Windows\system32\Bdmmeo32.exe56⤵PID:11840
-
C:\Windows\SysWOW64\Bobabg32.exeC:\Windows\system32\Bobabg32.exe57⤵PID:11992
-
C:\Windows\SysWOW64\Bgnffj32.exeC:\Windows\system32\Bgnffj32.exe58⤵PID:12216
-
C:\Windows\SysWOW64\Bpkdjofm.exeC:\Windows\system32\Bpkdjofm.exe59⤵PID:11924
-
C:\Windows\SysWOW64\Boldhf32.exeC:\Windows\system32\Boldhf32.exe60⤵
- Modifies registry class
PID:2612 -
C:\Windows\SysWOW64\Ckbemgcp.exeC:\Windows\system32\Ckbemgcp.exe61⤵PID:12464
-
C:\Windows\SysWOW64\Cponen32.exeC:\Windows\system32\Cponen32.exe62⤵PID:12592
-
C:\Windows\SysWOW64\Ckebcg32.exeC:\Windows\system32\Ckebcg32.exe63⤵PID:12788
-
C:\Windows\SysWOW64\Cdmfllhn.exeC:\Windows\system32\Cdmfllhn.exe64⤵PID:13004
-
C:\Windows\SysWOW64\Cocjiehd.exeC:\Windows\system32\Cocjiehd.exe65⤵
- Drops file in System32 directory
PID:13140 -
C:\Windows\SysWOW64\Cdpcal32.exeC:\Windows\system32\Cdpcal32.exe66⤵PID:12064
-
C:\Windows\SysWOW64\Cpfcfmlp.exeC:\Windows\system32\Cpfcfmlp.exe67⤵PID:12560
-
C:\Windows\SysWOW64\Cogddd32.exeC:\Windows\system32\Cogddd32.exe68⤵PID:12736
-
C:\Windows\SysWOW64\Dddllkbf.exeC:\Windows\system32\Dddllkbf.exe69⤵PID:11560
-
C:\Windows\SysWOW64\Dkndie32.exeC:\Windows\system32\Dkndie32.exe70⤵PID:12764
-
C:\Windows\SysWOW64\Ddgibkpc.exeC:\Windows\system32\Ddgibkpc.exe71⤵PID:13292
-
C:\Windows\SysWOW64\Dggbcf32.exeC:\Windows\system32\Dggbcf32.exe72⤵PID:13508
-
C:\Windows\SysWOW64\Dqpfmlce.exeC:\Windows\system32\Dqpfmlce.exe73⤵
- System Location Discovery: System Language Discovery
PID:13700 -
C:\Windows\SysWOW64\Dndgfpbo.exeC:\Windows\system32\Dndgfpbo.exe74⤵
- System Location Discovery: System Language Discovery
PID:13960 -
C:\Windows\SysWOW64\Dglkoeio.exeC:\Windows\system32\Dglkoeio.exe75⤵
- Drops file in System32 directory
PID:14084 -
C:\Windows\SysWOW64\Ebaplnie.exeC:\Windows\system32\Ebaplnie.exe76⤵PID:14232
-
C:\Windows\SysWOW64\Egohdegl.exeC:\Windows\system32\Egohdegl.exe77⤵PID:12524
-
C:\Windows\SysWOW64\Egaejeej.exeC:\Windows\system32\Egaejeej.exe78⤵PID:13536
-
C:\Windows\SysWOW64\Edeeci32.exeC:\Windows\system32\Edeeci32.exe79⤵PID:14332
-
C:\Windows\SysWOW64\Egcaod32.exeC:\Windows\system32\Egcaod32.exe80⤵PID:11872
-
C:\Windows\SysWOW64\Enmjlojd.exeC:\Windows\system32\Enmjlojd.exe81⤵
- Modifies registry class
PID:13012 -
C:\Windows\SysWOW64\Enpfan32.exeC:\Windows\system32\Enpfan32.exe82⤵PID:14444
-
C:\Windows\SysWOW64\Eiekog32.exeC:\Windows\system32\Eiekog32.exe83⤵
- Drops file in System32 directory
PID:14644 -
C:\Windows\SysWOW64\Ekcgkb32.exeC:\Windows\system32\Ekcgkb32.exe84⤵
- Drops file in System32 directory
PID:14724 -
C:\Windows\SysWOW64\Fbmohmoh.exeC:\Windows\system32\Fbmohmoh.exe85⤵
- System Location Discovery: System Language Discovery
PID:14832 -
C:\Windows\SysWOW64\Fdlkdhnk.exeC:\Windows\system32\Fdlkdhnk.exe86⤵PID:14928
-
C:\Windows\SysWOW64\Fkfcqb32.exeC:\Windows\system32\Fkfcqb32.exe87⤵PID:15048
-
C:\Windows\SysWOW64\Fndpmndl.exeC:\Windows\system32\Fndpmndl.exe88⤵PID:15160
-
C:\Windows\SysWOW64\Fdnhih32.exeC:\Windows\system32\Fdnhih32.exe89⤵PID:15272
-
C:\Windows\SysWOW64\Fnfmbmbi.exeC:\Windows\system32\Fnfmbmbi.exe90⤵
- Drops file in System32 directory
PID:14384 -
C:\Windows\SysWOW64\Filapfbo.exeC:\Windows\system32\Filapfbo.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:14576 -
C:\Windows\SysWOW64\Fniihmpf.exeC:\Windows\system32\Fniihmpf.exe92⤵PID:15000
-
C:\Windows\SysWOW64\Fbdehlip.exeC:\Windows\system32\Fbdehlip.exe93⤵PID:15044
-
C:\Windows\SysWOW64\Fkmjaa32.exeC:\Windows\system32\Fkmjaa32.exe94⤵PID:15356
-
C:\Windows\SysWOW64\Fbgbnkfm.exeC:\Windows\system32\Fbgbnkfm.exe95⤵PID:14908
-
C:\Windows\SysWOW64\Fiqjke32.exeC:\Windows\system32\Fiqjke32.exe96⤵
- Modifies registry class
PID:15124 -
C:\Windows\SysWOW64\Gegkpf32.exeC:\Windows\system32\Gegkpf32.exe97⤵
- Drops file in System32 directory
PID:15424 -
C:\Windows\SysWOW64\Gbkkik32.exeC:\Windows\system32\Gbkkik32.exe98⤵PID:15620
-
C:\Windows\SysWOW64\Gkdpbpih.exeC:\Windows\system32\Gkdpbpih.exe99⤵PID:15804
-
C:\Windows\SysWOW64\Gbnhoj32.exeC:\Windows\system32\Gbnhoj32.exe100⤵PID:15952
-
C:\Windows\SysWOW64\Geoapenf.exeC:\Windows\system32\Geoapenf.exe101⤵PID:16200
-
C:\Windows\SysWOW64\Hahokfag.exeC:\Windows\system32\Hahokfag.exe102⤵PID:15480
-
C:\Windows\SysWOW64\Halhfe32.exeC:\Windows\system32\Halhfe32.exe103⤵PID:15936
-
C:\Windows\SysWOW64\Hlblcn32.exeC:\Windows\system32\Hlblcn32.exe104⤵PID:16452
-
C:\Windows\SysWOW64\Hbldphde.exeC:\Windows\system32\Hbldphde.exe105⤵PID:16600
-
C:\Windows\SysWOW64\Hihibbjo.exeC:\Windows\system32\Hihibbjo.exe106⤵PID:17008
-
C:\Windows\SysWOW64\Inebjihf.exeC:\Windows\system32\Inebjihf.exe107⤵PID:17200
-
C:\Windows\SysWOW64\Ieojgc32.exeC:\Windows\system32\Ieojgc32.exe108⤵PID:17356
-
C:\Windows\SysWOW64\Ihmfco32.exeC:\Windows\system32\Ihmfco32.exe109⤵PID:16096
-
C:\Windows\SysWOW64\Ihpcinld.exeC:\Windows\system32\Ihpcinld.exe110⤵PID:16932
-
C:\Windows\SysWOW64\Iajdgcab.exeC:\Windows\system32\Iajdgcab.exe111⤵
- Drops file in System32 directory
PID:16580 -
C:\Windows\SysWOW64\Ihdldn32.exeC:\Windows\system32\Ihdldn32.exe112⤵PID:17424
-
C:\Windows\SysWOW64\Iondqhpl.exeC:\Windows\system32\Iondqhpl.exe113⤵PID:17544
-
C:\Windows\SysWOW64\Jidinqpb.exeC:\Windows\system32\Jidinqpb.exe114⤵PID:17676
-
C:\Windows\SysWOW64\Jppnpjel.exeC:\Windows\system32\Jppnpjel.exe115⤵PID:18108
-
C:\Windows\SysWOW64\Jaajhb32.exeC:\Windows\system32\Jaajhb32.exe116⤵PID:18260
-
C:\Windows\SysWOW64\Jlgoek32.exeC:\Windows\system32\Jlgoek32.exe117⤵PID:18380
-
C:\Windows\SysWOW64\Jadgnb32.exeC:\Windows\system32\Jadgnb32.exe118⤵PID:16524
-
C:\Windows\SysWOW64\Jlikkkhn.exeC:\Windows\system32\Jlikkkhn.exe119⤵PID:17712
-
C:\Windows\SysWOW64\Jafdcbge.exeC:\Windows\system32\Jafdcbge.exe120⤵
- Modifies registry class
PID:18004 -
C:\Windows\SysWOW64\Jpgdai32.exeC:\Windows\system32\Jpgdai32.exe121⤵PID:16652
-
C:\Windows\SysWOW64\Kiphjo32.exeC:\Windows\system32\Kiphjo32.exe122⤵PID:18144
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-