Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 18:41

General

  • Target

    4e790838e1f4690b8acb3b43ceb9979d9fb810a3b29e665faa969d49ab2fc4af.exe

  • Size

    464KB

  • MD5

    3eafa465e0c0a37bac20596b7a9abc7a

  • SHA1

    9291d80908f18db3042ef3b96d05564df156248b

  • SHA256

    4e790838e1f4690b8acb3b43ceb9979d9fb810a3b29e665faa969d49ab2fc4af

  • SHA512

    2caf5b633476d8d2014e07e1093ea18f9817e40b184a99defe4e49ae6ad1fe8c5dca20ba4364a69b2ec9a3fd821f8b1e403534f8e4fdd3f31cfaeb005f4b86b1

  • SSDEEP

    6144:IdE3xOgpBpuXhEOIIIPCn4EOIuIPJEOOcHTETKEOIIIPCV:IdexZpBpiEVI2C4EVu2JEVcBEVI2CV

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e790838e1f4690b8acb3b43ceb9979d9fb810a3b29e665faa969d49ab2fc4af.exe
    "C:\Users\Admin\AppData\Local\Temp\4e790838e1f4690b8acb3b43ceb9979d9fb810a3b29e665faa969d49ab2fc4af.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\Nmdgikhi.exe
      C:\Windows\system32\Nmdgikhi.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Windows\SysWOW64\Nqbpojnp.exe
        C:\Windows\system32\Nqbpojnp.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\Nadleilm.exe
          C:\Windows\system32\Nadleilm.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3124
          • C:\Windows\SysWOW64\Nmkmjjaa.exe
            C:\Windows\system32\Nmkmjjaa.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1060
            • C:\Windows\SysWOW64\Omnjojpo.exe
              C:\Windows\system32\Omnjojpo.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2904
              • C:\Windows\SysWOW64\Opnbae32.exe
                C:\Windows\system32\Opnbae32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3500
                • C:\Windows\SysWOW64\Ogekbb32.exe
                  C:\Windows\system32\Ogekbb32.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4756
                  • C:\Windows\SysWOW64\Oghghb32.exe
                    C:\Windows\system32\Oghghb32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3324
                    • C:\Windows\SysWOW64\Oabhfg32.exe
                      C:\Windows\system32\Oabhfg32.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2092
                      • C:\Windows\SysWOW64\Pfoann32.exe
                        C:\Windows\system32\Pfoann32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2608
                        • C:\Windows\SysWOW64\Pdenmbkk.exe
                          C:\Windows\system32\Pdenmbkk.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:812
                          • C:\Windows\SysWOW64\Phcgcqab.exe
                            C:\Windows\system32\Phcgcqab.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2088
                            • C:\Windows\SysWOW64\Pdjgha32.exe
                              C:\Windows\system32\Pdjgha32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:2704
                              • C:\Windows\SysWOW64\Qfkqjmdg.exe
                                C:\Windows\system32\Qfkqjmdg.exe
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:4172
                                • C:\Windows\SysWOW64\Qjiipk32.exe
                                  C:\Windows\system32\Qjiipk32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1728
                                  • C:\Windows\SysWOW64\Akkffkhk.exe
                                    C:\Windows\system32\Akkffkhk.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2632
                                    • C:\Windows\SysWOW64\Aoioli32.exe
                                      C:\Windows\system32\Aoioli32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:2636
                                      • C:\Windows\SysWOW64\Aokkahlo.exe
                                        C:\Windows\system32\Aokkahlo.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:1396
                                        • C:\Windows\SysWOW64\Adhdjpjf.exe
                                          C:\Windows\system32\Adhdjpjf.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:4564
                                          • C:\Windows\SysWOW64\Amqhbe32.exe
                                            C:\Windows\system32\Amqhbe32.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:2864
                                            • C:\Windows\SysWOW64\Aaldccip.exe
                                              C:\Windows\system32\Aaldccip.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:1680
                                              • C:\Windows\SysWOW64\Bobabg32.exe
                                                C:\Windows\system32\Bobabg32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:2336
                                                • C:\Windows\SysWOW64\Boenhgdd.exe
                                                  C:\Windows\system32\Boenhgdd.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4412
                                                  • C:\Windows\SysWOW64\Baegibae.exe
                                                    C:\Windows\system32\Baegibae.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    PID:992
                                                    • C:\Windows\SysWOW64\Bhpofl32.exe
                                                      C:\Windows\system32\Bhpofl32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:2416
                                                      • C:\Windows\SysWOW64\Bpkdjofm.exe
                                                        C:\Windows\system32\Bpkdjofm.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:2200
                                                        • C:\Windows\SysWOW64\Cggimh32.exe
                                                          C:\Windows\system32\Cggimh32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:1944
                                                          • C:\Windows\SysWOW64\Chfegk32.exe
                                                            C:\Windows\system32\Chfegk32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1332
                                                            • C:\Windows\SysWOW64\Cocjiehd.exe
                                                              C:\Windows\system32\Cocjiehd.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3428
                                                              • C:\Windows\SysWOW64\Cnhgjaml.exe
                                                                C:\Windows\system32\Cnhgjaml.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:4460
                                                                • C:\Windows\SysWOW64\Cklhcfle.exe
                                                                  C:\Windows\system32\Cklhcfle.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  PID:3176
                                                                  • C:\Windows\SysWOW64\Dnmaea32.exe
                                                                    C:\Windows\system32\Dnmaea32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:4408
                                                                    • C:\Windows\SysWOW64\Dakikoom.exe
                                                                      C:\Windows\system32\Dakikoom.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:1292
                                                                      • C:\Windows\SysWOW64\Dggbcf32.exe
                                                                        C:\Windows\system32\Dggbcf32.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:3448
                                                                        • C:\Windows\SysWOW64\Ddkbmj32.exe
                                                                          C:\Windows\system32\Ddkbmj32.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1856
                                                                          • C:\Windows\SysWOW64\Dbocfo32.exe
                                                                            C:\Windows\system32\Dbocfo32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            PID:4780
                                                                            • C:\Windows\SysWOW64\Dqbcbkab.exe
                                                                              C:\Windows\system32\Dqbcbkab.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies registry class
                                                                              PID:4328
                                                                              • C:\Windows\SysWOW64\Doccpcja.exe
                                                                                C:\Windows\system32\Doccpcja.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:2992
                                                                                • C:\Windows\SysWOW64\Egohdegl.exe
                                                                                  C:\Windows\system32\Egohdegl.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Modifies registry class
                                                                                  PID:552
                                                                                  • C:\Windows\SysWOW64\Ebdlangb.exe
                                                                                    C:\Windows\system32\Ebdlangb.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:4512
                                                                                    • C:\Windows\SysWOW64\Ebfign32.exe
                                                                                      C:\Windows\system32\Ebfign32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4464
                                                                                      • C:\Windows\SysWOW64\Edeeci32.exe
                                                                                        C:\Windows\system32\Edeeci32.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        PID:4908
                                                                                        • C:\Windows\SysWOW64\Ebifmm32.exe
                                                                                          C:\Windows\system32\Ebifmm32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4456
                                                                                          • C:\Windows\SysWOW64\Eomffaag.exe
                                                                                            C:\Windows\system32\Eomffaag.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            PID:2880
                                                                                            • C:\Windows\SysWOW64\Eghkjdoa.exe
                                                                                              C:\Windows\system32\Eghkjdoa.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:5060
                                                                                              • C:\Windows\SysWOW64\Foapaa32.exe
                                                                                                C:\Windows\system32\Foapaa32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4452
                                                                                                • C:\Windows\SysWOW64\Fijdjfdb.exe
                                                                                                  C:\Windows\system32\Fijdjfdb.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:3268
                                                                                                  • C:\Windows\SysWOW64\Fkjmlaac.exe
                                                                                                    C:\Windows\system32\Fkjmlaac.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:4824
                                                                                                    • C:\Windows\SysWOW64\Fajbjh32.exe
                                                                                                      C:\Windows\system32\Fajbjh32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:1692
                                                                                                      • C:\Windows\SysWOW64\Gbiockdj.exe
                                                                                                        C:\Windows\system32\Gbiockdj.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1632
                                                                                                        • C:\Windows\SysWOW64\Gnpphljo.exe
                                                                                                          C:\Windows\system32\Gnpphljo.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:3964
                                                                                                          • C:\Windows\SysWOW64\Gghdaa32.exe
                                                                                                            C:\Windows\system32\Gghdaa32.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Modifies registry class
                                                                                                            PID:720
                                                                                                            • C:\Windows\SysWOW64\Gihpkd32.exe
                                                                                                              C:\Windows\system32\Gihpkd32.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1676
                                                                                                              • C:\Windows\SysWOW64\Gbpedjnb.exe
                                                                                                                C:\Windows\system32\Gbpedjnb.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:2292
                                                                                                                • C:\Windows\SysWOW64\Gngeik32.exe
                                                                                                                  C:\Windows\system32\Gngeik32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:208
                                                                                                                  • C:\Windows\SysWOW64\Ghojbq32.exe
                                                                                                                    C:\Windows\system32\Ghojbq32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4516
                                                                                                                    • C:\Windows\SysWOW64\Hahokfag.exe
                                                                                                                      C:\Windows\system32\Hahokfag.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:4524
                                                                                                                      • C:\Windows\SysWOW64\Hbgkei32.exe
                                                                                                                        C:\Windows\system32\Hbgkei32.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Modifies registry class
                                                                                                                        PID:468
                                                                                                                        • C:\Windows\SysWOW64\Hhfpbpdo.exe
                                                                                                                          C:\Windows\system32\Hhfpbpdo.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          PID:1064
                                                                                                                          • C:\Windows\SysWOW64\Hlblcn32.exe
                                                                                                                            C:\Windows\system32\Hlblcn32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies registry class
                                                                                                                            PID:464
                                                                                                                            • C:\Windows\SysWOW64\Hppeim32.exe
                                                                                                                              C:\Windows\system32\Hppeim32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2908
                                                                                                                              • C:\Windows\SysWOW64\Hihibbjo.exe
                                                                                                                                C:\Windows\system32\Hihibbjo.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:2208
                                                                                                                                • C:\Windows\SysWOW64\Ipbaol32.exe
                                                                                                                                  C:\Windows\system32\Ipbaol32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:640
                                                                                                                                  • C:\Windows\SysWOW64\Ilibdmgp.exe
                                                                                                                                    C:\Windows\system32\Ilibdmgp.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:1948
                                                                                                                                    • C:\Windows\SysWOW64\Ieagmcmq.exe
                                                                                                                                      C:\Windows\system32\Ieagmcmq.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      PID:3492
                                                                                                                                      • C:\Windows\SysWOW64\Ieccbbkn.exe
                                                                                                                                        C:\Windows\system32\Ieccbbkn.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:3392
                                                                                                                                        • C:\Windows\SysWOW64\Ihbponja.exe
                                                                                                                                          C:\Windows\system32\Ihbponja.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:4352
                                                                                                                                          • C:\Windows\SysWOW64\Iefphb32.exe
                                                                                                                                            C:\Windows\system32\Iefphb32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:4708
                                                                                                                                            • C:\Windows\SysWOW64\Ibjqaf32.exe
                                                                                                                                              C:\Windows\system32\Ibjqaf32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:4548
                                                                                                                                              • C:\Windows\SysWOW64\Jblmgf32.exe
                                                                                                                                                C:\Windows\system32\Jblmgf32.exe
                                                                                                                                                71⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:652
                                                                                                                                                • C:\Windows\SysWOW64\Jhifomdj.exe
                                                                                                                                                  C:\Windows\system32\Jhifomdj.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:2160
                                                                                                                                                  • C:\Windows\SysWOW64\Jocnlg32.exe
                                                                                                                                                    C:\Windows\system32\Jocnlg32.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    PID:3312
                                                                                                                                                    • C:\Windows\SysWOW64\Joekag32.exe
                                                                                                                                                      C:\Windows\system32\Joekag32.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1504
                                                                                                                                                      • C:\Windows\SysWOW64\Jikoopij.exe
                                                                                                                                                        C:\Windows\system32\Jikoopij.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:4052
                                                                                                                                                        • C:\Windows\SysWOW64\Johggfha.exe
                                                                                                                                                          C:\Windows\system32\Johggfha.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          PID:2244
                                                                                                                                                          • C:\Windows\SysWOW64\Jeapcq32.exe
                                                                                                                                                            C:\Windows\system32\Jeapcq32.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:3976
                                                                                                                                                            • C:\Windows\SysWOW64\Jahqiaeb.exe
                                                                                                                                                              C:\Windows\system32\Jahqiaeb.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              PID:1908
                                                                                                                                                              • C:\Windows\SysWOW64\Kpiqfima.exe
                                                                                                                                                                C:\Windows\system32\Kpiqfima.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:4540
                                                                                                                                                                • C:\Windows\SysWOW64\Klpakj32.exe
                                                                                                                                                                  C:\Windows\system32\Klpakj32.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:1028
                                                                                                                                                                  • C:\Windows\SysWOW64\Kcjjhdjb.exe
                                                                                                                                                                    C:\Windows\system32\Kcjjhdjb.exe
                                                                                                                                                                    81⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:4712
                                                                                                                                                                    • C:\Windows\SysWOW64\Kpnjah32.exe
                                                                                                                                                                      C:\Windows\system32\Kpnjah32.exe
                                                                                                                                                                      82⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      PID:2352
                                                                                                                                                                      • C:\Windows\SysWOW64\Kpqggh32.exe
                                                                                                                                                                        C:\Windows\system32\Kpqggh32.exe
                                                                                                                                                                        83⤵
                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                        PID:4108
                                                                                                                                                                        • C:\Windows\SysWOW64\Likhem32.exe
                                                                                                                                                                          C:\Windows\system32\Likhem32.exe
                                                                                                                                                                          84⤵
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:768
                                                                                                                                                                          • C:\Windows\SysWOW64\Lindkm32.exe
                                                                                                                                                                            C:\Windows\system32\Lindkm32.exe
                                                                                                                                                                            85⤵
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            PID:2844
                                                                                                                                                                            • C:\Windows\SysWOW64\Lllagh32.exe
                                                                                                                                                                              C:\Windows\system32\Lllagh32.exe
                                                                                                                                                                              86⤵
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:1180
                                                                                                                                                                              • C:\Windows\SysWOW64\Lakfeodm.exe
                                                                                                                                                                                C:\Windows\system32\Lakfeodm.exe
                                                                                                                                                                                87⤵
                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                PID:4244
                                                                                                                                                                                • C:\Windows\SysWOW64\Ljbnfleo.exe
                                                                                                                                                                                  C:\Windows\system32\Ljbnfleo.exe
                                                                                                                                                                                  88⤵
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:2060
                                                                                                                                                                                  • C:\Windows\SysWOW64\Loacdc32.exe
                                                                                                                                                                                    C:\Windows\system32\Loacdc32.exe
                                                                                                                                                                                    89⤵
                                                                                                                                                                                      PID:2592
                                                                                                                                                                                      • C:\Windows\SysWOW64\Mledmg32.exe
                                                                                                                                                                                        C:\Windows\system32\Mledmg32.exe
                                                                                                                                                                                        90⤵
                                                                                                                                                                                          PID:4232
                                                                                                                                                                                          • C:\Windows\SysWOW64\Modpib32.exe
                                                                                                                                                                                            C:\Windows\system32\Modpib32.exe
                                                                                                                                                                                            91⤵
                                                                                                                                                                                              PID:4904
                                                                                                                                                                                              • C:\Windows\SysWOW64\Mhldbh32.exe
                                                                                                                                                                                                C:\Windows\system32\Mhldbh32.exe
                                                                                                                                                                                                92⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:1752
                                                                                                                                                                                                • C:\Windows\SysWOW64\Mcaipa32.exe
                                                                                                                                                                                                  C:\Windows\system32\Mcaipa32.exe
                                                                                                                                                                                                  93⤵
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:3548
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Mjlalkmd.exe
                                                                                                                                                                                                    C:\Windows\system32\Mjlalkmd.exe
                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:876
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Mhoahh32.exe
                                                                                                                                                                                                      C:\Windows\system32\Mhoahh32.exe
                                                                                                                                                                                                      95⤵
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:3848
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Mohidbkl.exe
                                                                                                                                                                                                        C:\Windows\system32\Mohidbkl.exe
                                                                                                                                                                                                        96⤵
                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                        PID:3424
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Mlljnf32.exe
                                                                                                                                                                                                          C:\Windows\system32\Mlljnf32.exe
                                                                                                                                                                                                          97⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          PID:536
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Mokfja32.exe
                                                                                                                                                                                                            C:\Windows\system32\Mokfja32.exe
                                                                                                                                                                                                            98⤵
                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                            PID:1792
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Mqjbddpl.exe
                                                                                                                                                                                                              C:\Windows\system32\Mqjbddpl.exe
                                                                                                                                                                                                              99⤵
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                              PID:4024
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Momcpa32.exe
                                                                                                                                                                                                                C:\Windows\system32\Momcpa32.exe
                                                                                                                                                                                                                100⤵
                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                PID:3832
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Njbgmjgl.exe
                                                                                                                                                                                                                  C:\Windows\system32\Njbgmjgl.exe
                                                                                                                                                                                                                  101⤵
                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  PID:372
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Nmaciefp.exe
                                                                                                                                                                                                                    C:\Windows\system32\Nmaciefp.exe
                                                                                                                                                                                                                    102⤵
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:4136
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Noppeaed.exe
                                                                                                                                                                                                                      C:\Windows\system32\Noppeaed.exe
                                                                                                                                                                                                                      103⤵
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                      PID:2132
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Nckkfp32.exe
                                                                                                                                                                                                                        C:\Windows\system32\Nckkfp32.exe
                                                                                                                                                                                                                        104⤵
                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                        PID:2948
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Nfihbk32.exe
                                                                                                                                                                                                                          C:\Windows\system32\Nfihbk32.exe
                                                                                                                                                                                                                          105⤵
                                                                                                                                                                                                                            PID:2884
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Nhhdnf32.exe
                                                                                                                                                                                                                              C:\Windows\system32\Nhhdnf32.exe
                                                                                                                                                                                                                              106⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:4632
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Nmcpoedn.exe
                                                                                                                                                                                                                                C:\Windows\system32\Nmcpoedn.exe
                                                                                                                                                                                                                                107⤵
                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:2684
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Noblkqca.exe
                                                                                                                                                                                                                                  C:\Windows\system32\Noblkqca.exe
                                                                                                                                                                                                                                  108⤵
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  PID:880
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Nbphglbe.exe
                                                                                                                                                                                                                                    C:\Windows\system32\Nbphglbe.exe
                                                                                                                                                                                                                                    109⤵
                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                    PID:4048
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Njgqhicg.exe
                                                                                                                                                                                                                                      C:\Windows\system32\Njgqhicg.exe
                                                                                                                                                                                                                                      110⤵
                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                      PID:1072
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Nmfmde32.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Nmfmde32.exe
                                                                                                                                                                                                                                        111⤵
                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                        PID:5008
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Nqaiecjd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\Nqaiecjd.exe
                                                                                                                                                                                                                                          112⤵
                                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                          PID:3172
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Ncpeaoih.exe
                                                                                                                                                                                                                                            C:\Windows\system32\Ncpeaoih.exe
                                                                                                                                                                                                                                            113⤵
                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                            PID:3000
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Nfnamjhk.exe
                                                                                                                                                                                                                                              C:\Windows\system32\Nfnamjhk.exe
                                                                                                                                                                                                                                              114⤵
                                                                                                                                                                                                                                                PID:5160
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Nmhijd32.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\Nmhijd32.exe
                                                                                                                                                                                                                                                  115⤵
                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                  PID:5212
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Nqcejcha.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\Nqcejcha.exe
                                                                                                                                                                                                                                                    116⤵
                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                    PID:5256
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Nbebbk32.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\Nbebbk32.exe
                                                                                                                                                                                                                                                      117⤵
                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                      PID:5300
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Njljch32.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\Njljch32.exe
                                                                                                                                                                                                                                                        118⤵
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:5340
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Nmjfodne.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\Nmjfodne.exe
                                                                                                                                                                                                                                                          119⤵
                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                          PID:5380
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Ooibkpmi.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\Ooibkpmi.exe
                                                                                                                                                                                                                                                            120⤵
                                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                            PID:5420
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Ocdnln32.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\Ocdnln32.exe
                                                                                                                                                                                                                                                              121⤵
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              PID:5464
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Ojnfihmo.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\Ojnfihmo.exe
                                                                                                                                                                                                                                                                122⤵
                                                                                                                                                                                                                                                                  PID:5508
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ommceclc.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\Ommceclc.exe
                                                                                                                                                                                                                                                                    123⤵
                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                    PID:5556
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Oqhoeb32.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\Oqhoeb32.exe
                                                                                                                                                                                                                                                                      124⤵
                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                      PID:5600
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Ofegni32.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\Ofegni32.exe
                                                                                                                                                                                                                                                                        125⤵
                                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                        PID:5648
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Ocihgnam.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\Ocihgnam.exe
                                                                                                                                                                                                                                                                          126⤵
                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                          PID:5696
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Oifppdpd.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\Oifppdpd.exe
                                                                                                                                                                                                                                                                            127⤵
                                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                            PID:5744
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Ofjqihnn.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\Ofjqihnn.exe
                                                                                                                                                                                                                                                                              128⤵
                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                              PID:5788
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Oihmedma.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\Oihmedma.exe
                                                                                                                                                                                                                                                                                129⤵
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                PID:5836
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Pqbala32.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\Pqbala32.exe
                                                                                                                                                                                                                                                                                  130⤵
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                  PID:5884
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ppgomnai.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\Ppgomnai.exe
                                                                                                                                                                                                                                                                                    131⤵
                                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                    PID:5928
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Pafkgphl.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\Pafkgphl.exe
                                                                                                                                                                                                                                                                                      132⤵
                                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                      PID:5976
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Ppikbm32.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\Ppikbm32.exe
                                                                                                                                                                                                                                                                                        133⤵
                                                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                        PID:6020
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Pjoppf32.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\Pjoppf32.exe
                                                                                                                                                                                                                                                                                          134⤵
                                                                                                                                                                                                                                                                                            PID:6064
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Pcgdhkem.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\Pcgdhkem.exe
                                                                                                                                                                                                                                                                                              135⤵
                                                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                              PID:6108
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Pfepdg32.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\Pfepdg32.exe
                                                                                                                                                                                                                                                                                                136⤵
                                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                PID:4128
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Pakdbp32.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Pakdbp32.exe
                                                                                                                                                                                                                                                                                                  137⤵
                                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                  PID:5172
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Pciqnk32.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\Pciqnk32.exe
                                                                                                                                                                                                                                                                                                    138⤵
                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                    PID:5232
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Pblajhje.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\Pblajhje.exe
                                                                                                                                                                                                                                                                                                      139⤵
                                                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                      PID:5280
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Pififb32.exe
                                                                                                                                                                                                                                                                                                        C:\Windows\system32\Pififb32.exe
                                                                                                                                                                                                                                                                                                        140⤵
                                                                                                                                                                                                                                                                                                          PID:5360
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5360 -s 232
                                                                                                                                                                                                                                                                                                            141⤵
                                                                                                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                                                                                                            PID:5568
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5360 -ip 5360
                    1⤵
                      PID:5500

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\SysWOW64\Aaldccip.exe

                      Filesize

                      464KB

                      MD5

                      a86fb847f297ff8ac96dbad8f765b215

                      SHA1

                      a7eeaafd28541fec12be7e390d5fe150e689891d

                      SHA256

                      fdfa0c9f06509eae230e68b77d8f0e9666e99803397eb4b75593d3c17fe469a8

                      SHA512

                      9500542c88c57d6f0b834e4d5303802a463a6e39858ccabe55aa3db900a474a2fa8d7dc22bce64412c30b9c77f379fb1a253684cdba9e88c7b6c4c5cadad8836

                    • C:\Windows\SysWOW64\Adhdjpjf.exe

                      Filesize

                      464KB

                      MD5

                      058268c03909b2c423b95c4998814264

                      SHA1

                      6a3b4c2004611026b1831624d1e248ae92a4072b

                      SHA256

                      26cf34afdae4ae314f50df39a3f3d6ccbc4d8a940140f86370029e64cae24c09

                      SHA512

                      8d4fe43e8c25ff69a8c61e4aa58fca4c816471fd1dd23501980534ced58e6e3ecf30b1fdcac38a8605f733f8f4a22e6b69cf02b891896eaceb2b8f866679e600

                    • C:\Windows\SysWOW64\Akkffkhk.exe

                      Filesize

                      464KB

                      MD5

                      b0023711a16edbbb5aaae048ec677d69

                      SHA1

                      e687aaabb817f498ee7f51e0001626d9fe032a35

                      SHA256

                      302eeda473a84590c5a1b82e9a97cc3ac0db19a1fb2a6ff2c930c8bc479204e0

                      SHA512

                      924fca59461138fcb015fc94eb7d3a20b8d7f11d432c9cd8c7fa7b86799475d841636792a0293b3058e66bd15f3c30448d1bb3c6d8a825da499b4ecf4343740d

                    • C:\Windows\SysWOW64\Amqhbe32.exe

                      Filesize

                      464KB

                      MD5

                      4ea38e8c07faa3708c1527225539657e

                      SHA1

                      2d95288b6293c06b658675217874f2bb0f93dfb8

                      SHA256

                      64b9bd542ea1246d6d7a7e8acd4cab69f216a7bc1c134af2a9716c109786aafd

                      SHA512

                      15c21f007676fe10415cf2d186584ad5b30ddd36b41ff106460eb0b8ef08b5934e4f8a833fb5dd16934ae9e77dae36366473ab13ffe9298df1df32ccb7c35445

                    • C:\Windows\SysWOW64\Aoioli32.exe

                      Filesize

                      464KB

                      MD5

                      0fafb3358268e569f356b1b91757cd6e

                      SHA1

                      4d7b3ad669c5c33f5a7e8cb39f40f8617c7d5b0e

                      SHA256

                      7de11cbe5d1ef11bd391727b079fca2882841c88ef2f0609d1dbec19ec1c12e5

                      SHA512

                      4166cdd54c5b3cf5c21227e6c7d5c820ea7f2343f8fd9dfd65c73e1263145899856d366b718f13919d3f30e0c397725aecd1e1b6b553bc73cffc3aad7f8724ad

                    • C:\Windows\SysWOW64\Aokkahlo.exe

                      Filesize

                      464KB

                      MD5

                      29e310fb163162dc0facf6e61b1f04fc

                      SHA1

                      9d51710e282e6c7017ac87e2679297ac55646271

                      SHA256

                      058c5d796dbd77463a3231bddccf0956312010e23e705b06e4149974f9e1b700

                      SHA512

                      569e7dcae09306e53f53228351ebe481e3c149a46fe94bc3a3404ccd4dad6626e8ca3305783025d06ee6ac0a62b53890f1c7708a859065d186a69f92d725399b

                    • C:\Windows\SysWOW64\Baegibae.exe

                      Filesize

                      464KB

                      MD5

                      dac048991fe4b35bd4461ac03507e386

                      SHA1

                      38fc6d79598e732a6e248199664fe42df6914de3

                      SHA256

                      f5e6f3f32a626fbe2fc65c78f4e1462c9f8cde6e1ca37f8356fd75f243e4d972

                      SHA512

                      2093d0ad8b5ba5c63c1fa821bbfe806292f5715e4ccceaf3a8af418e2c03e0aa47d17971437e3861315a69bb47d685a82c1f041647c5ec1c48c0625a33ffceb3

                    • C:\Windows\SysWOW64\Bhpofl32.exe

                      Filesize

                      464KB

                      MD5

                      550c53ce7446141c43739d4764679c38

                      SHA1

                      0d2c689751fba7be8748d80fadd258be849b9622

                      SHA256

                      c4e852a66874eedae6607560306c07f560744f97ef9fcbbd22858aa9bdedddd4

                      SHA512

                      2ce920435659aff3da5b5a5165881d5668ba2b3b4161376227ed29283bba4aeadd586000252ceec5f6b4ab36e42bb3203293f3ed0d62cb7ad3661449fa00cbac

                    • C:\Windows\SysWOW64\Bobabg32.exe

                      Filesize

                      464KB

                      MD5

                      13381e2b4d2596350fb50ad78246d854

                      SHA1

                      4226a0e8a4b0df55971e85489f8aa751725752f9

                      SHA256

                      499264ab61b715abe50a7aabfc3b711a619d87819aac24dfe11724817f8b6283

                      SHA512

                      255a6d80387eccf6d28f771e02c88c452c21445f461dbe786749984938e5f0864452608e51f9674791359b430a50a93e0e6a4f020503cdc9473cb7c8641a4a65

                    • C:\Windows\SysWOW64\Boenhgdd.exe

                      Filesize

                      464KB

                      MD5

                      6dc5da3cbfe549d62416037adcb84d24

                      SHA1

                      744bf2baf08100bdc2c82d0a7833d1bff7480e38

                      SHA256

                      3be54734959e79b3af3ed756234507f53d7b360ac66d53333e004cfdef750d22

                      SHA512

                      920a8fd3b9e4b38576fc30af5abbb9691ffef1eb8195a7943c40b2492b200cda08433aa35e06782a0cd01564c8748a6b8759ec89d3488f6410c3a7a7b11cc633

                    • C:\Windows\SysWOW64\Bpkdjofm.exe

                      Filesize

                      464KB

                      MD5

                      6b4f9090d27e22f0223b05ebcc0d1b32

                      SHA1

                      9421c7f8506a6a843e7fcff0ed689c177946462b

                      SHA256

                      51f0c8f5a8b44b771ff4493b04e0c5805a2d9933f18073c68ede944a7deab313

                      SHA512

                      f699f452c4f320d3de02c9da612b72603aa6d5aeb6840db3b43009b19d8a8f3c3031d6e782b928c89c50125675519d743c9ab829dd872dd3a2bc69cec3e6f71e

                    • C:\Windows\SysWOW64\Cggimh32.exe

                      Filesize

                      464KB

                      MD5

                      e5244e5c4e10e2eed057c135e14171dc

                      SHA1

                      7e7a9e4cc94719d8d4a4202e8a5f4782fdfb4c91

                      SHA256

                      9aa28d0e11e9bd5b315b86b2a89c618cde6c139b0f78e774796633a5cb9402be

                      SHA512

                      2966dff57844641b9d3d336070d23886674eea2c868ecb337752fb0c7d6f4aeddee0c983b3d677dd4e7bb055cf4ad9b7ac0786695b401f6ac810e8256bd96f0a

                    • C:\Windows\SysWOW64\Chfegk32.exe

                      Filesize

                      464KB

                      MD5

                      3f260714e77eb5a15f223bda9251f11b

                      SHA1

                      2ad9a736d3edc3ec8bb1b2b78ae0c61647acf4dd

                      SHA256

                      642effd3e779ea40ae3adea46302c13593a5f34010a9e59517ac6917c23f3c94

                      SHA512

                      e5a23bed8ee2c74ee68590467686626d787f2f8fab3ce68ce7231a72ffc17209c162a0019faf0553c87693ae8ba76a7fba58ccab0a3195aef329bde268c81549

                    • C:\Windows\SysWOW64\Chfegk32.exe

                      Filesize

                      464KB

                      MD5

                      0accdbc2ccda4f5a5898fb5260bb49f9

                      SHA1

                      345f0a27f8bab49797c269369b1b7534cd97ef6b

                      SHA256

                      d6ee8197084cd82bbe2ba7504fea9e26924a5a5481db03de20816332ba7bda88

                      SHA512

                      ad24c81219617c80e84b0333096ad992d8b058cf5c0a41c4fd8b8490c000c7e152ad186e49b0eaa58d95e4ae3c113546294b7177865a3c20929e967820d78512

                    • C:\Windows\SysWOW64\Cklhcfle.exe

                      Filesize

                      464KB

                      MD5

                      ef88bd4ba888b053c862759f3a7d546c

                      SHA1

                      53db77dde315588da9f0ed236f26f8ffd810d6c3

                      SHA256

                      51d123488b4ed6634cd55ff172b90f81425879f8acf5d59864ce1ed79b19fcd0

                      SHA512

                      d5c6639892112e8a29efcd76b5f08c36ba336da1425305a5af9b2ff7fe8ba3dfbf56fc34f9da0285163c39717dece56f89de052f6cf2c7b50c64b87d3c796310

                    • C:\Windows\SysWOW64\Cnhgjaml.exe

                      Filesize

                      464KB

                      MD5

                      facd119ab006b6006b4b8e6043a5fd3e

                      SHA1

                      a2c0790523a927c305b7dc335ec57fcddbaec2d9

                      SHA256

                      2ea2d1da2d7f463969053101fca1224398e2b18e6533b3dcad74fde772ef8d71

                      SHA512

                      b0ec7cb716f4e5c7dadf99e6d31940601397a1b19bacf0682cd5d79508e8400d58c2083242d6a13e465fec382d8110a69d4a1513ad4fdaac2aa3aea3c856487e

                    • C:\Windows\SysWOW64\Cocjiehd.exe

                      Filesize

                      464KB

                      MD5

                      3eff4cbd99f1ebfdd5a34d97a1e30f0f

                      SHA1

                      d63e785df0d6a6a52a9bfada507988ae7f7bfdb2

                      SHA256

                      a9aa529be204c4275822432971e4194d15667b13deb9375f3462dc14f79aa6db

                      SHA512

                      8195214ebbbd71fd6d53dfdc382b696186819d068c90c2f46a318fbea9cc76834dfdb42c2b8404e91d469893b660f8aa5f5f8791b27d0c6c22b8fd76b2a7e24d

                    • C:\Windows\SysWOW64\Ddkbmj32.exe

                      Filesize

                      464KB

                      MD5

                      331496929b20f109f1309183c5a767cf

                      SHA1

                      670e2ebfce615ce163d1d7cb54f451a815f3a554

                      SHA256

                      0f0fd419de3a88a4ecb1f3ff4ce562ff39d47d5dd76ac9cf5204dc32813deb4c

                      SHA512

                      847a4e10a9358ebef9b6b0f1d895ad46fe08f4247268c38ba0df69550214d8b47ed4bbeb945889de962422de590972df767d633aa61e91b5ec809080979255f6

                    • C:\Windows\SysWOW64\Dnmaea32.exe

                      Filesize

                      464KB

                      MD5

                      24b99c477fe1378e560df806d17c9ca0

                      SHA1

                      128499cbe53e55093bd06e91982bf42d5744eafc

                      SHA256

                      993b6bbb39db85dee339b28d2001c9a5fa066d7a82275a8f70dfef3bd8e3f3d8

                      SHA512

                      57c88550e927edba9f946ef6b308998774f3bd3d35a777df5e6877380c3e910e12475852cbeb553ff434efaeba79de654bf4e4251fdaeb7874c7d30fc58667f4

                    • C:\Windows\SysWOW64\Eomffaag.exe

                      Filesize

                      464KB

                      MD5

                      fad5de748bc74160c6d120e4fea5f1f9

                      SHA1

                      669f58f4173766558ec74138e68255f433a60f30

                      SHA256

                      c81bd7396cc365064d775cca193bdfdd75218913bbe5e65a9472561f66a7ba44

                      SHA512

                      9960607a7d7fec9c113ce8e4c11ef3fd67973f76df9b89e8d383072106013b7fd4452d5cb19f7198a518d16c75247fe9d51dd0eedf6729a73839b51a255a276e

                    • C:\Windows\SysWOW64\Fkjmlaac.exe

                      Filesize

                      464KB

                      MD5

                      d5e24107b14a2879c75de2f95e8c809d

                      SHA1

                      4eab0e8196ec40556d2eb44e70e4bf136cee717d

                      SHA256

                      39a6384cfd29088ff2a55d12fe25e92f003c4d9d22a118d3acfc126460c8f928

                      SHA512

                      09c45e515c95e97988a5daefe0086f72909e27ef5f0a17ec6ce434da201d9987b01fa12c088e53d48b8cb4a5b742490a656142c522e2d50b7d5214864a96744a

                    • C:\Windows\SysWOW64\Foapaa32.exe

                      Filesize

                      464KB

                      MD5

                      d5774dbc7a9a399e0acd441646146f84

                      SHA1

                      7805997d7dcdd7bedebbbfcab0206b18590d0c53

                      SHA256

                      facb2835127830a1190751467776bedab1f10598052cbaf7cfa821c0acdd4ff7

                      SHA512

                      00248cba9919cc08e1cd57fded9e7b92f20721110ca0d5f0f7707804ef3352d7908d3b6d9458999bbe002068a51f88f58e3e8eed7776367a58dfefc768b24b3f

                    • C:\Windows\SysWOW64\Gbpedjnb.exe

                      Filesize

                      464KB

                      MD5

                      31860841440ba5b389ca3cbd9777d791

                      SHA1

                      462292f4091fa49ae980d03611ce5cb83bd5f8d6

                      SHA256

                      a46a00b7a8137e2b3a1ac1cab586906434cb666f3a2d194def349822e7933c72

                      SHA512

                      6709476480be20b242f806d9def4139b68f4ccd8c778d5e4acb7035589b48479a213b0099d4d7fca4d689578d039a541d8d2bb2e495af956e532e7d552c8058d

                    • C:\Windows\SysWOW64\Ghojbq32.exe

                      Filesize

                      464KB

                      MD5

                      f04483157cb37ea63b88aa32cf0679e3

                      SHA1

                      1f041952d61ac918eaa3a641b44f10b52870c2c8

                      SHA256

                      69f39e2ca02883f895c8b96d2392eda7b9753430af8ee1aae8a9834824b7bd45

                      SHA512

                      98ebbbbff6962712986470a6f1e117c76720ef71b64cda70f95543c1909aa598541bb432cf48f7aa03c3a87710ed37028acf6274b75532af972f90f657135aaf

                    • C:\Windows\SysWOW64\Hppeim32.exe

                      Filesize

                      464KB

                      MD5

                      53ca7aef80fdab271da3aa9951063aaf

                      SHA1

                      3ace4960f17ae0e60d72563fd191ad48e626802e

                      SHA256

                      e198ec3e04096455e17fb0201405cc2f8b36138d81dded51e8a8081043d5f86a

                      SHA512

                      7dcbbb86a3e5874392bf1b0676e235bcf3c6f3223907e82e9faa58e016d49533f0a9e859437761aff25cfa36346ee8a861f05f1a16315b9d9b6e7a40d33ad3b7

                    • C:\Windows\SysWOW64\Iefphb32.exe

                      Filesize

                      464KB

                      MD5

                      26aa0d189b5f28467a1b9da570040780

                      SHA1

                      4092b002a357c37fc535a87c62e3ebec8602c48f

                      SHA256

                      a944913ecb7264fbc12a0412f7f565e00c035f754ee0926c3046736bbdd312a3

                      SHA512

                      b0cd729e8b4404d8ac28dc95c54a34bfea7b0e0b5e15b253843519f0901bad0dcd3c45e1fc4f3cf53ac1065fba80f92720059fab7be4fe8dc13a6b98676d077d

                    • C:\Windows\SysWOW64\Ilibdmgp.exe

                      Filesize

                      464KB

                      MD5

                      538b40ed96f1b7b00a5301797e1dbced

                      SHA1

                      7482a3018bd3082bce05d0c29c8e195d5fd9c342

                      SHA256

                      e0d1097605909a40b32f71a2fc227791d995ac93cf63941548ef7251b258df07

                      SHA512

                      4f7bf25831686f34bbd64696f9779a7eae00af4567615bd822da03967a68009045d7a8f6004b6b3aaf08399cf643dc3bd5e8641f922afe99a7ed9723b8ae014f

                    • C:\Windows\SysWOW64\Jahqiaeb.exe

                      Filesize

                      464KB

                      MD5

                      611aaa4b1aa42b36a80fd976a3decb9b

                      SHA1

                      9580fce467298013a90256c49a809e20b5de9214

                      SHA256

                      acea27855022f8439a92724d0e987e3f9178f51b149a14bb5cae54248c300dd0

                      SHA512

                      405b581d2ab26aa3666099820c4f47da0e1f369de8eaa779b660dbfe1fc8a2fc9ac2045f260cf28f883e06690b3a6f2b9e7cff904e20518921a2759823fa52ad

                    • C:\Windows\SysWOW64\Jhpicj32.dll

                      Filesize

                      7KB

                      MD5

                      58aef25865a36c317d9c7bcbee4550e5

                      SHA1

                      bfd943c0fac5a3ec73aa769ea070200352d099fc

                      SHA256

                      4dce204e2b2828e7b5593f0bf1845484c7baa0fb8ea76bf72007578217c00a5c

                      SHA512

                      5ee4f8bdccd49325544ca0e9946a8d16623c2a8e0372157ca85859d34e3f1257512191f7a18e2ceae4ba347809938b3dede8821ada384ad773bba166da067671

                    • C:\Windows\SysWOW64\Joekag32.exe

                      Filesize

                      464KB

                      MD5

                      97ba26b48bb2b9cd2015319a0ec89cfd

                      SHA1

                      3ac21c4799c08a735ea27a1651b4bf6b3e205dc4

                      SHA256

                      97823078c6614ed8895e5fbafba676ca7de4a38c41e5297e8fa3c6921753531b

                      SHA512

                      b0810a96b7613de3d4b3a7dfa8ba72e1c45185827f14629b9afaf29300d46010503fcc93daf73b2f47e07fa34a5a3ccb3b64e7fe37e4a30edb17ffa8d428fe9c

                    • C:\Windows\SysWOW64\Kpnjah32.exe

                      Filesize

                      464KB

                      MD5

                      632bbe58f7a1030f0d85f35cfa396bec

                      SHA1

                      8dd4e95537eb36280aed9d44a7d5e4d9338242ea

                      SHA256

                      d72a91c9adb099ce059854c0360b90bf54bf94e334d68472c68b059c9920eae1

                      SHA512

                      bfdfe4b477283f9423ec78b760cd137a3d15107b7120f57273ed25abbf9535319cf33bc979b1c27b7cb104d0a3952195095d9a0568897e3672a3c221d3689866

                    • C:\Windows\SysWOW64\Loacdc32.exe

                      Filesize

                      464KB

                      MD5

                      6db807ed414d5d8e876b0698890c2885

                      SHA1

                      cd020b2cdaf274c350e505ce08b24c8356447d31

                      SHA256

                      ab6cdba95bd24ed30f3be7371131d1e330a4b4b3cca71c8754926f052be01da0

                      SHA512

                      bd5847aea87db7abfabe9818e45484ef48e1691001aa8bb5474f18d27524f157ae9d8c918777a12779f9c5b9f0423fb2212496b6d145cebeaff3154cdf7e4198

                    • C:\Windows\SysWOW64\Mhldbh32.exe

                      Filesize

                      464KB

                      MD5

                      4f648ad42d4f79a93519a2c07499f2c6

                      SHA1

                      706cbc6024efa51b3e77cb9332d670bef748df96

                      SHA256

                      d7282df1b09ea0e9bbe9de01ad751491bc2ca6755937ef93ae3465296a3c1d99

                      SHA512

                      515c4110e7db9ccd8f85d83a8b4ba15e6748e4c9dbe7d9bd6ddd0eeca548790f45cdc480f91050690bc4e600d887a424d2e434fa617985d51c3d62311577596a

                    • C:\Windows\SysWOW64\Mohidbkl.exe

                      Filesize

                      464KB

                      MD5

                      c4595fa6a4f3ed6de0faad02d202dfca

                      SHA1

                      228e6dfb1e34671324ddec7da29b4d95baeddf14

                      SHA256

                      9f7c94c9650256a236b350ab8744b656a25639aaeb05a4d54a85afe13c29a2cc

                      SHA512

                      55a704cc1ff35179740ae1d68738bbb24ab1e5daf41ab7cea28e7c81c2b21b82d339eee8d0445a9c1e1a4ea0599c32d70e990dc3818062fce527db33ccc56704

                    • C:\Windows\SysWOW64\Nadleilm.exe

                      Filesize

                      464KB

                      MD5

                      dd57b0450ec1e2b8c65586d19be40eff

                      SHA1

                      42ff518c3b1bd9806816e02bf266d351664377c2

                      SHA256

                      02c3b2f8cf82e5b9b4bcb50083d39a86a4e2c3caabbb1c3d792ae6ce82c295b8

                      SHA512

                      8f59ab6c102fda9f2b7883b2a7a2f84cf5044f9cb3fc3d46cfd1f90065be4d9cc9394ce1d6bc0f3d405a6b58e11cb2687999d08ef0c60663447453de06219499

                    • C:\Windows\SysWOW64\Nmdgikhi.exe

                      Filesize

                      464KB

                      MD5

                      037515585d6e484c690be2c7e9f1fa54

                      SHA1

                      4fe8f6c18426f3b9051bd521b13215d53b680433

                      SHA256

                      635ae3220c689bb14bc6b790b6f123715f477d7f29565d85e1740b883f575592

                      SHA512

                      e8a5722b341d6ad159afcf1a0c3010f7ba5a8842f02be1b6afe6f7e5e4c498a6d824173730c8b91553a1330168f8e0299e1a9a7e6be3f5057b63021f473b92b4

                    • C:\Windows\SysWOW64\Nmkmjjaa.exe

                      Filesize

                      464KB

                      MD5

                      d3549506a6dd668bb43afbd3a12c56fc

                      SHA1

                      778b5e03acc73dc8335a362c59740980ca6d41a6

                      SHA256

                      0212782d5ab253039a8f4b42822b20a274aca4d108a08f75206ff54aeaf81d26

                      SHA512

                      8947065e6dedd8f1527f417c91e282ea51474d33e50a67370b1134e413a7830f8c51fe535970508571b8326d0d4e8e08d98ef28398fc47c50c850c250bead56d

                    • C:\Windows\SysWOW64\Nqbpojnp.exe

                      Filesize

                      464KB

                      MD5

                      2f1c876f946cffa3395ddb979b8c368c

                      SHA1

                      4c72362f0310b1977ba27e56c0fcfdc8328710b8

                      SHA256

                      c79deca723a021b006f37b36bba650709b7b920462a9f9713e988fe4e28a5d58

                      SHA512

                      e963a229ac27535cc4ad30788961fbd3676a406e26631d14c0c059d0420ac1e7097b1d509b49661084095c0ad78ea14dda41d2120ade71aa8b22a9632dbd8175

                    • C:\Windows\SysWOW64\Oabhfg32.exe

                      Filesize

                      464KB

                      MD5

                      f292bd60b96f8ebf7fed46de6ceec756

                      SHA1

                      d438a799f088d518b777ce243f80cb8b9bfa1153

                      SHA256

                      ac4433801b828e44aace5768c9457ebeed027536943f34de3ed684a5cd92315d

                      SHA512

                      051544604bf2c349facddaa6435771f099fa17060f05cb3d695756b943c983d26ff39faae952afaa1cc902c86db281db670160470ccdce3dedddb18692b638c9

                    • C:\Windows\SysWOW64\Ofegni32.exe

                      Filesize

                      464KB

                      MD5

                      a15a988b957efb5b889aea9e6171ff23

                      SHA1

                      70ce63ecbe66e80d533c1b5ccd6768fde7d6bc51

                      SHA256

                      d6131cc9bd3647545d1c8755b8b9bb95bd6c7572817d4f329d8b7644b7e15331

                      SHA512

                      0bd3d6e8832fa77d8ff47e25c4247017bf6172493ab5378bf8b40d1b1896d9cecc3c801ffc0918c256826f74e6aa275d5df39ff09e5dccb36457f9f231ff46c4

                    • C:\Windows\SysWOW64\Ogekbb32.exe

                      Filesize

                      464KB

                      MD5

                      72648cafeb8fdc0598e7839f4c64f634

                      SHA1

                      342d0ffa598e9735fb70b5085ba384d9b85ee359

                      SHA256

                      4cddc532cf6afb2721519f046bfb8150d12a653a02ec0904069ecf3022fbe969

                      SHA512

                      02fc9c024577be5051b0b6ae362ccbf8806aa52e6ee12c40c115d1b58b7711b96d3eb18367b591b15a721eb128f80d78467fa133eb5c9b98ffcc39c6d9cbb669

                    • C:\Windows\SysWOW64\Oghghb32.exe

                      Filesize

                      464KB

                      MD5

                      2dae76580270392581ed6facc8aca411

                      SHA1

                      f0b6f654bfa788ceefff78d93286f38308daf493

                      SHA256

                      16f4f8734f62a026128ecb31143e582d9b3da362bdced60ee015d9a5fe63b6c8

                      SHA512

                      f9c0a0341bab2cc87b679ceff73e29e317f9074948cfec16a4c4646def9d28781a230806e5979b95287f6818d45320f49e5756fce859f708662cc28b10b8a9a5

                    • C:\Windows\SysWOW64\Oifppdpd.exe

                      Filesize

                      464KB

                      MD5

                      75fb8cefe47bb7f3d34b81e2d8d05eff

                      SHA1

                      87a787756c570ff598b8525d6e4463ea5f7d967a

                      SHA256

                      c2542c397fd51e65c580501e4391bb70dcb39e43318fbe60ce7c6293c8516294

                      SHA512

                      16a4fa33143aa9e0c9a31fa99a74e42b44de5376d2f86edce5fdb5fc5c6b6ad048f261050c79e1992ab280f4a072bcf57439667f40589258842424bd286f5921

                    • C:\Windows\SysWOW64\Oihmedma.exe

                      Filesize

                      464KB

                      MD5

                      136d73eb02c5204dbc4216e1947be6d5

                      SHA1

                      2f7ad491dd04dfb135432f031708998b453ce99e

                      SHA256

                      08be5bd24ee5f91746c0870a4ebebefa896a6c924c99817e70aae69f547f75a0

                      SHA512

                      4f33a3c809f4bc9f9855d45fbbabc7e2183a7f40b51568f1152328258a4a07d644c1658468086708a150705988d37177dfceb98fd558b4ae009cf1e56682778c

                    • C:\Windows\SysWOW64\Omnjojpo.exe

                      Filesize

                      464KB

                      MD5

                      37778e5d8a6139ba66aed2935206413a

                      SHA1

                      a21a1497ba098c563331c35253ae49e6923c921b

                      SHA256

                      d23b7a8f733beca2336f3cb1af3629e7666c952f43f3a3cd5ceab9ad79b6bb58

                      SHA512

                      b4a13306593c6b09f917851fe8c36df284e2d0c0b81632b860c13a9868b87efd3de661d89e0978b70d936e22bc4852afe0611cee0d1bee129391da7753ab15ce

                    • C:\Windows\SysWOW64\Opnbae32.exe

                      Filesize

                      464KB

                      MD5

                      113344d8970bbfde2cafb5527e74243d

                      SHA1

                      b110a6974fe00b6c854960444b1d818007bb536d

                      SHA256

                      348051f11f3cfdd5f1043f0756d576e6ad060cdba945495f72ca4165e7e35f23

                      SHA512

                      6a0712ab83a7ea8b0a47d4b8fe7957fa53d8abfd6f694e828bc5a4a8f4704077d63dca38a7011f82cc290a6bff968436619d91203aeae80dbde0dcb9969af6ed

                    • C:\Windows\SysWOW64\Pdenmbkk.exe

                      Filesize

                      464KB

                      MD5

                      37bc82401ec336b29ba3e1a2302a5278

                      SHA1

                      56d35306f57a5850fa4983b9527c4202bbb9f2d3

                      SHA256

                      a72c7c185844cf810d58a9f911f3240d348ccbdc0345b75da49075d8b15557c7

                      SHA512

                      32c7fba7a99cea4018faa7455c3a7dbec1af569e1e5fc8538acf47209e5d17f8bc5c7593ca94b5a27bf5850b604467ba812401bcb340ed6bf15987d9e454ec65

                    • C:\Windows\SysWOW64\Pdjgha32.exe

                      Filesize

                      464KB

                      MD5

                      f37a318956a55e623a2d25e864dc0d2c

                      SHA1

                      927f8271ec3a08f47d0a88c03ee619ffdfe608d2

                      SHA256

                      562116a288a697f0858003ac33041c52560226e9ef40fb6e6926b6d3c9ca6be5

                      SHA512

                      7293332dcdd847ba14efa9a0049981559ea0c06038e8bccca76eb641b43de479e8a24e3da40f00892eef646ee3a0bad30f618b01d4506fdc7d80cfe08bd470ee

                    • C:\Windows\SysWOW64\Pfepdg32.exe

                      Filesize

                      464KB

                      MD5

                      d9d79efb2b89b3b72cd774418ee50472

                      SHA1

                      735d7a78f91ed80973c482c060a9d77a79d1df72

                      SHA256

                      fb9f7510efa9203e12e05785274d4d466a628c3c02159c577d3203cdf3acc003

                      SHA512

                      0b9b4fe954cb7872b415c6e145aed8e62508827488c4457d4170b7c6019f6d63b591d2720160a4b995db624595d18e82b6f7ef09d972e3a3deb56d40b88fef98

                    • C:\Windows\SysWOW64\Pfoann32.exe

                      Filesize

                      464KB

                      MD5

                      8c651d8206039eddfe5db88f1ef38ee2

                      SHA1

                      71e0966c98b5e5b62584fcf1d97c46bcaf38275e

                      SHA256

                      557e63363251bf7c88a93ee59f9fa6246c37594003e9c1c0231c016b70836567

                      SHA512

                      b7b50059db592802c2a3a12a14b5bd8c285c3df8cd94fdaabae06558bebbad225f0920527f162a7d44b673c6da62bc4418b489cd967c544defda8518ef8f8192

                    • C:\Windows\SysWOW64\Phcgcqab.exe

                      Filesize

                      464KB

                      MD5

                      5690d0952823d25244ce149ebbf894d1

                      SHA1

                      768ccb0fb4dfd75254c43dfb06f92501307647ba

                      SHA256

                      4e7b7f2f9d785f394cf787186d2d7387060f93ebaeb1ffaf248362ee0e1aa5fb

                      SHA512

                      7457b4a206c4c84152e6f51e1a7873bbce735398a78d6a01e16ca9f1ec62da1f29281bf56e50d7f93a599dcede4f9f6bd498422a520561c8ab65e04f72fbb8b8

                    • C:\Windows\SysWOW64\Pififb32.exe

                      Filesize

                      464KB

                      MD5

                      9b286c6024d29f79aa1b77ab593e6df4

                      SHA1

                      1fa1f7affcc369b48d5fc8aaeccbfbea2d188248

                      SHA256

                      b1bc9b507430efae9c213c6a8c3c1a814763b557fe53473055ed82e3b2e5e660

                      SHA512

                      dabd1613b216c79c626929cd4a50a7de16f1864a3f2fbce23d69773940e638b6d3351408a274cc6418f1664e2b6921bc9d3358373361f78aec29c58681cc1dd9

                    • C:\Windows\SysWOW64\Qfkqjmdg.exe

                      Filesize

                      464KB

                      MD5

                      e83da4fba4609e5991cd97d16b6f6314

                      SHA1

                      212e155ce8a944c9ef5ce2e2eee3b2a0948505db

                      SHA256

                      0b4e8055841e8887d59b9429d9afe9a592dffa90130c56dd0da3d89a640e6a48

                      SHA512

                      7fdb8227f86088d5762f24055379b3b225630c1dc11f15619c0d11561ed98e7fa9cedc3ca8e66499981327694fcf3bd6f635a04c02bd88d02bcb188c5edb0e8c

                    • C:\Windows\SysWOW64\Qjiipk32.exe

                      Filesize

                      464KB

                      MD5

                      8a11de656ba930ba7560572e03ecff73

                      SHA1

                      434e03cff9a4b97408318a4d2c173ba89246ac16

                      SHA256

                      da122af3083f44a16284ae6567fddadb7355dfd8d4a152847d7f9fa530374ae6

                      SHA512

                      7cc5144d740232f9b8a84dbfe8e1b5ca650f627709deeffd71a12f10522911cbcd24b6ab6eadf2049ed265f9fb88884ebbcd6ac4b5efc90ed21180d41eb4db0c

                    • memory/208-394-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/464-424-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/468-412-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/552-298-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/640-442-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/652-484-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/720-376-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/740-8-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/740-551-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/768-566-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/812-87-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/992-192-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1028-538-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1060-572-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1060-31-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1064-418-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1176-558-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1176-15-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1180-580-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1292-262-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1332-224-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1396-144-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1504-502-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1632-364-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1676-382-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1680-167-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1692-1140-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1692-358-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1728-120-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1856-274-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1908-526-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1944-215-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1948-448-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2060-594-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2088-95-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2092-72-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2160-490-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2200-208-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2208-436-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2244-514-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2292-388-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2336-175-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2352-553-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2416-207-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2608-79-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2632-127-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2636-135-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2704-103-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2844-573-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2864-164-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2880-328-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2904-39-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2904-579-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2908-430-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2992-292-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3024-544-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3024-0-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3124-565-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3124-23-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3172-1006-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3176-247-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3268-346-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3268-1146-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3312-496-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3324-64-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3392-460-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3428-232-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3448-268-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3492-454-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3500-48-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3500-586-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3964-370-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3976-520-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4052-509-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4108-559-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4172-111-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4244-588-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4328-286-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4352-466-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4408-256-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4412-183-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4452-340-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4456-322-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4460-240-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4464-310-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4512-304-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4516-400-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4524-1124-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4524-406-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4540-532-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4548-1099-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4548-478-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4564-152-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4708-472-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4712-545-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4756-56-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4756-593-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4780-280-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4824-352-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4908-316-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/5060-334-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB

                    • memory/5788-974-0x0000000000400000-0x000000000049D000-memory.dmp

                      Filesize

                      628KB