Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    210s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2023, 10:57

General

  • Target

    NEAS.a501b19909319395eb1e2e975cabe3e1.exe

  • Size

    81KB

  • MD5

    a501b19909319395eb1e2e975cabe3e1

  • SHA1

    cf8ffb73e41514c0e60e919b9c72f3bc17579997

  • SHA256

    c145e047a3c0b81a7f20a2064d54b7ce6655745f99881f04c3636a4c153ae4dd

  • SHA512

    7bf4084d255dce3865b2b4b65e97e94c325d50d1e1d85364f83e8515065008755dac65d9684a3fc944c116958c2c41cdd5aa7d5af92ef91e56d0439366264552

  • SSDEEP

    1536:BzTC/xkjSVdlUtSxU9TfM8sl7m4LO++/+1m6KadhYxU33HX0L:hTKxkwS39TU8A/LrCimBaH8UH30L

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 18 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 22 IoCs
  • Drops file in System32 directory 27 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a501b19909319395eb1e2e975cabe3e1.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a501b19909319395eb1e2e975cabe3e1.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\SysWOW64\Hpgakh32.exe
      C:\Windows\system32\Hpgakh32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\SysWOW64\Flhkhnel.exe
        C:\Windows\system32\Flhkhnel.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2484
        • C:\Windows\SysWOW64\Lgbfin32.exe
          C:\Windows\system32\Lgbfin32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Windows\SysWOW64\Pjlgna32.exe
            C:\Windows\system32\Pjlgna32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:524
            • C:\Windows\SysWOW64\Gbolce32.exe
              C:\Windows\system32\Gbolce32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2876
              • C:\Windows\SysWOW64\Ghlell32.exe
                C:\Windows\system32\Ghlell32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2932
                • C:\Windows\SysWOW64\Gmhmdc32.exe
                  C:\Windows\system32\Gmhmdc32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2172
                  • C:\Windows\SysWOW64\Ghnaaljp.exe
                    C:\Windows\system32\Ghnaaljp.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1108
                    • C:\Windows\SysWOW64\Gmmgobfd.exe
                      C:\Windows\system32\Gmmgobfd.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:772
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 140
                        11⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Flhkhnel.exe

    Filesize

    81KB

    MD5

    efc82062b890f9c20f506c6707071bd8

    SHA1

    16541995a76662b5574f08a36cd73083cb24cff0

    SHA256

    29d79cd112887efb7f476ff79a6ecbcf06c1ddc3c57af402196affa7f0cea94d

    SHA512

    9f89d85f81177fd6e3fb08d0a5412451e83fe585b002a8b84bd3214680995ba3cadbc6c930c6d54e9aa358a0090be13b6b2969e088d27cb1a6aa09996f826e5d

  • C:\Windows\SysWOW64\Flhkhnel.exe

    Filesize

    81KB

    MD5

    efc82062b890f9c20f506c6707071bd8

    SHA1

    16541995a76662b5574f08a36cd73083cb24cff0

    SHA256

    29d79cd112887efb7f476ff79a6ecbcf06c1ddc3c57af402196affa7f0cea94d

    SHA512

    9f89d85f81177fd6e3fb08d0a5412451e83fe585b002a8b84bd3214680995ba3cadbc6c930c6d54e9aa358a0090be13b6b2969e088d27cb1a6aa09996f826e5d

  • C:\Windows\SysWOW64\Flhkhnel.exe

    Filesize

    81KB

    MD5

    efc82062b890f9c20f506c6707071bd8

    SHA1

    16541995a76662b5574f08a36cd73083cb24cff0

    SHA256

    29d79cd112887efb7f476ff79a6ecbcf06c1ddc3c57af402196affa7f0cea94d

    SHA512

    9f89d85f81177fd6e3fb08d0a5412451e83fe585b002a8b84bd3214680995ba3cadbc6c930c6d54e9aa358a0090be13b6b2969e088d27cb1a6aa09996f826e5d

  • C:\Windows\SysWOW64\Gbolce32.exe

    Filesize

    81KB

    MD5

    3b489bf6996569a93395cab025a26894

    SHA1

    03dcd0799c2f87e1d449ffbbca48664a4cd241b9

    SHA256

    c07353933fa20ca7e756a30a4b8d2979a75c1f3b76dd7f4e0859b6da962b3e7a

    SHA512

    de5da311d12b964535432fbcc3dd434bceb3ae41fb97d40c43c78b47fe9554858ef387bfad0fe7d997f010c55cfaac703c36c6650ea0db948e88b58cafb2cfe5

  • C:\Windows\SysWOW64\Gbolce32.exe

    Filesize

    81KB

    MD5

    3b489bf6996569a93395cab025a26894

    SHA1

    03dcd0799c2f87e1d449ffbbca48664a4cd241b9

    SHA256

    c07353933fa20ca7e756a30a4b8d2979a75c1f3b76dd7f4e0859b6da962b3e7a

    SHA512

    de5da311d12b964535432fbcc3dd434bceb3ae41fb97d40c43c78b47fe9554858ef387bfad0fe7d997f010c55cfaac703c36c6650ea0db948e88b58cafb2cfe5

  • C:\Windows\SysWOW64\Gbolce32.exe

    Filesize

    81KB

    MD5

    3b489bf6996569a93395cab025a26894

    SHA1

    03dcd0799c2f87e1d449ffbbca48664a4cd241b9

    SHA256

    c07353933fa20ca7e756a30a4b8d2979a75c1f3b76dd7f4e0859b6da962b3e7a

    SHA512

    de5da311d12b964535432fbcc3dd434bceb3ae41fb97d40c43c78b47fe9554858ef387bfad0fe7d997f010c55cfaac703c36c6650ea0db948e88b58cafb2cfe5

  • C:\Windows\SysWOW64\Ghlell32.exe

    Filesize

    81KB

    MD5

    5cbb1423b01552f009bdcfc974c85be4

    SHA1

    e6837dd3775c12851b20b58cea22ce0bbe88af5f

    SHA256

    812e3e0ab9dc2219edd35fb0094bc30655acb594820a92e8db5ec2b6f88782f9

    SHA512

    9182a7d7481cf0debd4b0c4c10580fc9797771c911abfec44ed8c735a6f3d4556e5dd3da9fc1ccde712322883ce455fa620508be1390b1064954d70a366ce5fd

  • C:\Windows\SysWOW64\Ghlell32.exe

    Filesize

    81KB

    MD5

    5cbb1423b01552f009bdcfc974c85be4

    SHA1

    e6837dd3775c12851b20b58cea22ce0bbe88af5f

    SHA256

    812e3e0ab9dc2219edd35fb0094bc30655acb594820a92e8db5ec2b6f88782f9

    SHA512

    9182a7d7481cf0debd4b0c4c10580fc9797771c911abfec44ed8c735a6f3d4556e5dd3da9fc1ccde712322883ce455fa620508be1390b1064954d70a366ce5fd

  • C:\Windows\SysWOW64\Ghlell32.exe

    Filesize

    81KB

    MD5

    5cbb1423b01552f009bdcfc974c85be4

    SHA1

    e6837dd3775c12851b20b58cea22ce0bbe88af5f

    SHA256

    812e3e0ab9dc2219edd35fb0094bc30655acb594820a92e8db5ec2b6f88782f9

    SHA512

    9182a7d7481cf0debd4b0c4c10580fc9797771c911abfec44ed8c735a6f3d4556e5dd3da9fc1ccde712322883ce455fa620508be1390b1064954d70a366ce5fd

  • C:\Windows\SysWOW64\Ghnaaljp.exe

    Filesize

    81KB

    MD5

    55bb2b4d185ed4cc83c84ee4e5440c5d

    SHA1

    9307fa200487a3b62e3e9bec5623b37b3f5266a3

    SHA256

    8fc2ea8eece266b3bf733e5d8a36cacb18c46dd7457a556e42844056c8e9dbdc

    SHA512

    df0dfb2241d356e416a9b844cd7dbf9603d58e7560902d1e460cc3f2c84b039974e75c95345e4eb7289df97ffe3d25b156da382be537108d4b638b6ddff7858f

  • C:\Windows\SysWOW64\Ghnaaljp.exe

    Filesize

    81KB

    MD5

    55bb2b4d185ed4cc83c84ee4e5440c5d

    SHA1

    9307fa200487a3b62e3e9bec5623b37b3f5266a3

    SHA256

    8fc2ea8eece266b3bf733e5d8a36cacb18c46dd7457a556e42844056c8e9dbdc

    SHA512

    df0dfb2241d356e416a9b844cd7dbf9603d58e7560902d1e460cc3f2c84b039974e75c95345e4eb7289df97ffe3d25b156da382be537108d4b638b6ddff7858f

  • C:\Windows\SysWOW64\Ghnaaljp.exe

    Filesize

    81KB

    MD5

    55bb2b4d185ed4cc83c84ee4e5440c5d

    SHA1

    9307fa200487a3b62e3e9bec5623b37b3f5266a3

    SHA256

    8fc2ea8eece266b3bf733e5d8a36cacb18c46dd7457a556e42844056c8e9dbdc

    SHA512

    df0dfb2241d356e416a9b844cd7dbf9603d58e7560902d1e460cc3f2c84b039974e75c95345e4eb7289df97ffe3d25b156da382be537108d4b638b6ddff7858f

  • C:\Windows\SysWOW64\Gmhmdc32.exe

    Filesize

    81KB

    MD5

    7e456f3b7aa6e8f7c7206454f731e6e0

    SHA1

    90c968e46c919384b638b6111be329ef248fa2bd

    SHA256

    8be51d4e34da7b37ea19bd63fb27ee48ac9ebe4e895aa07247b52f08d2a07ddb

    SHA512

    40efbd813989f83cf1496096b8077eb3735eb3cda153a2627cdff0b3cfe8075408e34424cee204387f232123508d626e4400e20fdf6ed8c55de2ef169758365c

  • C:\Windows\SysWOW64\Gmhmdc32.exe

    Filesize

    81KB

    MD5

    7e456f3b7aa6e8f7c7206454f731e6e0

    SHA1

    90c968e46c919384b638b6111be329ef248fa2bd

    SHA256

    8be51d4e34da7b37ea19bd63fb27ee48ac9ebe4e895aa07247b52f08d2a07ddb

    SHA512

    40efbd813989f83cf1496096b8077eb3735eb3cda153a2627cdff0b3cfe8075408e34424cee204387f232123508d626e4400e20fdf6ed8c55de2ef169758365c

  • C:\Windows\SysWOW64\Gmhmdc32.exe

    Filesize

    81KB

    MD5

    7e456f3b7aa6e8f7c7206454f731e6e0

    SHA1

    90c968e46c919384b638b6111be329ef248fa2bd

    SHA256

    8be51d4e34da7b37ea19bd63fb27ee48ac9ebe4e895aa07247b52f08d2a07ddb

    SHA512

    40efbd813989f83cf1496096b8077eb3735eb3cda153a2627cdff0b3cfe8075408e34424cee204387f232123508d626e4400e20fdf6ed8c55de2ef169758365c

  • C:\Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • C:\Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • C:\Windows\SysWOW64\Hpgakh32.exe

    Filesize

    81KB

    MD5

    4a3e4ec59dac99494ff8f8b7877299c3

    SHA1

    24149f0cfa83f38ea710b86735d46ce79b5cd6bc

    SHA256

    e07c8e630f113d1bffd9a7e12842f3c0c3dbacf8bba9a7fa965e48efb0005c36

    SHA512

    fc88cc2156e5de04d7ee5c12613df99565d70702063e49c5584570bba5c9e4b2207eaee36657b4082a722016e4829169e6452403b22fcf94882abeba0fcae9cf

  • C:\Windows\SysWOW64\Hpgakh32.exe

    Filesize

    81KB

    MD5

    4a3e4ec59dac99494ff8f8b7877299c3

    SHA1

    24149f0cfa83f38ea710b86735d46ce79b5cd6bc

    SHA256

    e07c8e630f113d1bffd9a7e12842f3c0c3dbacf8bba9a7fa965e48efb0005c36

    SHA512

    fc88cc2156e5de04d7ee5c12613df99565d70702063e49c5584570bba5c9e4b2207eaee36657b4082a722016e4829169e6452403b22fcf94882abeba0fcae9cf

  • C:\Windows\SysWOW64\Hpgakh32.exe

    Filesize

    81KB

    MD5

    4a3e4ec59dac99494ff8f8b7877299c3

    SHA1

    24149f0cfa83f38ea710b86735d46ce79b5cd6bc

    SHA256

    e07c8e630f113d1bffd9a7e12842f3c0c3dbacf8bba9a7fa965e48efb0005c36

    SHA512

    fc88cc2156e5de04d7ee5c12613df99565d70702063e49c5584570bba5c9e4b2207eaee36657b4082a722016e4829169e6452403b22fcf94882abeba0fcae9cf

  • C:\Windows\SysWOW64\Lgbfin32.exe

    Filesize

    81KB

    MD5

    1dacb37a5f7d17f7bdfd2b49f5834e53

    SHA1

    6a997a96decd2e646ed797a3bec0401c73055d2d

    SHA256

    b551a0346f1a57a254502d8054519ad313afbea88daa64263e3a6e2bd009fc28

    SHA512

    13ee1ff94fbb251e43aa8904f8946c490e255667f3e453e4131016087f66317db23ca1bb2e5b649ea604545ed7a5579fd94ff8f1f92326e0f52915615ef141d3

  • C:\Windows\SysWOW64\Lgbfin32.exe

    Filesize

    81KB

    MD5

    1dacb37a5f7d17f7bdfd2b49f5834e53

    SHA1

    6a997a96decd2e646ed797a3bec0401c73055d2d

    SHA256

    b551a0346f1a57a254502d8054519ad313afbea88daa64263e3a6e2bd009fc28

    SHA512

    13ee1ff94fbb251e43aa8904f8946c490e255667f3e453e4131016087f66317db23ca1bb2e5b649ea604545ed7a5579fd94ff8f1f92326e0f52915615ef141d3

  • C:\Windows\SysWOW64\Lgbfin32.exe

    Filesize

    81KB

    MD5

    1dacb37a5f7d17f7bdfd2b49f5834e53

    SHA1

    6a997a96decd2e646ed797a3bec0401c73055d2d

    SHA256

    b551a0346f1a57a254502d8054519ad313afbea88daa64263e3a6e2bd009fc28

    SHA512

    13ee1ff94fbb251e43aa8904f8946c490e255667f3e453e4131016087f66317db23ca1bb2e5b649ea604545ed7a5579fd94ff8f1f92326e0f52915615ef141d3

  • C:\Windows\SysWOW64\Pjlgna32.exe

    Filesize

    81KB

    MD5

    445ea5344a82d93ba1ebee68468abeb9

    SHA1

    26ba398175dae6fbfe8a30723e27054f47a348ef

    SHA256

    4c627f1f31658b7545dd19b0292a1d005c0265e25aa39a7f7c79d55c5567e658

    SHA512

    f90a5b8b1d073de6991c5eaae43fd4421a6c10603a76e268e1c4395185716546150a30ec2bb45fbf9c8302bc7e30fa480ddaa24d2befe0a61f0fae91fe28a765

  • C:\Windows\SysWOW64\Pjlgna32.exe

    Filesize

    81KB

    MD5

    445ea5344a82d93ba1ebee68468abeb9

    SHA1

    26ba398175dae6fbfe8a30723e27054f47a348ef

    SHA256

    4c627f1f31658b7545dd19b0292a1d005c0265e25aa39a7f7c79d55c5567e658

    SHA512

    f90a5b8b1d073de6991c5eaae43fd4421a6c10603a76e268e1c4395185716546150a30ec2bb45fbf9c8302bc7e30fa480ddaa24d2befe0a61f0fae91fe28a765

  • C:\Windows\SysWOW64\Pjlgna32.exe

    Filesize

    81KB

    MD5

    445ea5344a82d93ba1ebee68468abeb9

    SHA1

    26ba398175dae6fbfe8a30723e27054f47a348ef

    SHA256

    4c627f1f31658b7545dd19b0292a1d005c0265e25aa39a7f7c79d55c5567e658

    SHA512

    f90a5b8b1d073de6991c5eaae43fd4421a6c10603a76e268e1c4395185716546150a30ec2bb45fbf9c8302bc7e30fa480ddaa24d2befe0a61f0fae91fe28a765

  • \Windows\SysWOW64\Flhkhnel.exe

    Filesize

    81KB

    MD5

    efc82062b890f9c20f506c6707071bd8

    SHA1

    16541995a76662b5574f08a36cd73083cb24cff0

    SHA256

    29d79cd112887efb7f476ff79a6ecbcf06c1ddc3c57af402196affa7f0cea94d

    SHA512

    9f89d85f81177fd6e3fb08d0a5412451e83fe585b002a8b84bd3214680995ba3cadbc6c930c6d54e9aa358a0090be13b6b2969e088d27cb1a6aa09996f826e5d

  • \Windows\SysWOW64\Flhkhnel.exe

    Filesize

    81KB

    MD5

    efc82062b890f9c20f506c6707071bd8

    SHA1

    16541995a76662b5574f08a36cd73083cb24cff0

    SHA256

    29d79cd112887efb7f476ff79a6ecbcf06c1ddc3c57af402196affa7f0cea94d

    SHA512

    9f89d85f81177fd6e3fb08d0a5412451e83fe585b002a8b84bd3214680995ba3cadbc6c930c6d54e9aa358a0090be13b6b2969e088d27cb1a6aa09996f826e5d

  • \Windows\SysWOW64\Gbolce32.exe

    Filesize

    81KB

    MD5

    3b489bf6996569a93395cab025a26894

    SHA1

    03dcd0799c2f87e1d449ffbbca48664a4cd241b9

    SHA256

    c07353933fa20ca7e756a30a4b8d2979a75c1f3b76dd7f4e0859b6da962b3e7a

    SHA512

    de5da311d12b964535432fbcc3dd434bceb3ae41fb97d40c43c78b47fe9554858ef387bfad0fe7d997f010c55cfaac703c36c6650ea0db948e88b58cafb2cfe5

  • \Windows\SysWOW64\Gbolce32.exe

    Filesize

    81KB

    MD5

    3b489bf6996569a93395cab025a26894

    SHA1

    03dcd0799c2f87e1d449ffbbca48664a4cd241b9

    SHA256

    c07353933fa20ca7e756a30a4b8d2979a75c1f3b76dd7f4e0859b6da962b3e7a

    SHA512

    de5da311d12b964535432fbcc3dd434bceb3ae41fb97d40c43c78b47fe9554858ef387bfad0fe7d997f010c55cfaac703c36c6650ea0db948e88b58cafb2cfe5

  • \Windows\SysWOW64\Ghlell32.exe

    Filesize

    81KB

    MD5

    5cbb1423b01552f009bdcfc974c85be4

    SHA1

    e6837dd3775c12851b20b58cea22ce0bbe88af5f

    SHA256

    812e3e0ab9dc2219edd35fb0094bc30655acb594820a92e8db5ec2b6f88782f9

    SHA512

    9182a7d7481cf0debd4b0c4c10580fc9797771c911abfec44ed8c735a6f3d4556e5dd3da9fc1ccde712322883ce455fa620508be1390b1064954d70a366ce5fd

  • \Windows\SysWOW64\Ghlell32.exe

    Filesize

    81KB

    MD5

    5cbb1423b01552f009bdcfc974c85be4

    SHA1

    e6837dd3775c12851b20b58cea22ce0bbe88af5f

    SHA256

    812e3e0ab9dc2219edd35fb0094bc30655acb594820a92e8db5ec2b6f88782f9

    SHA512

    9182a7d7481cf0debd4b0c4c10580fc9797771c911abfec44ed8c735a6f3d4556e5dd3da9fc1ccde712322883ce455fa620508be1390b1064954d70a366ce5fd

  • \Windows\SysWOW64\Ghnaaljp.exe

    Filesize

    81KB

    MD5

    55bb2b4d185ed4cc83c84ee4e5440c5d

    SHA1

    9307fa200487a3b62e3e9bec5623b37b3f5266a3

    SHA256

    8fc2ea8eece266b3bf733e5d8a36cacb18c46dd7457a556e42844056c8e9dbdc

    SHA512

    df0dfb2241d356e416a9b844cd7dbf9603d58e7560902d1e460cc3f2c84b039974e75c95345e4eb7289df97ffe3d25b156da382be537108d4b638b6ddff7858f

  • \Windows\SysWOW64\Ghnaaljp.exe

    Filesize

    81KB

    MD5

    55bb2b4d185ed4cc83c84ee4e5440c5d

    SHA1

    9307fa200487a3b62e3e9bec5623b37b3f5266a3

    SHA256

    8fc2ea8eece266b3bf733e5d8a36cacb18c46dd7457a556e42844056c8e9dbdc

    SHA512

    df0dfb2241d356e416a9b844cd7dbf9603d58e7560902d1e460cc3f2c84b039974e75c95345e4eb7289df97ffe3d25b156da382be537108d4b638b6ddff7858f

  • \Windows\SysWOW64\Gmhmdc32.exe

    Filesize

    81KB

    MD5

    7e456f3b7aa6e8f7c7206454f731e6e0

    SHA1

    90c968e46c919384b638b6111be329ef248fa2bd

    SHA256

    8be51d4e34da7b37ea19bd63fb27ee48ac9ebe4e895aa07247b52f08d2a07ddb

    SHA512

    40efbd813989f83cf1496096b8077eb3735eb3cda153a2627cdff0b3cfe8075408e34424cee204387f232123508d626e4400e20fdf6ed8c55de2ef169758365c

  • \Windows\SysWOW64\Gmhmdc32.exe

    Filesize

    81KB

    MD5

    7e456f3b7aa6e8f7c7206454f731e6e0

    SHA1

    90c968e46c919384b638b6111be329ef248fa2bd

    SHA256

    8be51d4e34da7b37ea19bd63fb27ee48ac9ebe4e895aa07247b52f08d2a07ddb

    SHA512

    40efbd813989f83cf1496096b8077eb3735eb3cda153a2627cdff0b3cfe8075408e34424cee204387f232123508d626e4400e20fdf6ed8c55de2ef169758365c

  • \Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • \Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • \Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • \Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • \Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • \Windows\SysWOW64\Gmmgobfd.exe

    Filesize

    81KB

    MD5

    d4fac2d4a0f9f6615e0da0ed079f8235

    SHA1

    c453470661de1268c7843ffa262a5cf1fede19cb

    SHA256

    4022ff393010ada517d33af1209fc3b48537a55aac53325919621184d9c444c2

    SHA512

    aff41395fe6d2322eec572a1213462e5f2b8201ae31eae9741e638b128c1c1a55d3d08945a6173e98c623f0e13fcad878b0a4b07903857518cc887720fbb9de8

  • \Windows\SysWOW64\Hpgakh32.exe

    Filesize

    81KB

    MD5

    4a3e4ec59dac99494ff8f8b7877299c3

    SHA1

    24149f0cfa83f38ea710b86735d46ce79b5cd6bc

    SHA256

    e07c8e630f113d1bffd9a7e12842f3c0c3dbacf8bba9a7fa965e48efb0005c36

    SHA512

    fc88cc2156e5de04d7ee5c12613df99565d70702063e49c5584570bba5c9e4b2207eaee36657b4082a722016e4829169e6452403b22fcf94882abeba0fcae9cf

  • \Windows\SysWOW64\Hpgakh32.exe

    Filesize

    81KB

    MD5

    4a3e4ec59dac99494ff8f8b7877299c3

    SHA1

    24149f0cfa83f38ea710b86735d46ce79b5cd6bc

    SHA256

    e07c8e630f113d1bffd9a7e12842f3c0c3dbacf8bba9a7fa965e48efb0005c36

    SHA512

    fc88cc2156e5de04d7ee5c12613df99565d70702063e49c5584570bba5c9e4b2207eaee36657b4082a722016e4829169e6452403b22fcf94882abeba0fcae9cf

  • \Windows\SysWOW64\Lgbfin32.exe

    Filesize

    81KB

    MD5

    1dacb37a5f7d17f7bdfd2b49f5834e53

    SHA1

    6a997a96decd2e646ed797a3bec0401c73055d2d

    SHA256

    b551a0346f1a57a254502d8054519ad313afbea88daa64263e3a6e2bd009fc28

    SHA512

    13ee1ff94fbb251e43aa8904f8946c490e255667f3e453e4131016087f66317db23ca1bb2e5b649ea604545ed7a5579fd94ff8f1f92326e0f52915615ef141d3

  • \Windows\SysWOW64\Lgbfin32.exe

    Filesize

    81KB

    MD5

    1dacb37a5f7d17f7bdfd2b49f5834e53

    SHA1

    6a997a96decd2e646ed797a3bec0401c73055d2d

    SHA256

    b551a0346f1a57a254502d8054519ad313afbea88daa64263e3a6e2bd009fc28

    SHA512

    13ee1ff94fbb251e43aa8904f8946c490e255667f3e453e4131016087f66317db23ca1bb2e5b649ea604545ed7a5579fd94ff8f1f92326e0f52915615ef141d3

  • \Windows\SysWOW64\Pjlgna32.exe

    Filesize

    81KB

    MD5

    445ea5344a82d93ba1ebee68468abeb9

    SHA1

    26ba398175dae6fbfe8a30723e27054f47a348ef

    SHA256

    4c627f1f31658b7545dd19b0292a1d005c0265e25aa39a7f7c79d55c5567e658

    SHA512

    f90a5b8b1d073de6991c5eaae43fd4421a6c10603a76e268e1c4395185716546150a30ec2bb45fbf9c8302bc7e30fa480ddaa24d2befe0a61f0fae91fe28a765

  • \Windows\SysWOW64\Pjlgna32.exe

    Filesize

    81KB

    MD5

    445ea5344a82d93ba1ebee68468abeb9

    SHA1

    26ba398175dae6fbfe8a30723e27054f47a348ef

    SHA256

    4c627f1f31658b7545dd19b0292a1d005c0265e25aa39a7f7c79d55c5567e658

    SHA512

    f90a5b8b1d073de6991c5eaae43fd4421a6c10603a76e268e1c4395185716546150a30ec2bb45fbf9c8302bc7e30fa480ddaa24d2befe0a61f0fae91fe28a765

  • memory/524-135-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/524-72-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/772-125-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/772-140-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1108-139-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2172-138-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2172-107-0x00000000002A0000-0x00000000002D4000-memory.dmp

    Filesize

    208KB

  • memory/2172-99-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2256-51-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2256-53-0x00000000002A0000-0x00000000002D4000-memory.dmp

    Filesize

    208KB

  • memory/2484-45-0x0000000000440000-0x0000000000474000-memory.dmp

    Filesize

    208KB

  • memory/2484-132-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2780-30-0x00000000002D0000-0x0000000000304000-memory.dmp

    Filesize

    208KB

  • memory/2780-24-0x00000000002D0000-0x0000000000304000-memory.dmp

    Filesize

    208KB

  • memory/2780-22-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2832-1-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2832-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2832-7-0x0000000000220000-0x0000000000254000-memory.dmp

    Filesize

    208KB

  • memory/2832-8-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2876-84-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2932-86-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2932-137-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB