Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 21:54

General

  • Target

    3f160356575f0698f2b5ec0ca4e2329893a351669a76ee7a1081bed3793a3a3c.exe

  • Size

    128KB

  • MD5

    cb647e27d867ee9f7a6288fb555f7992

  • SHA1

    aeb68544a0e5f6d47b09854bb773248d5d641c73

  • SHA256

    3f160356575f0698f2b5ec0ca4e2329893a351669a76ee7a1081bed3793a3a3c

  • SHA512

    406bb2fac199827b904bedcc22763dd7f91818677a9770c1914d6794c45b9e446b856fd621eb79383cec26b5528dd431ca49dec02993937f501f964885b71c9b

  • SSDEEP

    3072:isY/LO22UL5Gxcyq8+qxPHZcn5/Z+M5lCHDMQH2qC7ZQOlzSLUK6MwGsGnDc9nhg:isCSpq54cSxPHZc5BpoHDMQWfdQOhwJn

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f160356575f0698f2b5ec0ca4e2329893a351669a76ee7a1081bed3793a3a3c.exe
    "C:\Users\Admin\AppData\Local\Temp\3f160356575f0698f2b5ec0ca4e2329893a351669a76ee7a1081bed3793a3a3c.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Windows\SysWOW64\Ldkojb32.exe
      C:\Windows\system32\Ldkojb32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Windows\SysWOW64\Lgikfn32.exe
        C:\Windows\system32\Lgikfn32.exe
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3704
        • C:\Windows\SysWOW64\Lkdggmlj.exe
          C:\Windows\system32\Lkdggmlj.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2852
          • C:\Windows\SysWOW64\Liggbi32.exe
            C:\Windows\system32\Liggbi32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:3216
            • C:\Windows\SysWOW64\Laopdgcg.exe
              C:\Windows\system32\Laopdgcg.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:620
              • C:\Windows\SysWOW64\Lpappc32.exe
                C:\Windows\system32\Lpappc32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2288
                • C:\Windows\SysWOW64\Lcpllo32.exe
                  C:\Windows\system32\Lcpllo32.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:836
                  • C:\Windows\SysWOW64\Lgkhlnbn.exe
                    C:\Windows\system32\Lgkhlnbn.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:736
                    • C:\Windows\SysWOW64\Lijdhiaa.exe
                      C:\Windows\system32\Lijdhiaa.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2520
                      • C:\Windows\SysWOW64\Lnepih32.exe
                        C:\Windows\system32\Lnepih32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1132
                        • C:\Windows\SysWOW64\Lpcmec32.exe
                          C:\Windows\system32\Lpcmec32.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:1184
                          • C:\Windows\SysWOW64\Lcbiao32.exe
                            C:\Windows\system32\Lcbiao32.exe
                            13⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2984
                            • C:\Windows\SysWOW64\Lkiqbl32.exe
                              C:\Windows\system32\Lkiqbl32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:2336
                              • C:\Windows\SysWOW64\Lilanioo.exe
                                C:\Windows\system32\Lilanioo.exe
                                15⤵
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:1656
                                • C:\Windows\SysWOW64\Laciofpa.exe
                                  C:\Windows\system32\Laciofpa.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:5052
                                  • C:\Windows\SysWOW64\Ldaeka32.exe
                                    C:\Windows\system32\Ldaeka32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2424
                                    • C:\Windows\SysWOW64\Lklnhlfb.exe
                                      C:\Windows\system32\Lklnhlfb.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:5024
                                      • C:\Windows\SysWOW64\Lnjjdgee.exe
                                        C:\Windows\system32\Lnjjdgee.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:4668
                                        • C:\Windows\SysWOW64\Lphfpbdi.exe
                                          C:\Windows\system32\Lphfpbdi.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4448
                                          • C:\Windows\SysWOW64\Lddbqa32.exe
                                            C:\Windows\system32\Lddbqa32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:832
                                            • C:\Windows\SysWOW64\Lgbnmm32.exe
                                              C:\Windows\system32\Lgbnmm32.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:5112
                                              • C:\Windows\SysWOW64\Mjqjih32.exe
                                                C:\Windows\system32\Mjqjih32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:3668
                                                • C:\Windows\SysWOW64\Mahbje32.exe
                                                  C:\Windows\system32\Mahbje32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:892
                                                  • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                    C:\Windows\system32\Mpkbebbf.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:2212
                                                    • C:\Windows\SysWOW64\Mciobn32.exe
                                                      C:\Windows\system32\Mciobn32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:3304
                                                      • C:\Windows\SysWOW64\Mgekbljc.exe
                                                        C:\Windows\system32\Mgekbljc.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:1556
                                                        • C:\Windows\SysWOW64\Mjcgohig.exe
                                                          C:\Windows\system32\Mjcgohig.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:3888
                                                          • C:\Windows\SysWOW64\Majopeii.exe
                                                            C:\Windows\system32\Majopeii.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:1056
                                                            • C:\Windows\SysWOW64\Mpmokb32.exe
                                                              C:\Windows\system32\Mpmokb32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              PID:1684
                                                              • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                C:\Windows\system32\Mgghhlhq.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:2196
                                                                • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                  C:\Windows\system32\Mjeddggd.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:4888
                                                                  • C:\Windows\SysWOW64\Mamleegg.exe
                                                                    C:\Windows\system32\Mamleegg.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:3056
                                                                    • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                      C:\Windows\system32\Mdkhapfj.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:948
                                                                      • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                        C:\Windows\system32\Mkepnjng.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:3916
                                                                        • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                          C:\Windows\system32\Mncmjfmk.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:2280
                                                                          • C:\Windows\SysWOW64\Maohkd32.exe
                                                                            C:\Windows\system32\Maohkd32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:3504
                                                                            • C:\Windows\SysWOW64\Mdmegp32.exe
                                                                              C:\Windows\system32\Mdmegp32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:2912
                                                                              • C:\Windows\SysWOW64\Mglack32.exe
                                                                                C:\Windows\system32\Mglack32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • Modifies registry class
                                                                                PID:3956
                                                                                • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                  C:\Windows\system32\Mnfipekh.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  PID:116
                                                                                  • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                    C:\Windows\system32\Maaepd32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:4736
                                                                                    • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                      C:\Windows\system32\Mpdelajl.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:1096
                                                                                      • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                        C:\Windows\system32\Mcbahlip.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:1032
                                                                                        • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                          C:\Windows\system32\Mgnnhk32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:1292
                                                                                          • C:\Windows\SysWOW64\Njljefql.exe
                                                                                            C:\Windows\system32\Njljefql.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:464
                                                                                            • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                              C:\Windows\system32\Nnhfee32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:4952
                                                                                              • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                C:\Windows\system32\Nacbfdao.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:3100
                                                                                                • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                  C:\Windows\system32\Ndbnboqb.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:2848
                                                                                                  • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                    C:\Windows\system32\Nceonl32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:436
                                                                                                    • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                      C:\Windows\system32\Nklfoi32.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:2800
                                                                                                      • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                        C:\Windows\system32\Njogjfoj.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2120
                                                                                                        • C:\Windows\SysWOW64\Nnjbke32.exe
                                                                                                          C:\Windows\system32\Nnjbke32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          PID:4484
                                                                                                          • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                            C:\Windows\system32\Nafokcol.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:4560
                                                                                                            • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                              C:\Windows\system32\Nddkgonp.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:3008
                                                                                                              • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                C:\Windows\system32\Ncgkcl32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:3384
                                                                                                                • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                  C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:2192
                                                                                                                  • C:\Windows\SysWOW64\Nkncdifl.exe
                                                                                                                    C:\Windows\system32\Nkncdifl.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:4960
                                                                                                                    • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                      C:\Windows\system32\Njacpf32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:876
                                                                                                                      • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                        C:\Windows\system32\Nnmopdep.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:1724
                                                                                                                        • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                          C:\Windows\system32\Nqklmpdd.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:4760
                                                                                                                          • C:\Windows\SysWOW64\Ndghmo32.exe
                                                                                                                            C:\Windows\system32\Ndghmo32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1324
                                                                                                                            • C:\Windows\SysWOW64\Ngedij32.exe
                                                                                                                              C:\Windows\system32\Ngedij32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:2552
                                                                                                                              • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:1716
                                                                                                                                • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                  C:\Windows\system32\Njcpee32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:2300
                                                                                                                                  • C:\Windows\SysWOW64\Nnolfdcn.exe
                                                                                                                                    C:\Windows\system32\Nnolfdcn.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:4748
                                                                                                                                    • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                      C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:4992
                                                                                                                                      • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                        C:\Windows\system32\Ndidbn32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        PID:212
                                                                                                                                        • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                          C:\Windows\system32\Ncldnkae.exe
                                                                                                                                          68⤵
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4588
                                                                                                                                          • C:\Windows\SysWOW64\Nggqoj32.exe
                                                                                                                                            C:\Windows\system32\Nggqoj32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:3020
                                                                                                                                            • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                              C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                              70⤵
                                                                                                                                                PID:1396
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 400
                                                                                                                                                  71⤵
                                                                                                                                                  • Program crash
                                                                                                                                                  PID:2200
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1396 -ip 1396
      1⤵
        PID:3048

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Laciofpa.exe

        Filesize

        128KB

        MD5

        c4d432b42a246cc08344524cc77b8cd9

        SHA1

        d4dd12b9def0359bdafa2dfa56c123db31ae2725

        SHA256

        6b5b91766fa24fa775efbf106fd2d71519a79a264b356047498a61f26f26004a

        SHA512

        ff3fc0d580e33bdaac8a4fd55011487b3576a3231d87ac130badff9b04b2eb68965877a65112adcbe70a6d4e9f442c43fb95ec45a9d9ad328ef84f1a4727a985

      • C:\Windows\SysWOW64\Laciofpa.exe

        Filesize

        59KB

        MD5

        1eb3ac617778144343a83da12da72e86

        SHA1

        80ce78fe2fbd3333b4a62d3f091915a4494a2905

        SHA256

        da4d26d5c8e9403475ab149009615052c4803f07cb441c1163d18693c3fa5374

        SHA512

        64e8263ea42f9e2aaf303947e087615691b5ac7eac52666896ad6cb5a0cfc922e7800a376930d97989428483c443bbb2faba722e22100fdd621801940087823d

      • C:\Windows\SysWOW64\Laopdgcg.exe

        Filesize

        82KB

        MD5

        81f3a67ec42502f25f12d9e6b6c2dbcf

        SHA1

        c497c61a1fc85c1b25c221da1754ac053b77db68

        SHA256

        bfe0b92e13ba05f6d4054b8076e97fcdab9d4e9f554e73d6cc6ccc911864f191

        SHA512

        afdc961d0a9325f1515064111f54048dd7a8265c70006953e98a57c3d8498d4e32fc03e8a993f96a85106f4e55bf87d9d84ac4d004580a0b76fb5f18d72b384c

      • C:\Windows\SysWOW64\Lcbiao32.exe

        Filesize

        128KB

        MD5

        a7d04a17c6c8f4aa31d8816e83ae23c7

        SHA1

        e16b5f5b06f48550dff63c5d0b59559a34f60b0b

        SHA256

        9d66b9ba5a2f4feebb55dabe3ca925894236cf3ab98383fc431bfb11307f05fb

        SHA512

        fa0cb0653d725fc85f2fbe83e4758ae4fd1c7e2ad664a166bf1dbe01860d60de7d5bb4b496429ce7455772855bb5d7427bf535f971d13484400d7b48aee1b2fa

      • C:\Windows\SysWOW64\Lcpllo32.exe

        Filesize

        110KB

        MD5

        5c87d8c4042ef8fa0bc8b3091e9ee281

        SHA1

        8bc89e886bf4343757766bced3f45f6b31253eef

        SHA256

        a15019d5a117b273663f6c704404e0ca9ce0635d5cb25918b1a6ab20d77a4033

        SHA512

        3e6028dd2414252c5c951178cde266aa66cb0655f95ace4990faf7587a0c688cff3bfc1ebe18e4a8493d19fcb229d807c89d5c63ae36cfde295b534e39b4e2b9

      • C:\Windows\SysWOW64\Lcpllo32.exe

        Filesize

        128KB

        MD5

        1400e2aa4540cec7777d3fd7bb430800

        SHA1

        854fe329552542799aafcc2446ce21f8669d0f07

        SHA256

        8964bc98b75f9b8e49ac534103ee023790c9972d44f39afeb624f25c6f1a5796

        SHA512

        9a49bb8f1005d2978e4f07515c70a986820956bf2511be5c5e56855d05185712b9ae2b3811543a243fad8da021f3804b62a0059dfd51a01a2f7f2e9bb08e82f2

      • C:\Windows\SysWOW64\Ldaeka32.exe

        Filesize

        21KB

        MD5

        758a9d4cceca45446572758f040a01f2

        SHA1

        42d3f5a632ebe1af2847fda669b7be6708194891

        SHA256

        a4cca76484fdafbc19f3cd922d3319ce3b4970bd16df03bd7f8bf07b7fd95504

        SHA512

        fd19b13298b3ba90e23351302d872a0b70b8ff8e6e4bd02bec428cb66dceeae6eac80e411ef58744b48f7b0f7927d7edd9c3871f4e94ce6448ef62a56b87a250

      • C:\Windows\SysWOW64\Ldaeka32.exe

        Filesize

        128KB

        MD5

        ca291aab5c9afec52d5327a61cfbbe63

        SHA1

        5ce5659e45b161f53b0941b02e85109897e5536e

        SHA256

        722b7ef675a717a30eea2d5a032768b16da3146e13c6d6d8ad8665f7d7b4cfea

        SHA512

        fcab2811129dd4e9850475875711e3a2cb6762eb2357c13542e615eb2054948d56be284e433a12c31e775246805e9f6a809ec093d6e72bf653f690ef75259363

      • C:\Windows\SysWOW64\Lddbqa32.exe

        Filesize

        128KB

        MD5

        a94d7957de93f19447e88e08d6987b57

        SHA1

        70a863ca44cb032a0ccc4bb768e53e0150c212c9

        SHA256

        1dbe497348b79febff88cc8bd498ef0dc7b1620aeb9c04b14564415cf8aaae0b

        SHA512

        6f6ea69cb0ad07d8f36c51b08f8c71f98a717b43d576d376b91898074450bbdfe1268522ac1fdc8211c6506b3ec48aa8e27bb56aa46f1bec0b9fa2567c1ec3a8

      • C:\Windows\SysWOW64\Ldkojb32.exe

        Filesize

        128KB

        MD5

        bb7725d2da91b6a460690bd1c7e334e7

        SHA1

        3b96a0ba634e922869dbb77d89c3004d3e5df36e

        SHA256

        add12ee010a6f888906ae24163bd56b4b16adc8a0326ad09fcf804b6af7b5939

        SHA512

        74813f743230e38678b9092bed04a67379c40460124a1f7dd6873d12be7ba1f88c3bac9ad25a4473bdb29cbe2f90c7ccb2918f1c6ba20b82177c85d1a6cadf8d

      • C:\Windows\SysWOW64\Lgbnmm32.exe

        Filesize

        128KB

        MD5

        33d3f8be9bdf8791cf40c6d04da8a939

        SHA1

        604f0ef87f46fad90cecd06436202015c1f6e301

        SHA256

        a0790991cfafc5951167f7c3654668c6826882c49e493a14bf162f40dc0f1e0d

        SHA512

        91a8e479b380f61474502e1e66bed7da511c609d58a3c91cdb9b4bed3279c09c47980759341fe02a9a928f2f13099ba8c89b0a3cd344e57a4e127129ff96a3fb

      • C:\Windows\SysWOW64\Lgikfn32.exe

        Filesize

        128KB

        MD5

        4e8e1dd18604226ab03d0f6d6d967cbe

        SHA1

        64137010917267849bc4e67ff73a7c77aa3cfaad

        SHA256

        c951a7eabf40cb3fda20ef71fe21a8b1593116d002cb6b21e99621274d60de83

        SHA512

        3f75a5548c4f132c25140cbb77948c827b4ccc30f24b7d651698074d7c822c211236879fd4b06fed4f4137c9b052621210affdad64be20e50641538eed959141

      • C:\Windows\SysWOW64\Lgkhlnbn.exe

        Filesize

        128KB

        MD5

        b94450df7d762694cf4782c25d5967d0

        SHA1

        047f3dd910ec42082d5c3605d470bdefab58f6d2

        SHA256

        6bc743b7a597eaee0e7775ee9148e03a14cc4e4e4bb17fcefb17f1b50acc7005

        SHA512

        bc0eaafd06855007eea3befd34621fbe76fc8b52c221c5654ac707ef405788c3fd30340244a5f319ee92a873155af0c5f4bdf19f5967bbd34faf4c83d15e4112

      • C:\Windows\SysWOW64\Liggbi32.exe

        Filesize

        128KB

        MD5

        97ca268e5f7fa1d634027baca6e7a6b7

        SHA1

        f7a185c1d67d33281e092e9cb8045a91e5d4999d

        SHA256

        45517838237d2c56750f39a96cc52af69706e67c522ce4ac82d62b7671208fbd

        SHA512

        a8c594b390df41746a88709ca51a1741176e756a0464407508d6d30157f19525a0990898ceabb180b3eeb6dd0dce8f4cd1a5f72774021342de05d288e77b160e

      • C:\Windows\SysWOW64\Lijdhiaa.exe

        Filesize

        75KB

        MD5

        769479e95e0cee323c22fe6d386a9a67

        SHA1

        520ea5fbeb8f32630cfb75667b399425e40d5be0

        SHA256

        480b69607bac0eced5e9e8026d900aa77410049db628355fb4fc653ef4398881

        SHA512

        dac86879ad316d2b89da0f2c09b147ebf10b6a2d2a043c8e05804ecdeb5635e534e3f4a219d6b302bc25be66646446f857899d0a00a546699afbf01c8d0329dd

      • C:\Windows\SysWOW64\Lilanioo.exe

        Filesize

        128KB

        MD5

        b80213e1fe20c4b0d6596be647c4a2e0

        SHA1

        f03881a2ba8ce652f2f21d6e88e53042815a8b2a

        SHA256

        3f232f39073d08a5bed1c774b7cea1615ab04646b7f1c707d8fe9fd1692f7eab

        SHA512

        b98286db74c9548efc280fbe384a49e9fc3f97d63dca79be3f63636e470b4aa42c66652741a8ab3b5588bbf26863e4392d51f88c4ab8f364fd49366ffc9d22e1

      • C:\Windows\SysWOW64\Lkdggmlj.exe

        Filesize

        128KB

        MD5

        e43a6e904cbef12f8a53fbc2ffddd3fd

        SHA1

        b5efd153d1b713ea47b46896120fd714e5622a40

        SHA256

        cee2ed27a69533a6b86c9e68144940a179c30425494b0cda110178f3fd9bcc03

        SHA512

        90869b15b1437db69e52ca3e032c880d1a98f1d41b72d8768e2ae33d7cd7e03b43dde0de5e1d1d0f6c3bbe1883b2beae3159cab6b0d76192526903c316489a5d

      • C:\Windows\SysWOW64\Lkiqbl32.exe

        Filesize

        128KB

        MD5

        f19c33c435d44e42f70bc42fcedd49c7

        SHA1

        2177eb6b4b4d26444423f1c1d0f32cf9b9c46ffc

        SHA256

        2ca47f99598c229127aa7cb28bb6df76e2e366d9748983320ea57504679a71c9

        SHA512

        5d69b5e3adfe6d701c69e9050a718feb07764601f5e8e7e1a208ebef103269d8cc6b693669e83fa605c874b01fd7f8e48d40e97ede0930f040efc082fc661b6d

      • C:\Windows\SysWOW64\Lklnhlfb.exe

        Filesize

        128KB

        MD5

        e88b2f77f5ce7e0976e85acbd7f44463

        SHA1

        bc5f56cbfb136e305729214974fd6329fd7ae9ee

        SHA256

        db28839b0fcaed2ae17d9e4b9e27560641589140c7c43d38722915b4daa0761e

        SHA512

        bc794bbe931ba1527bb969c8133d9b5217ee0394dde56eb32e729b93cb33b7c9509d3d61213d6d0c618cbd73932b68fc08a5745bfc5fc0eb3f27242748982b70

      • C:\Windows\SysWOW64\Lnepih32.exe

        Filesize

        128KB

        MD5

        b136a4256d1dc8493ea834d62f018c2e

        SHA1

        8064c66037d55b3e09e6c8d3dd0bc4b694fc08ab

        SHA256

        7589269599b6fc6ae0db2287076b05863a23316c892a6226e1b4687d7b95596c

        SHA512

        482375c9dc0d5d6c7c003af5b8c3963c7f6c59d5b641379a66b2dd3d1b57074b9db02bb6e519853259033d3283b5257891877422e30a3e4767368fb26f2ed0de

      • C:\Windows\SysWOW64\Lnepih32.exe

        Filesize

        128KB

        MD5

        5f8a194420db8140ece83bac517e438d

        SHA1

        939a9158e66f1e409ef8bcb1f6fd0c57a27bada3

        SHA256

        268f79b6a5c7a922937e6653f05961d8dd94aa36f0426155e4eff87529a6ed1f

        SHA512

        5437aaee86ea871de40ceae73849957a4d5b4b76ae6a30ea3884c202f2443482113be032f7a4f3a077de920bd8fbb5f35122f7fb03170b4e3a5477aa1a1f484d

      • C:\Windows\SysWOW64\Lnjjdgee.exe

        Filesize

        128KB

        MD5

        14a123fb89011d1a96bf2abad3f62319

        SHA1

        5a6b6ea85f8ceb28a525736df311f1c5caad006e

        SHA256

        952be8f3f33ee18e1279d20e55ab1e3d33caa8d863a50ed337c767a903de7892

        SHA512

        31868a749870e36094595d316ce0b720aae761823e9d7c93a8e65f3de48b5f5277d768dd181d79c521dc9be12288b07eb31f55f034ad05937e375e5768f93c47

      • C:\Windows\SysWOW64\Lnjjdgee.exe

        Filesize

        49KB

        MD5

        3b1fc3d3a95c012a56c0aa084c833fde

        SHA1

        ea6f988f3072453a6da8976a0db7f218459255f7

        SHA256

        a4e4391ad533b4ba8b10f7e951e5b6ac0d7546d070df228c82b35fbf6a8d42b5

        SHA512

        0add8a9bd78fa710047f86c8a209a465183051dbf5dbb98b888be9c4b698dd96142a0bc20ec0a33d314b516f2c35326e37be8dc17e2f2ed4a66f0bb5f5381196

      • C:\Windows\SysWOW64\Lpappc32.exe

        Filesize

        128KB

        MD5

        61600296b26514dc4cd5b51262b267b1

        SHA1

        849404a22c728eea3fcb26594be7682a2a2bb9b1

        SHA256

        8da4e10d2a9b0a679003ffc2cc9553c6ac5f1290784aa1bcf73b41d96e55ec44

        SHA512

        ada576d0159c16d9496253ed581338b9615ac90781a61001d328789285a1181d5e36cde73724275cb14f6e180147c0d531d7162a75d5c73353357892b132708e

      • C:\Windows\SysWOW64\Lpappc32.exe

        Filesize

        128KB

        MD5

        b6d4946e0d115b64556506f22e338823

        SHA1

        111b157c5cb061acf610906f84c106f07dfbb573

        SHA256

        5d482763446cfad9d62ccbcf3eb1dbce7e5320e268fe77c12569f24821d26095

        SHA512

        9c5efb8eda88d6cf00a27acacf3104582a9d632e7b8d74e6b4865659b8304ed772eb5deed3c629c38f3e651b8b8aeecc03193ec6d9081a8d77142751d98208c6

      • C:\Windows\SysWOW64\Lpcmec32.exe

        Filesize

        128KB

        MD5

        a9bc7035da0cf6f9cb3fd71ae997d95b

        SHA1

        462970581a61556dd2c6a9f9f07a5270d109ae22

        SHA256

        c288b2c00f7ec7ea5fddfb838f26e5ee93e76ddb20f2ddcee9b7d13b85dae2fa

        SHA512

        e1aadc69a52c9a5dc9ccc7f928acf21c042375f498a33ffa2a0dc24bd02c678869896262c502d4fcd0a800975d529be98e303bee8f7db2c1e3d61de6381502b8

      • C:\Windows\SysWOW64\Lphfpbdi.exe

        Filesize

        128KB

        MD5

        91dd5a0c0ad7e747e3acfa6eefb0e72c

        SHA1

        1d282b9115842dd84d28a97d116d1df874149c95

        SHA256

        c7056246da91d358b5bc0aa7f76c0d3c4d8335a7102fa8a7b5433c5a1eb32334

        SHA512

        4d709ea212a75ffed3b69a3c26bbb81d7781b2d274e199b7010f9db022f537392babbcfd34acb69ca7f2056f9802e0fb4103f73a1dcd6bdfd1d5e5dec9859f97

      • C:\Windows\SysWOW64\Mahbje32.exe

        Filesize

        128KB

        MD5

        452dfba7a74c8b68df846a9614bae63a

        SHA1

        012db8dd4aa6c8d469d7b378206fa8a566f1b319

        SHA256

        62309c66cf793ea0d2023b9b1fa1d8b8f8b17cb8fed8f959437de631bccb6598

        SHA512

        6062b8e1f8cae5865a4002a83d1f2dc63594dd0c229dbda937d7b591f814bfb9fa8d8957d5d34110990dfb8bfec77362587cff0c3a93595c5e7e8a903eae6a2b

      • C:\Windows\SysWOW64\Mahbje32.exe

        Filesize

        128KB

        MD5

        0e16c049b8405c35970cd4c0ca167857

        SHA1

        9e89bb133dafc8421a9ba594e913601130ffeed3

        SHA256

        c69e72c6fcb5f4c2cc8cc3085911a202357afc18a26fbaacba73a89f72e295d7

        SHA512

        1aa39728ddf4ba0112944df4407d657246dd4b8f2af490f44e7bfa59e3d990c4ee834917dec30f5fc5ce908d937649ae61c35160335d3c69fe6f49fcef689a26

      • C:\Windows\SysWOW64\Majopeii.exe

        Filesize

        128KB

        MD5

        88da640f92052dfb8932924526930cfd

        SHA1

        21c71249bae8758ab5a58ff75b45bb7a0d7593c3

        SHA256

        d34bd143f8bf1a48214b52371c058d2bc19a5ad0ee841a6f568657d4209e8d57

        SHA512

        48917f7535ec0d6b4fe066dfe640b87545d5ceeb2086251887ddceeed05148cd4f6d7a95f7d5e40e816cc08d091914b926159a1aae59e078b062937e1b48a7ae

      • C:\Windows\SysWOW64\Mamleegg.exe

        Filesize

        128KB

        MD5

        e06e2fc2397a2ce56dc2fe326e3d1cde

        SHA1

        c3207d065a3dc7b791f1e468494fc5a1922d4333

        SHA256

        92f4f2b169ebdce00b5716f95f863dcc1685b7fe627e56e2a903c6a245424918

        SHA512

        b5cb466bc160e84fcbfc9ee1b8e4292c9270f218ad6db939c273ddadd1c23f2764bcbfab79a7915b4e7e0cc32f5e83a6147265b6a1353e33498ae6b779a32ce0

      • C:\Windows\SysWOW64\Mciobn32.exe

        Filesize

        128KB

        MD5

        b56e6e18eea89833aa3dffac439759c7

        SHA1

        e4ebb4ab2baca19c90fabcec62408b503a2c7fd3

        SHA256

        b9bd9f54a8daedd0113dd4f531a2b0a743e47cae405032b46bf876534880d662

        SHA512

        20ddc2625088ec2f29cd17e57ccbc9a13b3e010d1a3d82ee45d549b98e733853fd5ef12694fb1595979cc1b1d864761112b9e84ebee23fd9bb0a725d23e98423

      • C:\Windows\SysWOW64\Mgekbljc.exe

        Filesize

        128KB

        MD5

        c802eef07f08dee507592da658a4e140

        SHA1

        ff0860e62bdeccad67353f89cdf78ecf3fdf1796

        SHA256

        b6a5883c3fd98a5c7f6d165a39e26506b90f2fc0466976a13ef0342a2b0e4b78

        SHA512

        3d4419aeaa2484a1aed58637342c7465b00b73dc3e29eb2a37ec6a0bc22c06f99ca3e924ab1f14b0084b584162937a9a298cb36de05e29dafe1e3cf7279e9f10

      • C:\Windows\SysWOW64\Mgekbljc.exe

        Filesize

        104KB

        MD5

        b69a44d443a1d7d87fb72774e45c1301

        SHA1

        03a9d10bb33ada8d653584291edb1690fbde5c98

        SHA256

        1fe57129e30656ae850534e502a9bbfc812f354fca4385bc5c0176621aaa9305

        SHA512

        a80a305987178d68e5197a5d51f07afad144f29640afcf5b8070aa0ae105c119087ef70e307ccbd38110a49bcc49ef1c77946c23c8b9f6db129ae78668ea030a

      • C:\Windows\SysWOW64\Mgghhlhq.exe

        Filesize

        128KB

        MD5

        53f28bb5b660ce31a1a7a37e0b233718

        SHA1

        434d6d703a920cda5367c5296f5ca1a37f8d30fa

        SHA256

        340a31e357765d91960bf2c3762801589d97e1edad4c61d6f59d4fddf94aa2e3

        SHA512

        a7304ffcade24d3f6461fd57fc5089f5f177313d4d99e7c8e657d9b6ddd232922c7c1f0751027cfc85faeb5430639f0703ce762e51fcce441a8d7adfc05ae967

      • C:\Windows\SysWOW64\Mgnnhk32.exe

        Filesize

        128KB

        MD5

        66e5faeb584653c364a682f417a74a23

        SHA1

        934dc5a64674689f441f8a6d835b83fe8c3668db

        SHA256

        5d1d1d069dcdbd89e4fbbe0b0a80008e9205dd8ff7fd0f3870bf1c48e716df21

        SHA512

        96a10e318817dfee9c8ab6ddb37d8c3e4c8eb73798ad7fa60d511949a340ed2a0fb961a2c604d5147c4b4827996886b6fa3f243e33f50bf371215458f3fa67c6

      • C:\Windows\SysWOW64\Mjcgohig.exe

        Filesize

        128KB

        MD5

        3a99779cea15d4edeb5861cf27c603d0

        SHA1

        aeb3854fb3416b7aad97254d70dce4b1cd23b5d7

        SHA256

        3fccfa56330a9dad0bb4680cbf69f6015dc261afc6d1a02f4e04519889141cc2

        SHA512

        6a91cf7af0906310df0a9ebbf8ee6be0b1654cf95135ccd33fe165034ba7f1004060252c356cda1b49b59f447e1148daa4f6344d2053af16412d21cb7ecffc55

      • C:\Windows\SysWOW64\Mjeddggd.exe

        Filesize

        128KB

        MD5

        8652767c96724a78a43754fb7e2f67fd

        SHA1

        80e3d13402f4ac2845ac8269fcf8cf09ccd68ba4

        SHA256

        6981380f4457e214b3f9594e69941a7a37e78401fc756fbbe73fb671f26c1ad4

        SHA512

        5a484d38318777058aa882cb15c59071a3c8b8fcfa2d2f2000e1c49963124b803e56cd7272a5aa9d5e512fe59b7c9a120ae32e1d55356db4c1f863aa902a5d4d

      • C:\Windows\SysWOW64\Mpkbebbf.exe

        Filesize

        4KB

        MD5

        a814daf5b40060a3e3f54a86e20fe61d

        SHA1

        762fd3f7c360ae5f32eaf1d15e017fde5d2ea40a

        SHA256

        2c0feb08810d67703c1946deaef1c521f48a83e734c47610a5e1ff569ab0afeb

        SHA512

        9e363b73207829d951cc186d26ab1aeeb826f1b6246e14cf501400209fd30815435eddac238efd55ae21ca70ba101dc7f80018fa1733fff2d05637d1b9bba203

      • C:\Windows\SysWOW64\Mpkbebbf.exe

        Filesize

        128KB

        MD5

        086df7f3924fedee338be5822017fd97

        SHA1

        710b3eb8242a2a351957ed6b9f54cb4adfcdedc4

        SHA256

        dd2af028394450fe184da746c4b9a290000bd92d7361f37bab6baf488ca69702

        SHA512

        c564102f3792be64e4798aea83455be4267481fd6759e6790050e8d1301f499e0fb93891e92897756e7948eeb958d1bb1c28c6995679afcad0f06eb1abfe259a

      • C:\Windows\SysWOW64\Mpmokb32.exe

        Filesize

        128KB

        MD5

        c292d8181e30fcdba13556662b9ddfe9

        SHA1

        144e767f5e593f19e46a2afd2b7142b59dc277f8

        SHA256

        26a83eb5f425d91966086a468d3f29ffe058e39ec5fba209de59c18deac49adb

        SHA512

        e68f18c8beb267f9538bc9a5a79bf89ec7135a355c85017f1c1b53f4c1fbdde151aaec7ba894dfb998580c932371a78270cfb449ebb35f0ca6d6a883e06c0262

      • C:\Windows\SysWOW64\Ncgkcl32.exe

        Filesize

        128KB

        MD5

        5b89ea811631aa724b4e7bec458b2bb3

        SHA1

        d6453c355018677f5b3039b21bc1621a16a988de

        SHA256

        b633a63f7126c50720eb8e9b85dd6a63f6905d627064c8d6a582a79be113ebad

        SHA512

        80d77499f542267394446eb3c722b332d2e34f9678a09c5b0c6456cff642d259c6e96ee05c1ffc3775311119c1945cdd5f883e04a702ac905ab45575193659b0

      • C:\Windows\SysWOW64\Njogjfoj.exe

        Filesize

        128KB

        MD5

        a2f830444db80ccd9b55f75fdf9658f8

        SHA1

        48f6d8a1e62f665c4d21daf922c6716088b1a140

        SHA256

        4574fe5c102542c1c3c6c576b1548a85441d9bd35c6e426651ad18381e7d155d

        SHA512

        388b5347a487782d66648fae4cd34a942b3db54b016e1eed7ed8f053308acca1a1eb70dc80c7867953e302fa3a7c390a45e5e9116c7c9797c9157e9eb3ae0f86

      • C:\Windows\SysWOW64\Nkcmohbg.exe

        Filesize

        104KB

        MD5

        5ef8f85f7a44b1e66e81f3eb8aa500ee

        SHA1

        1cec8604146e6786df42ed8f300955cda8df763c

        SHA256

        87c826cc0bab7e2c7c6133a03c8176f67a44b3e48f55d9e773d705e1c925ba8f

        SHA512

        678b0d23ba3267eff71a8ebe2c70d5f34bcc68d3058be139aa23861eae2a3d3e84a835262a891403243a4f211b74dbf408d49e84837c7c0bdf2c095947f0a7d8

      • C:\Windows\SysWOW64\Nnmopdep.exe

        Filesize

        128KB

        MD5

        bc78c0cdb736f40ea8b39b45f7acbd67

        SHA1

        711a06ad78b0cf6cda423f0086479cf7fbebe284

        SHA256

        97e20d3ad4071bb3cfccbc8d0001220c3c849de78bb4bef61f1e6fa152ba41e9

        SHA512

        cffd0aa73fff14d866efd6587ff798a75e10ed72289ae7197a998535c9ad4d4c8aea4947acdea34edb51b0b6f4863ada4f66233dcf70fe8f74a5e6aad7a7e2be

      • C:\Windows\SysWOW64\Nnolfdcn.exe

        Filesize

        65KB

        MD5

        702c5eeca151863143b6aa65b35b934b

        SHA1

        6cee87f2edb6a93f562ab71a00ec97d975f5b075

        SHA256

        53b8865001d26b975cf37df05bae45772e9ce84c2308a054d030e6624036a9b6

        SHA512

        cd8f823690963cc88d95e0dc32e6d6743fbce6860ba490cb80edbe9b7fdc58b046ed6f58ddbd992c714b39ff810bb562e1938bca573a800e4af0bb2fa8249953

      • memory/620-40-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/620-124-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/736-151-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/736-65-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/832-258-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/832-170-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/836-62-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/892-196-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/892-283-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/948-284-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1056-315-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1056-241-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1132-169-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1132-80-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1184-90-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1184-178-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1556-228-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1656-117-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1656-205-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1684-250-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1684-322-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2196-259-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2212-290-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2212-206-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2280-297-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2288-49-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2288-133-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2336-195-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2336-108-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2424-135-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2424-227-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2520-159-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2520-72-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2852-25-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2852-106-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2912-309-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2984-102-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2984-186-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3056-281-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3216-33-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3216-116-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3248-5-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3248-0-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3304-219-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3504-307-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3668-188-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3668-276-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3704-17-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3704-98-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3888-237-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3916-291-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/3956-320-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/4448-161-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/4448-249-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/4528-88-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/4528-9-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/4668-156-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/4888-268-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/5024-143-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/5024-232-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/5052-214-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/5052-125-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/5112-266-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/5112-183-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB