Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 21:21

General

  • Target

    465a5f48e7f32d26991868ecc80f117057b4e6c50182d2ed859ddee1364aff9b.exe

  • Size

    896KB

  • MD5

    cdac72f72de9770889028785890cc53c

  • SHA1

    3d6a79560131d1705c720caf954fc1b39a858f78

  • SHA256

    465a5f48e7f32d26991868ecc80f117057b4e6c50182d2ed859ddee1364aff9b

  • SHA512

    801933f451ca792594c7398e4f7cd37f4b69182ec372fc0bf1617bac66c91350fd7c078ef2f383632091c6ea9e62fe72fafd55e7c378755660b6f8f6f9c89c28

  • SSDEEP

    6144:djOnby5CPXbo92ynnZMqKLDK2Q9zsyVH3imoQiRLsmAKWEnaW377a85n0R0tHII7:BOWFMusMH0QiRLsR4P377a20R01F50+5

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\465a5f48e7f32d26991868ecc80f117057b4e6c50182d2ed859ddee1364aff9b.exe
    "C:\Users\Admin\AppData\Local\Temp\465a5f48e7f32d26991868ecc80f117057b4e6c50182d2ed859ddee1364aff9b.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\Mfeeabda.exe
      C:\Windows\system32\Mfeeabda.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\Nggnadib.exe
        C:\Windows\system32\Nggnadib.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4268
        • C:\Windows\SysWOW64\Nfohgqlg.exe
          C:\Windows\system32\Nfohgqlg.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Windows\SysWOW64\Ngndaccj.exe
            C:\Windows\system32\Ngndaccj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1956
            • C:\Windows\SysWOW64\Ngqagcag.exe
              C:\Windows\system32\Ngqagcag.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:348
              • C:\Windows\SysWOW64\Onocomdo.exe
                C:\Windows\system32\Onocomdo.exe
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3652
                • C:\Windows\SysWOW64\Omdppiif.exe
                  C:\Windows\system32\Omdppiif.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4364
                  • C:\Windows\SysWOW64\Omgmeigd.exe
                    C:\Windows\system32\Omgmeigd.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3320
                    • C:\Windows\SysWOW64\Pdhkcb32.exe
                      C:\Windows\system32\Pdhkcb32.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1020
                      • C:\Windows\SysWOW64\Palklf32.exe
                        C:\Windows\system32\Palklf32.exe
                        11⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3992
                        • C:\Windows\SysWOW64\Pnplfj32.exe
                          C:\Windows\system32\Pnplfj32.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:4812
                          • C:\Windows\SysWOW64\Qfkqjmdg.exe
                            C:\Windows\system32\Qfkqjmdg.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2432
                            • C:\Windows\SysWOW64\Adfgdpmi.exe
                              C:\Windows\system32\Adfgdpmi.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:3576
                              • C:\Windows\SysWOW64\Akblfj32.exe
                                C:\Windows\system32\Akblfj32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:3228
                                • C:\Windows\SysWOW64\Ahfmpnql.exe
                                  C:\Windows\system32\Ahfmpnql.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:3836
                                  • C:\Windows\SysWOW64\Bhhiemoj.exe
                                    C:\Windows\system32\Bhhiemoj.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of WriteProcessMemory
                                    PID:1976
                                    • C:\Windows\SysWOW64\Bmeandma.exe
                                      C:\Windows\system32\Bmeandma.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:3620
                                      • C:\Windows\SysWOW64\Ckbemgcp.exe
                                        C:\Windows\system32\Ckbemgcp.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:4712
                                        • C:\Windows\SysWOW64\Cpbjkn32.exe
                                          C:\Windows\system32\Cpbjkn32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Suspicious use of WriteProcessMemory
                                          PID:2428
                                          • C:\Windows\SysWOW64\Chkobkod.exe
                                            C:\Windows\system32\Chkobkod.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:3984
                                            • C:\Windows\SysWOW64\Cklhcfle.exe
                                              C:\Windows\system32\Cklhcfle.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:1176
                                              • C:\Windows\SysWOW64\Ddgibkpc.exe
                                                C:\Windows\system32\Ddgibkpc.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:1252
                                                • C:\Windows\SysWOW64\Dakikoom.exe
                                                  C:\Windows\system32\Dakikoom.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:1512
                                                  • C:\Windows\SysWOW64\Enfckp32.exe
                                                    C:\Windows\system32\Enfckp32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:2484
                                                    • C:\Windows\SysWOW64\Ekajec32.exe
                                                      C:\Windows\system32\Ekajec32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:4600
                                                      • C:\Windows\SysWOW64\Fecadghc.exe
                                                        C:\Windows\system32\Fecadghc.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:5084
                                                        • C:\Windows\SysWOW64\Gnpphljo.exe
                                                          C:\Windows\system32\Gnpphljo.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          PID:3480
                                                          • C:\Windows\SysWOW64\Gnblnlhl.exe
                                                            C:\Windows\system32\Gnblnlhl.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:1880
                                                            • C:\Windows\SysWOW64\Glhimp32.exe
                                                              C:\Windows\system32\Glhimp32.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:2196
                                                              • C:\Windows\SysWOW64\Hlppno32.exe
                                                                C:\Windows\system32\Hlppno32.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:1164
                                                                • C:\Windows\SysWOW64\Hbldphde.exe
                                                                  C:\Windows\system32\Hbldphde.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:3812
                                                                  • C:\Windows\SysWOW64\Inebjihf.exe
                                                                    C:\Windows\system32\Inebjihf.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    PID:2220
                                                                    • C:\Windows\SysWOW64\Iafkld32.exe
                                                                      C:\Windows\system32\Iafkld32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:1708
                                                                      • C:\Windows\SysWOW64\Ilnlom32.exe
                                                                        C:\Windows\system32\Ilnlom32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:2304
                                                                        • C:\Windows\SysWOW64\Jhgiim32.exe
                                                                          C:\Windows\system32\Jhgiim32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:4700
                                                                          • C:\Windows\SysWOW64\Jifecp32.exe
                                                                            C:\Windows\system32\Jifecp32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:1616
                                                                            • C:\Windows\SysWOW64\Jaajhb32.exe
                                                                              C:\Windows\system32\Jaajhb32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:1548
                                                                              • C:\Windows\SysWOW64\Jpbjfjci.exe
                                                                                C:\Windows\system32\Jpbjfjci.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • Modifies registry class
                                                                                PID:4372
                                                                                • C:\Windows\SysWOW64\Jikoopij.exe
                                                                                  C:\Windows\system32\Jikoopij.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:3584
                                                                                  • C:\Windows\SysWOW64\Jllhpkfk.exe
                                                                                    C:\Windows\system32\Jllhpkfk.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:3436
                                                                                    • C:\Windows\SysWOW64\Jahqiaeb.exe
                                                                                      C:\Windows\system32\Jahqiaeb.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:4080
                                                                                      • C:\Windows\SysWOW64\Kakmna32.exe
                                                                                        C:\Windows\system32\Kakmna32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:4760
                                                                                        • C:\Windows\SysWOW64\Kcjjhdjb.exe
                                                                                          C:\Windows\system32\Kcjjhdjb.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:5092
                                                                                          • C:\Windows\SysWOW64\Klbnajqc.exe
                                                                                            C:\Windows\system32\Klbnajqc.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            PID:64
                                                                                            • C:\Windows\SysWOW64\Kapfiqoj.exe
                                                                                              C:\Windows\system32\Kapfiqoj.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              PID:3556
                                                                                              • C:\Windows\SysWOW64\Likhem32.exe
                                                                                                C:\Windows\system32\Likhem32.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:3488
                                                                                                • C:\Windows\SysWOW64\Lohqnd32.exe
                                                                                                  C:\Windows\system32\Lohqnd32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  PID:4784
                                                                                                  • C:\Windows\SysWOW64\Ljpaqmgb.exe
                                                                                                    C:\Windows\system32\Ljpaqmgb.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:1888
                                                                                                    • C:\Windows\SysWOW64\Mhldbh32.exe
                                                                                                      C:\Windows\system32\Mhldbh32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:2224
                                                                                                      • C:\Windows\SysWOW64\Mjnnbk32.exe
                                                                                                        C:\Windows\system32\Mjnnbk32.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:4048
                                                                                                        • C:\Windows\SysWOW64\Mqhfoebo.exe
                                                                                                          C:\Windows\system32\Mqhfoebo.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:3868
                                                                                                          • C:\Windows\SysWOW64\Nfgklkoc.exe
                                                                                                            C:\Windows\system32\Nfgklkoc.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:2916
                                                                                                            • C:\Windows\SysWOW64\Nckkfp32.exe
                                                                                                              C:\Windows\system32\Nckkfp32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:3332
                                                                                                              • C:\Windows\SysWOW64\Noblkqca.exe
                                                                                                                C:\Windows\system32\Noblkqca.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:1752
                                                                                                                • C:\Windows\SysWOW64\Obgohklm.exe
                                                                                                                  C:\Windows\system32\Obgohklm.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  PID:4928
                                                                                                                  • C:\Windows\SysWOW64\Ofegni32.exe
                                                                                                                    C:\Windows\system32\Ofegni32.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    PID:2760
                                                                                                                    • C:\Windows\SysWOW64\Oblhcj32.exe
                                                                                                                      C:\Windows\system32\Oblhcj32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:4672
                                                                                                                      • C:\Windows\SysWOW64\Omalpc32.exe
                                                                                                                        C:\Windows\system32\Omalpc32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:4472
                                                                                                                        • C:\Windows\SysWOW64\Ofjqihnn.exe
                                                                                                                          C:\Windows\system32\Ofjqihnn.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1696
                                                                                                                          • C:\Windows\SysWOW64\Obqanjdb.exe
                                                                                                                            C:\Windows\system32\Obqanjdb.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:3748
                                                                                                                            • C:\Windows\SysWOW64\Ppdbgncl.exe
                                                                                                                              C:\Windows\system32\Ppdbgncl.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4816
                                                                                                                              • C:\Windows\SysWOW64\Pimfpc32.exe
                                                                                                                                C:\Windows\system32\Pimfpc32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:4736
                                                                                                                                • C:\Windows\SysWOW64\Pcbkml32.exe
                                                                                                                                  C:\Windows\system32\Pcbkml32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  PID:3612
                                                                                                                                  • C:\Windows\SysWOW64\Ppikbm32.exe
                                                                                                                                    C:\Windows\system32\Ppikbm32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:2824
                                                                                                                                    • C:\Windows\SysWOW64\Pfccogfc.exe
                                                                                                                                      C:\Windows\system32\Pfccogfc.exe
                                                                                                                                      66⤵
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:3920
                                                                                                                                      • C:\Windows\SysWOW64\Paihlpfi.exe
                                                                                                                                        C:\Windows\system32\Paihlpfi.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:3244
                                                                                                                                        • C:\Windows\SysWOW64\Pfepdg32.exe
                                                                                                                                          C:\Windows\system32\Pfepdg32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4528
                                                                                                                                          • C:\Windows\SysWOW64\Pmphaaln.exe
                                                                                                                                            C:\Windows\system32\Pmphaaln.exe
                                                                                                                                            69⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:2756
                                                                                                                                            • C:\Windows\SysWOW64\Pciqnk32.exe
                                                                                                                                              C:\Windows\system32\Pciqnk32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:2660
                                                                                                                                              • C:\Windows\SysWOW64\Pififb32.exe
                                                                                                                                                C:\Windows\system32\Pififb32.exe
                                                                                                                                                71⤵
                                                                                                                                                  PID:1536
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 400
                                                                                                                                                    72⤵
                                                                                                                                                    • Program crash
                                                                                                                                                    PID:2300
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1536 -ip 1536
      1⤵
        PID:1136
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:6104

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Adfgdpmi.exe

          Filesize

          896KB

          MD5

          b6ca35fbc8ba96c4319ca8ae5630cfc7

          SHA1

          eaaf5ef3de2433585b3dbcfb01655effa0052bcc

          SHA256

          842eefe6bb7097192d75834c7dde7f16232d32734c4a190ec9ff127a7daf3747

          SHA512

          ace4fa56e9fdad2263f272b8bfaa4f408f99d064071f4be3f4bf9eff453e76f57bc323204631b031e618297aada5de5d16dad5a578409839cfb3868dcadca914

        • C:\Windows\SysWOW64\Adfgdpmi.exe

          Filesize

          896KB

          MD5

          f8809d99f1243edc5a776a0515b67b93

          SHA1

          06296ec47cc83536681d8b23518776d5df8027a4

          SHA256

          40e7b40dd083fa11617aad5c02da852792a6710795a2e899b776bfbf5db40867

          SHA512

          4dfa2190c3e23bf200f754c6a8d3046bacbda9c0b55c558706d2be18486981ff35eef77c6bbc4cff07bbcaebfc644003360907cf2e1a4920d40a0340c04a4a7d

        • C:\Windows\SysWOW64\Ahfmpnql.exe

          Filesize

          896KB

          MD5

          b9a7c0c79f0096f1f7ab811a238df0cc

          SHA1

          f15b62126853ce791e1b10ac9322ecb13bfdc333

          SHA256

          a139be7033dda9be5cba07890bb02b4b6ea70bd809362bae858cc81c85e1ac65

          SHA512

          92a45fded968d0db53bf638b3047df9b3fcf764b4c18a30c9cc2fa8f49f6b303a6c1a69e55816b30a1b800dd4878f1e566240a733390900d2f91d9d9db4b9193

        • C:\Windows\SysWOW64\Akblfj32.exe

          Filesize

          896KB

          MD5

          fd7570926bb627965c1ef503ed33ea71

          SHA1

          bb7905a4f155b36806d4ff8181bf8739a0299b3e

          SHA256

          ec5fc1269f73f47cc4a70b90474ba7891495aa92f77718e11cd1fb666dee2656

          SHA512

          79496d9f9e148577989a537c7e2ca9fcff9f50f56c63f08b980a6584b95fe9bffef32b3ce9fccd685e11578f1e102e7c7eac488620301aa59754cc5767c3c6c3

        • C:\Windows\SysWOW64\Bhhiemoj.exe

          Filesize

          896KB

          MD5

          b8eb5d10489145a9357444aa1046e2ed

          SHA1

          3fffbd7f418d934bcfcc5762ab905aaa9749444b

          SHA256

          f6a816cff71fb8393f330a9934a15bc0a4e212e53c77aea41982b091986a289f

          SHA512

          88b707dfbff0b43632d8ee480bd765bfadbf61dc81c16303effbc4d717b74725bcbcbe3ea3bd906b4bd464b83d9b40474b4a0d3f2e3fd2faaacc90e9a18b4010

        • C:\Windows\SysWOW64\Bmeandma.exe

          Filesize

          896KB

          MD5

          e411e90f3b71ae73ea65572b8d7a34a5

          SHA1

          175fd059c34dbcf168755672fee0a90f0e630be9

          SHA256

          5626f286abe3c58ea87b849f86d7ef92954d545e274412fe55070c011b57d2e8

          SHA512

          4574b59d5249bfcddd65ae65b4d818b18353ff6727f3b3fad8b107c5289b0f6a03e67e289403ab5895a5960989c27da74c351b105c8b667ae9de22c5a19ae281

        • C:\Windows\SysWOW64\Chkobkod.exe

          Filesize

          896KB

          MD5

          29e53af971068e8549d2c9941fa1127c

          SHA1

          ea616bfd5672f449c49e1014003a999674ae6b7f

          SHA256

          ed8676c2489ea38c61db6453a3a5821ca2c6fae9749ee1f992d09bac5773f85e

          SHA512

          b690284e8e95dbb15b20dad7cb095f2958c036a623cd42106729d2a06efc4f192e8a6929813f21c68ceb1627a729ee33c28e632853f4741b39a0321ce46adc6a

        • C:\Windows\SysWOW64\Ckbemgcp.exe

          Filesize

          896KB

          MD5

          291df90afaf02494f6a4dfefd53b9ef3

          SHA1

          875f698bb3165581d3cab53e77c2cc617dc4a7cb

          SHA256

          b99a72a350425748f3529441b7fe36b48b4ae124d303a0243c1448d6109622c9

          SHA512

          bd82314ce8821494f449f4b93b3fd8499645eb55718fe3361885138dc19f289b64ea02d5adb0083e4f989c4466a1fef97ca9feb8e78c5f73e8cce53be0a96ea5

        • C:\Windows\SysWOW64\Cklhcfle.exe

          Filesize

          896KB

          MD5

          883bacd2cac68d74287ed370130c7232

          SHA1

          2d830eb9dd83e245411627d72e887787274f1d49

          SHA256

          6f0c6c1bb76c988b55caa4643ec10650f8f578d905feab9860213b1b17acc060

          SHA512

          cbcae248519e314cf7de64e1f55aa1f386a7b2a8967105cbf4d9c879d073916c5741f3234ffc9466e783b49cb6418e78f98b14ac64358affa595b04f999b79b4

        • C:\Windows\SysWOW64\Cpbjkn32.exe

          Filesize

          896KB

          MD5

          075169286e344bca9e7c5a36b1a179cb

          SHA1

          465b68220bf8bb54ef9c9a8dcadb02a51600d8fc

          SHA256

          8f2fdf7cdb09beba86b60a5d5ec65d603aa3596ce6e58dfad57c8dff4b89dc68

          SHA512

          c075da4245aeb3483cf9c46e77e4cdd046438b0e393ebe337b9d9eaa63a73da9f6fe8f1447059aec07e9ad3afd7c13518e8f2e1ce6fdb56bba28c719762a34c3

        • C:\Windows\SysWOW64\Dakikoom.exe

          Filesize

          896KB

          MD5

          07735494eb99dd535699cba146c0fd60

          SHA1

          7783bf2c982816aa0efb47cce2500825b11dfc30

          SHA256

          af25ad46a288623edc0cd96d2e43fe223efff7bfd591cd8da0bfca2058c86bb1

          SHA512

          1f5d6430f297a20e96f8819a6cf44c04407684b589729d3d1e7b1307a174d5be10524f376b5ad175fe53396263052e4018c727a2f682e7b1bb9aa7cd44ae04fc

        • C:\Windows\SysWOW64\Ddgibkpc.exe

          Filesize

          896KB

          MD5

          408ef821eaf7a330cd75c7e9cc162603

          SHA1

          6e0774b98835358caca971e76db2b36f4d93b3be

          SHA256

          546fc256317d92a4f1ee82cc752e1cc79e2b1f80162348fce29b9b782afafa33

          SHA512

          e0c533e2eeb6ecf219daeee320211ad766b336f03111e5fabbedc66b89fa8aecd4913ef3f658f21662bee7d8795cfeac255a64c68a182a0a3d6d105c78e76d94

        • C:\Windows\SysWOW64\Ekajec32.exe

          Filesize

          896KB

          MD5

          16c3ec7fd79ddd0e1afb1538dbe53f9a

          SHA1

          fa63a798968875a965b14a5edc0bae72e96646cc

          SHA256

          f9f26606604593e70fe6ebee427a2f4b6e6b8d9f95bdd0a0d881da137a0da86d

          SHA512

          449b34c710aeeba0249b34a68c572a773aea81c067bc56f7a01424fa776141ca313aabf53490ae2f8e2203703a5cc4ebf1be2d54b76a5b640b3674ac01fe3d9f

        • C:\Windows\SysWOW64\Enfckp32.exe

          Filesize

          896KB

          MD5

          24b4e02ddd93b3d4cf8dab20fc77734d

          SHA1

          0641d49f35399cfe479eef2e6755f7c7ef98274e

          SHA256

          3117848172db629188a844e6dc2e4e663e2fe2a69bbca206a695a806ec68d587

          SHA512

          ba86a42a2ac015231621416f44ce11dab8edf19f457f77f0cce458cb55828b20ca27fca6548c6083da34a6d1e0964481c858e03547359a1244038e6b47b7ddf9

        • C:\Windows\SysWOW64\Fecadghc.exe

          Filesize

          896KB

          MD5

          c3f4ff55b733f4e1e55832d49734e3c3

          SHA1

          fb98764d6d58864e115c9b82ac280447e8eed8c1

          SHA256

          ccd0d44caf9f0f1b21c23b05713fce60fee471fc12fd81671adce49c6516412e

          SHA512

          9076f08e23e441a087e2eb0815ecca3b4d02368deff160e3764fbe54f22b7b88a92f9833efc4d23f4e9a542de481810eb9743abd29368c25ec8df2a5cad64c1e

        • C:\Windows\SysWOW64\Glhimp32.exe

          Filesize

          896KB

          MD5

          542ab7a1c8ee2184a0ef379368be19c7

          SHA1

          53f9a4f29902d4fdf047e036bbb14d10bb261211

          SHA256

          e3c845b57c916ef01ba3d807337fea1e554bdbc8deba9b52f075f8dbb50f734b

          SHA512

          96e25fa74f4979c62f732e5a2c0424f46e19ff10f845fdb4cf25b0dd43c5b42962b070e0e00933338151c47cf5da8a53947720bdb5c74bcc1bd4de6e62516a38

        • C:\Windows\SysWOW64\Gnblnlhl.exe

          Filesize

          896KB

          MD5

          becc9a3c36af42e65e5488b2793bcac5

          SHA1

          f8f3c93f05aef38d52c8e75c5d622c6486a7db6f

          SHA256

          c93b49d4e4b7af709874eebbed77e2ffac951e06928aeab903dcfd858dbd7ec6

          SHA512

          feccab6c21864578d4d193fae7fbbcbc0a53d430af92017f6a217c02f9671ce6e947d33758ef5d76426b6a5ad05b97ee98b52e17c3a2ad23b4cc54c164fcb7a3

        • C:\Windows\SysWOW64\Gnpphljo.exe

          Filesize

          896KB

          MD5

          5b87ffadc73217fb48d8b4ff78b92539

          SHA1

          6c8755e019d1099ed2f483df0e9111852283324b

          SHA256

          c2ae18fb9b12d8a443574967d606957367d5f1759d89774e5a388be49cba5a32

          SHA512

          d8abe2ebe89f358149847974ac9723775edde3e93707da254ae32f8c87eb3a5a9a72e56bc15e08ad42a3fa51150170add3b805f082f89233581120fd2ef37806

        • C:\Windows\SysWOW64\Hbldphde.exe

          Filesize

          896KB

          MD5

          02ef498270856c2fd170f172aaded2a4

          SHA1

          58e9ebc32a857698a9aff229aa1638c407c8193a

          SHA256

          d6ef7dd5d794c22044a568a1bee2516d2ca163f12293229b80c00cb43d2775b2

          SHA512

          8c6e45cabccf6cbc7f149c3f99a97c3526535fa0e3b58db4aaa15ddddb71b5e2a56e3109820e2091f3eeee59396e0ea3366a08a7c0f2f370e05fbf19d05f26f0

        • C:\Windows\SysWOW64\Hlppno32.exe

          Filesize

          896KB

          MD5

          0e7a7c6eb98501b83c2971130f2247dd

          SHA1

          3c8ad2b0efc0acc696895a0819240ded1ad68b07

          SHA256

          2f1fc6eed7530b5880f898c9f64662f81a9c42a10d33ef5aef36175dbc318a71

          SHA512

          d208e8b2e85e9626433b5bbfdd9768c2327e0d3a6f3c3682370bc37c740ceba51df069d00a42a435285250101595cb448975684404390118aec5e91c473a33fa

        • C:\Windows\SysWOW64\Inebjihf.exe

          Filesize

          896KB

          MD5

          40d1a91558a9838feadd9dffccb47330

          SHA1

          550646e84f6d5e6569475f047e7ca9afbb948bab

          SHA256

          4dab70700c811b029f6df265e35ce5f41e52372eb885d1c79dcd9352dd4a43eb

          SHA512

          769bfa26cb61fd0740f7470eeac71fc17c0ece6dc14bd16889f4bb1ae6fd67521e8147dd5546829a19e8eb85736408dcab9752b8cbaae5d8f164e32613c9ce4e

        • C:\Windows\SysWOW64\Jikoopij.exe

          Filesize

          896KB

          MD5

          f2a49a61142b9a1a1dc8706868c194ba

          SHA1

          7f744a3475ae550990e08f7ba54c1efc54a67543

          SHA256

          612875dd5721f53e9d35d33601736f226281e50589a9c598d94d4f9b7d86afcf

          SHA512

          4b8299476d52bc585e622b699051320d7f243a1013d8de10608fe02d8f81c4c3f5e3aed56363028ffea18a0d4ae2a47add550ff471c804be0a2f28d418c58363

        • C:\Windows\SysWOW64\Kcjjhdjb.exe

          Filesize

          896KB

          MD5

          4ddf80aea1030111d49382efb1b5ad94

          SHA1

          e22863b755e599dfac691f06a9fe5357b68b3e8f

          SHA256

          2dcfcad737a974a6e83a62822dd9ce11da1cc25abe4fd92d4a2b675ea6a9fde1

          SHA512

          fb2f2bd0fb833d6063c0762f09b7c50c09b779cb55e3dd90b63c4306ab2f5c84e1f681c1f8f107966c7d553ae7b7a699604b3d1930d4ad3856feedff22bf4578

        • C:\Windows\SysWOW64\Klbnajqc.exe

          Filesize

          896KB

          MD5

          0888dbc5b54489545d9d4b11b6f5ade7

          SHA1

          c688be9ea744d922f3eca84ff9f5a86832d68482

          SHA256

          a6a443fd5512aae516c8f8dacd53556f141d8797a70859ae98e418faf97e786e

          SHA512

          9fe441dd8607144e99a643db2bcf7cc060695fa635a427a429f94a0ed5cc11bc075e4557131eb1a24280b421f1a2a825223af0ddd8b2487cad2dc214df6de23b

        • C:\Windows\SysWOW64\Lohqnd32.exe

          Filesize

          896KB

          MD5

          cb7b0cb28c3766414a34e1cc46c72f6a

          SHA1

          bac1a8e0b6b935a2c9b254855d6277473b61db2f

          SHA256

          0e47e7d63202aeb23420c7eacc16c7b728ad0bbde6c20da34ea50dff0985b642

          SHA512

          4444bf714dbf2cec316c80c07720d4a86ad3902f5b5ffac8f6aecab53a2dd8872433ae5f16d8aa15cc679129d093824163358d6c8855bc6a54fbd86d5860580d

        • C:\Windows\SysWOW64\Mfeeabda.exe

          Filesize

          896KB

          MD5

          a27a1f4d8b7b32d0ab0ede63d927c33d

          SHA1

          e56c2a8ffcab893494478f7654f7b45c61d25d5c

          SHA256

          01ea26f2e0d597686d07d15dcffb68b9ad99182e61b3b7826612dda34e4402df

          SHA512

          a88c3bf81dec1ded5d52accd75112462e39750a50fcf5075048ca5544b9fc476473f45e08348a3c30eb5dfc967567e82d4cccf25f1a3f5af2fb8171cb0ad9917

        • C:\Windows\SysWOW64\Mqhfoebo.exe

          Filesize

          896KB

          MD5

          730233ff3bd78c83c32714dacf0f4080

          SHA1

          a75ef6990a5299b46dd2d1a1671ed518e8db1330

          SHA256

          d7e5ff423bb2edb573594be87c0a71415d9ff9e1fe734f19d7f6276ce0b246aa

          SHA512

          a3112ebb78d102f4c8f40e5698a7915e97826323394bfc01225e7ee78c8cb767032e9b069378c977d27f9afc843e25a52deaacb4a67992781e334516c2f57396

        • C:\Windows\SysWOW64\Nckkfp32.exe

          Filesize

          896KB

          MD5

          6c9439ff9414620327ac5ec7a55b5a75

          SHA1

          c653607e14f728010b9069fb12fb4f7ea73f4fce

          SHA256

          54b35cbea3343d7e95377c250160c02fe7b0b4429bd75a85c0a735436dece02e

          SHA512

          1241b34efe341ab865b3a9396106687f1acab1a63d79a210c035152b5aac73bc79063efcf19a165c6a5ee8579f349b85c2dae590f24f0557b4d1664b4cdf7b3e

        • C:\Windows\SysWOW64\Nfohgqlg.exe

          Filesize

          896KB

          MD5

          c2e37dcb122d5055ad05fa0007ba07d7

          SHA1

          d8113b9422c3d4ec5b516a1b0ceaa59162051f71

          SHA256

          22934f4dd0afa27b05ca7e4ab559317c86df11e542390b9ac47661272255014d

          SHA512

          fe637ae5a98e6d93641167d1681852f750a2ae221c159ea72a7f5782e5049cb2c33c5c3981d30321c486946d7eb37fade336ed1461d5673ff28f37bedaaaf170

        • C:\Windows\SysWOW64\Nggnadib.exe

          Filesize

          896KB

          MD5

          912b5ed7fa84442ee0cd3c69e0403793

          SHA1

          c3b41a54aaba7df322ae34bc5f65e0a65898a101

          SHA256

          1724b64aa856381b57849902ca8a0af9fa9fc964e970b40eb61186f2f755db99

          SHA512

          dd49efb2a6fc66f394a15fc6effc70f4328e285f82c1af9d1bc9ab5f62ccbc3e9f784f7b650500134bff104aceb846ad5379d06a275af0733cb01febdd5f089e

        • C:\Windows\SysWOW64\Ngndaccj.exe

          Filesize

          896KB

          MD5

          854abb3f1d5e804a2f4ff4021f59d6f4

          SHA1

          99dff056ac9996f2986c87211344048b729de5aa

          SHA256

          c762da7239e274979fcc5a189ad80bd360ade1f44793ccb2938fd780e841cc9f

          SHA512

          51baf773b95d2ba31cd1ad4c63ce7a6f06de8820feb63414fac89346ae42c917bf91e60b5522d3ac595f0559e116047adf4a3bc04bedad7f0b4bee91b124dfad

        • C:\Windows\SysWOW64\Ngqagcag.exe

          Filesize

          896KB

          MD5

          46a182e4057dac951072484b828e2bd1

          SHA1

          ead6f3877396be82f58fe3f91052992ea904dc82

          SHA256

          9198e2ef919ec9966dd46a5fc69898659fe32a48c7162d91a01b4ef751a0974b

          SHA512

          b4f251c127196fae2f6fd802c9ed06e5707c9ef47b1423a1848b1551871e9da30e133d89d3b5390384a4badbd21350eba83d3abef84f0a6b44ca2d68b4f43da4

        • C:\Windows\SysWOW64\Omdppiif.exe

          Filesize

          896KB

          MD5

          2a138f166ecfeadfb39c58bcdfb93179

          SHA1

          e3f1ad639939264b66b033d30def1e3a12e41d3b

          SHA256

          29f1b8987ec91bcd694ee1712506302141d216eaa5178904593fb6c73de19036

          SHA512

          53602879adf99e416f723476f04c1adf86d403b7de4f43a8243876a8e6308c19fadc07d6bfe2befae48937f3b61635df8b07bb61531b876465ee1aadd523ec0c

        • C:\Windows\SysWOW64\Omgmeigd.exe

          Filesize

          896KB

          MD5

          3575961c051c7d7ca220d52510a83fa6

          SHA1

          0a6bbac9fc810f7ef20202d1e81271edd36270ac

          SHA256

          ee29c065c807faa1767071edd60765e2306dd16dacb8fd95504c876374bcf04a

          SHA512

          52fdba2a0806f69c91660edff72ca907e53ad0b82505e099a691d9fd5359a0cd7a6dbbb14fdcdb78a46b86fa65d37da28dadcfe6c142dc377314945a32b0bbe3

        • C:\Windows\SysWOW64\Onocomdo.exe

          Filesize

          896KB

          MD5

          0ff16f9ce16977c0f57bb86989e25c29

          SHA1

          75b170881ea9fcb7b271fc235021ac880e495a5c

          SHA256

          e410a84fa73c1fcb638b7a478a3e8f6694b8916ff2e54cb0fcd898b8e70557fc

          SHA512

          1bc6a0f642c06adba22469cc47ed87d0198480d1c4e988d89d0f7f648ff170dfcca77944f3c8d99f1ba5515e5edc93cc8f584816a60a3e285fe30855155acd98

        • C:\Windows\SysWOW64\Palklf32.exe

          Filesize

          896KB

          MD5

          2cb4f0628e66c70643d5173cfeaa31e9

          SHA1

          518ae680c5007f6f35a3768dbc791cc7d7d951b3

          SHA256

          f1fcdde4704995987f8a7fd3fd472f4dc995464c9fb87c639ba1a13b57a88329

          SHA512

          65d5e0ae259c41eee61a2478f40af247098de14ca5effaf8eb4d963870ed7060bb6eaa2828e49913105b5555bca045dc4d675ee386bc33fb97bafee13249de6b

        • C:\Windows\SysWOW64\Pciqnk32.exe

          Filesize

          896KB

          MD5

          7a9dc7974e5e0a7c66cbf597b8fa1338

          SHA1

          253aa38395f74def4291467b6c792ddd10aa0a7b

          SHA256

          5cc73c036fb2cc102f7e888263c2c8e11fe503deb1f9897b169b21ea9e3a233f

          SHA512

          da876bd836995e386d7ee4236d57c47c8aa0cd480f7b17f21a40f0a6c2063c15f7bd710517c9f77f244faca50970416ce35979bdcd99817a173779de815f7aaa

        • C:\Windows\SysWOW64\Pdhkcb32.exe

          Filesize

          896KB

          MD5

          fe8e743807e6608e401cbce981ff26e3

          SHA1

          45cdc6597612131bc43826dc34ff85f6ddbd7d92

          SHA256

          4c6ee11b6c6e7a3036839d1687a4b7cdecbf8a151d2ccb24813d6a9c2b2cea98

          SHA512

          301868db4ab5b45bebcab85173239b1146d7d17df1ac71631611831892a38875324fb1329e66d1311341a7e7cc5fa59a924a37049f08ce9d0f3dc58d01c49667

        • C:\Windows\SysWOW64\Pfccogfc.exe

          Filesize

          896KB

          MD5

          7fee2d494aa6d5dd411d8ea9a3c9b32d

          SHA1

          5234eb1f49bc7a79e537053a9cc9ad9b8e5f3608

          SHA256

          cd5339c72e77ee0735ed298506ea89da7e4f5190ecb0d46d5d26704523ceebee

          SHA512

          74ad3eabd9c4a51dc52824dcea44d6cb252beb98ca69c5646e9fe29beaf5578d94740cb2b5b1cb12b3e601c8f67a1de0d633739c9743461bf5d4d5bc1ad3099a

        • C:\Windows\SysWOW64\Pimfpc32.exe

          Filesize

          896KB

          MD5

          234f5b75b6b0a639998399f570f2c5e8

          SHA1

          340086bbb40d9fa76c3d83420a906ce998d63253

          SHA256

          a9e0be38248eab4f481ca42800643f0087828a0dff0d46bae186308ff59361b2

          SHA512

          3934490be2b8b2f05f55378476de9b5d92028c64637176725a80b6d9bcd45dfb5394a353116bfc232bb07e2e638bdf3d5fc4db42260d4ff3921bfb5522c68c25

        • C:\Windows\SysWOW64\Pnplfj32.exe

          Filesize

          896KB

          MD5

          408ad59ee616e74b68b7f6f2d86786a7

          SHA1

          2b5c6c1addc5138c12354626413ed3e9a9f4fda9

          SHA256

          8c405e6fc9285f627e59f2e9f4821d5c31c89da44bd5af6f62b9d04b2d8462d5

          SHA512

          e569678fdf990e34c72bea20a15a7233e0ae2d5313df05f5085772a9a57cc07cb4f8c4ce70f1fc68ae1db8763650870288551df37942c9cb9d3c8826b3a7b670

        • memory/64-331-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/348-41-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/348-401-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1020-73-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1020-470-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1164-517-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1164-242-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1176-508-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1176-169-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1252-509-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1252-178-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1512-186-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1512-510-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1536-519-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1548-288-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1616-282-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1696-428-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1696-530-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1708-264-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1752-395-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1752-538-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1880-515-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1880-226-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1888-547-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1888-355-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1944-0-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1944-1-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1944-81-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1956-32-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1956-394-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1976-503-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1976-129-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2196-516-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2196-234-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2220-258-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2224-546-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2224-361-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2304-270-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2428-506-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2428-154-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2432-98-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2432-498-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2484-194-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2484-511-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2600-393-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2600-24-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2660-520-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2756-521-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2760-535-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2760-408-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2824-525-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2916-380-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2916-542-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3048-373-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3048-8-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3228-501-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3228-114-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3244-523-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3320-65-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3320-434-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3332-391-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3436-307-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3480-514-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3480-218-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3488-343-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3488-549-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3556-337-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3556-550-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3576-105-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3576-500-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3584-301-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3612-526-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3620-137-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3620-504-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3652-48-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3652-414-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3748-529-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3748-435-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3812-249-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3812-518-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3836-502-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3836-121-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3868-543-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3868-374-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3920-524-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3984-507-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3984-161-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3992-86-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4048-367-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4048-545-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4080-317-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4268-386-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4268-16-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4364-426-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4364-57-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4372-294-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4472-425-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4600-512-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4600-201-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4672-419-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4672-533-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4700-276-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4712-145-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4712-505-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4736-527-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4760-319-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4784-349-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4784-548-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4812-491-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4812-89-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4816-528-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4816-441-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4928-537-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4928-402-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/5084-209-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/5084-513-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/5092-325-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB