Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 04:40

General

  • Target

    f11d1aa09a29121a85155b5bc9143e319e6790ab6c0d959937f6e69119b08073.exe

  • Size

    163KB

  • MD5

    d6891b608c4716c31359175499c61cce

  • SHA1

    a1041a621b7d6aff7bfcf4e63276d563b9a7bfa1

  • SHA256

    f11d1aa09a29121a85155b5bc9143e319e6790ab6c0d959937f6e69119b08073

  • SHA512

    e4e15760bcaa5dd74eeb41f42337efb6eefee668ab55bada883adc0d937dadd2ec939a446759605e665928616aa6216ac806bf45a1da1491c1bcf3c9cdefea16

  • SSDEEP

    1536:Pj8I75xda5BIYhQkILf2ECUZQ0ILlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:LxfZeaD2V7LltOrWKDBr+yJb

Malware Config

Extracted

Family

gozi

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Detects executables built or packed with MPress PE compressor 47 IoCs
  • UPX dump on OEP (original entry point) 51 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f11d1aa09a29121a85155b5bc9143e319e6790ab6c0d959937f6e69119b08073.exe
    "C:\Users\Admin\AppData\Local\Temp\f11d1aa09a29121a85155b5bc9143e319e6790ab6c0d959937f6e69119b08073.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\SysWOW64\Ljeafb32.exe
      C:\Windows\system32\Ljeafb32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Windows\SysWOW64\Mqdcnl32.exe
        C:\Windows\system32\Mqdcnl32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4164
        • C:\Windows\SysWOW64\Mcelpggq.exe
          C:\Windows\system32\Mcelpggq.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:724
          • C:\Windows\SysWOW64\Mokmdh32.exe
            C:\Windows\system32\Mokmdh32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2112
            • C:\Windows\SysWOW64\Mjcngpjh.exe
              C:\Windows\system32\Mjcngpjh.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4692
              • C:\Windows\SysWOW64\Npbceggm.exe
                C:\Windows\system32\Npbceggm.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3576
                • C:\Windows\SysWOW64\Nfohgqlg.exe
                  C:\Windows\system32\Nfohgqlg.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2304
                  • C:\Windows\SysWOW64\Ngndaccj.exe
                    C:\Windows\system32\Ngndaccj.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:2088
                    • C:\Windows\SysWOW64\Oplfkeob.exe
                      C:\Windows\system32\Oplfkeob.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:740
                      • C:\Windows\SysWOW64\Oakbehfe.exe
                        C:\Windows\system32\Oakbehfe.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:3844
                        • C:\Windows\SysWOW64\Ombcji32.exe
                          C:\Windows\system32\Ombcji32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4924
                          • C:\Windows\SysWOW64\Onapdl32.exe
                            C:\Windows\system32\Onapdl32.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1008
                            • C:\Windows\SysWOW64\Ocaebc32.exe
                              C:\Windows\system32\Ocaebc32.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:2992
                              • C:\Windows\SysWOW64\Ppgegd32.exe
                                C:\Windows\system32\Ppgegd32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2152
                                • C:\Windows\SysWOW64\Pdenmbkk.exe
                                  C:\Windows\system32\Pdenmbkk.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4948
                                  • C:\Windows\SysWOW64\Phfcipoo.exe
                                    C:\Windows\system32\Phfcipoo.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:4644
                                    • C:\Windows\SysWOW64\Qhhpop32.exe
                                      C:\Windows\system32\Qhhpop32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:2280
                                      • C:\Windows\SysWOW64\Qodeajbg.exe
                                        C:\Windows\system32\Qodeajbg.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:2620
                                        • C:\Windows\SysWOW64\Afpjel32.exe
                                          C:\Windows\system32\Afpjel32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:624
                                          • C:\Windows\SysWOW64\Aaenbd32.exe
                                            C:\Windows\system32\Aaenbd32.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:1520
                                            • C:\Windows\SysWOW64\Ahaceo32.exe
                                              C:\Windows\system32\Ahaceo32.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:3084
                                              • C:\Windows\SysWOW64\Aajhndkb.exe
                                                C:\Windows\system32\Aajhndkb.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:3484
                                                • C:\Windows\SysWOW64\Apodoq32.exe
                                                  C:\Windows\system32\Apodoq32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:4424
                                                  • C:\Windows\SysWOW64\Aopemh32.exe
                                                    C:\Windows\system32\Aopemh32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:4488
                                                    • C:\Windows\SysWOW64\Bphgeo32.exe
                                                      C:\Windows\system32\Bphgeo32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:4712
                                                      • C:\Windows\SysWOW64\Cnaaib32.exe
                                                        C:\Windows\system32\Cnaaib32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        PID:4788
                                                        • C:\Windows\SysWOW64\Dpiplm32.exe
                                                          C:\Windows\system32\Dpiplm32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:4472
                                                          • C:\Windows\SysWOW64\Dahmfpap.exe
                                                            C:\Windows\system32\Dahmfpap.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:4524
                                                            • C:\Windows\SysWOW64\Dndgfpbo.exe
                                                              C:\Windows\system32\Dndgfpbo.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:4660
                                                              • C:\Windows\SysWOW64\Egaejeej.exe
                                                                C:\Windows\system32\Egaejeej.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                PID:4884
                                                                • C:\Windows\SysWOW64\Fdlkdhnk.exe
                                                                  C:\Windows\system32\Fdlkdhnk.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:3596
                                                                  • C:\Windows\SysWOW64\Fniihmpf.exe
                                                                    C:\Windows\system32\Fniihmpf.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    PID:1432
                                                                    • C:\Windows\SysWOW64\Gihpkd32.exe
                                                                      C:\Windows\system32\Gihpkd32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4544
                                                                      • C:\Windows\SysWOW64\Gpaihooo.exe
                                                                        C:\Windows\system32\Gpaihooo.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:4088
                                                                        • C:\Windows\SysWOW64\Hahokfag.exe
                                                                          C:\Windows\system32\Hahokfag.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          PID:636
                                                                          • C:\Windows\SysWOW64\Hnbeeiji.exe
                                                                            C:\Windows\system32\Hnbeeiji.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:3700
                                                                            • C:\Windows\SysWOW64\Iafkld32.exe
                                                                              C:\Windows\system32\Iafkld32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:964
                                                                              • C:\Windows\SysWOW64\Ilnlom32.exe
                                                                                C:\Windows\system32\Ilnlom32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:2808
                                                                                • C:\Windows\SysWOW64\Iamamcop.exe
                                                                                  C:\Windows\system32\Iamamcop.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:732
                                                                                  • C:\Windows\SysWOW64\Jpbjfjci.exe
                                                                                    C:\Windows\system32\Jpbjfjci.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    PID:872
                                                                                    • C:\Windows\SysWOW64\Jpegkj32.exe
                                                                                      C:\Windows\system32\Jpegkj32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      PID:4588
                                                                                      • C:\Windows\SysWOW64\Koonge32.exe
                                                                                        C:\Windows\system32\Koonge32.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:3580
                                                                                        • C:\Windows\SysWOW64\Lcfidb32.exe
                                                                                          C:\Windows\system32\Lcfidb32.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:2756
                                                                                          • C:\Windows\SysWOW64\Lhgkgijg.exe
                                                                                            C:\Windows\system32\Lhgkgijg.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:4440
                                                                                            • C:\Windows\SysWOW64\Mjidgkog.exe
                                                                                              C:\Windows\system32\Mjidgkog.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:4508
                                                                                              • C:\Windows\SysWOW64\Mjlalkmd.exe
                                                                                                C:\Windows\system32\Mjlalkmd.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Modifies registry class
                                                                                                PID:824
                                                                                                • C:\Windows\SysWOW64\Nfgklkoc.exe
                                                                                                  C:\Windows\system32\Nfgklkoc.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  PID:3020
                                                                                                  • C:\Windows\SysWOW64\Nfqnbjfi.exe
                                                                                                    C:\Windows\system32\Nfqnbjfi.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:4984
                                                                                                    • C:\Windows\SysWOW64\Oqhoeb32.exe
                                                                                                      C:\Windows\system32\Oqhoeb32.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:2712
                                                                                                      • C:\Windows\SysWOW64\Omopjcjp.exe
                                                                                                        C:\Windows\system32\Omopjcjp.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:4388
                                                                                                        • C:\Windows\SysWOW64\Ocihgnam.exe
                                                                                                          C:\Windows\system32\Ocihgnam.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:2140
                                                                                                          • C:\Windows\SysWOW64\Oihmedma.exe
                                                                                                            C:\Windows\system32\Oihmedma.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:928
                                                                                                            • C:\Windows\SysWOW64\Pfagighf.exe
                                                                                                              C:\Windows\system32\Pfagighf.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:4120
                                                                                                              • C:\Windows\SysWOW64\Pciqnk32.exe
                                                                                                                C:\Windows\system32\Pciqnk32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:4892
                                                                                                                • C:\Windows\SysWOW64\Qjhbfd32.exe
                                                                                                                  C:\Windows\system32\Qjhbfd32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:100
                                                                                                                  • C:\Windows\SysWOW64\Ajmladbl.exe
                                                                                                                    C:\Windows\system32\Ajmladbl.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:1792
                                                                                                                    • C:\Windows\SysWOW64\Adgmoigj.exe
                                                                                                                      C:\Windows\system32\Adgmoigj.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies registry class
                                                                                                                      PID:3480
                                                                                                                      • C:\Windows\SysWOW64\Bmggingc.exe
                                                                                                                        C:\Windows\system32\Bmggingc.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:2212
                                                                                                                        • C:\Windows\SysWOW64\Bfolacnc.exe
                                                                                                                          C:\Windows\system32\Bfolacnc.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:768
                                                                                                                          • C:\Windows\SysWOW64\Bbfmgd32.exe
                                                                                                                            C:\Windows\system32\Bbfmgd32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:1932
                                                                                                                            • C:\Windows\SysWOW64\Bagmdllg.exe
                                                                                                                              C:\Windows\system32\Bagmdllg.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4272
                                                                                                                              • C:\Windows\SysWOW64\Ckpamabg.exe
                                                                                                                                C:\Windows\system32\Ckpamabg.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:456
                                                                                                                                • C:\Windows\SysWOW64\Cpljehpo.exe
                                                                                                                                  C:\Windows\system32\Cpljehpo.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:3764
                                                                                                                                  • C:\Windows\SysWOW64\Ccmcgcmp.exe
                                                                                                                                    C:\Windows\system32\Ccmcgcmp.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:672
                                                                                                                                    • C:\Windows\SysWOW64\Cigkdmel.exe
                                                                                                                                      C:\Windows\system32\Cigkdmel.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:2548
                                                                                                                                      • C:\Windows\SysWOW64\Cildom32.exe
                                                                                                                                        C:\Windows\system32\Cildom32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:2276
                                                                                                                                        • C:\Windows\SysWOW64\Dcibca32.exe
                                                                                                                                          C:\Windows\system32\Dcibca32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:3972
                                                                                                                                          • C:\Windows\SysWOW64\Dnqcfjae.exe
                                                                                                                                            C:\Windows\system32\Dnqcfjae.exe
                                                                                                                                            69⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:1144
                                                                                                                                            • C:\Windows\SysWOW64\Ejlnfjbd.exe
                                                                                                                                              C:\Windows\system32\Ejlnfjbd.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:1552
                                                                                                                                              • C:\Windows\SysWOW64\Ejagaj32.exe
                                                                                                                                                C:\Windows\system32\Ejagaj32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:4548
                                                                                                                                                • C:\Windows\SysWOW64\Fggdpnkf.exe
                                                                                                                                                  C:\Windows\system32\Fggdpnkf.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  PID:4560
                                                                                                                                                  • C:\Windows\SysWOW64\Fcekfnkb.exe
                                                                                                                                                    C:\Windows\system32\Fcekfnkb.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:4064
                                                                                                                                                    • C:\Windows\SysWOW64\Gjcmngnj.exe
                                                                                                                                                      C:\Windows\system32\Gjcmngnj.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      PID:4404
                                                                                                                                                      • C:\Windows\SysWOW64\Gdiakp32.exe
                                                                                                                                                        C:\Windows\system32\Gdiakp32.exe
                                                                                                                                                        75⤵
                                                                                                                                                          PID:1860
                                                                                                                                                          • C:\Windows\SysWOW64\Gbbkocid.exe
                                                                                                                                                            C:\Windows\system32\Gbbkocid.exe
                                                                                                                                                            76⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:324
                                                                                                                                                            • C:\Windows\SysWOW64\Hebcao32.exe
                                                                                                                                                              C:\Windows\system32\Hebcao32.exe
                                                                                                                                                              77⤵
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:3204
                                                                                                                                                              • C:\Windows\SysWOW64\Hbknebqi.exe
                                                                                                                                                                C:\Windows\system32\Hbknebqi.exe
                                                                                                                                                                78⤵
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:1152
                                                                                                                                                                • C:\Windows\SysWOW64\Hkcbnh32.exe
                                                                                                                                                                  C:\Windows\system32\Hkcbnh32.exe
                                                                                                                                                                  79⤵
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:3280
                                                                                                                                                                  • C:\Windows\SysWOW64\Iaedanal.exe
                                                                                                                                                                    C:\Windows\system32\Iaedanal.exe
                                                                                                                                                                    80⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    PID:908
                                                                                                                                                                    • C:\Windows\SysWOW64\Jhfbog32.exe
                                                                                                                                                                      C:\Windows\system32\Jhfbog32.exe
                                                                                                                                                                      81⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:2288
                                                                                                                                                                      • C:\Windows\SysWOW64\Jblflp32.exe
                                                                                                                                                                        C:\Windows\system32\Jblflp32.exe
                                                                                                                                                                        82⤵
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        PID:1732
                                                                                                                                                                        • C:\Windows\SysWOW64\Jnedgq32.exe
                                                                                                                                                                          C:\Windows\system32\Jnedgq32.exe
                                                                                                                                                                          83⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:4156
                                                                                                                                                                          • C:\Windows\SysWOW64\Jhoeef32.exe
                                                                                                                                                                            C:\Windows\system32\Jhoeef32.exe
                                                                                                                                                                            84⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            PID:2260
                                                                                                                                                                            • C:\Windows\SysWOW64\Kahinkaf.exe
                                                                                                                                                                              C:\Windows\system32\Kahinkaf.exe
                                                                                                                                                                              85⤵
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              PID:3248
                                                                                                                                                                              • C:\Windows\SysWOW64\Klmnkdal.exe
                                                                                                                                                                                C:\Windows\system32\Klmnkdal.exe
                                                                                                                                                                                86⤵
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:4608
                                                                                                                                                                                • C:\Windows\SysWOW64\Kefbdjgm.exe
                                                                                                                                                                                  C:\Windows\system32\Kefbdjgm.exe
                                                                                                                                                                                  87⤵
                                                                                                                                                                                    PID:2120
                                                                                                                                                                                    • C:\Windows\SysWOW64\Klpjad32.exe
                                                                                                                                                                                      C:\Windows\system32\Klpjad32.exe
                                                                                                                                                                                      88⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:912
                                                                                                                                                                                      • C:\Windows\SysWOW64\Kejloi32.exe
                                                                                                                                                                                        C:\Windows\system32\Kejloi32.exe
                                                                                                                                                                                        89⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        PID:5144
                                                                                                                                                                                        • C:\Windows\SysWOW64\Kbnlim32.exe
                                                                                                                                                                                          C:\Windows\system32\Kbnlim32.exe
                                                                                                                                                                                          90⤵
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:5188
                                                                                                                                                                                          • C:\Windows\SysWOW64\Khkdad32.exe
                                                                                                                                                                                            C:\Windows\system32\Khkdad32.exe
                                                                                                                                                                                            91⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5228
                                                                                                                                                                                            • C:\Windows\SysWOW64\Leoejh32.exe
                                                                                                                                                                                              C:\Windows\system32\Leoejh32.exe
                                                                                                                                                                                              92⤵
                                                                                                                                                                                                PID:5272
                                                                                                                                                                                                • C:\Windows\SysWOW64\Lbcedmnl.exe
                                                                                                                                                                                                  C:\Windows\system32\Lbcedmnl.exe
                                                                                                                                                                                                  93⤵
                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:5316
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Mkepineo.exe
                                                                                                                                                                                                    C:\Windows\system32\Mkepineo.exe
                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:5360
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Mekdffee.exe
                                                                                                                                                                                                      C:\Windows\system32\Mekdffee.exe
                                                                                                                                                                                                      95⤵
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:5400
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Mkgmoncl.exe
                                                                                                                                                                                                        C:\Windows\system32\Mkgmoncl.exe
                                                                                                                                                                                                        96⤵
                                                                                                                                                                                                          PID:5444
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Mkocol32.exe
                                                                                                                                                                                                            C:\Windows\system32\Mkocol32.exe
                                                                                                                                                                                                            97⤵
                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                            PID:5492
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Nhbciqln.exe
                                                                                                                                                                                                              C:\Windows\system32\Nhbciqln.exe
                                                                                                                                                                                                              98⤵
                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                              PID:5540
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Ndidna32.exe
                                                                                                                                                                                                                C:\Windows\system32\Ndidna32.exe
                                                                                                                                                                                                                99⤵
                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                PID:5596
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Nhgmcp32.exe
                                                                                                                                                                                                                  C:\Windows\system32\Nhgmcp32.exe
                                                                                                                                                                                                                  100⤵
                                                                                                                                                                                                                    PID:5636
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Napameoi.exe
                                                                                                                                                                                                                      C:\Windows\system32\Napameoi.exe
                                                                                                                                                                                                                      101⤵
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      PID:5680
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Nkhfek32.exe
                                                                                                                                                                                                                        C:\Windows\system32\Nkhfek32.exe
                                                                                                                                                                                                                        102⤵
                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                        PID:5732
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Nhlfoodc.exe
                                                                                                                                                                                                                          C:\Windows\system32\Nhlfoodc.exe
                                                                                                                                                                                                                          103⤵
                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                          PID:5772
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Nbdkhe32.exe
                                                                                                                                                                                                                            C:\Windows\system32\Nbdkhe32.exe
                                                                                                                                                                                                                            104⤵
                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                            PID:5816
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Oohkai32.exe
                                                                                                                                                                                                                              C:\Windows\system32\Oohkai32.exe
                                                                                                                                                                                                                              105⤵
                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                              PID:5860
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Ofbdncaj.exe
                                                                                                                                                                                                                                C:\Windows\system32\Ofbdncaj.exe
                                                                                                                                                                                                                                106⤵
                                                                                                                                                                                                                                  PID:5908
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ookhfigk.exe
                                                                                                                                                                                                                                    C:\Windows\system32\Ookhfigk.exe
                                                                                                                                                                                                                                    107⤵
                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                    PID:5956
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Ochamg32.exe
                                                                                                                                                                                                                                      C:\Windows\system32\Ochamg32.exe
                                                                                                                                                                                                                                      108⤵
                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                      PID:6000
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Odjmdocp.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Odjmdocp.exe
                                                                                                                                                                                                                                        109⤵
                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                        PID:6040
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Obnnnc32.exe
                                                                                                                                                                                                                                          C:\Windows\system32\Obnnnc32.exe
                                                                                                                                                                                                                                          110⤵
                                                                                                                                                                                                                                            PID:6084
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Okfbgiij.exe
                                                                                                                                                                                                                                              C:\Windows\system32\Okfbgiij.exe
                                                                                                                                                                                                                                              111⤵
                                                                                                                                                                                                                                                PID:6124
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Pijcpmhc.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\Pijcpmhc.exe
                                                                                                                                                                                                                                                  112⤵
                                                                                                                                                                                                                                                    PID:5152
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Pcpgmf32.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\Pcpgmf32.exe
                                                                                                                                                                                                                                                      113⤵
                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                      PID:5260
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Pecpknke.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\Pecpknke.exe
                                                                                                                                                                                                                                                        114⤵
                                                                                                                                                                                                                                                          PID:892
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Pbgqdb32.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\Pbgqdb32.exe
                                                                                                                                                                                                                                                            115⤵
                                                                                                                                                                                                                                                              PID:5384
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Pmmeak32.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\Pmmeak32.exe
                                                                                                                                                                                                                                                                116⤵
                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                PID:5456
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Amhdmi32.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\Amhdmi32.exe
                                                                                                                                                                                                                                                                  117⤵
                                                                                                                                                                                                                                                                    PID:5528
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
                            1⤵
                              PID:5224

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\SysWOW64\Aaenbd32.exe

                              Filesize

                              163KB

                              MD5

                              8e9c83ef957b9942f4995e344a63699c

                              SHA1

                              0efc29be46c3f76134ca2969e532243408b67998

                              SHA256

                              e3f02bd9630460ef8284c4310c0b0c90830c3ca138ff600b7ee46341b41f1af5

                              SHA512

                              07c3cf4b1d5eeaa13126d63fc59243934e05a8f192d70618186408dba3af35df00df4bac5a2939b25df69d96a48d92b00d8a7ebdacb0ff0745ae4519e637d45a

                            • C:\Windows\SysWOW64\Aajhndkb.exe

                              Filesize

                              163KB

                              MD5

                              7d2e5ce3f4998c29748118f37143b750

                              SHA1

                              1c7b8ab18c440f2d95664877c246c486088e5739

                              SHA256

                              9d90f8a514a3a5cc09485c1f593d55ca883403c82fac7e8d320485a7c1406338

                              SHA512

                              8cbf99a7bbc8e5869ceb1375c2e000e89e2c93c2b75bc3b10df7d7e88825cf1d78725df57ce90aeac7c58889f23619abf8893cc3f06a786a70b9ecdcf57970f3

                            • C:\Windows\SysWOW64\Afpjel32.exe

                              Filesize

                              163KB

                              MD5

                              b7e62a07ba5ca0a02755cca1e47c94c2

                              SHA1

                              308ea32c879176fa834ec5a25505e5ec9ed255e7

                              SHA256

                              01096c027b3ed48182ae03750853d75d98e601109cd75b5cbf64571f67e07542

                              SHA512

                              0de72f6a82921aab84273b9e3f2c4bda950e9760191d6bdda30146d85b0bc05b05eca411478cdc744353a68f09f4806d39bfb6769df7d7b2ae3260ba6c24dcfb

                            • C:\Windows\SysWOW64\Ahaceo32.exe

                              Filesize

                              163KB

                              MD5

                              8eb0cf166ef799544be9c1eb67756862

                              SHA1

                              86e3139873015cad001e81dd71f20613bb7ed1cb

                              SHA256

                              d8a3d3dd76d654c057ebdc2618409ed37985658cfeb84b773a9c89f0bd75a65d

                              SHA512

                              f8ce523a67ce38a4178e9c0d9853e7df3ed85528102bfe7c1df8a599a58e0bf13f9a6566f13a78de0db787d8f87306b78a939e38d9dccb681df0f59db8dd8ef9

                            • C:\Windows\SysWOW64\Aopemh32.exe

                              Filesize

                              163KB

                              MD5

                              e2317f814abec985581344176ab40af6

                              SHA1

                              daf4cb3d9b6f5617586b71962d4325b392f2af17

                              SHA256

                              b37c5ac0e6f8a6e560c2774783afb7b0889111457ab41573881034155bb26d07

                              SHA512

                              b851451dd613d1c82e13711e58b1cb6d8d4837f613d5d5f5e7216ef7e2f965df25692a8991d7468362e271976b3fd5ada770438daa511af7dbaf47e5ed1f9253

                            • C:\Windows\SysWOW64\Apodoq32.exe

                              Filesize

                              163KB

                              MD5

                              e9b4eee39c5f375c26a639960f9439f9

                              SHA1

                              89c5234daea170e370c0cb006ba2ffa09d8e943b

                              SHA256

                              79644d306ebb187896d56744122c2244a7965771c3c3a7351a873fab4cf28cad

                              SHA512

                              d0eb5e5ef1d5b401fb8d537ffe5c3135898f4d32e1b29756fb4fc41b2a9cb550e9d47a141d1c188258582ea0441c21ecbf953e09bcb2edd5b5fb33f66e17cf7b

                            • C:\Windows\SysWOW64\Bfolacnc.exe

                              Filesize

                              163KB

                              MD5

                              446efc33f046dc8e8ecceda1c319cc43

                              SHA1

                              bb3e4c04a0d73ac876088702df12620a23569326

                              SHA256

                              b9c98a580be255bb13ea124119fe63baf5b5441822fa923748df2d285dc338ad

                              SHA512

                              40293040c221d24a16d2539b6102a33a5deaa77dd4d568f306e191cc6fea1ed0e14b5f33bfdcaf11dc85d02ca8f4b3ef5eca7aa5b558ca09eb66dabfada15b33

                            • C:\Windows\SysWOW64\Bphgeo32.exe

                              Filesize

                              163KB

                              MD5

                              5bb9b7bf8934c260ed01dc597ead430e

                              SHA1

                              0305756dfcbbf333eb08534e8897f593d8a86298

                              SHA256

                              39becab92d1cc00f61af762ed4e30283026b21290b52352788e4ecf70ba11c0b

                              SHA512

                              77c50c6f9a53258a4534d490c0722a2c84fa5e3ba72f3188f54792b3c47ae25b9206586b86c7fdcb771d4cc8b2ff68f0eb38adce8e50372f30f34033b4b81dbc

                            • C:\Windows\SysWOW64\Cigkdmel.exe

                              Filesize

                              163KB

                              MD5

                              cdd75dfc98bdab241fcb7fde6adc98e9

                              SHA1

                              c16a3e18a87d0572be38fb6cde50c78a13d004f7

                              SHA256

                              e19c0ce4734d9739d103751dcdf5e06c0294f1ef491be6bff6d99aa1d3bc0c70

                              SHA512

                              f6f8c108f990ec1a4fec4eb9988ffded6416ebade9430888bedf8501bc9aff2529d53c1713fe198e35ac6c056e2ae84eb01ee64ebd093708ba0f97989924bc97

                            • C:\Windows\SysWOW64\Cnaaib32.exe

                              Filesize

                              163KB

                              MD5

                              d1e1ed6b518fbcc231151e89c9a370ea

                              SHA1

                              1723ac30cd73a20a21d818837ce00a66e4e1123b

                              SHA256

                              f8adddc485e26c5d87ab9f9387de1df73673f92fc065b2772f7684d5877cb641

                              SHA512

                              f2de13aaa5a28d6d80e395cefa3dd65281bc26c7436ba04119d1b57afa954a9c00a5b4be24710fbb012c53e716cd86ca450188fe2519af4030a61704c7f96b15

                            • C:\Windows\SysWOW64\Dahmfpap.exe

                              Filesize

                              163KB

                              MD5

                              24ff62fdeffb1ad55065ee2e0cbc6778

                              SHA1

                              f827c57ae5156d0b48b5c8ec1c31b94494b7dd35

                              SHA256

                              9ced99d2fda66b1c8041d892f294337a1cf2808398bdf4e21881caa305ff0595

                              SHA512

                              3844d4b00568ee64aeb4376d7b9838e8bf7e6932aa22b29527f40a16dd15a200a000e3f7c38ad7baa2c4047a56427d0e0b6bfcda0f2885d0903aef3c0048d5bc

                            • C:\Windows\SysWOW64\Dndgfpbo.exe

                              Filesize

                              163KB

                              MD5

                              57d11f7fb76aa223e34fe1ad5c6c6f99

                              SHA1

                              0613ac94ab77a4f392977779e915a5c75ed6696b

                              SHA256

                              cb68f6d68ea749c7822ce2e21e20a8c00e5b1a9a69f2c82537c826f7308c5b6d

                              SHA512

                              9cabeeec536f73532849599b08b88e5c365dc1ee06b0723dcda144a86d7c40c27a14f51c67385751a8218a23686659b9cf972792af157e641adb5b8b0e1292b5

                            • C:\Windows\SysWOW64\Dpiplm32.exe

                              Filesize

                              163KB

                              MD5

                              ed7428e17566254ebbbb63f5ae32f5be

                              SHA1

                              3da0f6c2e397ce2b2a27fed2de8a6b7276a48713

                              SHA256

                              df860b482179675feb21404e9813d16391ba55b06504b33eca7f1a6152b9f74c

                              SHA512

                              84142d1636c464ef53dd8147593c0fd85cf9405d3c96c75e088fccfe7748aab64152c478c51fcdabe6a06092d41ba7a8bd8b3c6a7f4ec7536777dad7ef65c0be

                            • C:\Windows\SysWOW64\Egaejeej.exe

                              Filesize

                              163KB

                              MD5

                              eb2d5652cecb7f0446ad45da59ba23c7

                              SHA1

                              538f64fba1b35a7bfd4fb317d2759ab3625f60b1

                              SHA256

                              c87d7f7adceaf22aa7cee8f2ec56a157a62e1f48a68cd9d9bfcc761b874ac533

                              SHA512

                              595e2d3df35d85fc5ed118d4e87ed03f962110d170fc7b5e784e2b7445f24d8bc204f0017461b19f58036a1b4cd638404b18b2ab1cf2acce639f52c88a882c24

                            • C:\Windows\SysWOW64\Fdlkdhnk.exe

                              Filesize

                              163KB

                              MD5

                              b26eae29f88d9d57223542e85b1cde29

                              SHA1

                              7c88365a5aa46e5d16b1c37f58275f9cb0406170

                              SHA256

                              dff874709d19ce18c419ab081ba8586fb516fbc70304fb465ed985f4a90c0237

                              SHA512

                              76b45769bd3acf72f8eefdc6d4100306b78d25d1c0989e85f3607622aa88655cfd637cf21ad089f7f8f097a1f246bd9b76e341fd75e5a0ac2c9bc9d4bb12d134

                            • C:\Windows\SysWOW64\Fniihmpf.exe

                              Filesize

                              163KB

                              MD5

                              14103e37a276873c1f0f52a70a8610c9

                              SHA1

                              dbf8cde2337de2c1838c010641a0f62fc7f886f9

                              SHA256

                              15c71800f2a32a2ebe85e3403a6e8df7ac63f656f2e552da7c67bd307f50636c

                              SHA512

                              d14c0cbf707357fd1aa9177ed93690c6d8aecb8e9f5611321935c26e8ab61b5281e700425b63d473cdbceb84a1dae3a069d26abbc0f80a759d71ecfb44a85522

                            • C:\Windows\SysWOW64\Iafkld32.exe

                              Filesize

                              163KB

                              MD5

                              9c598c7b282585b24ef8b7a4db27c4a5

                              SHA1

                              32dd8e75a7253240e0c35b0c8ec26d58089210a6

                              SHA256

                              b77c7ff52b7b533251e49d80241f83c4019911c19999f7b21d5a29f3a4dc857c

                              SHA512

                              1efc1059cd08f0c9dca93525f6ad295c27918e6b9561646fbbf7335ae470f49f66212e5ec1e31fcdfe05469ffb7341135fc8bdaf5b175c2c4a1ea55bfd02bdd2

                            • C:\Windows\SysWOW64\Jpegkj32.exe

                              Filesize

                              163KB

                              MD5

                              8259d3cd02ba842eb4f1d20bd684107d

                              SHA1

                              375894f25155c3b36a9b2d30c295c52dcb4609ca

                              SHA256

                              3bb62bf6d9b3683fab921c28376e3968bb2ff0e7d82aed2c83eb20abce629e5e

                              SHA512

                              232bbf6dd5153ccd3f4958d28f1af5b0635df07be022eb1c9f3ed18f4a50ac17d0a7241058294e87e97267c1e5d5a2da2453436a2dae4595ad1475a5f396a243

                            • C:\Windows\SysWOW64\Lcfidb32.exe

                              Filesize

                              163KB

                              MD5

                              4153a77130857371c6a0e9b801587273

                              SHA1

                              a2ef4d20872b9bee354eee66182f85c96b1984b5

                              SHA256

                              b8c72c4cfa6f56c0abcff2408fccfc34dcb5a22bc14f0a4e609a555f24ca991a

                              SHA512

                              d2a617c16c86d7eb21642ac5e806323097862df95efa5307d5918003baf108bfff508ce56f7d47254b401fb5118e32cea2bfebdc77505542718f16dd41e18693

                            • C:\Windows\SysWOW64\Leoejh32.exe

                              Filesize

                              163KB

                              MD5

                              34472cc32ac6b606fa142711e21e1cae

                              SHA1

                              3fb951518e65329ee926a1f20501744fbf88840d

                              SHA256

                              1480b07c3b27d1325946c03a415f1c7095c33395ee8d4ee5e5cca7177bd313a5

                              SHA512

                              6f2f160032f406b6d321c24f1e57bd855221c006a537a51cae195ec3b230e5c1ce55e1ea9c85dd42b3fe7c3ebc535ef34907e38ee03b1d575844832e6388bbbb

                            • C:\Windows\SysWOW64\Ljeafb32.exe

                              Filesize

                              163KB

                              MD5

                              bae0440277022958838f86a0df388187

                              SHA1

                              c890ac5ecf20f8c9984631d43049b2d8239be4f4

                              SHA256

                              bf2043eac54d7435ea014ac59982b72e911ae2f2a852215b03b95b697dedb111

                              SHA512

                              084a329a07b62630f2071795896cb78f7e5bfd30794adcecc9a911339fc3368921957422733f241aba28e38e22a5a2f294852fd9d6771dc6e2afe4928d527916

                            • C:\Windows\SysWOW64\Mcelpggq.exe

                              Filesize

                              163KB

                              MD5

                              88c2675c8f53d0c7e8182dd5f674ecae

                              SHA1

                              85918452dd2fd9b13f1995e0de0e17562c0a2a82

                              SHA256

                              aa9e7f2de0cc9425bdd9e02b9f85bc05006b0ace541b37855708c0e5e456249a

                              SHA512

                              caf9930ce8f5cc21d871df2c693c2a91c59ebae14b2d85cc98ceb45a705b8d1b8e2a0c85c81670db7b048884f66c2009465f7d84b76d5e10d1ba480ba16d28f2

                            • C:\Windows\SysWOW64\Mjcngpjh.exe

                              Filesize

                              163KB

                              MD5

                              da938493ad624110643d56e9786c16eb

                              SHA1

                              c936fdd96d1568e812098d7c366d303a3e2f302d

                              SHA256

                              29d23876f6b871ff1a70e636fad51797ba8660fa2ed81f5d6acbc87e26c683da

                              SHA512

                              5dc74f3eb443602e8fc5ec9617f141e6abd7f471066f1c4fd7fe1438f5f5f8428c51422dfeee8d09bbc3eef6015735db8fbd99a75f21b07b343bdcf93b5bc3b7

                            • C:\Windows\SysWOW64\Mokmdh32.exe

                              Filesize

                              163KB

                              MD5

                              7ef07d2987ffa58d9f18ff52a3832e4e

                              SHA1

                              50a0ac2584de69d3b8c97cada8a59347f0e6fff0

                              SHA256

                              148e3a0ebfc74e7ef353425607c9bb9802781b4f479465bf2c946d0cef91dcbb

                              SHA512

                              fde9e8a143fc0e7caafd866424aed3233fbcef6cb0f8804c2803e68589e73cc750bfbc1422ae4e3d12f84910d883c34134ccf0bbd1725336051a43817eba87bf

                            • C:\Windows\SysWOW64\Mqdcnl32.exe

                              Filesize

                              163KB

                              MD5

                              ef63ad25a26e624ff780680b43d04980

                              SHA1

                              a3cb2f604016af06b3b777fc1de2473522d2356f

                              SHA256

                              fef8b4598381fa816523c0177ef9fef0d9ce32b996dee12f5bd2a778170a1c7b

                              SHA512

                              cedc07de6f8300194a266b77ae74771c0bf8d1f56c89b6391883822cc2216cf170bb224d24c972f0fdb9131d1b1ca4b33d6c3a67510f79df997162923bd31ba8

                            • C:\Windows\SysWOW64\Nfohgqlg.exe

                              Filesize

                              163KB

                              MD5

                              26da4509185633a94efdd12d6b5d0abd

                              SHA1

                              74adf361163d8757604f6e0e8102307ad3e2eb3f

                              SHA256

                              eb9b22d19e6d532fd1b1c665fb6aa7f106baf51e2f7deb11bfa4ef7c1c1d74a3

                              SHA512

                              53b8bb65a2212cba4d77acf6c05208ec972cbc966893c0961078c6f1b8a0fa0dcb6969c4bd04a25fa2e56ba2a10ecac817329fa9e3e3b7d18ea2aaf71caa677d

                            • C:\Windows\SysWOW64\Ngndaccj.exe

                              Filesize

                              163KB

                              MD5

                              216b1b7b34c830c92440ee544c1fcc50

                              SHA1

                              d0a069a03c41cf380c326f514397e1709cfb38a3

                              SHA256

                              7744cccb7063ae51ed1843c40ea2c1fc56feeeb413a181b18496746082c86c39

                              SHA512

                              071c83983efd4e027a0737f24e9a011ab3cfe82c4d7bdeba483b5497642fc4eeff151b3bce939490e479dd6b89fbb705c1b0560b681446da75ccae8a3f7d21af

                            • C:\Windows\SysWOW64\Npbceggm.exe

                              Filesize

                              163KB

                              MD5

                              add6f0e2e16406969b10547d696d80a5

                              SHA1

                              5c3d27dec0b4b93d58a01962fd05eb9a2ffe4a68

                              SHA256

                              de160991147a7fb1b65b332927327858ecc755f28bb18dff042a56b56c23756b

                              SHA512

                              d178f356558a0d803c38edfd50fd42609f7ce51c2f56dc3a8189b7f86e725c0267ea2410e604326fd22145305e316076b1b91774cbaa04aac9f39354163f0135

                            • C:\Windows\SysWOW64\Oakbehfe.exe

                              Filesize

                              163KB

                              MD5

                              97221f2729aa5ce989c831c3186a313a

                              SHA1

                              df96db0b4f00ee85b10f90595a855cd271fca330

                              SHA256

                              86c0e8bb3830ff62639192d33b78b99b1e64a653a2a416f9f75765f9aa08515c

                              SHA512

                              ceab617875a953a49436a64b48723f4622c43eb622f272f6d140c122de60e7049587e2185dd2b4c23f37c17d6ef423efe215a32d2cfec54ef006c6e7e38b8758

                            • C:\Windows\SysWOW64\Ocaebc32.exe

                              Filesize

                              163KB

                              MD5

                              edfc02587ad4ab94e1c3b66cab18af8b

                              SHA1

                              6e3e0f363682a64a0568dbf3ac27814f3944f0d2

                              SHA256

                              7626fa0f83257e94812f3c0ab0b0d7c2a2de88ffaf64533ac0983efeba12ef9c

                              SHA512

                              ec1b5ddc441ea486580bed42aad782e40031b622901a1209e9ef9e255ce9f5ba1468d2883a5c229d01454332a89a4054458f27b7ccedcbbf22e0725c1df36363

                            • C:\Windows\SysWOW64\Ombcji32.exe

                              Filesize

                              163KB

                              MD5

                              be1dc7829b077a01214b67d3cf813b13

                              SHA1

                              b94491af6b909f9ce13748a4b0ce93af7ca275cf

                              SHA256

                              d4fc25919e64ec31c12babd10b5bb98e430daf17ea9547cd46a6b596fd8b6ad5

                              SHA512

                              1a8da4690b1bbe8febbaefc59b2bb20f90834e0ab5cb13bbb99a4d38db5cc6c51b382bb4ba4ad0a38d84b6a8ba4e48dbcf32f609ff895a7a7d35821ced761a80

                            • C:\Windows\SysWOW64\Onapdl32.exe

                              Filesize

                              163KB

                              MD5

                              4cffaad91387755970de25465fb26131

                              SHA1

                              0e7609adb185f2613aac2de75b66d7d386752a31

                              SHA256

                              bc21f4014172c0b3bd2a6019cfa6ece272e515a3fe820729a5c01bb7281a6e88

                              SHA512

                              8aeb025996b80786e10da3eb84cd9e1492c487dfa040a332ffa45b26920b6761ab5310f0b24ba463822423eacf5beb5b2dfb813b150c9d54c2312e2647a4fa37

                            • C:\Windows\SysWOW64\Ookhfigk.exe

                              Filesize

                              163KB

                              MD5

                              20e7bcfa440686b1082553bdd85df5bb

                              SHA1

                              31c2823e5ee8cf2e42aa099ec90bcdce410fa15d

                              SHA256

                              5ea2b4c6c1aeaec67fb8ba20491437d34e33360a770fd5cbf124b061a3ffebff

                              SHA512

                              093feb60305f7be9862291cb0191d055526455af5854df76ad43ba31360af27cc55328796cac3f34f96c847a87ed636774f546d3f25519049f02894e76e7549e

                            • C:\Windows\SysWOW64\Oplfkeob.exe

                              Filesize

                              163KB

                              MD5

                              35f4b5ed42eeab5a47771bc548ff82c4

                              SHA1

                              12bf94b5d031cb0ecd7d6bf0f0dd43f1ec45ea32

                              SHA256

                              80e5d73b46ed8eb84d2b0e7573f60dc5ad862e5e275b50406d7e52dcbcc2eff6

                              SHA512

                              e05b43a64ff7023a6a95ca61aef8d546f0d5fd20697998d5be77b1cd63379a2cfb87e916c4fe70587a76d5409bf981e15c6d1a5fa06efe779d44678f205af181

                            • C:\Windows\SysWOW64\Pdenmbkk.exe

                              Filesize

                              163KB

                              MD5

                              1f5da94976d2f09a38450fd8cbde3945

                              SHA1

                              59a30e30b9683970a9f52761431588e69c649579

                              SHA256

                              9c15f037e641536d59bee8a6094a4440f2cac079bfa79846f05d408af50d5d48

                              SHA512

                              7b71a0b5cc44b3f23b0707323880ca78f0a62d7e4ddec615f8fa893c0d7888c4c6e6f4fcd5bf53bbe8e47dfcd52270992bb46ad4726bb70522d05b7b9c21c251

                            • C:\Windows\SysWOW64\Phfcipoo.exe

                              Filesize

                              163KB

                              MD5

                              b32f4d33649f9baf66a89f69b4011e29

                              SHA1

                              fe9f6e12f7a30c8e505e88c306a10b48cfe777a4

                              SHA256

                              2e318012508246ece57ca3553e0a949d9903b00d81d15fc86e596d26a0f4b21e

                              SHA512

                              f6d84e84c4d2438c32bca2d398c6d6947b6c9fc06910543d1bf6e6f551e3e905bbe87ea2f3d266b7c0a971066c910cc0eb35a4f9a26ef2bf413db968c86b77a2

                            • C:\Windows\SysWOW64\Ppgegd32.exe

                              Filesize

                              163KB

                              MD5

                              086c9df6fd3e7ad9d8ec9c0cae9be9a3

                              SHA1

                              0b2dd31e245a24ea563b538f5f68596f28f5aeed

                              SHA256

                              5b145275788b483b74e05d1d4b73e108cce1cac7940492271076eb95a2d9c71f

                              SHA512

                              7f48d646191dcf48fc45f29b07c13412e697c4ed8460303eeac07b1a60812f34d7e469eabcc6c80b83f374a96ce60a3d22fb01baac5d6675e53a897f8fd71de4

                            • C:\Windows\SysWOW64\Qhhpop32.exe

                              Filesize

                              163KB

                              MD5

                              21c9875b63abc7f5f58dc5fef1b56a2f

                              SHA1

                              0be2147fd7c6403f05b8b01909aea24d684296ed

                              SHA256

                              882cbcdc21524e344601981aa802cc25421ee184ddaa91ceff24c0e199689ce0

                              SHA512

                              c14a325d79fd1a2dce97b270f17d6ada432ad5855bfb307c41f3152d08610a61ea9cdba926106f28bde7027aeb4bdb68f127bbf00a647d7ee0af93ebdcbcc9ca

                            • C:\Windows\SysWOW64\Qodeajbg.exe

                              Filesize

                              163KB

                              MD5

                              91aa0331943f2f0e1920a8030e0d534e

                              SHA1

                              0cbb2845dbca8c219ce738e4f502ab470f8d9d87

                              SHA256

                              b2ebccb2f7f4ee56e240b9b4ecb6e6ca4e795017e8a737808e89283e18d3d814

                              SHA512

                              1f211edb492d2934db6c3cae43638e002e8e07c70e33934ae17c5ca8d130ded2f5cecf81c0bba086dd8d83eadecb65d092a5c447ad136e25d8e3596a0b1acb2c

                            • memory/100-420-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/228-9-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/624-154-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/636-276-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/724-25-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/732-301-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/740-72-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/768-444-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/824-346-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/872-307-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/928-396-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/964-289-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/1008-98-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/1432-258-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/1520-162-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/1792-424-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/1932-450-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2088-64-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2112-32-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2140-383-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2152-113-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2212-438-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2280-138-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2304-57-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2388-0-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2388-1-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2388-80-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2620-145-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2712-375-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2756-325-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2808-295-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/2992-105-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3020-359-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3084-170-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3480-432-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3484-177-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3576-48-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3580-319-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3596-249-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3700-283-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3764-470-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/3844-82-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4088-270-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4120-404-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4164-17-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4272-456-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4388-376-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4424-186-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4440-336-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4472-218-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4488-194-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4524-225-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4544-264-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4588-313-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4644-130-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4660-233-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4692-40-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4712-201-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4788-210-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4884-242-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4892-412-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4924-90-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4948-122-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB

                            • memory/4984-367-0x0000000000400000-0x0000000000453000-memory.dmp

                              Filesize

                              332KB