Analysis

  • max time kernel
    130s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2024, 20:13

General

  • Target

    f2e8a1efb36ee271d0266b6493b06fb8_JaffaCakes118.exe

  • Size

    320KB

  • MD5

    f2e8a1efb36ee271d0266b6493b06fb8

  • SHA1

    68d51fc85e8a3f60d3cf14ffc7a2e81eac9fe90f

  • SHA256

    9cbbd49b25dc6adbb7d34af85664783d0e73614c42198e65722147cbc779d554

  • SHA512

    42e6c75941c6344d0d7222bb52a74b459578ac90fd3c38782c400c79eb46c6c0543f329fac1e17523779ba220057ee17443e43cf414270715a494fe209d34a4e

  • SSDEEP

    3072:K/7/oVsYeoGQwS/A4MK0FzJG/AMBxjUSmkCMQ/9h/NR5f0m:OqmTQV/Ah1G/AcQ///NR5fn

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2e8a1efb36ee271d0266b6493b06fb8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f2e8a1efb36ee271d0266b6493b06fb8_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Windows\SysWOW64\Icgqggce.exe
      C:\Windows\system32\Icgqggce.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\SysWOW64\Impepm32.exe
        C:\Windows\system32\Impepm32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4936
        • C:\Windows\SysWOW64\Iiffen32.exe
          C:\Windows\system32\Iiffen32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:3080
          • C:\Windows\SysWOW64\Iannfk32.exe
            C:\Windows\system32\Iannfk32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4992
            • C:\Windows\SysWOW64\Iapjlk32.exe
              C:\Windows\system32\Iapjlk32.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3460
              • C:\Windows\SysWOW64\Ibagcc32.exe
                C:\Windows\system32\Ibagcc32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:4172
                • C:\Windows\SysWOW64\Ijhodq32.exe
                  C:\Windows\system32\Ijhodq32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2920
                  • C:\Windows\SysWOW64\Ijkljp32.exe
                    C:\Windows\system32\Ijkljp32.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3476
                    • C:\Windows\SysWOW64\Jdcpcf32.exe
                      C:\Windows\system32\Jdcpcf32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4496
                      • C:\Windows\SysWOW64\Jjmhppqd.exe
                        C:\Windows\system32\Jjmhppqd.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3084
                        • C:\Windows\SysWOW64\Jpjqhgol.exe
                          C:\Windows\system32\Jpjqhgol.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4220
                          • C:\Windows\SysWOW64\Jdemhe32.exe
                            C:\Windows\system32\Jdemhe32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:3868
                            • C:\Windows\SysWOW64\Jbhmdbnp.exe
                              C:\Windows\system32\Jbhmdbnp.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:3216
                              • C:\Windows\SysWOW64\Jjpeepnb.exe
                                C:\Windows\system32\Jjpeepnb.exe
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:2496
                                • C:\Windows\SysWOW64\Jibeql32.exe
                                  C:\Windows\system32\Jibeql32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:2188
                                  • C:\Windows\SysWOW64\Jmnaakne.exe
                                    C:\Windows\system32\Jmnaakne.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3332
                                    • C:\Windows\SysWOW64\Jaimbj32.exe
                                      C:\Windows\system32\Jaimbj32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:4064
                                      • C:\Windows\SysWOW64\Jdhine32.exe
                                        C:\Windows\system32\Jdhine32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:3376
                                        • C:\Windows\SysWOW64\Jbkjjblm.exe
                                          C:\Windows\system32\Jbkjjblm.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:1780
                                          • C:\Windows\SysWOW64\Jfffjqdf.exe
                                            C:\Windows\system32\Jfffjqdf.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:1076
                                            • C:\Windows\SysWOW64\Jjbako32.exe
                                              C:\Windows\system32\Jjbako32.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Suspicious use of WriteProcessMemory
                                              PID:4988
                                              • C:\Windows\SysWOW64\Jidbflcj.exe
                                                C:\Windows\system32\Jidbflcj.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:1512
                                                • C:\Windows\SysWOW64\Jmpngk32.exe
                                                  C:\Windows\system32\Jmpngk32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:1952
                                                  • C:\Windows\SysWOW64\Jpojcf32.exe
                                                    C:\Windows\system32\Jpojcf32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:2268
                                                    • C:\Windows\SysWOW64\Jdjfcecp.exe
                                                      C:\Windows\system32\Jdjfcecp.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:1844
                                                      • C:\Windows\SysWOW64\Jbmfoa32.exe
                                                        C:\Windows\system32\Jbmfoa32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        PID:1784
                                                        • C:\Windows\SysWOW64\Jkdnpo32.exe
                                                          C:\Windows\system32\Jkdnpo32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:3220
                                                          • C:\Windows\SysWOW64\Jmbklj32.exe
                                                            C:\Windows\system32\Jmbklj32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:4892
                                                            • C:\Windows\SysWOW64\Jangmibi.exe
                                                              C:\Windows\system32\Jangmibi.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:4360
                                                              • C:\Windows\SysWOW64\Jpaghf32.exe
                                                                C:\Windows\system32\Jpaghf32.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:2396
                                                                • C:\Windows\SysWOW64\Jdmcidam.exe
                                                                  C:\Windows\system32\Jdmcidam.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:1524
                                                                  • C:\Windows\SysWOW64\Jfkoeppq.exe
                                                                    C:\Windows\system32\Jfkoeppq.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    PID:4440
                                                                    • C:\Windows\SysWOW64\Jkfkfohj.exe
                                                                      C:\Windows\system32\Jkfkfohj.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:4748
                                                                      • C:\Windows\SysWOW64\Jiikak32.exe
                                                                        C:\Windows\system32\Jiikak32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:3128
                                                                        • C:\Windows\SysWOW64\Kmegbjgn.exe
                                                                          C:\Windows\system32\Kmegbjgn.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          PID:2200
                                                                          • C:\Windows\SysWOW64\Kpccnefa.exe
                                                                            C:\Windows\system32\Kpccnefa.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            PID:3168
                                                                            • C:\Windows\SysWOW64\Kdopod32.exe
                                                                              C:\Windows\system32\Kdopod32.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              PID:3900
                                                                              • C:\Windows\SysWOW64\Kbapjafe.exe
                                                                                C:\Windows\system32\Kbapjafe.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:3928
                                                                                • C:\Windows\SysWOW64\Kilhgk32.exe
                                                                                  C:\Windows\system32\Kilhgk32.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2152
                                                                                  • C:\Windows\SysWOW64\Kmgdgjek.exe
                                                                                    C:\Windows\system32\Kmgdgjek.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:3820
                                                                                    • C:\Windows\SysWOW64\Kacphh32.exe
                                                                                      C:\Windows\system32\Kacphh32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      PID:3980
                                                                                      • C:\Windows\SysWOW64\Kpepcedo.exe
                                                                                        C:\Windows\system32\Kpepcedo.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        PID:4392
                                                                                        • C:\Windows\SysWOW64\Kbdmpqcb.exe
                                                                                          C:\Windows\system32\Kbdmpqcb.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:2864
                                                                                          • C:\Windows\SysWOW64\Kgphpo32.exe
                                                                                            C:\Windows\system32\Kgphpo32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            PID:3516
                                                                                            • C:\Windows\SysWOW64\Kkkdan32.exe
                                                                                              C:\Windows\system32\Kkkdan32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:4628
                                                                                              • C:\Windows\SysWOW64\Kinemkko.exe
                                                                                                C:\Windows\system32\Kinemkko.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:4404
                                                                                                • C:\Windows\SysWOW64\Kaemnhla.exe
                                                                                                  C:\Windows\system32\Kaemnhla.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:1948
                                                                                                  • C:\Windows\SysWOW64\Kphmie32.exe
                                                                                                    C:\Windows\system32\Kphmie32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:4764
                                                                                                    • C:\Windows\SysWOW64\Kbfiep32.exe
                                                                                                      C:\Windows\system32\Kbfiep32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:4068
                                                                                                      • C:\Windows\SysWOW64\Kgbefoji.exe
                                                                                                        C:\Windows\system32\Kgbefoji.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:4916
                                                                                                        • C:\Windows\SysWOW64\Kknafn32.exe
                                                                                                          C:\Windows\system32\Kknafn32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:4744
                                                                                                          • C:\Windows\SysWOW64\Kipabjil.exe
                                                                                                            C:\Windows\system32\Kipabjil.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies registry class
                                                                                                            PID:3284
                                                                                                            • C:\Windows\SysWOW64\Kmlnbi32.exe
                                                                                                              C:\Windows\system32\Kmlnbi32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:4760
                                                                                                              • C:\Windows\SysWOW64\Kagichjo.exe
                                                                                                                C:\Windows\system32\Kagichjo.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:2116
                                                                                                                • C:\Windows\SysWOW64\Kdffocib.exe
                                                                                                                  C:\Windows\system32\Kdffocib.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4716
                                                                                                                  • C:\Windows\SysWOW64\Kcifkp32.exe
                                                                                                                    C:\Windows\system32\Kcifkp32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:4284
                                                                                                                    • C:\Windows\SysWOW64\Kkpnlm32.exe
                                                                                                                      C:\Windows\system32\Kkpnlm32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:5112
                                                                                                                      • C:\Windows\SysWOW64\Kibnhjgj.exe
                                                                                                                        C:\Windows\system32\Kibnhjgj.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:3844
                                                                                                                        • C:\Windows\SysWOW64\Kmnjhioc.exe
                                                                                                                          C:\Windows\system32\Kmnjhioc.exe
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          PID:5116
                                                                                                                          • C:\Windows\SysWOW64\Kajfig32.exe
                                                                                                                            C:\Windows\system32\Kajfig32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:5036
                                                                                                                            • C:\Windows\SysWOW64\Kdhbec32.exe
                                                                                                                              C:\Windows\system32\Kdhbec32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:1908
                                                                                                                              • C:\Windows\SysWOW64\Kckbqpnj.exe
                                                                                                                                C:\Windows\system32\Kckbqpnj.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:2216
                                                                                                                                • C:\Windows\SysWOW64\Kkbkamnl.exe
                                                                                                                                  C:\Windows\system32\Kkbkamnl.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  PID:2580
                                                                                                                                  • C:\Windows\SysWOW64\Liekmj32.exe
                                                                                                                                    C:\Windows\system32\Liekmj32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:620
                                                                                                                                    • C:\Windows\SysWOW64\Lmqgnhmp.exe
                                                                                                                                      C:\Windows\system32\Lmqgnhmp.exe
                                                                                                                                      66⤵
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:3140
                                                                                                                                      • C:\Windows\SysWOW64\Lpocjdld.exe
                                                                                                                                        C:\Windows\system32\Lpocjdld.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:3020
                                                                                                                                        • C:\Windows\SysWOW64\Ldkojb32.exe
                                                                                                                                          C:\Windows\system32\Ldkojb32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4004
                                                                                                                                          • C:\Windows\SysWOW64\Lcmofolg.exe
                                                                                                                                            C:\Windows\system32\Lcmofolg.exe
                                                                                                                                            69⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:928
                                                                                                                                            • C:\Windows\SysWOW64\Lgikfn32.exe
                                                                                                                                              C:\Windows\system32\Lgikfn32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:4056
                                                                                                                                              • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                                                                                C:\Windows\system32\Mnlfigcc.exe
                                                                                                                                                71⤵
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                PID:1876
                                                                                                                                                • C:\Windows\SysWOW64\Mdfofakp.exe
                                                                                                                                                  C:\Windows\system32\Mdfofakp.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:2000
                                                                                                                                                  • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                                                                                    C:\Windows\system32\Mjcgohig.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:3956
                                                                                                                                                    • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                                                                                      C:\Windows\system32\Mdiklqhm.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      PID:1596
                                                                                                                                                      • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                                                                                                        C:\Windows\system32\Mjeddggd.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        PID:2996
                                                                                                                                                        • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                                                                          C:\Windows\system32\Mpolqa32.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:2896
                                                                                                                                                          • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                                                                            C:\Windows\system32\Mkepnjng.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:4208
                                                                                                                                                            • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                                                              C:\Windows\system32\Maohkd32.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:2304
                                                                                                                                                              • C:\Windows\SysWOW64\Mdmegp32.exe
                                                                                                                                                                C:\Windows\system32\Mdmegp32.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                PID:1956
                                                                                                                                                                • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                                                                  C:\Windows\system32\Mkgmcjld.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                    PID:4568
                                                                                                                                                                    • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                                                                                                      C:\Windows\system32\Maaepd32.exe
                                                                                                                                                                      81⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      PID:2412
                                                                                                                                                                      • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                                                                                        C:\Windows\system32\Mdpalp32.exe
                                                                                                                                                                        82⤵
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        PID:3916
                                                                                                                                                                        • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                                                                          C:\Windows\system32\Nkjjij32.exe
                                                                                                                                                                          83⤵
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:2284
                                                                                                                                                                          • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                                                                            C:\Windows\system32\Nqfbaq32.exe
                                                                                                                                                                            84⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:1968
                                                                                                                                                                            • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                                                              C:\Windows\system32\Nceonl32.exe
                                                                                                                                                                              85⤵
                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                              PID:5100
                                                                                                                                                                              • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                                                                                C:\Windows\system32\Nklfoi32.exe
                                                                                                                                                                                86⤵
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:4412
                                                                                                                                                                                • C:\Windows\SysWOW64\Nnjbke32.exe
                                                                                                                                                                                  C:\Windows\system32\Nnjbke32.exe
                                                                                                                                                                                  87⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:3752
                                                                                                                                                                                  • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                                                                                    C:\Windows\system32\Ncgkcl32.exe
                                                                                                                                                                                    88⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:1632
                                                                                                                                                                                    • C:\Windows\SysWOW64\Nkncdifl.exe
                                                                                                                                                                                      C:\Windows\system32\Nkncdifl.exe
                                                                                                                                                                                      89⤵
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:2536
                                                                                                                                                                                      • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                                                                                        C:\Windows\system32\Nnmopdep.exe
                                                                                                                                                                                        90⤵
                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        PID:4576
                                                                                                                                                                                        • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                                                                                          C:\Windows\system32\Nqklmpdd.exe
                                                                                                                                                                                          91⤵
                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:5176
                                                                                                                                                                                          • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                                                                            C:\Windows\system32\Ncihikcg.exe
                                                                                                                                                                                            92⤵
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5244
                                                                                                                                                                                            • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                                                                              C:\Windows\system32\Njcpee32.exe
                                                                                                                                                                                              93⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                              PID:5284
                                                                                                                                                                                              • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                                                                C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                                                                94⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                PID:5324
                                                                                                                                                                                                • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                                                                                  C:\Windows\system32\Ncldnkae.exe
                                                                                                                                                                                                  95⤵
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:5360
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                                                                    C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                                                                    96⤵
                                                                                                                                                                                                      PID:5404
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5404 -s 400
                                                                                                                                                                                                        97⤵
                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                        PID:5500
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5404 -ip 5404
        1⤵
          PID:5476
        • C:\Windows\System32\Conhost.exe
          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          1⤵
            PID:5284

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\SysWOW64\Iannfk32.exe

                  Filesize

                  320KB

                  MD5

                  da526550ea10e23e963572ce6287cc8f

                  SHA1

                  b2cc73f33b6e2dd34fd95170fc734388ac4d0c83

                  SHA256

                  ce0eaf7f27cd638f714b0be39040e0438b1cb0a744f215ad02f21f61bb793c41

                  SHA512

                  c8252fc685eeda6bf53022a7e188520fa6cd5ceaafc982f876e8b3198afacc102a40bb948a2ca6557a087dadfec5a39136027f973fdb366e3c8b9e820e35391b

                • C:\Windows\SysWOW64\Iapjlk32.exe

                  Filesize

                  320KB

                  MD5

                  ca456f4fdb30a1a5dd38256c773ddfa7

                  SHA1

                  9d26190ef38cfdd49f2dc8b70532c5c10b13d3c6

                  SHA256

                  a09c6ffedae113b6a5c595421fd1cfac3b2216b4205163b54e857655af203ed7

                  SHA512

                  87faed4ed4763dd92f0f4421a081bc90504e03b90e5def308f4caa8d720f284fcdf66fdc34bf73c8bb4dc2d7be0962ef4ee7412fe16bf692e1957621c083d634

                • C:\Windows\SysWOW64\Ibagcc32.exe

                  Filesize

                  320KB

                  MD5

                  b9d9cc52d9ba53efa69a5fe06bba5dce

                  SHA1

                  a18833391bc23fe2cd0365fdc3ebccd1b386cd12

                  SHA256

                  5a44891132d0aad8914053fa583d35cc84437bc939d8a0c2d0688b8cffd835f5

                  SHA512

                  94d96d82daa9f77a2bc0cd5035a8d830e6d682af51e18eaca3bfc4107a52fb754de3b1b29aaef7b22bd74a16438b7a90cf3187b31c40341d6c36e5891efad750

                • C:\Windows\SysWOW64\Icgqggce.exe

                  Filesize

                  320KB

                  MD5

                  dc4545a678b7bf69c32cd8f6c8977fbe

                  SHA1

                  9bd93a0dc411a39ecad172ff9081a40c875a3405

                  SHA256

                  910018ded69d75372b2f25da5b3c70ae30a91128ac01ac4cbf700ca45362fae6

                  SHA512

                  c00db3dcd4a20ddc86cbf05a87e3a96244f1c6fe06a0eaf56e9f278eece8be0929400e52ce0943575167bae0ae0aa76d62b37a9874db67a2f482def7004ee4bf

                • C:\Windows\SysWOW64\Iiffen32.exe

                  Filesize

                  320KB

                  MD5

                  6f6370f75abd4f52328e94b3ad15d4c3

                  SHA1

                  1427104694494f411539ce542e2f273b8982990a

                  SHA256

                  4de5206c87e98376ecb9f55f43069ee30a69eff96fd6b5ed637a2232de529cce

                  SHA512

                  9aafa16b33f97e76dda4dae9f1afcbe80b797dcb99433c8a69251cb0c50ff2f657c33d8df3edf008333878c7198533691890f48395f326742877dea5d08b7053

                • C:\Windows\SysWOW64\Ijhodq32.exe

                  Filesize

                  320KB

                  MD5

                  87dfbb2dea6b0ac0aecd2382eefc84d7

                  SHA1

                  4dbf6ee1d4e25167224a680603ac601a8372e349

                  SHA256

                  bc768463a954e2dc790cf04bf27f9e59532e966c04355d5387662533a8b5f0f7

                  SHA512

                  d98c5105708d2da2c55b1062e26ddac75459d1b5c3447405480bb327f62c54306776f0b479d4fe1fde5e34b7fc4114814c6085d16ef354516ddd757fab9919f6

                • C:\Windows\SysWOW64\Ijkljp32.exe

                  Filesize

                  320KB

                  MD5

                  2220c84a392e7c50e009be6b9f7f4bb1

                  SHA1

                  5cbff803ffdbe28a6808f9b21536f83bcb246245

                  SHA256

                  288493a78644a0fc780a206b7f80ebb3b28e60f9a4c12701e455af1df44b2d5b

                  SHA512

                  e835db6f52331b44ec38cced134748d7441614f7e60dce4b38f0dd44e52c25d7001b190ea8ca47063213d43771e6059297d2c273472f3f41a3dfaba53afba859

                • C:\Windows\SysWOW64\Impepm32.exe

                  Filesize

                  320KB

                  MD5

                  982bb7463b9e3f2b890e545abd628cd3

                  SHA1

                  cff29d1b964d312a558726ea6d2f2038d2039c4c

                  SHA256

                  55d36d2ddf3411b898594c66a9c6dcaad579b6947c1b81d44df2a74083218ce1

                  SHA512

                  ba56ad596386f0cec00ff183295293ce2b532afddeb15232f714ff5659f980751fff4988ffd2f7e84c6fb66d19a5b34c99688d642880a0f5b0209cb1051cfcdd

                • C:\Windows\SysWOW64\Jaimbj32.exe

                  Filesize

                  320KB

                  MD5

                  a5250ce3514a29e70846ca4acb161270

                  SHA1

                  4359230b7337e7f6785a0a4b1d08dc28b729795b

                  SHA256

                  435983370cd8617b2d2f0bf963d0d4b0feb3f1ce779f59c8472c93ac92dcb5f1

                  SHA512

                  382214eed1a35e8090ed1e83413f8f8ab93ed976f35f1906e4bd5a1d5f475cf74a496594ee2fffce69b63357c3ecf5f510bb75df87ba8e2223318fe0bc6da4f5

                • C:\Windows\SysWOW64\Jangmibi.exe

                  Filesize

                  320KB

                  MD5

                  3260250c67a44cf69fc7f8485262c861

                  SHA1

                  305a2d23ca3c43536cdef2eebae78c162831e4ae

                  SHA256

                  ff31f9d7d07b740f3bd3afc87f3dc0a0c8fbc09d77f4a4a82f73d764605e205c

                  SHA512

                  be851dc939434811aff21cf6b5587973027e6dd526b72bc1387f2e334ca609655a2ddb8bf785bd79b2b863ff489cbebe1973f7c7d97f13821a9fad4d1ed02723

                • C:\Windows\SysWOW64\Jbhmdbnp.exe

                  Filesize

                  320KB

                  MD5

                  1702c0a6f4e0bb2530fb67d28a869218

                  SHA1

                  5c1967c02dc112ae8cb3dd34da6cf2f97712af31

                  SHA256

                  cc969be8dc73072d9c4a763a9240172417dfe18e2fd1447c2e7b77ee374c6c65

                  SHA512

                  a1305c869d45fc090ac0fc6e4bc069e605f234bfbf801fd10cec74e25bc6fbdb5fa1d97bd7b0e14d5c41a95cc0729cd4dce3e5b3a57c4351c4722e4e20b711af

                • C:\Windows\SysWOW64\Jbkjjblm.exe

                  Filesize

                  320KB

                  MD5

                  7d2327865de7ea01e1a97c78b285e877

                  SHA1

                  7d6fd56bf757bdb4bd3435ae4f56d3407e2771e2

                  SHA256

                  d85510553950d24b8d54e4f9df8846355fa63390be5c333706671effb1f23a68

                  SHA512

                  470b5dedf674c8fc89302dbd213a3747584d89101be90685016f28760691cf5f069f1df0d17d26550ef1c8b2614991ae6c8e991b03524642f4e51e4be80be05a

                • C:\Windows\SysWOW64\Jbmfoa32.exe

                  Filesize

                  320KB

                  MD5

                  fabac65dd097a0a78d129b393ff3c213

                  SHA1

                  aef779fc53e770c5543d584637b196b4478d5c2f

                  SHA256

                  cc7a50eb85c954451f059f2052dfa3dd295609d798220df587de27b6f72fefd5

                  SHA512

                  216a77c3ef7179a1c8e30047e9101cc978979c74df31047150c39a12d17a707e5b3e92adae39c1348c5c77b946e9486d3884877a12a60ddc0be6857d981525e1

                • C:\Windows\SysWOW64\Jdcpcf32.exe

                  Filesize

                  320KB

                  MD5

                  ee3ca134f2fef479ca2be9e71f30905c

                  SHA1

                  701f24a047ae4a2dac4f0274736ed7361f5ba59d

                  SHA256

                  8d9ee73dfb8218a60a576724a41e8d6a3c20376da18d36eb6330569f9747970d

                  SHA512

                  308d21eea65bde583f9b7d0b674c495a8057a67af0fb4393e35564e563999ab97c73804d0912e0ac6e5179d796479c6633c077a20a32daf2094fc63e7b40c2f1

                • C:\Windows\SysWOW64\Jdemhe32.exe

                  Filesize

                  320KB

                  MD5

                  f0cc8f110769aada8eaa6dff61e8d227

                  SHA1

                  2c4c140824fda3681585ef95409dd73ab4c94673

                  SHA256

                  ba919782f62474818494b7a7d3ba356857a9b7ebac1d6834876146e4014bd51b

                  SHA512

                  27737bd42f89215ceede764602628a728123e11b9c9d28eb56b8bd938fb4104205433689e817cced6e4b428142567114e7d6c887a1ea0064992c65ad0c6f33ec

                • C:\Windows\SysWOW64\Jdhine32.exe

                  Filesize

                  320KB

                  MD5

                  466a89b93a5f0666c48a73e137614b9c

                  SHA1

                  b7d9cf2532518f3047ee60041fcf1e8480b2cdc6

                  SHA256

                  ddd6438e7377dfc06f525ee8187d88eb518f36d6671325fb29f7fdb49b0306c7

                  SHA512

                  f95fe630ddce6b09b00940fa4c6a4ff8ca4d7b1cf6e246adff2368d3c1af2d5b979ffdd134d3850a5e4fb4de079379ff0ed991bf7e0aa01ca15592e4db24be2e

                • C:\Windows\SysWOW64\Jdjfcecp.exe

                  Filesize

                  320KB

                  MD5

                  79866e3b0f61a7950a7893b292131590

                  SHA1

                  46ad45d2984b51b540cfc98e7ac68cad35f18ed5

                  SHA256

                  313280fbbe8afe1fda83a039e31b2733416d36c9727504479560e4cf01916e0c

                  SHA512

                  8c01e3601144bc3ee61d83b3b08ea2ed6f9434d71ea95fd7872f9eb222b15a1824f2d9711289ffa57a2fe4caa6d94209a5a4198d97ffc4636631ea29d9534241

                • C:\Windows\SysWOW64\Jdmcidam.exe

                  Filesize

                  320KB

                  MD5

                  41bb83b645e96c67877407da7444e5f4

                  SHA1

                  4aca781ef1d6dbd58cf331a041fcdf808b078631

                  SHA256

                  84c68f2c8213160edfd9d48ab3a2636d57724c285695cc527ae5cdc866caa9c5

                  SHA512

                  320e576c9895f5096e952233e5f3c61b1ab79018f80e25c6efe032511a78dc2fbbc694096beae39933f705065740421f0468ca72a67cd8759e0b9cb8c6e30c2c

                • C:\Windows\SysWOW64\Jfffjqdf.exe

                  Filesize

                  320KB

                  MD5

                  e470bb5503310363dd4f71802416b8d2

                  SHA1

                  c988c5a19b2edc8500daf75f187513e2f64d609b

                  SHA256

                  36a489592e96013bed7e5dbdd48dda0356dc9da1a5e8bb4780b2cd0ca084d142

                  SHA512

                  d4ae167bc9fd625bd62c3e1eb61a208c661998babf57f859584ac9e1862f8f7af81832a3794e71479ebafa521d2849a761349047aa2f3776c2a27b5c8874e1a4

                • C:\Windows\SysWOW64\Jfkoeppq.exe

                  Filesize

                  320KB

                  MD5

                  c9d5f600851e9cbbddf3b0c13a7eb27e

                  SHA1

                  ee43ec13270046cb4132d8f247948dd3b4ef7734

                  SHA256

                  7890a547d8d2a9b55fdb99b1fcefe1166b6f2a3d9297a0989dbff7a77a8eb956

                  SHA512

                  9327c06be4b0d63e730cde7a51b93707a911986477433b22bb5923919d083c45b61ee3d7dc6483218126045087c6a2c204bc92990b0a0264a18a71a062cf84fc

                • C:\Windows\SysWOW64\Jibeql32.exe

                  Filesize

                  320KB

                  MD5

                  90dbbb95230c17941ad14e52c5b5284d

                  SHA1

                  0ba2ec14cb56ac9896db2ac02e2f8bdd239259b6

                  SHA256

                  a4dc2bd9a03e2a779c13798cad151e8ceae8a7fae2a6eb6077ea526ca9ccdac5

                  SHA512

                  5ad540828485c1f5652ca14d0d397cf3500aced1ba658d237812c9a94da41962ed2941b1bd0f05201bffa7634fc297a041fdc4b4139e356e475374b554b72b60

                • C:\Windows\SysWOW64\Jidbflcj.exe

                  Filesize

                  320KB

                  MD5

                  7a571f8d6d2add476505763db554fca6

                  SHA1

                  f6efb08636ed18c4e4d6b95148d3844fb8ac72f1

                  SHA256

                  9e23554bd0625304ee427fa5b3756ba36195ce4911e06cdd845e3a987b5b632f

                  SHA512

                  fd80b64c1fbae25afb8dce2a06f28d4210e17e9e9be55d35adaeeea1b0afb4f58634c4d2c63b764c08c72497d38b104d5ea89f0d2142b7235281a07da9bc03a5

                • C:\Windows\SysWOW64\Jjbako32.exe

                  Filesize

                  320KB

                  MD5

                  3deadd7c91d6c08951e610f367e713d8

                  SHA1

                  ff2bf2ac9ed6ad97a90668f46dffe80cb6df2e35

                  SHA256

                  ab979c7e658a71bc4d2cfa327226032c80ffdecb7d533ddde84755a53ab6679b

                  SHA512

                  74ee6da37e329921c5f0090b41293fb89714f3f41c695ac7d77dbead725cec4b8e2db6b99b4535c6a6e9cf49c0004341394f00ca49424042f2f65498bb8c8144

                • C:\Windows\SysWOW64\Jjmhppqd.exe

                  Filesize

                  320KB

                  MD5

                  adeeb8289660aa1ace1b4b5574551d76

                  SHA1

                  a3c6b082c21b8e3ac73830e5d2d2aae1da6f010c

                  SHA256

                  343484c00ac7dee7cc464b4521b7f2a6fbf5bb72581e5e3a881cf324d3b8c7e1

                  SHA512

                  5879ab852ed2a2e42a588a4fe324177a272ec7410f62e20fe0050f01bb09f2a8c3d48474d656454a0bfdd2058e8ba303d022f58b1988be79045d7130e5de2ea9

                • C:\Windows\SysWOW64\Jjpeepnb.exe

                  Filesize

                  320KB

                  MD5

                  3aca10bc38fb3b4df462e9bd8e9e1eed

                  SHA1

                  1a37c46941da5937e096e3c5f7d31c9ed54dbbcd

                  SHA256

                  0fe95a8449232bca0bba22390acbe1257ec7b8e6275640b9c619d727527540bc

                  SHA512

                  1fb8c8721c17c99f8b576dbe06f2974c6e3e031b11cfc334ce5888e33b714daf97e90479d4d01be615f7b05841e00907890b0ccfc1f61ef0f7afea3970d8b5b0

                • C:\Windows\SysWOW64\Jkdnpo32.exe

                  Filesize

                  320KB

                  MD5

                  1995b9f950c6cf391b1fb8ddaedb679f

                  SHA1

                  800afda09fc6579306af0038f0702d774af83730

                  SHA256

                  d04a933a273cef967103144b35333b00cf93f933b5e9fa4ae9c45bc0d248da53

                  SHA512

                  a64dd8ec3aa8a6c531e0e8fc40c994b11a15508d368bc06a7ce9047d48ceee04f1628314219614e2cb5f2005f8e6b168af4d7c120f222c094b30b6deec6e8909

                • C:\Windows\SysWOW64\Jmbklj32.exe

                  Filesize

                  320KB

                  MD5

                  98f0bd1156f644ee7c77bf00fe0e0384

                  SHA1

                  ef2dba69d7602da49e603c18e512c75ffd4e1522

                  SHA256

                  a0001671ff51f4fca15b3a86093056c80ca6a1b241b94df4be570d4ffd74694a

                  SHA512

                  3f300461d8133c73628ba508acd73233c042ff02f79f0ba52c0ca278146820836cdd74df104c8131f986a8375b616427f37081c33309faa53754910ff5ff48a5

                • C:\Windows\SysWOW64\Jmnaakne.exe

                  Filesize

                  320KB

                  MD5

                  d20b25a6f444b865f4645e5c813239aa

                  SHA1

                  f397351f504d0a2998d9bc445eaede1eacd903a3

                  SHA256

                  1985820b5d301a687a3981df3af673700fdb80894d1714fb07f7b9b6bd3e5f24

                  SHA512

                  a38ac57994b693f26b8e9b3111383d58990e18673059fef8b4e44a34d7959640f811da70074a1654908fd5751c05059981392d44745ba841de9c60e5034dbf06

                • C:\Windows\SysWOW64\Jmpngk32.exe

                  Filesize

                  320KB

                  MD5

                  8847f4faa5fc1b7f362f3bda57d7d2fa

                  SHA1

                  9b6694f8f58c61694776d3fb64908d0b75bc3a8e

                  SHA256

                  c0b510e68fa87f5fdffd80bfb6a81f47f59aa699b16d250532fda0c83b2ecc64

                  SHA512

                  3355803a6405fb1cf1d91f40020fe7f1aa4c0879d34131e2ec4876aafb9b097b0cfdb20c798d5041b7996ffc31423e5fa1a76a513ee748c6d5e48089f17bf132

                • C:\Windows\SysWOW64\Jpaghf32.exe

                  Filesize

                  320KB

                  MD5

                  4428a54788fa8794f7b2b33419596154

                  SHA1

                  6eca8aa4f7d6c4fede2fb96601087fbb8416e743

                  SHA256

                  6100685fee173bc1bf393615f20bd25f36515e8948bbe8a24869dfbcf868cf69

                  SHA512

                  97a2a4c2665c59efdb8a11ac9d5c700852f3aa200fad02c093152933b27de9dfa5bb4405ed1e4ac2e6e9d3958a1e8e6308eea2914da5cd9d123164a4572fb242

                • C:\Windows\SysWOW64\Jpjqhgol.exe

                  Filesize

                  320KB

                  MD5

                  aef6c7b9364ab3df0223613ef0eedf14

                  SHA1

                  4e93ca7d09b8e7f008341bc97bfa3304ccc68662

                  SHA256

                  e8406b1b17f43cbfa029bc02df26b93f33644f8f65c5c2c2ec6c20770256eede

                  SHA512

                  32e64739f25a5a35c5f2d64bc7664841c58c7965d9f3a24d342bb07f55bba75b9cc2c8927286378ae7a0349754f144de84936c9591c752e984852a9c69ae491c

                • C:\Windows\SysWOW64\Jpojcf32.exe

                  Filesize

                  320KB

                  MD5

                  8bf72045ddf0bb38734766a60816c82c

                  SHA1

                  0b971783aeede38a24a7e6236c96e9891e5cfe99

                  SHA256

                  8a3f981bb756c8762a7628251c25e7ccfd0bf543242291f630c42503aeda0fb9

                  SHA512

                  c4da928e4b7fe0f34587629b66c8e5af23e92a1aceb7d7c191219cfbf78b780633fcca43315a0de06ecc55f4f549fb7f2e91a1c2b1e0c83b7524f724b09d5f3c

                • C:\Windows\SysWOW64\Ncgkcl32.exe

                  Filesize

                  320KB

                  MD5

                  f1c514a59a0e8e0adb377d2f573be85d

                  SHA1

                  e577702e740dd843c3a0702a47d9b851528c72d9

                  SHA256

                  cd8ee64beefd4b686be2bc49de801311b593b3a74854e3759a24999526a24f53

                  SHA512

                  98e5c69be77a385f0eccac00d634b87ea8b808c7a64144d2f62c0ee1a9f6b81b1a0c1f7c1948170ff2a5b46f34c9191cd69028b0c93226b6df44f30c4487c60f

                • memory/620-651-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/928-643-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/928-437-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/940-1-0x0000000000432000-0x0000000000433000-memory.dmp

                  Filesize

                  4KB

                • memory/940-0-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1076-430-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1512-431-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1596-461-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1596-633-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1632-605-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1780-429-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1784-434-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1844-433-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1876-639-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1908-657-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1956-490-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1956-623-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/1968-613-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2000-449-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2000-637-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2116-671-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2188-425-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2216-655-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2268-432-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2284-615-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2284-514-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2304-625-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2412-619-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2412-502-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2496-424-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2532-9-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2536-603-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2536-553-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2580-653-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2864-436-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2896-477-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2896-629-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2920-57-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2996-467-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/2996-631-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3020-647-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3080-24-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3084-80-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3140-649-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3216-423-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3284-675-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3332-426-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3376-428-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3460-45-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3476-65-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3752-607-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3752-537-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3844-663-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3868-422-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3916-512-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3916-617-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3956-460-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/3956-635-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4004-645-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4056-438-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4056-641-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4064-427-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4068-681-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4172-49-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4208-627-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4208-479-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4220-94-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4284-667-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4392-435-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4412-536-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4412-609-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4496-77-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4568-496-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4568-621-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4576-601-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4716-669-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4744-677-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4760-673-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4916-679-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4936-17-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/4992-33-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5036-659-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5100-525-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5100-611-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5112-665-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5116-661-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5176-563-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5176-599-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5244-597-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5284-570-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5284-595-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5324-593-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5324-580-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5360-591-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5404-589-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB

                • memory/5404-587-0x0000000000400000-0x000000000046D000-memory.dmp

                  Filesize

                  436KB