Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 23:02

General

  • Target

    761aa1dae24aebff03781ccc292481e4977e15c5f85ec679514b35c5aea2e803.exe

  • Size

    128KB

  • MD5

    3e14c5558bf41446c7ae425f1762f98c

  • SHA1

    49ea5fcabf696dbac46d145e42099e54a3cabba7

  • SHA256

    761aa1dae24aebff03781ccc292481e4977e15c5f85ec679514b35c5aea2e803

  • SHA512

    cd91831dbb3efed9dc5b536065708f102909df271963a93571624c4cde025aa5d1f249492ba40a83fe8518567462295d3414ac1f43175da45c330bb74b888686

  • SSDEEP

    3072:xSjl5mwU0d5UTFCwQ9bGCmBJFWpoPSkGF:IJcwUk5UTFCN9bGCKJFt

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\761aa1dae24aebff03781ccc292481e4977e15c5f85ec679514b35c5aea2e803.exe
    "C:\Users\Admin\AppData\Local\Temp\761aa1dae24aebff03781ccc292481e4977e15c5f85ec679514b35c5aea2e803.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\SysWOW64\Kknafn32.exe
      C:\Windows\system32\Kknafn32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\SysWOW64\Kmlnbi32.exe
        C:\Windows\system32\Kmlnbi32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4088
        • C:\Windows\SysWOW64\Kagichjo.exe
          C:\Windows\system32\Kagichjo.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\SysWOW64\Kpjjod32.exe
            C:\Windows\system32\Kpjjod32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Windows\SysWOW64\Kcifkp32.exe
              C:\Windows\system32\Kcifkp32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4564
              • C:\Windows\SysWOW64\Kkpnlm32.exe
                C:\Windows\system32\Kkpnlm32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Windows\SysWOW64\Kibnhjgj.exe
                  C:\Windows\system32\Kibnhjgj.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1412
                  • C:\Windows\SysWOW64\Kajfig32.exe
                    C:\Windows\system32\Kajfig32.exe
                    9⤵
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3052
                    • C:\Windows\SysWOW64\Kdhbec32.exe
                      C:\Windows\system32\Kdhbec32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1848
                      • C:\Windows\SysWOW64\Kckbqpnj.exe
                        C:\Windows\system32\Kckbqpnj.exe
                        11⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1044
                        • C:\Windows\SysWOW64\Kgfoan32.exe
                          C:\Windows\system32\Kgfoan32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:2008
                          • C:\Windows\SysWOW64\Kkbkamnl.exe
                            C:\Windows\system32\Kkbkamnl.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4032
                            • C:\Windows\SysWOW64\Lmqgnhmp.exe
                              C:\Windows\system32\Lmqgnhmp.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:796
                              • C:\Windows\SysWOW64\Lalcng32.exe
                                C:\Windows\system32\Lalcng32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2444
                                • C:\Windows\SysWOW64\Lpocjdld.exe
                                  C:\Windows\system32\Lpocjdld.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4524
                                  • C:\Windows\SysWOW64\Lkdggmlj.exe
                                    C:\Windows\system32\Lkdggmlj.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Suspicious use of WriteProcessMemory
                                    PID:1864
                                    • C:\Windows\SysWOW64\Lmccchkn.exe
                                      C:\Windows\system32\Lmccchkn.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:5032
                                      • C:\Windows\SysWOW64\Lpappc32.exe
                                        C:\Windows\system32\Lpappc32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:4848
                                        • C:\Windows\SysWOW64\Lcpllo32.exe
                                          C:\Windows\system32\Lcpllo32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:548
                                          • C:\Windows\SysWOW64\Lkgdml32.exe
                                            C:\Windows\system32\Lkgdml32.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:3352
                                            • C:\Windows\SysWOW64\Lnepih32.exe
                                              C:\Windows\system32\Lnepih32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:3756
                                              • C:\Windows\SysWOW64\Laalifad.exe
                                                C:\Windows\system32\Laalifad.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:3080
                                                • C:\Windows\SysWOW64\Ldohebqh.exe
                                                  C:\Windows\system32\Ldohebqh.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:3812
                                                  • C:\Windows\SysWOW64\Lgneampk.exe
                                                    C:\Windows\system32\Lgneampk.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:4448
                                                    • C:\Windows\SysWOW64\Lilanioo.exe
                                                      C:\Windows\system32\Lilanioo.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:3528
                                                      • C:\Windows\SysWOW64\Lnhmng32.exe
                                                        C:\Windows\system32\Lnhmng32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:5076
                                                        • C:\Windows\SysWOW64\Ldaeka32.exe
                                                          C:\Windows\system32\Ldaeka32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          PID:2908
                                                          • C:\Windows\SysWOW64\Lgpagm32.exe
                                                            C:\Windows\system32\Lgpagm32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            PID:4752
                                                            • C:\Windows\SysWOW64\Ljnnch32.exe
                                                              C:\Windows\system32\Ljnnch32.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:3048
                                                              • C:\Windows\SysWOW64\Laefdf32.exe
                                                                C:\Windows\system32\Laefdf32.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:3696
                                                                • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                  C:\Windows\system32\Lddbqa32.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:1584
                                                                  • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                    C:\Windows\system32\Lgbnmm32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    PID:1568
                                                                    • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                      C:\Windows\system32\Mjqjih32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:5100
                                                                      • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                        C:\Windows\system32\Mnlfigcc.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:3076
                                                                        • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                          C:\Windows\system32\Mpkbebbf.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:2720
                                                                          • C:\Windows\SysWOW64\Mdfofakp.exe
                                                                            C:\Windows\system32\Mdfofakp.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:4488
                                                                            • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                              C:\Windows\system32\Mgekbljc.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:4716
                                                                              • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                C:\Windows\system32\Mkpgck32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                PID:2488
                                                                                • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                  C:\Windows\system32\Mjcgohig.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:4608
                                                                                  • C:\Windows\SysWOW64\Majopeii.exe
                                                                                    C:\Windows\system32\Majopeii.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    PID:3164
                                                                                    • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                      C:\Windows\system32\Mpmokb32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      PID:4880
                                                                                      • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                        C:\Windows\system32\Mdiklqhm.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:4300
                                                                                        • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                          C:\Windows\system32\Mgghhlhq.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:4168
                                                                                          • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                            C:\Windows\system32\Mkbchk32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            PID:2920
                                                                                            • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                              C:\Windows\system32\Mnapdf32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:3544
                                                                                              • C:\Windows\SysWOW64\Mamleegg.exe
                                                                                                C:\Windows\system32\Mamleegg.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:64
                                                                                                • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                  C:\Windows\system32\Mpolqa32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4508
                                                                                                  • C:\Windows\SysWOW64\Mcnhmm32.exe
                                                                                                    C:\Windows\system32\Mcnhmm32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:2596
                                                                                                    • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                      C:\Windows\system32\Mkepnjng.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:1752
                                                                                                      • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                        C:\Windows\system32\Mjhqjg32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        PID:1052
                                                                                                        • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                          C:\Windows\system32\Maohkd32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:516
                                                                                                          • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                            C:\Windows\system32\Mpaifalo.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:3636
                                                                                                            • C:\Windows\SysWOW64\Mdmegp32.exe
                                                                                                              C:\Windows\system32\Mdmegp32.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:100
                                                                                                              • C:\Windows\SysWOW64\Mglack32.exe
                                                                                                                C:\Windows\system32\Mglack32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:4304
                                                                                                                • C:\Windows\SysWOW64\Mjjmog32.exe
                                                                                                                  C:\Windows\system32\Mjjmog32.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4104
                                                                                                                  • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                    C:\Windows\system32\Mnfipekh.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:5112
                                                                                                                    • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                      C:\Windows\system32\Mpdelajl.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies registry class
                                                                                                                      PID:5052
                                                                                                                      • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                                        C:\Windows\system32\Mcbahlip.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:1692
                                                                                                                        • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                                          C:\Windows\system32\Mgnnhk32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1484
                                                                                                                          • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                            C:\Windows\system32\Nkjjij32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4784
                                                                                                                            • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                              C:\Windows\system32\Nnhfee32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4960
                                                                                                                              • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                                C:\Windows\system32\Nqfbaq32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3720
                                                                                                                                • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                  C:\Windows\system32\Nceonl32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:2956
                                                                                                                                  • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                                    C:\Windows\system32\Nklfoi32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:4560
                                                                                                                                    • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                                      C:\Windows\system32\Njogjfoj.exe
                                                                                                                                      66⤵
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:1876
                                                                                                                                      • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                        C:\Windows\system32\Nafokcol.exe
                                                                                                                                        67⤵
                                                                                                                                          PID:1220
                                                                                                                                          • C:\Windows\SysWOW64\Nqiogp32.exe
                                                                                                                                            C:\Windows\system32\Nqiogp32.exe
                                                                                                                                            68⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:3716
                                                                                                                                            • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                                                              C:\Windows\system32\Nddkgonp.exe
                                                                                                                                              69⤵
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:4888
                                                                                                                                              • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                                C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                                70⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                PID:1984
                                                                                                                                                • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                                  C:\Windows\system32\Njacpf32.exe
                                                                                                                                                  71⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  PID:4328
                                                                                                                                                  • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                                                    C:\Windows\system32\Nbhkac32.exe
                                                                                                                                                    72⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:4220
                                                                                                                                                    • C:\Windows\SysWOW64\Ndghmo32.exe
                                                                                                                                                      C:\Windows\system32\Ndghmo32.exe
                                                                                                                                                      73⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:3336
                                                                                                                                                      • C:\Windows\SysWOW64\Ngedij32.exe
                                                                                                                                                        C:\Windows\system32\Ngedij32.exe
                                                                                                                                                        74⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        PID:5024
                                                                                                                                                        • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                                          C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                                          75⤵
                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:4972
                                                                                                                                                          • C:\Windows\SysWOW64\Nnolfdcn.exe
                                                                                                                                                            C:\Windows\system32\Nnolfdcn.exe
                                                                                                                                                            76⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            PID:3600
                                                                                                                                                            • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                              C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                              77⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              PID:1672
                                                                                                                                                              • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                                C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                                78⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:1776
                                                                                                                                                                • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                                                  C:\Windows\system32\Ncldnkae.exe
                                                                                                                                                                  79⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:4836
                                                                                                                                                                  • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                                    C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                                    80⤵
                                                                                                                                                                      PID:4336
                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 400
                                                                                                                                                                        81⤵
                                                                                                                                                                        • Program crash
                                                                                                                                                                        PID:5136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4336 -ip 4336
        1⤵
          PID:2676

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Kagichjo.exe

          Filesize

          128KB

          MD5

          015e0d3a20056355d991c42ffeba52ae

          SHA1

          169ffe7c1d6743bde2d81935b6ad58b407778662

          SHA256

          667cbe7ac54070c18c929bebcb7908bebcdbeb3d1675f0ee987f63fc8a28106a

          SHA512

          a0c01de432b6508cb5d2f35f3667a7559b509bba9c6d2c27da225c962dac09b847f8cdcb110fea4fdd3f6356951c4d2545a4fc303ef60a34974b8d9e0b6b717e

        • C:\Windows\SysWOW64\Kajfig32.exe

          Filesize

          128KB

          MD5

          cdea1250dedf8ef3208ef8a673f477ba

          SHA1

          79544ecb9c043593517dddfef9928a058ccada5c

          SHA256

          3822a9680afebf371ad1e938c3739e6da21454e37ebde6a4f30aa63df6863ad3

          SHA512

          b5dc5147439e46372f342948f0a1810a1748e775355ec566b1a212df3532305c68eb5a206f945c33c1e2a296c8752b2eb1eae843a682735d95807e3f781c97f1

        • C:\Windows\SysWOW64\Kcifkp32.exe

          Filesize

          128KB

          MD5

          a453b793ca029fd312928c0b45a61aae

          SHA1

          aa3d72fd66bdf980fb99a0b19f3c96740c945686

          SHA256

          d789e343f0965a2f10d15770473e04b51ef8258ef2e9b6cbe2cdf0590d6f4a57

          SHA512

          e508f84b9d2c77357aa9fe0dcde53a821707804240b1af2df5a8fbf13123baaac0a4bd4aa365439a525c1dcf14a5778866ed82b92152f1286176106bd1ac8e8f

        • C:\Windows\SysWOW64\Kckbqpnj.exe

          Filesize

          128KB

          MD5

          db42d361c0f29c496a756bfbb4b8d5d6

          SHA1

          218c918453c97c2bc901c2f7ffe2715598ad712b

          SHA256

          8e94f0bd6f4268db3cfe3f7a26fd60a44cc6a9e8299c0266add11c79176c6c98

          SHA512

          b6d23fca6f39b991350d7de5239ce5572cc064c0c8f5d242699ab01dc5d401c47e4e6d03e0cbf24ea74d14bb13a5827169468b6ae8ea79f9e2f5705bb757eeee

        • C:\Windows\SysWOW64\Kdhbec32.exe

          Filesize

          128KB

          MD5

          b513774f7aaec609108652ac4a23e398

          SHA1

          598611168f4998c1138868487fde71d93126de99

          SHA256

          baf131e59f3fcba9c3aade9e80421c45325d28fbd4027c99ae3e98a2c4ccf4d6

          SHA512

          33810ccb19e6ff68e98c58966f96c467ee89265ddae95c07274d7cbb9e8e1844ec824254e9cc7bd61e49ca68939bdbc724c840d9bc0d155fc5e3546b0003019b

        • C:\Windows\SysWOW64\Kgfoan32.exe

          Filesize

          128KB

          MD5

          26bbc6d393e24ac0c5a237a33f262381

          SHA1

          ea7fa6e83275b5fb2cb02a829053c4a62dd4b544

          SHA256

          029d3572bcf54721e6258a3638900b537b3ab3ad6ca01d0566ee0f7537c3ca9b

          SHA512

          0d7094354245d11e025f9a671007db6d56728d4a3267c6b6bd5ae9d473dd231ca605b2276c558eed2ceb075870861bd65331f3d7b3603232297bc993b2e29a72

        • C:\Windows\SysWOW64\Kibnhjgj.exe

          Filesize

          128KB

          MD5

          c5426f8fa6e4cfd0a2ad2ddc8dc0d53a

          SHA1

          3f8b163bad89384acbf25464774b4188767a364b

          SHA256

          6359945e7848c3941f40692e201fe48435e7c45e776a063e9d284b0b6a0280fc

          SHA512

          bbb8d5feb63da467df4d20b53b13d84500bcc766ee6d37cd77977e41779c8325160b6116275c4599fc4b94a63e546111c915c2d8b97fe1feb0ad3515d600ee4a

        • C:\Windows\SysWOW64\Kkbkamnl.exe

          Filesize

          128KB

          MD5

          ba6647ce316d23773392a0a0b7dac89b

          SHA1

          e90ae244d0cc4d5bf4ee132c35f61ead68604b00

          SHA256

          7781d4ba6213c002773006a981630869de2cf774d411037f8bda564ca7169855

          SHA512

          09eac6c77265c60dba2a80f3c969def7159a8a894f828ec03981161f8fb5ae5b03bb5eae70fd710a1a71782661a1b370f90c900aa64aedbc5a8e068e4cb3fd3a

        • C:\Windows\SysWOW64\Kknafn32.exe

          Filesize

          128KB

          MD5

          ef86c4d237f38d8e016f1fc7ca387c96

          SHA1

          5040691486ea55f002a5ff3ad2d75fb5da61e1dd

          SHA256

          0021c5f1e2ad85048a5db123c0b46989ab3e67792a9d4ed928daad7bae3743a9

          SHA512

          9ab723c46096a6ce1cc156662852ebddb719c9138e4ecf3b55fe62e2bd7e856065f43de037df49cecd053319b3559247410e8a64f5f15ba00157c9c30d90fb7c

        • C:\Windows\SysWOW64\Kkpnlm32.exe

          Filesize

          128KB

          MD5

          932483fc2ddcdfcbf0e5bfb26acc6983

          SHA1

          42cad66bea168411d41cf587e74481d5ca739b9e

          SHA256

          2847cbe1931cfd62f1c7e11a2c9fb2c6f9d5f351ed695690dc55f7a604c4c702

          SHA512

          6672d4f346d4dba78aee8cbe88dcf03ec71dddd5f8921e73be5aa9f4c8f6add9cceef17234a01ec55dedc6bcee512978e800247617c24fac14675e4bee9a573c

        • C:\Windows\SysWOW64\Kmlnbi32.exe

          Filesize

          128KB

          MD5

          2141c12e01b1b838746910a4b438b4d2

          SHA1

          7d687c4906d71c109dd5b5d4fba4ae11ffadba60

          SHA256

          20d83bee1f4b35cb183c4ea6f5857e97e9c95c0e6f87afd8b04370e2c10a183d

          SHA512

          7a8b73e8c7416be3eb62e7aa78e3089785939cbe201b89326cd70e36f597ef1b861525933f7aacc33ce5eb6ea4773399f2f1815f0b530f2e1e5a80aca538a945

        • C:\Windows\SysWOW64\Kpjjod32.exe

          Filesize

          128KB

          MD5

          cff1e89fab6ae801d456ca1624ae5f73

          SHA1

          3766c7c08ae539845d700750a9ff03b59f0fc724

          SHA256

          83754a3eff12bdc8b679b09b663a427fa39df2b59df1b1b780ea4b117fddade8

          SHA512

          130f66b901256da1175b17a79f78859981f879810875b2525d328bacd4f4c4e6a5f47bf639464314c9b520dc161dc10841d45e48dea785b8aca1a098918f30bb

        • C:\Windows\SysWOW64\Laalifad.exe

          Filesize

          128KB

          MD5

          63f63d25e6d2e3efcd0e176f32bd018e

          SHA1

          c5b8ade22a44d100485d5d60cd8a68121bb7fb37

          SHA256

          dac4a79a9045bbad3a11693d7a85ba925ce64935b7e9e0f10339cbecd091277f

          SHA512

          87b22a01af4cc31ace15101ae272b3aa75eae88773b7180e0fbcc7d75cc7f78d30fbca73a852fbddc252f65210637d12c880f7fa2714ad9bf4f12ba831430aa2

        • C:\Windows\SysWOW64\Laefdf32.exe

          Filesize

          128KB

          MD5

          b754767f36d1f74b6c62c0c1ca7f34b9

          SHA1

          ad2e95fd18a60c85b0610d9fda3cf731c390d0fd

          SHA256

          d0945413072c43170e8633ff58e61d3c33e6c9be9c0a985af4b359c3a717e0a7

          SHA512

          706ba4372b55b76ffbdfd6370000a1b553e14ff091ddcd2e1d6b75d3308fbb8a9f2b8d91285140f6a0be5b8cd31cd93663741426894cc45a1802f1a105e81e2f

        • C:\Windows\SysWOW64\Lalcng32.exe

          Filesize

          128KB

          MD5

          4a9a69a87a23bd6f1e5f24b4cf501c65

          SHA1

          c0d59d4fa631fbf221e19f9a038198a1d822c278

          SHA256

          90ae63e3d00c30d83a9db36b891900e1039d891e9f0cb43cc28b3d03c1be4331

          SHA512

          9b1a73a4f9aa8bc403fd2acf9ef4b9805f5f54c5ff888f2f367604ee9f8790a15952ef2878f50b9850428c5d6e2ed32d0c00c2fa980113bff515054c21feeed1

        • C:\Windows\SysWOW64\Lcpllo32.exe

          Filesize

          128KB

          MD5

          665edd7b45630e7ebfc43d587f853742

          SHA1

          33524be8b0ddc5ee4d239cbec86f35d40f8b33a6

          SHA256

          4d6eda7b4a31baa28a0f48be1c3d321c15919e9c04c92f64b3e07301425058e3

          SHA512

          c335ba02359ffbf6435196904846828b147ad065fa35eb4f1a0e6a0047b886134957b577c34fc33f37199d5bc95d344e41d3906d96487e2d51b311a699236968

        • C:\Windows\SysWOW64\Ldaeka32.exe

          Filesize

          128KB

          MD5

          b5abaedbd725e77d1d28fc32ccb4e75a

          SHA1

          204f184b447f50d73d9ab5cb5b44a9edbe6adb60

          SHA256

          99e4b3c24a5c3fc1590088e42b2e12751f698f300bb1239d764f6f9d8b7c3636

          SHA512

          97cf219a32fb1412fa40566c3f6e33b558f907c74ad201e4f06290411f47134f236b4f477d49e5018ee3ced39fa03895aabfa2d090e979c77c89d78ae09dc1a6

        • C:\Windows\SysWOW64\Ldaeka32.exe

          Filesize

          128KB

          MD5

          9a864ebba068d1aee7dd500171a71d51

          SHA1

          73f3e7c84ca5dec1631683b6809f902d0770bdde

          SHA256

          ea6ef055a501fc813593ba5b29cfef197c8d5329263e189592f22990ac4e7dc9

          SHA512

          46b7b1a65e7347d7199371dbe7a747e9929aefe06639383f45a454bc1f45df4afb6bf08ab160fb79037d38ec29a28be8b1231c5c0bb77935b37f1713bd407267

        • C:\Windows\SysWOW64\Lddbqa32.exe

          Filesize

          128KB

          MD5

          4bd52fea28232aafabd5b64fb1b23332

          SHA1

          6b4e3253cfbdefa3eb306ad220cebb7d5268859b

          SHA256

          090faffaf5534111491052a9af3518072f35fe3488ca7dcd3d482350f97af71a

          SHA512

          59778d461a82914f3d750c63ddc851791021786dffb4a4165018ea26482ffe0a0805fb7f10891560f534fb667450d956335c9f978f2cfe23ad9c4a5bde22bc21

        • C:\Windows\SysWOW64\Ldohebqh.exe

          Filesize

          128KB

          MD5

          419813974028c212de3b9c498ab80f18

          SHA1

          a0f657be7dca2cb9ce7b99d8c1c27958b07276fd

          SHA256

          50856f44f3a3c6caf40c10619caacc0af5d3d68c7302e25219a440ffc32a824a

          SHA512

          e34c3d3c2c809d1e7612e67f9841c21d672c68159f59e5d8ed5d6c3b7fb88ff2267f191d7d971c62686b8346dcd98e3dd4de8d05548c5d7c75ca86b6e1b4485e

        • C:\Windows\SysWOW64\Lgbnmm32.exe

          Filesize

          128KB

          MD5

          456deb3c9e5f389700b062df8607e93e

          SHA1

          2f4f7afe8c81215656891d0dc2d42c191d330ade

          SHA256

          2a70fc6a5854d084d1fd125a10d5287157d8e2b844862554a64160655456a786

          SHA512

          3d671bb991f57cd5bd03dfc55dd72a9940570091c43d8e2808f5392a76332b0430eb1fc741b85bbe0471f96373e7ffd247ff32492792dd8ef0c3e777d160c3f5

        • C:\Windows\SysWOW64\Lgneampk.exe

          Filesize

          128KB

          MD5

          e74ce55abbcd221380f8be556f69f36a

          SHA1

          c78d616214dffdace0cfd5cae555cfdc066528e0

          SHA256

          85a9dba25cee8b8be7a092e05534016e1f250c42d863f66f4050361e057646ea

          SHA512

          3b07225e4cd806b3ac2b7c482c606a446bb13f711d38bf839a36cdd39a05ea43b7d41fe741322cae685c1ce2e59f998323c178f72869c969e3bf0c09a238778e

        • C:\Windows\SysWOW64\Lgpagm32.exe

          Filesize

          128KB

          MD5

          2de6e884eeb0f2be6719e4b5941aa83e

          SHA1

          cb83663960992f36b4e969311da2da7f7fc82017

          SHA256

          81f46fdee2501bc7b64c7401cba78be4cf6a9a90c2fe84c6c1d3df5d3f8ec539

          SHA512

          c079fef57890eaed76e14741a016ad0d0f6b06732f7e9ca9de72ac853939beeb8711fc0c1884d38ef90dea6ff5a67b032b2e85b3ca3b17704e12c17de55439f6

        • C:\Windows\SysWOW64\Lilanioo.exe

          Filesize

          128KB

          MD5

          18dc0f5b3d41dc092bf9aa8f8aaa34b7

          SHA1

          f33aed4bed6c072bed59128ff658b561f29311f1

          SHA256

          86c7775fa3bd19ec79a2fdfea255a61df395eed64cbafcb46d8e580bacba50eb

          SHA512

          a55113193aa3e65f461ca0b7b2604c5a2cc2578db5f8ccbc9fc54d9a0dddda969790760d8eb59857037ee3d2a3a11f3911704719e516ce0a1e231eca2557827d

        • C:\Windows\SysWOW64\Ljnnch32.exe

          Filesize

          128KB

          MD5

          e7e398c264ece755619043a24f864ad8

          SHA1

          31c0d7e5ead4339f8d7956c1919e90b20e37f98b

          SHA256

          4cff136bf0ec6dabdade2f17c09a314772e38b2c8ce02c606b5e7b3196fd2160

          SHA512

          17a701e966c29374ce0bf6d1098201298a39e7cfe59394927a5259a6649447a0e8ac93a3441c1ccd0c3f7aa435a370f2af3063f0ae7b51f273bfee4d58bb92c3

        • C:\Windows\SysWOW64\Lkdggmlj.exe

          Filesize

          128KB

          MD5

          addf0d664764c2784f34feb4d97dcf2a

          SHA1

          40cc33d85645565bab878dfe7250ff35e2a6013f

          SHA256

          10c07fa20a5ea4a0a147e121d055869ea9101c20fe051fe53a08ba162c67c138

          SHA512

          89a07352bc542ee03a5f4024a808e3db33db62aba645f20c6c639ef63dd742e7cd641a3c03686c092c99945dd63e6e16ed1fe7a362eddef366e3402f9bef996d

        • C:\Windows\SysWOW64\Lkgdml32.exe

          Filesize

          128KB

          MD5

          c0370001079ef238e73f0b2e9eadbe30

          SHA1

          dada0ec4bd0ea80d711ef9bf9e59275a65edb322

          SHA256

          a1e839500c2d65f40cbc3780f87fc1203326b50062df5b78963a157d7a9cf6d9

          SHA512

          c5285227e7d5a2624142b74a68cb0abdb1df103760d490322530fbdf271554cf429507efb6a39b646f9fe54f8ff45c9fb63b945b9fc1ca27b1cf6b4df13d8b19

        • C:\Windows\SysWOW64\Lmccchkn.exe

          Filesize

          128KB

          MD5

          e0ed8f6fd8263301d6edcdae216614ea

          SHA1

          cfbb936a313619485a53631cfadc9a4cd9907359

          SHA256

          01e2ae7cad582c2b67f141783886a658ad539813b7e0251ceaba8e8136e05134

          SHA512

          916931554a97406e53ab9b663699d3a17bf9c86f75ab399816e9d593a55aca253307b84c74c4d1a2b29170e7a06525822072af0ef922e6e45b7bd44563bd8d0c

        • C:\Windows\SysWOW64\Lmqgnhmp.exe

          Filesize

          128KB

          MD5

          5fc186a26c2c2be04cc1a96f86caad61

          SHA1

          d718988d6beaa69d48858f40d7f953a2e3a691cc

          SHA256

          424b5573bbc0a1d3f55cbbbd4b7b4d8e82dafdc7535894e68cc86b4e0241d9b7

          SHA512

          fef41d8ba99b62e23a46cc458fa4c21408ed31946c887f746945e64f9809bc254f7b9c8e542d70821b3f76af27cd259f83e4ded929641e88b2c138475120199e

        • C:\Windows\SysWOW64\Lnepih32.exe

          Filesize

          128KB

          MD5

          1871a9f799d255617885e5ae1f55e6e4

          SHA1

          d84b642e9bc3075ebe273852cd8780c75a8cb4c7

          SHA256

          878191d8aaf33fc0cca02ba24131608a27951926845077366a9ff65379a022d5

          SHA512

          f6e7f3c569e6f68710dac2380c777b6448322ed76e0977dcd386ab875f8c8ea00ad1b58762309c336850ffc502036a6d248d82fcb9be6cbcfe9f95ae71f4fac7

        • C:\Windows\SysWOW64\Lpappc32.exe

          Filesize

          128KB

          MD5

          4336c32978c84e839bb8d3fa490e07c0

          SHA1

          796a608152226443fd98cae861b8eb324e0b9da5

          SHA256

          eb8ee5d86604b1f2909e444cd712b294a4282bd1aa077e38a5f8bf6cf3112795

          SHA512

          7efae189b79e087354d405b78d05880989882c1426afc14557a151a7c40e0d1637a4c8e854df674d361264704f2366cee97c7ecdde3335d1c2c30fe9c7d13202

        • C:\Windows\SysWOW64\Lpocjdld.exe

          Filesize

          128KB

          MD5

          e8b12fed48a6220f5101a629fc2dbbf1

          SHA1

          16f5580d96929ad1bce99fa4e47b1edef4eb709c

          SHA256

          d0f4c4b084e46e07bcd1db833a482b2be480a5617752f6183e2ac83955236aef

          SHA512

          0ae7c1758d91f10d97b69211e42594fbd2d31f03cdca0375db74f409c2fdbc0fc5d7104ef2591c4a58ffa11b7e0a48ef3cb4cafaf19d04da25093bd085cb970a

        • C:\Windows\SysWOW64\Mdfofakp.exe

          Filesize

          128KB

          MD5

          e48a35eb93b72a64619987357e5cc5fa

          SHA1

          3069f941ae8d262d9798e82c146f8a2548b84e43

          SHA256

          fbaa01fb96f11921a35d44a55771c7380cb44f0621b32f255a85686617e9b937

          SHA512

          9968841a642e74a4639cebc0f33657daea3351244cfb866fa0c3d2b5112958787cbbc9460b6062cd172bbf76d0e75adf9e38fce6daf88933f1ff7e31e38808a9

        • C:\Windows\SysWOW64\Mdmegp32.exe

          Filesize

          128KB

          MD5

          e7b86a031f8f4884ff60fc31ed02c153

          SHA1

          ac9b15a3d4393a2d15f252b659e9c2c1f1d3851a

          SHA256

          03cefe714e78cf3f470f43bc4f6ff748e02516403a0f52ef12585941108faae4

          SHA512

          355548345fa999a45f08257b4ce8dff06a5782c1a2b540ee38f663c19fd0bcb59e84887fbc2634645a87017b48d24d20752540a4e439fac0814a0a8f13e9b4df

        • C:\Windows\SysWOW64\Mkepnjng.exe

          Filesize

          128KB

          MD5

          040b2d6a14de42ea521e163a3118e96d

          SHA1

          41cafdf3fb3226ceb079bae3b232f918b2987695

          SHA256

          bc716802f8e11c6b63ca7e3dffd116ed7b3134d585bb11434d4bd856a91b0c6a

          SHA512

          e265d3c07d6ba6538771af45a92aaa26579da6b3e106311077a78da6c595ef4fc7650c7fdb911cd77a9d1f9481d552a9ef2050258e11cdcac15834c2ab0f5d34

        • C:\Windows\SysWOW64\Mkpgck32.exe

          Filesize

          128KB

          MD5

          81873b52f3a6c492d926589a6d59de77

          SHA1

          494d18084eb07114cdafd7dff5dad6252607d03e

          SHA256

          09eb7d13d0ee2e37566bf327330d91c707c70c306bdcbbf98b5449c58aab1a9d

          SHA512

          dc4fa33b595d3228ec6ba3f97fdac6458dec79a27b6fc29af7f497437a114406b620fa5069d199b45772387ade265b4dbdcdb9124aa28ef53227e74ccc38db6d

        • C:\Windows\SysWOW64\Mnapdf32.exe

          Filesize

          128KB

          MD5

          10eacecb697ab14bc2e47337c7296d12

          SHA1

          888a6418f4a6e9e112026e74cede0e77bd7f06c0

          SHA256

          3e00cdfce9bd36fc72b23a61d89727e38f7d639aacf85465b587e2ff1e767cbc

          SHA512

          54875c283594ca340a7e69dbe20680fdb840d777fb04ef065b68550c3db86c6632f3d58d036def96c347a4b766e4a9fe5a7a501880b45e02886a90d8ffd45d29

        • C:\Windows\SysWOW64\Mpmokb32.exe

          Filesize

          128KB

          MD5

          4942718041806ad0f94e304a55532ad9

          SHA1

          15cb60f256a20c3b04b55e3782ac154ff7349686

          SHA256

          e8bc2abf8afc63f90fc05b0cac0383e3cd25327c7c135add9fe61514e1e781be

          SHA512

          c72e4e7ecfa43ba9861a318fb5889322093d02427a6fdf38231f9943f11a465aefd18f345075f3c0033b36b77608bd8be07747d919c8bc7316c8ce601f39ca78

        • C:\Windows\SysWOW64\Mpolqa32.exe

          Filesize

          128KB

          MD5

          584b1fe59defdc4f5e70760b7bed164d

          SHA1

          1a7c0f939ec2337fa60a6e997d42f6b4e6285665

          SHA256

          7dcdebcdb2ceec9544a45f1561dee49d7ce4dbac71bcdd2d8ff6a429190ed108

          SHA512

          eb4ce7d1dd40b1bed9c9349d4d7b0d981e1d1e457943aefebdbd9d30fb9b7557e73e0c70f02a5e510c47a25cb75f82119b390d51e90cb99de52f4615a800f5d2

        • C:\Windows\SysWOW64\Ngcgcjnc.exe

          Filesize

          128KB

          MD5

          d446d98356a0ba4264c38196ad72d5d4

          SHA1

          111320aba571ea94bbeff24df84dac3b0e242d29

          SHA256

          d68bb2ac7d1a7d0c2c1bed39833729196850a6fce10e25e97cee61eda1017e21

          SHA512

          a9407719f2bf7f873ff6b90f74cdcf2affac80a287ac3257d9aec73d7fbbcf39d8c168822fb66174724d3fc6ccebc6c492fc5c3d07a573747b6adc2941d0a08d

        • C:\Windows\SysWOW64\Nqiogp32.exe

          Filesize

          128KB

          MD5

          7ccbd1d006a891f8f214414ac1770c56

          SHA1

          a8aea634293c91f2563061243ad7ebbfeee09d24

          SHA256

          b18f43f7948cf6afd0fd91b1adb3382eaa81027e50d4df24d4933c8229de8bd1

          SHA512

          4833438d4c6ac7cc94a155addd93e6c1a3d0e458099442d5d21a2cf138ff6ca7bc47f029c319b10b67d3062ee6e3236cc1ca9b2d9b693e3ea028cfe4f6f38cf6

        • memory/64-341-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/100-383-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/516-375-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/548-157-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/796-105-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1044-85-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1052-365-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1220-549-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1220-461-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1412-56-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1484-423-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1568-257-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1584-249-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1612-0-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1612-1-0x0000000000431000-0x0000000000432000-memory.dmp

          Filesize

          4KB

        • memory/1672-525-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1692-553-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1692-413-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1752-364-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1776-532-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1848-73-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1864-129-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1876-459-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1876-548-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1984-546-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1984-479-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2008-93-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2444-117-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2488-297-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2596-353-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2720-275-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2724-33-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2876-53-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2908-217-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2920-329-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2956-443-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2956-551-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3048-233-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3052-69-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3076-273-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3080-181-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3164-305-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3336-497-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3336-543-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3352-165-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3528-200-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3544-340-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3600-519-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3628-9-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3636-377-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3696-244-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3716-471-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3720-441-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3756-169-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3812-185-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4032-97-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4088-17-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4104-395-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4168-323-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4220-495-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4220-544-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4300-321-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4304-389-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4328-545-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4328-485-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4336-539-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4336-540-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4448-193-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4488-281-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4508-347-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4524-125-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4560-550-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4560-449-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4564-45-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4608-299-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4716-287-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4752-225-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4776-25-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4784-425-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4784-554-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4836-541-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4836-533-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4848-145-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4880-315-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4888-473-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4888-547-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4960-552-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4960-431-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4972-509-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4972-542-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5024-508-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5032-136-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5052-411-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5076-209-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5100-263-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5112-405-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB