Analysis

  • max time kernel
    139s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 20:53

General

  • Target

    bec119853fc519bafd4b811e5fabae80_NeikiAnalytics.exe

  • Size

    128KB

  • MD5

    bec119853fc519bafd4b811e5fabae80

  • SHA1

    943a6a3dce1007c52581311d93f026082e42ffe3

  • SHA256

    f645ac8d7f12d5be6301e997ef6fc620b38470b971b12b840a919ae50757e9f5

  • SHA512

    53d756db8ba2c32b2395d650d576c683bb2197b5a8c238b8275e86183091270e06f84f23e28c5ba82d9efa07cbb43e786d7b57b524dcd6d160968d814f447c5a

  • SSDEEP

    3072:BEkIb57YHDrrClshsleuSJdEN0s4WE+3S9pui6yYPaI7DX:BEk05cHyshsIrENm+3Mpui6yYPaI/

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bec119853fc519bafd4b811e5fabae80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\bec119853fc519bafd4b811e5fabae80_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SysWOW64\Ompfej32.exe
      C:\Windows\system32\Ompfej32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Windows\SysWOW64\Ojfcdnjc.exe
        C:\Windows\system32\Ojfcdnjc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4488
        • C:\Windows\SysWOW64\Ojhpimhp.exe
          C:\Windows\system32\Ojhpimhp.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4552
          • C:\Windows\SysWOW64\Pjkmomfn.exe
            C:\Windows\system32\Pjkmomfn.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3996
            • C:\Windows\SysWOW64\Pmlfqh32.exe
              C:\Windows\system32\Pmlfqh32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1436
              • C:\Windows\SysWOW64\Ppolhcnm.exe
                C:\Windows\system32\Ppolhcnm.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:5096
                • C:\Windows\SysWOW64\Qobhkjdi.exe
                  C:\Windows\system32\Qobhkjdi.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2564
                  • C:\Windows\SysWOW64\Qodeajbg.exe
                    C:\Windows\system32\Qodeajbg.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3276
                    • C:\Windows\SysWOW64\Aaenbd32.exe
                      C:\Windows\system32\Aaenbd32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3724
                      • C:\Windows\SysWOW64\Amnlme32.exe
                        C:\Windows\system32\Amnlme32.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:4100
                        • C:\Windows\SysWOW64\Adkqoohc.exe
                          C:\Windows\system32\Adkqoohc.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:1748
                          • C:\Windows\SysWOW64\Apaadpng.exe
                            C:\Windows\system32\Apaadpng.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:1804
                            • C:\Windows\SysWOW64\Baannc32.exe
                              C:\Windows\system32\Baannc32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:1848
                              • C:\Windows\SysWOW64\Bogkmgba.exe
                                C:\Windows\system32\Bogkmgba.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4476
                                • C:\Windows\SysWOW64\Cggimh32.exe
                                  C:\Windows\system32\Cggimh32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:2496
                                  • C:\Windows\SysWOW64\Caojpaij.exe
                                    C:\Windows\system32\Caojpaij.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3580
                                    • C:\Windows\SysWOW64\Caageq32.exe
                                      C:\Windows\system32\Caageq32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:720
                                      • C:\Windows\SysWOW64\Cdbpgl32.exe
                                        C:\Windows\system32\Cdbpgl32.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:4424
                                        • C:\Windows\SysWOW64\Dahmfpap.exe
                                          C:\Windows\system32\Dahmfpap.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4692
                                          • C:\Windows\SysWOW64\Dggbcf32.exe
                                            C:\Windows\system32\Dggbcf32.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:1644
                                            • C:\Windows\SysWOW64\Dgjoif32.exe
                                              C:\Windows\system32\Dgjoif32.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:1384
                                              • C:\Windows\SysWOW64\Ehlhih32.exe
                                                C:\Windows\system32\Ehlhih32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:4776
                                                • C:\Windows\SysWOW64\Egaejeej.exe
                                                  C:\Windows\system32\Egaejeej.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:2288
                                                  • C:\Windows\SysWOW64\Egcaod32.exe
                                                    C:\Windows\system32\Egcaod32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:3812
                                                    • C:\Windows\SysWOW64\Eomffaag.exe
                                                      C:\Windows\system32\Eomffaag.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:1420
                                                      • C:\Windows\SysWOW64\Fqppci32.exe
                                                        C:\Windows\system32\Fqppci32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:1996
                                                        • C:\Windows\SysWOW64\Fijdjfdb.exe
                                                          C:\Windows\system32\Fijdjfdb.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:1668
                                                          • C:\Windows\SysWOW64\Feqeog32.exe
                                                            C:\Windows\system32\Feqeog32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:5060
                                                            • C:\Windows\SysWOW64\Finnef32.exe
                                                              C:\Windows\system32\Finnef32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:3420
                                                              • C:\Windows\SysWOW64\Fiqjke32.exe
                                                                C:\Windows\system32\Fiqjke32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:404
                                                                • C:\Windows\SysWOW64\Ggfglb32.exe
                                                                  C:\Windows\system32\Ggfglb32.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:4412
                                                                  • C:\Windows\SysWOW64\Gpolbo32.exe
                                                                    C:\Windows\system32\Gpolbo32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:2372
                                                                    • C:\Windows\SysWOW64\Gijmad32.exe
                                                                      C:\Windows\system32\Gijmad32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:1828
                                                                      • C:\Windows\SysWOW64\Ghojbq32.exe
                                                                        C:\Windows\system32\Ghojbq32.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:2404
                                                                        • C:\Windows\SysWOW64\Hehdfdek.exe
                                                                          C:\Windows\system32\Hehdfdek.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:3140
                                                                          • C:\Windows\SysWOW64\Haodle32.exe
                                                                            C:\Windows\system32\Haodle32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:1392
                                                                            • C:\Windows\SysWOW64\Hbnaeh32.exe
                                                                              C:\Windows\system32\Hbnaeh32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              PID:4136
                                                                              • C:\Windows\SysWOW64\Ipbaol32.exe
                                                                                C:\Windows\system32\Ipbaol32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:2112
                                                                                • C:\Windows\SysWOW64\Ilibdmgp.exe
                                                                                  C:\Windows\system32\Ilibdmgp.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  PID:2300
                                                                                  • C:\Windows\SysWOW64\Ieccbbkn.exe
                                                                                    C:\Windows\system32\Ieccbbkn.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:1092
                                                                                    • C:\Windows\SysWOW64\Ihdldn32.exe
                                                                                      C:\Windows\system32\Ihdldn32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      PID:4904
                                                                                      • C:\Windows\SysWOW64\Jlbejloe.exe
                                                                                        C:\Windows\system32\Jlbejloe.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:456
                                                                                        • C:\Windows\SysWOW64\Jhifomdj.exe
                                                                                          C:\Windows\system32\Jhifomdj.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:4584
                                                                                          • C:\Windows\SysWOW64\Jhkbdmbg.exe
                                                                                            C:\Windows\system32\Jhkbdmbg.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:1108
                                                                                            • C:\Windows\SysWOW64\Jhnojl32.exe
                                                                                              C:\Windows\system32\Jhnojl32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              PID:916
                                                                                              • C:\Windows\SysWOW64\Jhplpl32.exe
                                                                                                C:\Windows\system32\Jhplpl32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:4204
                                                                                                • C:\Windows\SysWOW64\Kbhmbdle.exe
                                                                                                  C:\Windows\system32\Kbhmbdle.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  PID:3328
                                                                                                  • C:\Windows\SysWOW64\Kplmliko.exe
                                                                                                    C:\Windows\system32\Kplmliko.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:876
                                                                                                    • C:\Windows\SysWOW64\Khgbqkhj.exe
                                                                                                      C:\Windows\system32\Khgbqkhj.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:4648
                                                                                                      • C:\Windows\SysWOW64\Kpqggh32.exe
                                                                                                        C:\Windows\system32\Kpqggh32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:1564
                                                                                                        • C:\Windows\SysWOW64\Klggli32.exe
                                                                                                          C:\Windows\system32\Klggli32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:1976
                                                                                                          • C:\Windows\SysWOW64\Lebijnak.exe
                                                                                                            C:\Windows\system32\Lebijnak.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:832
                                                                                                            • C:\Windows\SysWOW64\Llnnmhfe.exe
                                                                                                              C:\Windows\system32\Llnnmhfe.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:4976
                                                                                                              • C:\Windows\SysWOW64\Lchfib32.exe
                                                                                                                C:\Windows\system32\Lchfib32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:2024
                                                                                                                • C:\Windows\SysWOW64\Lhgkgijg.exe
                                                                                                                  C:\Windows\system32\Lhgkgijg.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4024
                                                                                                                  • C:\Windows\SysWOW64\Mfkkqmiq.exe
                                                                                                                    C:\Windows\system32\Mfkkqmiq.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:3176
                                                                                                                    • C:\Windows\SysWOW64\Mhldbh32.exe
                                                                                                                      C:\Windows\system32\Mhldbh32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:4000
                                                                                                                      • C:\Windows\SysWOW64\Mljmhflh.exe
                                                                                                                        C:\Windows\system32\Mljmhflh.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:5000
                                                                                                                        • C:\Windows\SysWOW64\Mbgeqmjp.exe
                                                                                                                          C:\Windows\system32\Mbgeqmjp.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          PID:840
                                                                                                                          • C:\Windows\SysWOW64\Mqhfoebo.exe
                                                                                                                            C:\Windows\system32\Mqhfoebo.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:4344
                                                                                                                            • C:\Windows\SysWOW64\Mjpjgj32.exe
                                                                                                                              C:\Windows\system32\Mjpjgj32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              PID:3940
                                                                                                                              • C:\Windows\SysWOW64\Nblolm32.exe
                                                                                                                                C:\Windows\system32\Nblolm32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3884
                                                                                                                                • C:\Windows\SysWOW64\Noppeaed.exe
                                                                                                                                  C:\Windows\system32\Noppeaed.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:2392
                                                                                                                                  • C:\Windows\SysWOW64\Nmcpoedn.exe
                                                                                                                                    C:\Windows\system32\Nmcpoedn.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:5104
                                                                                                                                    • C:\Windows\SysWOW64\Nmfmde32.exe
                                                                                                                                      C:\Windows\system32\Nmfmde32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4292
                                                                                                                                      • C:\Windows\SysWOW64\Nmhijd32.exe
                                                                                                                                        C:\Windows\system32\Nmhijd32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:2128
                                                                                                                                        • C:\Windows\SysWOW64\Niojoeel.exe
                                                                                                                                          C:\Windows\system32\Niojoeel.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:5072
                                                                                                                                          • C:\Windows\SysWOW64\Ojnfihmo.exe
                                                                                                                                            C:\Windows\system32\Ojnfihmo.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:4748
                                                                                                                                            • C:\Windows\SysWOW64\Ookoaokf.exe
                                                                                                                                              C:\Windows\system32\Ookoaokf.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:884
                                                                                                                                              • C:\Windows\SysWOW64\Oqklkbbi.exe
                                                                                                                                                C:\Windows\system32\Oqklkbbi.exe
                                                                                                                                                71⤵
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:3184
                                                                                                                                                • C:\Windows\SysWOW64\Oqmhqapg.exe
                                                                                                                                                  C:\Windows\system32\Oqmhqapg.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:4800
                                                                                                                                                  • C:\Windows\SysWOW64\Ojemig32.exe
                                                                                                                                                    C:\Windows\system32\Ojemig32.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:2332
                                                                                                                                                    • C:\Windows\SysWOW64\Obqanjdb.exe
                                                                                                                                                      C:\Windows\system32\Obqanjdb.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:2508
                                                                                                                                                      • C:\Windows\SysWOW64\Pcpnhl32.exe
                                                                                                                                                        C:\Windows\system32\Pcpnhl32.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:3548
                                                                                                                                                        • C:\Windows\SysWOW64\Ppgomnai.exe
                                                                                                                                                          C:\Windows\system32\Ppgomnai.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:2968
                                                                                                                                                          • C:\Windows\SysWOW64\Pafkgphl.exe
                                                                                                                                                            C:\Windows\system32\Pafkgphl.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:4592
                                                                                                                                                            • C:\Windows\SysWOW64\Piapkbeg.exe
                                                                                                                                                              C:\Windows\system32\Piapkbeg.exe
                                                                                                                                                              78⤵
                                                                                                                                                                PID:4824
                                                                                                                                                                • C:\Windows\SysWOW64\Pmphaaln.exe
                                                                                                                                                                  C:\Windows\system32\Pmphaaln.exe
                                                                                                                                                                  79⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:3648
                                                                                                                                                                  • C:\Windows\SysWOW64\Pciqnk32.exe
                                                                                                                                                                    C:\Windows\system32\Pciqnk32.exe
                                                                                                                                                                    80⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    PID:2684
                                                                                                                                                                    • C:\Windows\SysWOW64\Pififb32.exe
                                                                                                                                                                      C:\Windows\system32\Pififb32.exe
                                                                                                                                                                      81⤵
                                                                                                                                                                        PID:5128
                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 5128 -s 412
                                                                                                                                                                          82⤵
                                                                                                                                                                          • Program crash
                                                                                                                                                                          PID:5292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5128 -ip 5128
        1⤵
          PID:5248
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4420 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:5948

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Aaenbd32.exe

            Filesize

            128KB

            MD5

            c399735bf316e0c589be3dd95915fb6a

            SHA1

            e373505104b4f3d9e0c09e88af94548fd17a13cc

            SHA256

            b9df76dda14812135e04c74edadb0aec5707b4238807dbf62758f5e3deb5e26f

            SHA512

            46a9b5b9d66d88f436e88703affe628f3270ae3b751b58a26e29b668b3c8b9d212287af16a856879047cdf5c1e23784ead7fdeb7ed55e5689c40a78d68a1a571

          • C:\Windows\SysWOW64\Adkqoohc.exe

            Filesize

            128KB

            MD5

            202fa85ff53d8b0affe0c7b1b7aa3194

            SHA1

            9eb977491c0864efc30776c17e489890c9bf0eb9

            SHA256

            2ae3947a73b8724ce2fc606de46b508401aefe7ef916a820bd9d4c9ec30d959f

            SHA512

            0c057d9d0471b4f4819c49974304e91370de5e3726e4fa67b9efb6d1b53ac07a6de8f2e86b482f0c9816d8ce6af8e8d08b3709ad822d0224747bb7a3360c50f7

          • C:\Windows\SysWOW64\Amnlme32.exe

            Filesize

            128KB

            MD5

            b901d4db3e47a31733c4d004d6a46a7f

            SHA1

            5df7b777280d9f3ba3cc57636a881748b1cecb0f

            SHA256

            2e354f15885b30def08b0d5e6e063c5cfe03f7c382f1f9596322dca4ff3fdf83

            SHA512

            4555ae90994248dfd0e72fe18579aa8b9afba61ff123228cc15c20f6671719e38701a7ce1e4d079c5c3cc6d3139aa5a4ea69fcb68a89181fabda95db79eaca65

          • C:\Windows\SysWOW64\Apaadpng.exe

            Filesize

            128KB

            MD5

            8deb41b82fd2b6c8583215a9de7faf30

            SHA1

            cdd640b739fd091096ac009f29cdaf3c36b49199

            SHA256

            1db4fe78ff0c9dcacbf6dca62122ab94dd1724128d9b8d87eec0bcaaf97362cf

            SHA512

            fef08b767a486979f6dcd481326072587f03ad033cde37cad6e9ea98e3eddeb43d0da5dfd1c399acba165201ec5be2319858f5fb9777d15d759722588e456d56

          • C:\Windows\SysWOW64\Baannc32.exe

            Filesize

            128KB

            MD5

            5b3d536b8e2e2a28cecc98f7b1367210

            SHA1

            3982c79842580ffb0f114341e7be3eb60d4f1daf

            SHA256

            ac219c94d5bf46604a47d895a9bbca808405df0335ead23ab721a7aa10fac1ed

            SHA512

            e0b441ed474c6be3f9081aaebe2d3a9641a3522451254e7daf4efd1d5207cfbeabfd0224bf77453eb0ccf960f2233679e61bc314b94edee46927430240b58a60

          • C:\Windows\SysWOW64\Bogkmgba.exe

            Filesize

            128KB

            MD5

            0c2cccd378d6121c57ada5ead64f1815

            SHA1

            6afde569b91209c88c313597f15314ff87311191

            SHA256

            8b184d704b9abc16b753d3ac2a2bd4c343bec5ad741d3fb02bfb426fa36fea51

            SHA512

            1f62fed36dbf78f1ee7e6c4d20b61a2b451101993ac446a132f67ec352315b8ea737be2032683722c28f59fe5f7c238959bf08b0519b447da8a806ee7d481e12

          • C:\Windows\SysWOW64\Caageq32.exe

            Filesize

            128KB

            MD5

            384cec7cf4167f38898ee3819b75f6b1

            SHA1

            3a739bd78aac099dace9629214f5d0977a1e0c26

            SHA256

            77b858c33adc34fe1dfee8508767a8c3ba463ee32846ebc65eecfc09e315a3c0

            SHA512

            6c85d6a342e8a6775cbe0c59754628fae4ceb651104d34e5cf8937b1385dedd1913eea4173c6c642f92701fd32f4cfccd29086200f04716f24a5516fc0ddd28d

          • C:\Windows\SysWOW64\Caojpaij.exe

            Filesize

            128KB

            MD5

            72e9238cc3d247d076561be0667cec2a

            SHA1

            80735b748381bd0d226cf91cb3370f03e0a4191f

            SHA256

            1cdc8615ff885b5dec72a8b8d5ddf52bf41eb65f776ec7bfcbd5e6256ad0c972

            SHA512

            72d5647589c94742f13aa4d814e1f6738427333ad6fe2dff1b6b198fffe123628c202048c39636be6175a89588ea641e5db3f2239b28fa2f1dafa3fefb1bace4

          • C:\Windows\SysWOW64\Cdbpgl32.exe

            Filesize

            128KB

            MD5

            c73a7863791dbd884317712d3f50c619

            SHA1

            a9cf4be35732a86af9df808203e532321aa246f3

            SHA256

            0b9b3a56b4dc3654bbfbe8fd8403667944e5cabcb512280486a42e28a011a1c4

            SHA512

            ba5347d511b492d19389d6c8abd44408650c1e9cfdcc20f1337d3fb818351ec0028441488f4c194f1833899d9ce053894d7bee36c9142d96661b39869c4ba1cb

          • C:\Windows\SysWOW64\Cggimh32.exe

            Filesize

            128KB

            MD5

            47bec9e15844ff2e31c6ed427969cb98

            SHA1

            30e08171a896f4cbfa323d6faa228e9cc9c1fd8c

            SHA256

            62b5a5ce19594ae2c1c161f527180dd9632fce49e61b51a1cf744da671ae5fb3

            SHA512

            8eb007433fdecbf1305792f4f30de8757085ef87560f9bfa75db3850e9dc6697901a6783bcff9138d2240bc2908e9983d5c7bbfffbfeab748479a9221c9ea6fc

          • C:\Windows\SysWOW64\Dahmfpap.exe

            Filesize

            128KB

            MD5

            8a290ec981e06dc5bbef77caf0666b66

            SHA1

            8f3849dd4250029ac92381f7bd8e683f2bb1d510

            SHA256

            2a4185a67b55217677f1dff75d6705ee43ae95d4925948c578df33a13af7b2da

            SHA512

            a273fe7992b2d5d84fbf440de555296198ad95439733e22507bebf38b56e79e292648582e87567a927565bdf04f67fedf9c3ce4f6c72f6b8a5ac2feb9e0e5f0e

          • C:\Windows\SysWOW64\Dggbcf32.exe

            Filesize

            128KB

            MD5

            07c62c43b4ad2f77afa21df8937ac3f3

            SHA1

            ed63ad1a3259017fb010037a5251148c0879d3de

            SHA256

            a9f07a19cb5811d30168d3e56e8afa1d605e150993f15b379091bda0c85dce3b

            SHA512

            fb6a319c7edf32306c7bbeb844c6b8b4fa2000a5d3da16d7473c59bca2817dec55972447e66964acebdbada8261f81f326903318071914ed64a5ac29f414f7d3

          • C:\Windows\SysWOW64\Dgjoif32.exe

            Filesize

            128KB

            MD5

            6dd32df01466523e11cc01d956136a35

            SHA1

            98f7af1dbc3ec80e327d53ede1ef3b2fd57bd8df

            SHA256

            f7c1618c18f6e6cb5e03441d36bae98d076d277a2bcadc9d1dff8b15bc77b879

            SHA512

            da57c9dec4bd38263d283863f90681b6223d0c905345e5fb74694b7a7f50cf717bfa932d51f902fcff33f5bb71f64e2db1f58a1dfc94347fdc0019847337c35d

          • C:\Windows\SysWOW64\Egaejeej.exe

            Filesize

            128KB

            MD5

            c9732ff1c83e833fc3f9a693e0e768e0

            SHA1

            d7a3f857bcb9212967d05ed670244806dfe318c0

            SHA256

            0e81326a0b0825a9aae68346341df93eac41585a5ebd4637dee4d4747a66e7c2

            SHA512

            81a39927119da5381827bfeff43f63c5ef9de19a4b71103673d26d19a31764bf3eebe993a4a2a7ad4dbc5f9efeb61f08c82056cdf5bba1082af40d2e14249441

          • C:\Windows\SysWOW64\Egcaod32.exe

            Filesize

            128KB

            MD5

            b1e728ee50ca5d9c4837513e7828a974

            SHA1

            e638c85c33f0369153829b49f3287da58026c10b

            SHA256

            8820e11a7aa5c829f1aba32569b6a0785c148ac1cb5dc08f03f848821787038c

            SHA512

            44a496e7691faf48d170917c1158d14715c673879892849083b1199614548b6668958648f6de652cb5c38a64dbd9deb79f2143397b4988652660461a3ae1842a

          • C:\Windows\SysWOW64\Ehlhih32.exe

            Filesize

            128KB

            MD5

            4c156a061434522832d599d1bb748947

            SHA1

            e4a851cc33362b04b1462b43e1116aa52445dbb3

            SHA256

            0b8670737fefd21ad4796225ca424b2e0bd457103e3203c544bba26a48de1069

            SHA512

            99d09860bed7ec8965e78f445f8d14bf2a99a2f21103204d8bf74c545ffb19b75fd4d487621219d8595bcb9f915c6176060daffb509e51372f0ac15d6d02f8ad

          • C:\Windows\SysWOW64\Eomffaag.exe

            Filesize

            128KB

            MD5

            a8f64226bf8dde46be3aa61c0c917d69

            SHA1

            26787ad83beb368edff53f6300597965b8829716

            SHA256

            eb2750a73fd857ddcffe87341f7483c684c58dc3fe1163967fb0e293a4027fc1

            SHA512

            6e0f57ba2b13c6a47b7a99f71b4ec1e6f0cb49c1ecc1561ef0610e54ad579896e6f50b886d3cbfd1ec910598cb273417f75f503f7c8669cacfd981759d99d8f2

          • C:\Windows\SysWOW64\Feqeog32.exe

            Filesize

            128KB

            MD5

            a808b41966e87cd408c3108047452235

            SHA1

            29942c88db08074891e9c192eacd1eb86461a070

            SHA256

            6c25612850663b84f90fd232c046aa9102f8e6fe2d06a27a5c666b5a1f5e714c

            SHA512

            687cbff98282a576f8c12c5b4774ff2c964418f347aff4be1a86c968f820d68aedefd464b7091fb6de7cb3577c54029a8fc5ab75f0a0d63479e396e9ab7cbd29

          • C:\Windows\SysWOW64\Fijdjfdb.exe

            Filesize

            128KB

            MD5

            ec17cb3e756dc53b290335a7e1958060

            SHA1

            f25d1f372e77276cbb40ea570358ab2907b7ef18

            SHA256

            b4a083f442f8272a0e87622c40d1404fc1f59954883862b356828b045002bd19

            SHA512

            bb8a6d9c0a59bbd7078525bca9a6bdc965063a2807c6e360ee9425adb684b080bc4daa212c28716de7802ac6012df1f994183d28074838cbd56aa82bb25bf564

          • C:\Windows\SysWOW64\Finnef32.exe

            Filesize

            128KB

            MD5

            0b25836daf76bdcf222a5866213fd276

            SHA1

            7ad99a15a5ec594277ef3703d09f91e747bade02

            SHA256

            5ad0acf5a989172e69b0af2085d37db13443024340e1e1e17e2ce0357ca1cb44

            SHA512

            99dd9cdf52835eeaaba9c5173895af37226d769174f6bbd18843e133cd5e9e682f5876931e3fcd03f088c945e4c080ab954e302c01d0a3152aff581b86c749d8

          • C:\Windows\SysWOW64\Fiqjke32.exe

            Filesize

            128KB

            MD5

            d0347ea33ad7547296828928b8461b10

            SHA1

            69631df1a5af4f8592400b484e42a018586f1330

            SHA256

            6b2b61c4780dbbf5de0caa75dcb22ad1afed0a84b7bde5c51abb3c149cccce76

            SHA512

            241658bad3194c5c7afe8f6e8e1d370da87558546ae98871835ad068d354d7383fe2f929ce31626b04633cb74158f3b1f5d6ff9cc7da7ecd7e69f13e51bf029a

          • C:\Windows\SysWOW64\Fqppci32.exe

            Filesize

            128KB

            MD5

            afb4011c9a202273b393d977b318b12f

            SHA1

            c75add6a17ef475833ff18b890cb34b2038b98b0

            SHA256

            7af1deb6a821b999afef81317eda9b8c0b745c17ca3538050a15c42870b25962

            SHA512

            58fa6f6b2af30caa1d6e2030b196e8319a681d8342c654330b6561c96157c8c12f329a6c8750456fee8127517717f64ae08d6ab664f914c08fa7f81fa708769d

          • C:\Windows\SysWOW64\Ggfglb32.exe

            Filesize

            128KB

            MD5

            62d3c6ee89c58fd45b8ebd1bce282939

            SHA1

            3f05177a9bb496335f80bc485930a6eccff894b7

            SHA256

            3bc5d270b6dba4e91b1aaeb97438f8d98df1151a9eec8f8ae2e9874e359d74a9

            SHA512

            3504a14a28d88cf0dedabac40ff08f7eaa49ed3d1a7b8f371cde1f102cdcf4327ec55c753bcf867c46645716d90326fd462569316330010b9ab4f0f3aa8112a5

          • C:\Windows\SysWOW64\Gpolbo32.exe

            Filesize

            128KB

            MD5

            82759d53c48a5f466a50bcdaf6abdce9

            SHA1

            b1b294e198fac00a919b2a5d7de56efb4adc8c29

            SHA256

            c5d704e37b07d468226e128fcb5be0d291b7502c4e9cc661b73c4cde8d9159e4

            SHA512

            f05af3a6e8da4934e728ae3cb87ec655a1a510c70e556e2036ea8ce259608b943bfb2f0970cbc0d4e8dd22f729ca5ea933c543c6da163d39d67666b6c331daa9

          • C:\Windows\SysWOW64\Jhplpl32.exe

            Filesize

            128KB

            MD5

            5c69f53b6b749caa8cc29c8409301cf5

            SHA1

            25631ce4355dd3b39058ef548166554ffd85fe3f

            SHA256

            e37d85a543b14c08f83f9fad5b96bdbc94b7a17fcefb7c5137d9dade796028c6

            SHA512

            1aced8b1b9b36d90e67117bbf4719c07acd40bca2f7d6cfef0ae2d50446bacf4f4afb51e8559a91ff4bd12914bc1a67f97c30af6530cc128a8865ec692f8cce8

          • C:\Windows\SysWOW64\Jlbejloe.exe

            Filesize

            128KB

            MD5

            3c69a4532389b5ab2969b90281972e2c

            SHA1

            829b0e955fc9ee5455e7e6b3434bc8f0a2b82f64

            SHA256

            c5d4e4611deb743864eee962ef5fccbd492ef0f474a178b46c7098859c66e824

            SHA512

            49ccb99591c3e001dc31409cbfa8db228f06873ede39fe661124cddfd699d2206466405e458d97118627058e22b588d173897c78e378015aa93f3b8e5f259da6

          • C:\Windows\SysWOW64\Kplmliko.exe

            Filesize

            128KB

            MD5

            367a3840e2fda3446484785f843ef2af

            SHA1

            a7691c7215dc152fcfdb1b84dbe244fa66ec1511

            SHA256

            bf15c3c93a03b1cadb78926bac4578d9247b6700d94aec1207f39dba7145c496

            SHA512

            e3e5a97fcbaf7dccfbb75185d62ef85a115ee94b0dd79e561e2e44c4e298fa8149294d249464b8f9932cd0c428e8d5ee4ac7356f99c482ef8112d56444912076

          • C:\Windows\SysWOW64\Lebijnak.exe

            Filesize

            128KB

            MD5

            1902bc210c57e4d5305511fa03fe25e5

            SHA1

            2aa78a5f9cdeb71de439a8300e07cd087b1a6743

            SHA256

            f314ff7e0fb0e872173deed496b306d8cffa1e44b22511bf77808097389a5431

            SHA512

            87cd62d9a9a05b86fcbbb0f33d275a0926298a5f5d2171ad7c015d3422d0a6d09831dc212b66a47bcc3d6f69cc0f52dfcf7ee12ad3747ccac7bb432a8ac823d6

          • C:\Windows\SysWOW64\Lfdqcn32.dll

            Filesize

            7KB

            MD5

            ecf1d1055f61a88eb3ccbd3c9e07944a

            SHA1

            66acf01582404cf22fa6b2a7534e669aa8f99f62

            SHA256

            e99184830ffd277a2de1423d32d34d23042ec8db307ec143a2161b25fe3ff34e

            SHA512

            490ded10f4f0983aa6596bfffd39bd48926949828139e08ff20415fb931d5569ba6528aa5cc4d69ce5ae701de489f0d065eb5ded44ec84d6705f829617d0519a

          • C:\Windows\SysWOW64\Mfkkqmiq.exe

            Filesize

            128KB

            MD5

            1da7c62d156dc18841f3d36b7f43cb39

            SHA1

            93423d129159aa7534f6e5c2907a4b7d1b9337f3

            SHA256

            80d2cab84c41b323f5c2d1d16ce812f3d19fa2c539ec32a61efb3437fdda212b

            SHA512

            9343d0b0d64b156834028354e55f2a80d1c6819da592477fc33ca2ce45ab22c43a661ca90d9639222f85810f9f2cdf3294ada018b4ddea4fc5bdee99da8bffbb

          • C:\Windows\SysWOW64\Nmfmde32.exe

            Filesize

            128KB

            MD5

            39521fd9b5aca868797e5b64c7ac0990

            SHA1

            3552a35131be47e1bea8f5654b086d67ada2c337

            SHA256

            c9f981af49a108b4922ba0894bc14f8562f8df07c4f2b6f791f498bebedf2c83

            SHA512

            b61c62e286d1a8a40a4c5b5d6ae577e8ed1f04edadee88b38955015c53f6a3c0f989479898888539256fa367099737ea36be648094dee4ea4eae6c34084d3bae

          • C:\Windows\SysWOW64\Nmhijd32.exe

            Filesize

            128KB

            MD5

            3634ff41235ea904bd42a52a4dd7efa4

            SHA1

            c8ed3ade6bed5f6a77c59f8f826c389c2c87880a

            SHA256

            7e9f4f25ef40dc124a7a8b95b321d63b40f257a2348e000855170455fea5ddba

            SHA512

            f9aaafed4cb79ae7caf0854ca5dd68323a03a24227c3bdc26f37ecf4b333298729bea37e49e92048a245e3064a66f2b47beb7404d749295590fea91496af9db5

          • C:\Windows\SysWOW64\Noppeaed.exe

            Filesize

            128KB

            MD5

            41eae37d6c4a6b8b38f8051d3ffa7642

            SHA1

            198c1fadcbc12ca5980e803fee23c47a5b4bfd3f

            SHA256

            a605443506881b3e1adf94c341658c9a9b68784779c0b6d259871a932da3dc71

            SHA512

            95882d36c1f689fa029b86dff06adac0445c21c6df2b1b0887e333cf89f75003ce9004d5be9c79614db43c5e960eb64b28540a6cefea2fb0249e23171433743b

          • C:\Windows\SysWOW64\Ojfcdnjc.exe

            Filesize

            128KB

            MD5

            5d67d1e8ab5babcd34b3989ce5a5d4aa

            SHA1

            413b0f70054bd3f9ab8ea3fabffa1aac7b555bfb

            SHA256

            c67aaad035c2350e97d42947b3969e09492fe384308b9d6aab83c783fd35f594

            SHA512

            469b2dab5954d094b30fe7bbb95bd3bd65025e5f2894a38cb97d420383077396ae4dc353bbd1cc002253c1ffe6bafb4b400fa6044e63e4e9efbb18a568bb6a6c

          • C:\Windows\SysWOW64\Ojhpimhp.exe

            Filesize

            128KB

            MD5

            9c7af07e8842728353d67db72ccefcdc

            SHA1

            74124642ff2000aa2eba28663f1b46bb27ec67f2

            SHA256

            4d018c55f15116ec83d62e2aae8e4a4c0788cc4b4f5e50574206aa21657f8046

            SHA512

            243200204d72b1b70e5a5674eda0d62bf569220e73bacc1cddf05da8141b3815eacae75b85ec5346b83d087a920dc0d011f774c7521ab67ba699816f0c6f26f6

          • C:\Windows\SysWOW64\Ompfej32.exe

            Filesize

            128KB

            MD5

            750a7f2981f177542502b50470ffd763

            SHA1

            fdc05b868674471b299c629c40866ce9c0a8c2a3

            SHA256

            dd3a1583717d319d6beb1d44a6942e1a19611814c024639c3f1bf292c41f1a9a

            SHA512

            8f4229be975788c51a1b55d4bcd430c0677d6e203634dd67647558266880233c0dafa7eb75472cdd84605c0cef4d945e010f9b07b3f31499cba3e7df2cd61c97

          • C:\Windows\SysWOW64\Oqmhqapg.exe

            Filesize

            128KB

            MD5

            f187adee27dec2e4da118f96d03c2094

            SHA1

            54c1f57ce04c176f76a81f61322f2bcf91d8bc98

            SHA256

            bd0447d5b3ac71c792d0fed14e418cc6ab7440516403b7a8701f44552d8a46a0

            SHA512

            b71eaa7818f6ca5d321e67a1ffc0ddf62bb2eccfa713b4ad548f746a474fe0a573eb3e50757916b4bd66cba5e6411bf9bdc4eccf991ec17fab5862fea5f68662

          • C:\Windows\SysWOW64\Piapkbeg.exe

            Filesize

            128KB

            MD5

            3f4cc53d42ef0ae9af8948bd104fe73d

            SHA1

            43bff115007a3ba751e2e0e1b31f4e9cd694f58b

            SHA256

            3173040bbfc58791ee4848949eb7fea87656da6a004cdaf4ffc176356a5b8749

            SHA512

            884435157a073b02d8daa856eda0df2662b6563217ecbcd0e54f0926a913d29eb97b6c0ca5d2e4c7675269649222798f747ad20c8e289851308262dd8522ebb4

          • C:\Windows\SysWOW64\Pjkmomfn.exe

            Filesize

            128KB

            MD5

            2812771a721fb581927f74d0c32119c9

            SHA1

            d8c6ed144cc9958452601efb446e626fec89a5ae

            SHA256

            fa5cba84606d34c59d659474aa2e68a586f10beb6ce8d4734d6176bb2ce205eb

            SHA512

            7bc5c804c73deefa746f0783eea516d16c0cc946c4c78ac668ebe49461498071cad6c8354933c2b8e6701bcbf8ee44ca0e73dde518e4f44b84a8915715982ebe

          • C:\Windows\SysWOW64\Pmlfqh32.exe

            Filesize

            128KB

            MD5

            33cdd01e77aea16f8c084b2453d2e7f5

            SHA1

            943d032e2b9c8432e2d74d5433f21cd93327384e

            SHA256

            9a2d0771360b61796a02a4b4817037b7e519895e4020e97b27f56b5e25525972

            SHA512

            7a202d9ca71c4f610eead85a38dffecddfee1e4bccfc27700fc17eb88abe57030f7a862799b958a3033581248924fcae1308d56b33746cb11dfe7d11b5a5a482

          • C:\Windows\SysWOW64\Ppolhcnm.exe

            Filesize

            128KB

            MD5

            f2a078973a8c0c79234131b1b24f9a65

            SHA1

            fd12ad516ec0177c2a033a79668df083d9bfe4f2

            SHA256

            98952fe6514742ebdd4d2929641011efc5428ebf4055cbd42f28f90781f852ae

            SHA512

            f167cc955206b7abe8243ffa6c5cb2f978930784527b360164f3fc44d9ae5fb41cdeffdc0c6c30a25550e6c66521b000002ae004d75ac49cdc3365a5d6b03621

          • C:\Windows\SysWOW64\Qobhkjdi.exe

            Filesize

            128KB

            MD5

            92df988a2fd1eda0cac79ce7fdfa4265

            SHA1

            36c1eb296bbbb0979517d4afa60458c5f150cf5b

            SHA256

            bcd397cd1220dd8363596bc27cc2433c805d80986375cda7c74c87f39cfa4d96

            SHA512

            7da57bcc81f5bd0b5c2ef9b7469d602216f1b70a4815bd91881186473aa15149756e1ee3c62243749d52ef6bc87dfa35dc41eb34006dccae53824709362db9a7

          • C:\Windows\SysWOW64\Qodeajbg.exe

            Filesize

            128KB

            MD5

            f2845c2ba909412e84b53ba2f536b569

            SHA1

            e17b050dc2229fe97bc88d984e1d682e5c19ff0e

            SHA256

            80fb3ce20dd61375258f53bc866f50bdde8f58df31436fc4709164d40ce941a0

            SHA512

            1e71f1352b4e09b264d068712385be03a7f5afe599ed5fbf7297db792a7d519d0a103f0ffec671d62ebe4c5e1fe1c0bb7c48aeae295df664f8f9a56d45c03568

          • memory/404-260-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/404-334-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/456-418-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/456-349-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/720-143-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/720-232-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/832-419-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/876-391-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/916-370-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1092-404-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1092-335-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1108-363-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1384-268-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1384-180-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1392-307-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1392-376-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1420-215-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1420-299-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1436-124-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1436-39-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1564-405-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1644-170-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1644-259-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1668-233-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1668-313-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1748-89-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1748-178-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1804-187-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1804-99-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1828-286-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1828-355-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1848-107-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1848-196-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1976-412-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1996-306-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/1996-225-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2112-390-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2112-321-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2288-198-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2288-285-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2300-397-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2300-328-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2372-348-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2372-278-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2404-362-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2404-293-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2496-214-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2496-125-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2564-142-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2564-55-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3140-369-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3140-300-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3276-63-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3276-151-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3328-384-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3420-251-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3420-327-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3580-134-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3580-223-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3724-71-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3724-160-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3812-292-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3812-207-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3996-31-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3996-115-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4032-88-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4032-8-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4100-80-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4100-169-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4136-314-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4136-383-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4204-377-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4412-341-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4412-269-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4424-153-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4424-242-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4476-117-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4476-206-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4488-97-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4488-16-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4552-106-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4552-23-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4584-356-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4648-398-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4692-161-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4692-250-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4776-277-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4776-189-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4904-411-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4904-342-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5060-320-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5060-243-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5096-47-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5096-133-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5112-0-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/5112-79-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB