Analysis

  • max time kernel
    142s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 00:50

General

  • Target

    a0b9a804328cce3269d1ce05b261c10308120b5bda21912e2b4c84e5b4cc2f4e.exe

  • Size

    128KB

  • MD5

    18259bde8e2cc2e22cb8b532440d99ed

  • SHA1

    d2174a25b5abbe822af47db7a43689c12ed3aabc

  • SHA256

    a0b9a804328cce3269d1ce05b261c10308120b5bda21912e2b4c84e5b4cc2f4e

  • SHA512

    6842a715c46368b499b7a8789e683ab8f4d231b4faf7c84d6267733ffa8737e6f19b074895925d73b820c88b6604dcd7fddaacb4d970ce791fc389323a952190

  • SSDEEP

    3072:+wBhx5xBfGV2/BhHmiImXJ2fYdV46nfPyxWhj8NCM/r:JBhx5Pe4BhHmNEcYj9nhV8NCU

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0b9a804328cce3269d1ce05b261c10308120b5bda21912e2b4c84e5b4cc2f4e.exe
    "C:\Users\Admin\AppData\Local\Temp\a0b9a804328cce3269d1ce05b261c10308120b5bda21912e2b4c84e5b4cc2f4e.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\SysWOW64\Ifmcdblq.exe
      C:\Windows\system32\Ifmcdblq.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\Iikopmkd.exe
        C:\Windows\system32\Iikopmkd.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\SysWOW64\Iabgaklg.exe
          C:\Windows\system32\Iabgaklg.exe
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Windows\SysWOW64\Idacmfkj.exe
            C:\Windows\system32\Idacmfkj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4984
            • C:\Windows\SysWOW64\Iinlemia.exe
              C:\Windows\system32\Iinlemia.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4876
              • C:\Windows\SysWOW64\Jaedgjjd.exe
                C:\Windows\system32\Jaedgjjd.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2412
                • C:\Windows\SysWOW64\Jdcpcf32.exe
                  C:\Windows\system32\Jdcpcf32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:3232
                  • C:\Windows\SysWOW64\Jjmhppqd.exe
                    C:\Windows\system32\Jjmhppqd.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:3404
                    • C:\Windows\SysWOW64\Jagqlj32.exe
                      C:\Windows\system32\Jagqlj32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:1904
                      • C:\Windows\SysWOW64\Jdemhe32.exe
                        C:\Windows\system32\Jdemhe32.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:2928
                        • C:\Windows\SysWOW64\Jfdida32.exe
                          C:\Windows\system32\Jfdida32.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:2424
                          • C:\Windows\SysWOW64\Jmnaakne.exe
                            C:\Windows\system32\Jmnaakne.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:3088
                            • C:\Windows\SysWOW64\Jplmmfmi.exe
                              C:\Windows\system32\Jplmmfmi.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:5024
                              • C:\Windows\SysWOW64\Jfffjqdf.exe
                                C:\Windows\system32\Jfffjqdf.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:2644
                                • C:\Windows\SysWOW64\Jidbflcj.exe
                                  C:\Windows\system32\Jidbflcj.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:768
                                  • C:\Windows\SysWOW64\Jpojcf32.exe
                                    C:\Windows\system32\Jpojcf32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2184
                                    • C:\Windows\SysWOW64\Jfhbppbc.exe
                                      C:\Windows\system32\Jfhbppbc.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:4460
                                      • C:\Windows\SysWOW64\Jigollag.exe
                                        C:\Windows\system32\Jigollag.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:4132
                                        • C:\Windows\SysWOW64\Jangmibi.exe
                                          C:\Windows\system32\Jangmibi.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:772
                                          • C:\Windows\SysWOW64\Jbocea32.exe
                                            C:\Windows\system32\Jbocea32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:3956
                                            • C:\Windows\SysWOW64\Jiikak32.exe
                                              C:\Windows\system32\Jiikak32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:3276
                                              • C:\Windows\SysWOW64\Kdopod32.exe
                                                C:\Windows\system32\Kdopod32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:4392
                                                • C:\Windows\SysWOW64\Kkihknfg.exe
                                                  C:\Windows\system32\Kkihknfg.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:1852
                                                  • C:\Windows\SysWOW64\Kacphh32.exe
                                                    C:\Windows\system32\Kacphh32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:4072
                                                    • C:\Windows\SysWOW64\Kdaldd32.exe
                                                      C:\Windows\system32\Kdaldd32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:2312
                                                      • C:\Windows\SysWOW64\Kkkdan32.exe
                                                        C:\Windows\system32\Kkkdan32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        PID:4584
                                                        • C:\Windows\SysWOW64\Kmjqmi32.exe
                                                          C:\Windows\system32\Kmjqmi32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:4228
                                                          • C:\Windows\SysWOW64\Kdcijcke.exe
                                                            C:\Windows\system32\Kdcijcke.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            PID:2732
                                                            • C:\Windows\SysWOW64\Kgbefoji.exe
                                                              C:\Windows\system32\Kgbefoji.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:1132
                                                              • C:\Windows\SysWOW64\Kipabjil.exe
                                                                C:\Windows\system32\Kipabjil.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:824
                                                                • C:\Windows\SysWOW64\Kdffocib.exe
                                                                  C:\Windows\system32\Kdffocib.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:2080
                                                                  • C:\Windows\SysWOW64\Kkpnlm32.exe
                                                                    C:\Windows\system32\Kkpnlm32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    PID:728
                                                                    • C:\Windows\SysWOW64\Kmnjhioc.exe
                                                                      C:\Windows\system32\Kmnjhioc.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4688
                                                                      • C:\Windows\SysWOW64\Kpmfddnf.exe
                                                                        C:\Windows\system32\Kpmfddnf.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:4176
                                                                        • C:\Windows\SysWOW64\Kgfoan32.exe
                                                                          C:\Windows\system32\Kgfoan32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:1212
                                                                          • C:\Windows\SysWOW64\Kkbkamnl.exe
                                                                            C:\Windows\system32\Kkbkamnl.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:2992
                                                                            • C:\Windows\SysWOW64\Lalcng32.exe
                                                                              C:\Windows\system32\Lalcng32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:3636
                                                                              • C:\Windows\SysWOW64\Ldkojb32.exe
                                                                                C:\Windows\system32\Ldkojb32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                PID:1384
                                                                                • C:\Windows\SysWOW64\Lkdggmlj.exe
                                                                                  C:\Windows\system32\Lkdggmlj.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:2320
                                                                                  • C:\Windows\SysWOW64\Lmccchkn.exe
                                                                                    C:\Windows\system32\Lmccchkn.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:4836
                                                                                    • C:\Windows\SysWOW64\Laopdgcg.exe
                                                                                      C:\Windows\system32\Laopdgcg.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:5020
                                                                                      • C:\Windows\SysWOW64\Lcpllo32.exe
                                                                                        C:\Windows\system32\Lcpllo32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:1108
                                                                                        • C:\Windows\SysWOW64\Lgkhlnbn.exe
                                                                                          C:\Windows\system32\Lgkhlnbn.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:2052
                                                                                          • C:\Windows\SysWOW64\Lijdhiaa.exe
                                                                                            C:\Windows\system32\Lijdhiaa.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:1552
                                                                                            • C:\Windows\SysWOW64\Laalifad.exe
                                                                                              C:\Windows\system32\Laalifad.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              PID:2612
                                                                                              • C:\Windows\SysWOW64\Ldohebqh.exe
                                                                                                C:\Windows\system32\Ldohebqh.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:3004
                                                                                                • C:\Windows\SysWOW64\Lgneampk.exe
                                                                                                  C:\Windows\system32\Lgneampk.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:4980
                                                                                                  • C:\Windows\SysWOW64\Lnhmng32.exe
                                                                                                    C:\Windows\system32\Lnhmng32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:1688
                                                                                                    • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                                                      C:\Windows\system32\Ldaeka32.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:2308
                                                                                                      • C:\Windows\SysWOW64\Lcdegnep.exe
                                                                                                        C:\Windows\system32\Lcdegnep.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:1260
                                                                                                        • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                                                                          C:\Windows\system32\Lnjjdgee.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          PID:3876
                                                                                                          • C:\Windows\SysWOW64\Laefdf32.exe
                                                                                                            C:\Windows\system32\Laefdf32.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:3044
                                                                                                            • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                                                              C:\Windows\system32\Lddbqa32.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:3236
                                                                                                              • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                                                                C:\Windows\system32\Lgbnmm32.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:2996
                                                                                                                • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                                                  C:\Windows\system32\Mnlfigcc.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4968
                                                                                                                  • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                                                                    C:\Windows\system32\Mpkbebbf.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    PID:3220
                                                                                                                    • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                                                      C:\Windows\system32\Mgekbljc.exe
                                                                                                                      58⤵
                                                                                                                        PID:2076
                                                                                                                        • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                                                          C:\Windows\system32\Mjcgohig.exe
                                                                                                                          59⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:4568
                                                                                                                          • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                                                            C:\Windows\system32\Mdiklqhm.exe
                                                                                                                            60⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4940
                                                                                                                            • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                                                              C:\Windows\system32\Mgghhlhq.exe
                                                                                                                              61⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              PID:4044
                                                                                                                              • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                                                C:\Windows\system32\Mnapdf32.exe
                                                                                                                                62⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:4024
                                                                                                                                • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                                                  C:\Windows\system32\Mdkhapfj.exe
                                                                                                                                  63⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:1996
                                                                                                                                  • C:\Windows\SysWOW64\Mcnhmm32.exe
                                                                                                                                    C:\Windows\system32\Mcnhmm32.exe
                                                                                                                                    64⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:3168
                                                                                                                                    • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                                                      C:\Windows\system32\Mkepnjng.exe
                                                                                                                                      65⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:1508
                                                                                                                                      • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                                        C:\Windows\system32\Maohkd32.exe
                                                                                                                                        66⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:1232
                                                                                                                                        • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                                          C:\Windows\system32\Mkgmcjld.exe
                                                                                                                                          67⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4240
                                                                                                                                          • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                                            C:\Windows\system32\Mnfipekh.exe
                                                                                                                                            68⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:1188
                                                                                                                                            • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                                                              C:\Windows\system32\Mdpalp32.exe
                                                                                                                                              69⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              PID:3668
                                                                                                                                              • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                                                                C:\Windows\system32\Mgnnhk32.exe
                                                                                                                                                70⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:1264
                                                                                                                                                • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                                                  C:\Windows\system32\Nkjjij32.exe
                                                                                                                                                  71⤵
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:452
                                                                                                                                                  • C:\Windows\SysWOW64\Njljefql.exe
                                                                                                                                                    C:\Windows\system32\Njljefql.exe
                                                                                                                                                    72⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    PID:4032
                                                                                                                                                    • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                                                                      C:\Windows\system32\Nacbfdao.exe
                                                                                                                                                      73⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      PID:1940
                                                                                                                                                      • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                                        C:\Windows\system32\Nceonl32.exe
                                                                                                                                                        74⤵
                                                                                                                                                          PID:1316
                                                                                                                                                          • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                                                            C:\Windows\system32\Njogjfoj.exe
                                                                                                                                                            75⤵
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            PID:4180
                                                                                                                                                            • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                                              C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                                              76⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:2920
                                                                                                                                                              • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                                                C:\Windows\system32\Njacpf32.exe
                                                                                                                                                                77⤵
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:2136
                                                                                                                                                                • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                                                                  C:\Windows\system32\Nbhkac32.exe
                                                                                                                                                                  78⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:4016
                                                                                                                                                                  • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                                                    C:\Windows\system32\Ncihikcg.exe
                                                                                                                                                                    79⤵
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:4028
                                                                                                                                                                    • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                                                      C:\Windows\system32\Njcpee32.exe
                                                                                                                                                                      80⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      PID:1912
                                                                                                                                                                      • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                                        C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                                        81⤵
                                                                                                                                                                          PID:5072
                                                                                                                                                                          • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                                            C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                                            82⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:4092
                                                                                                                                                                            • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                                              C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                                              83⤵
                                                                                                                                                                                PID:4944
                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 400
                                                                                                                                                                                  84⤵
                                                                                                                                                                                  • Program crash
                                                                                                                                                                                  PID:688
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4944 -ip 4944
            1⤵
              PID:3692

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Iabgaklg.exe

              Filesize

              128KB

              MD5

              a66039ca4495a7252528b3b18b7e516a

              SHA1

              2fa5a3f894d7183b3f788eb2c0313a1c39f48252

              SHA256

              40c53ed6b75dc02ee8dbdde3eaf11f962e65ed5286900757383349e721fbff74

              SHA512

              12a0c3884d3b9a45ae23e44b3b7f1020d90331d443b8fe5ea8cb73b39cd3b5c84ae39aa4abae3b27ea580539b46530c301119857ddae329408cd8ec653f530f7

            • C:\Windows\SysWOW64\Idacmfkj.exe

              Filesize

              128KB

              MD5

              11f355dd1fd8b3109c8ace80f86b9a19

              SHA1

              06e3f6d37d1178e9ee80fb45903d8f986fc05eb2

              SHA256

              2ac5fd31a33dee5cc9aa963a01e2cdebbaa76004458156d00ab410b968addfb9

              SHA512

              3aa2f3d439df5e3025e5064e9d902842d38692e3eef3866012d968b3b4168fd2bbc91da91f9d550f9e0ee03e660609bdfa599c51b5956cfc513cae95add5952b

            • C:\Windows\SysWOW64\Ifmcdblq.exe

              Filesize

              128KB

              MD5

              0c0c69b853057e0d9463562e0f8d2c04

              SHA1

              3a27030ea331b2be3670749369e77a02d6bcd921

              SHA256

              1909221fe2d11e01e8b2c31992e7ef31efa229fc12b033f69b42f8986fce1a77

              SHA512

              312d089889a766a2b868c7cfe5648ac0de190c3a01349bb007572fb699a50b42957260c004a0a2d1764b03a90fcaa8ce86ba7aaf7d6a5232ec71bda2c11e5111

            • C:\Windows\SysWOW64\Iikopmkd.exe

              Filesize

              128KB

              MD5

              83c5a14cc84a9fabbddc820629d10600

              SHA1

              a61b90cc4fba6ee36e0ad9a3b8afa4da5eee578d

              SHA256

              b4bc43d6e131cea51a46b77c4539eb768845f205c11634b27e615f00fefe8356

              SHA512

              13c5a9887b5d07baa3906c167653f840eb787572adff4a44f936332c68c2b44dc57771904341a88aec04449d8b1933d2105214890f52b30ddf8f0ff158a5a3fd

            • C:\Windows\SysWOW64\Iinlemia.exe

              Filesize

              128KB

              MD5

              b2f28b87aa2ab7479eda11348484515b

              SHA1

              28bbc0737270e661b796b81f032e1323d9a5c670

              SHA256

              d0f61188fc0818b806df2951a655560178d0ce3d303617b4ce6d3ea59c925bf2

              SHA512

              025bd8105eeeaffbd56ddd66dc0adfcd809ce2c7b8a10d5855472657b624c9b5042bd7e64e2204be881d586bdee9d353a730f57851beaa4de4fbf90a5c8614b2

            • C:\Windows\SysWOW64\Jaedgjjd.exe

              Filesize

              128KB

              MD5

              2dc4ef2cc2827b64d65adb5dc0648e77

              SHA1

              34d17791212c98b5083c598697e2e55d8e74ec98

              SHA256

              6e4514404fd4844de55025413e8a46c5979949d4e68a7575c2c315f150cf807b

              SHA512

              be2284aebb7c24e34de70b3d52116771069f3d8b3d20b8586ecc8605de6c83502b78eef659a305291c191fbb0c4a3ac24215299200c076e13c39609a2329cc0c

            • C:\Windows\SysWOW64\Jagqlj32.exe

              Filesize

              128KB

              MD5

              8bf621a7ddfe4c64fb07dca34c4079d0

              SHA1

              35a61e1e0c75f74614f6317d43d2ff4e2dcbdad8

              SHA256

              5a28719ec1ca72480e4037375f018d0ba6af3b7f54b69520e49ac8ca179fcb0e

              SHA512

              61315bbaa6783911604ebc409978106cbdfae83e8643a233810b78698967613fe5e0b80f76cee1fdafc11ea79433a18a984b49feeec6ec8dad7ea08ddbcac8ba

            • C:\Windows\SysWOW64\Jangmibi.exe

              Filesize

              128KB

              MD5

              7d6ad187679805fe8910f8c2e8778641

              SHA1

              a81cae318caed09611bd70065491394bc1a46270

              SHA256

              06ad3053bb16dd009f782434175ebb5dfe4eb3efa27c2cacdd006fbd7b0c4c20

              SHA512

              b6d3ae5fd75aded32fd4b2fec2e3a992050298930cdbd66ae2ad988ba032767acd4be530102126168c75fa3bef1bd40b295c44d3a9b32488d8f2407a8371d7d5

            • C:\Windows\SysWOW64\Jbocea32.exe

              Filesize

              128KB

              MD5

              8d2c14d28908aa8a69baf99ef109e830

              SHA1

              9d8debc77c976128b08d8d4915ebb49e93af22c2

              SHA256

              e1a57c1cec3f6cc8ce96e8d83e07d6f5338be69fc299650f501714266707b8be

              SHA512

              47d6e3aefda66e00dea8875aea3360bbeeada1dbe5d2768276f7b316f459ca5525056d9f311f62c3066fb97757ae74fa4b787aea93be525694175734f64a1c03

            • C:\Windows\SysWOW64\Jdcpcf32.exe

              Filesize

              128KB

              MD5

              cdaadbb081790f58be1bdd0c5d97250f

              SHA1

              4609c9d57509e093328472a8d050c3e577acf8bb

              SHA256

              35001bbde3f8f537d89c61fe0516878694253ab30b3461fc3a04130c53dd9227

              SHA512

              ca4f5eceb68850af21162be7659d00fe0748a252ccaf401ba72f130d78158dbb434428e8cd958b2be00c5759cbd01fc84089a889fe4335dcec25fc16a4b3b04c

            • C:\Windows\SysWOW64\Jdemhe32.exe

              Filesize

              128KB

              MD5

              703deea7ce7fde607635c06fc94033ef

              SHA1

              e87d15f8f425295d72955196c1b2518567f13bd5

              SHA256

              dd54f3d8e2b6fa2821f7af3f45b017a3c317bbceb620d6224693dd29ef789a42

              SHA512

              dd2caa2757c0b165e197566d983edd67809f594ed71838d3b9cf52ec46d43377c030f1c67809cd484b8f98b1b894d36b08eece69d5d09f6fefa5f6acb9fbe0f8

            • C:\Windows\SysWOW64\Jfdida32.exe

              Filesize

              128KB

              MD5

              c571d3bfd59d942b50199a0763f260f4

              SHA1

              50ef4775c29ecfdf9a9735cbebdba9bd71daf550

              SHA256

              eafc31e57d2aa4bfe867911c98124197220d16966b2510f920e9358a3f135946

              SHA512

              b6e5e7757a61cf3c421e2bbdeaede81ed1262b52d0ba7983da3fbf5e5286f5e4db2ba2f0df19a05f2f9a7d5118a0c4d92b3d7e9b408c84cf24dd432672e84725

            • C:\Windows\SysWOW64\Jfffjqdf.exe

              Filesize

              128KB

              MD5

              24d2dd6e01b48af1ea6c060153a03278

              SHA1

              d84f21454b08174813a996e09a00b3903a99d3d9

              SHA256

              0c505246d45ffafead7b541b5a8458a5a05e871056a088437d0fb224a13f2628

              SHA512

              4e62de5c24b3a612bda7eb93d9bbf92146702b1821b4d1063faf081b25d48391103c75c227ab67a47ed79f246a341c69b9c70c894572e9175941258b9582cf4e

            • C:\Windows\SysWOW64\Jfhbppbc.exe

              Filesize

              128KB

              MD5

              949670dbcf7e155c744ab69908c9ba59

              SHA1

              2b844f772af61d2bdd139c30b326929c622a89d9

              SHA256

              88ba7ef9e5554e41cf56c0c313ee0759b68aa71eeb15519f9296cd7c5286b711

              SHA512

              2c22381ddaa6388cbed5fc26a826ec80a8328d532272372d6914c7b4625722ac6f48e258d71e0bbc7ae8166e1d36eeb18e30d997086b10ba5e95c5ab388f60e3

            • C:\Windows\SysWOW64\Jidbflcj.exe

              Filesize

              128KB

              MD5

              4a997de1c0a3789254e69d9ef5e1073c

              SHA1

              055ac5df3e5fd1b3c54ed3608e981b06b56cf50b

              SHA256

              a5311e59b0a5e25df8cebf6af4fc03d5488891e776e0bb3e4c9e405f9d31dfab

              SHA512

              1930a109f4abe3ee9c707dc2ede87351fad908b40c2c8d752a58c978fed5e4fa24fecf5a0841401e88ce8e7c507be411ca3d18b2990ef8023c9b04b1135cc333

            • C:\Windows\SysWOW64\Jigollag.exe

              Filesize

              128KB

              MD5

              9a437f512a7ab570ec7c724a9474e61c

              SHA1

              e79082bb495073d5cc6595492403e9c6c0d6f189

              SHA256

              86c381e9a276d6e00aae47652e1500e598ef5e95e17733aa177cb281909ef227

              SHA512

              ac50232a5d29e9d3df6360ed9e07af0a341d05dadfbd64307fc1a28737b4f380a0d635145388c1ac7a6ba38b0057252070597bc969a580e6dca74ed00954dbf8

            • C:\Windows\SysWOW64\Jiikak32.exe

              Filesize

              128KB

              MD5

              114bc419d97015baeef1b828b4d80289

              SHA1

              aca38aaa98b38a17a10eebaa0376a1c0157f7d87

              SHA256

              f22c7c166edb0bbe548e6cf5969171e27cc352d1b92e45be547e9d8b8b5afa0b

              SHA512

              f8581cd5c58e60cf71d9bac8f10a20033ef27ee904d34a2434604f470b2444b000624a55797f56108afaa9c5a2cb5ab09630dbec098e19d7188bb2bb45379719

            • C:\Windows\SysWOW64\Jjmhppqd.exe

              Filesize

              128KB

              MD5

              9575487099a6efc406e3e413eb645e9c

              SHA1

              25c63a1e66738aa6a08aa43bd0f4f18093805664

              SHA256

              3d1e1e9c2b7d5bcca323ceb897b022d18bdc6d147460bba11716c202ee72e6d0

              SHA512

              8b2b21a541d99bbc6ee0ed73e3d88a75246ded26d4ee51c624bf9f6d7c0f1fbe77e352e07475e08253f0556cdea7a9de1f33a5321b7dc8bbdb3fbfa7965bdb70

            • C:\Windows\SysWOW64\Jmnaakne.exe

              Filesize

              128KB

              MD5

              e49622a101b6679e7c30f262fdca9731

              SHA1

              2e259a5f4c3fcfdf5b80cd9ad1c07c8cac866fa9

              SHA256

              29881b46f5ba5fa0048d38550474eea51252b76e5a6a38cd608647bc91c03669

              SHA512

              a2223e613f50a6ba928ed212a91b5b4db69730f84dbc18715136dc10d54809f9e43610d6404926c166a00f7b7b38effa4f825d85a6932a61f3142eb44076a21d

            • C:\Windows\SysWOW64\Jplmmfmi.exe

              Filesize

              128KB

              MD5

              6ee07c208c651edf80c26af0b82063cf

              SHA1

              5b9e7c86f968832bab5f1003c7af322878b2db42

              SHA256

              e09fcf87918a93acc64c21b1fecab7698e83904154d1789916dac3544cb93b44

              SHA512

              61648f17238149182a2b6362c1fc2ac08635007854118707acf988782c67d29552a6f1695acae487bc6d6a1f68b05a3aac7d5bafd984e4eda148eaf6f45da9cb

            • C:\Windows\SysWOW64\Jpojcf32.exe

              Filesize

              128KB

              MD5

              156d9fcd18cbb8140d4cdc011d0820d1

              SHA1

              6ece2bd9712621ede4aab083b2d263220b24c977

              SHA256

              ff8d5516f57309d984520fa3070fe1a99f8db595495f65f3eb76bf319261a48e

              SHA512

              bc48f2a218ccf65ccfbc7b12f2a09a0aef71d09cd15eb20599f052d18ba0cefc1b7cf56a2a24f7d5baf909da69044665e17b2175097228203533e1253b451cee

            • C:\Windows\SysWOW64\Kacphh32.exe

              Filesize

              128KB

              MD5

              4a88104c2f28b52160674b1d40213986

              SHA1

              7d553583abc8c914c56570a081fae0e98d1c1071

              SHA256

              89a3b9f23efd86bd63e215049cf81ecb55d7c78ee721251dc3a2694ed6cc2057

              SHA512

              fe20d3470754a911d3628be7aaadd6a84928e6b2a3dfd16d0d2316563b931e76c3064a0e053acfab2d42be5cdc0f52482fc82f029b8cb4bc9475b1090bddd369

            • C:\Windows\SysWOW64\Kdaldd32.exe

              Filesize

              128KB

              MD5

              954c2d3907cc29ad31e35c2a6619d80e

              SHA1

              2649dd57479a08fe11ef86287e952ad7d3e34bb0

              SHA256

              dc3139e0072548a5fdb20949dffb7d4f5944d806ce02b95c4dcf406e3fb48159

              SHA512

              6b823e678ffd294b49b91f08e266213cb223848d7dc68b17cf71b2ef0c0524d1ec251fb05b9bce7d893a3fc059c1b76148c5615bc26c2804be7dc673869efa28

            • C:\Windows\SysWOW64\Kdcijcke.exe

              Filesize

              128KB

              MD5

              a7570dcc89cbee658d3f580f2afa1198

              SHA1

              d3fb8246b3b9266dd276a9579dbb19490664d1e4

              SHA256

              044f36624b77163e9275cf5c83beffa568f470005be586ab1b8ac554997d9a5c

              SHA512

              1c881acb720faa4c1efcf796aa698846fab70a5813e34d692f88187cf4f750514354763f9af1ebf842302cd31bcf12ac29e2fcf250ecd3f9f19bbf5234f1c580

            • C:\Windows\SysWOW64\Kdffocib.exe

              Filesize

              128KB

              MD5

              9414499c45fe68fb5e448b40880e9579

              SHA1

              316d8ec2ce2bf7b32b860d0e116b94b011f0abf4

              SHA256

              f3f6325772c2b5384e259736b79157db2f35d6a7293b34696f5c9259d2a5d2a5

              SHA512

              2198f5b92e571befcf96669162661c870fd1b4343982aa1f6182ced8974a768f83f84045e3e1d049ebbaba3fab32c7138f600f27cc5c9b208f452bb0148a1987

            • C:\Windows\SysWOW64\Kdopod32.exe

              Filesize

              128KB

              MD5

              a34b0c0c7662da072e07dcd56cb939eb

              SHA1

              b439ab9f04778e113ad274862d6b44f25418101e

              SHA256

              397435020d72958129033912727cfdb401f9cfe68906877fa12180ca221ac078

              SHA512

              ff51644067bb25e58d7e449133e2d883177fbc99d92dd4a6bd779f4f66a2ad438dfb96561855fd53794406cbbbb809270f4ee0378d4cb395790a4870d3711f3f

            • C:\Windows\SysWOW64\Kgbefoji.exe

              Filesize

              128KB

              MD5

              46d9c7b7b6d6fe1617a2350d9ca482b3

              SHA1

              d72d3ca818b92b6be83bc45f27aef9b52e95d41b

              SHA256

              7a58d65951a57a4d9cb512becf0e61026ad076abbfe878e2da9d7d5a486f26d5

              SHA512

              ed9c228c3a559ba20a7043e8ba0954d25f15df5ea026ffd71e16086e83238f093a2f744c4ed3fa40f4a77066f35a29ae06bc90052513ae1d770371873202b3ba

            • C:\Windows\SysWOW64\Kipabjil.exe

              Filesize

              128KB

              MD5

              b2eb46dac9adef4453b25f26c4fed57c

              SHA1

              26c3077604b0655f48821e0013b3353c4ebe42f4

              SHA256

              a2662aa3c6b8b215d75be1dc5f6ef17a67706735685a252ccefc85118c616c47

              SHA512

              cc9262a49561fb423bdac79fd1ba5e3782483c3f4a995d9d7b8188f4cd9b73a53d09d8c2e35b5acb41e3fbc7610d7790d292a526adeab20adfec66cb0e9e13f3

            • C:\Windows\SysWOW64\Kkihknfg.exe

              Filesize

              128KB

              MD5

              988ba75eff03111af39d87b2551129db

              SHA1

              6f4d84946043f71738b000775ba287e16137b2e1

              SHA256

              02813288743e5d2cd13486a0fb1f07a646562cdf1f26bf6f48d5f92d892976b4

              SHA512

              98cc8dcfffd9c94d69a50c72bc5493716d82a16f0e877bf5b7d1d1052af91ac2071ec712ed176086445273636cb2896d8f0f01d77d3644523eb0a7ae3d13bd9d

            • C:\Windows\SysWOW64\Kkkdan32.exe

              Filesize

              128KB

              MD5

              fff355242da34d860c1c670edf076d2f

              SHA1

              57220677b169f4b8e6282fdf349a2d9e9c8a153d

              SHA256

              8dfa97d59c63117eea476eaad24988cfa34c25b6886da6e5364297aebce7e003

              SHA512

              6755b8007d8f79945e329d0bf0bff9dfeeca6dbd24d6980fb1d3598002a8817e4ae4a046300cf9cdf9bb65e7b50716f1822641dd1d0ba31f2eb0fca6642ff0f4

            • C:\Windows\SysWOW64\Kkpnlm32.exe

              Filesize

              128KB

              MD5

              e9cd8393bba28d06a3c9ac31b7c2fc7c

              SHA1

              c79c4d99db32fde4cff128892be81ffed92c0d7a

              SHA256

              fb2fd9cf952c37d129487d643a1d183b2a6cc02e0952046d15dbb18d0c668038

              SHA512

              f129dd7c173354d871def0278c1354402241657be71f39ba38b361db1847b9b73887f204544a6c9958f58a8a3479442055dedef7270628516eaae759e3aa7ff4

            • C:\Windows\SysWOW64\Kmjqmi32.exe

              Filesize

              128KB

              MD5

              c185999a25be399066d3ca308e856d32

              SHA1

              0946440cc2f072dc254e1a629412cc36de232a80

              SHA256

              70afee1d425ef09be7da98773a36f71e65109b42ed1a36fe535679dff3ce9100

              SHA512

              c1c753afa0012172eb6e6b187c00af3f7e5ecd6ae8a5d633a79413d95ea5999b64f4e156b1a637dff96f799459ea539fcc76ead70f2d68166dad30c87401d971

            • C:\Windows\SysWOW64\Lgbnmm32.exe

              Filesize

              128KB

              MD5

              eb9f1dbe1c4a2b94286e3ab544284091

              SHA1

              9ed921b8adf63fa68084291e8d44d3a8df9d1870

              SHA256

              a4cd5f470933c57f468825fea29d49d4761974fb8fd37053398ff076e8303bb0

              SHA512

              3aae9e4b99dbd522cb2461a1ef057e439382bfabb4c9f09b14ca21d3ebb247d1e14dc8c29997de8edbed230bb35df0e8f8b60174ceace40dfd00e4565f030aa0

            • C:\Windows\SysWOW64\Lnhmng32.exe

              Filesize

              128KB

              MD5

              903a428d228952acf3fff44c5ee94ac9

              SHA1

              312b1e22ea7e3769032e26d7634e023f43b0dc1a

              SHA256

              bdb44bee7d3e761e5062a138a379ca4b75533b14590a9445c194e364a32cef86

              SHA512

              e67059b861a7a2f5a05bb0becdd1d15b94c10a62746369dc6644141bd1788a10163488e159e58b114703f10d78ca2f6ef07238ca228ed50212a33d1709112cbe

            • C:\Windows\SysWOW64\Mkgmcjld.exe

              Filesize

              128KB

              MD5

              1966a9b24ef9eeaa556bc7377f6ea596

              SHA1

              2584cb64bb695eaf563cf03e4b1ab19ae0df7e98

              SHA256

              a8f446383a300522973c954a69de071b9585c42f9202d8a4253e00c3dda32b6d

              SHA512

              82f512ba54d08d5fdc2add0bda30e05e8bcf0177df0a51de8764a07367daee530745c418207f3c1bd5e9ac15efa5cda1f836f1ecc3b65ccb9c90e2256e048054

            • C:\Windows\SysWOW64\Ngcgcjnc.exe

              Filesize

              128KB

              MD5

              ef81d17909f2752b03106483c1c72103

              SHA1

              7f96decfc2b3cb8577bd84a8d6dac7af0a0631bd

              SHA256

              44f7a346dca691de79c949feaa301c30c905525ae4f029d13c4f846243ba52f8

              SHA512

              0d1e41af1d5cf4796bfb11347c9ffa9c42562baea3adaab5ba276cc18536e07a19fa8a88203615ef1c8e7a18a7d55d84beb33cc741f988b55cf1b2446678df8a

            • memory/452-484-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/728-257-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/768-121-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/772-153-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/824-246-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1108-321-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1132-233-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1188-462-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1212-280-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1232-450-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1260-365-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1264-474-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1264-563-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1316-498-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1316-562-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1384-297-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1508-444-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1528-5-0x0000000000431000-0x0000000000432000-memory.dmp

              Filesize

              4KB

            • memory/1528-534-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1528-0-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1552-333-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1688-353-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1852-184-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1904-72-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1912-535-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1912-557-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1940-561-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1940-496-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1996-432-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2052-323-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2076-402-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2080-254-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2136-559-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2136-516-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2184-129-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2308-359-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2312-200-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2320-299-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2392-17-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2392-554-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2412-53-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2424-89-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2612-335-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2644-113-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2732-224-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2920-514-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2928-81-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2936-9-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2936-547-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2992-281-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2996-389-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3004-346-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3044-377-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3088-97-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3168-438-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3220-401-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3232-57-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3236-383-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3276-168-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3404-65-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3636-287-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3668-468-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3668-564-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3876-371-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/3956-161-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4016-522-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4016-558-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4024-426-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4028-532-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4032-490-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4044-420-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4072-197-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4092-556-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4092-548-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4132-145-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4176-273-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4180-560-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4180-504-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4228-217-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4240-460-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4392-177-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4460-141-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4568-408-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4584-209-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4612-25-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4688-267-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4836-309-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4876-45-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4940-414-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4944-555-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4968-395-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4980-347-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/4984-33-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/5020-311-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/5024-104-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/5072-546-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB