Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 17:52

General

  • Target

    f0ee393245568ef0e70e2de2d057c5a0N.exe

  • Size

    64KB

  • MD5

    f0ee393245568ef0e70e2de2d057c5a0

  • SHA1

    ca59a285d8b0089b2b7330342441e78549fb68ee

  • SHA256

    5b14fa476afa2748cc8de2a557aa7a3535ceb8484ad68b0924afbb984b499484

  • SHA512

    6830c5a0c900df42d114c97b53724e18efcc7b9d318a8b8512e639efc68dbe1925ea9fcd6da446be29d3164f8a916faa44f981d814a82c3a14f33a69bc3bb3ce

  • SSDEEP

    1536:w7bVfql9YAqTnfcHt3Fp2mrZ4uBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbBBRai:wHVIq7kpfd4uBBBBBBBBBBBBBBBBBBBV

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0ee393245568ef0e70e2de2d057c5a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f0ee393245568ef0e70e2de2d057c5a0N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\SysWOW64\Ognpebpj.exe
      C:\Windows\system32\Ognpebpj.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\SysWOW64\Onhhamgg.exe
        C:\Windows\system32\Onhhamgg.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Windows\SysWOW64\Oqfdnhfk.exe
          C:\Windows\system32\Oqfdnhfk.exe
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4688
          • C:\Windows\SysWOW64\Ocdqjceo.exe
            C:\Windows\system32\Ocdqjceo.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3860
            • C:\Windows\SysWOW64\Ofcmfodb.exe
              C:\Windows\system32\Ofcmfodb.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:2476
              • C:\Windows\SysWOW64\Onjegled.exe
                C:\Windows\system32\Onjegled.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1968
                • C:\Windows\SysWOW64\Oqhacgdh.exe
                  C:\Windows\system32\Oqhacgdh.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4428
                  • C:\Windows\SysWOW64\Ocgmpccl.exe
                    C:\Windows\system32\Ocgmpccl.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1288
                    • C:\Windows\SysWOW64\Ojaelm32.exe
                      C:\Windows\system32\Ojaelm32.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4724
                      • C:\Windows\SysWOW64\Pmoahijl.exe
                        C:\Windows\system32\Pmoahijl.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:2744
                        • C:\Windows\SysWOW64\Pdfjifjo.exe
                          C:\Windows\system32\Pdfjifjo.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4920
                          • C:\Windows\SysWOW64\Pgefeajb.exe
                            C:\Windows\system32\Pgefeajb.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:5036
                            • C:\Windows\SysWOW64\Pjcbbmif.exe
                              C:\Windows\system32\Pjcbbmif.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2844
                              • C:\Windows\SysWOW64\Pqmjog32.exe
                                C:\Windows\system32\Pqmjog32.exe
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:3956
                                • C:\Windows\SysWOW64\Pclgkb32.exe
                                  C:\Windows\system32\Pclgkb32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4084
                                  • C:\Windows\SysWOW64\Pggbkagp.exe
                                    C:\Windows\system32\Pggbkagp.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3208
                                    • C:\Windows\SysWOW64\Pnakhkol.exe
                                      C:\Windows\system32\Pnakhkol.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:3180
                                      • C:\Windows\SysWOW64\Pqpgdfnp.exe
                                        C:\Windows\system32\Pqpgdfnp.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:764
                                        • C:\Windows\SysWOW64\Pcncpbmd.exe
                                          C:\Windows\system32\Pcncpbmd.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:4828
                                          • C:\Windows\SysWOW64\Pflplnlg.exe
                                            C:\Windows\system32\Pflplnlg.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:1444
                                            • C:\Windows\SysWOW64\Pncgmkmj.exe
                                              C:\Windows\system32\Pncgmkmj.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:3280
                                              • C:\Windows\SysWOW64\Pqbdjfln.exe
                                                C:\Windows\system32\Pqbdjfln.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:448
                                                • C:\Windows\SysWOW64\Pcppfaka.exe
                                                  C:\Windows\system32\Pcppfaka.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:3420
                                                  • C:\Windows\SysWOW64\Pfolbmje.exe
                                                    C:\Windows\system32\Pfolbmje.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4192
                                                    • C:\Windows\SysWOW64\Pnfdcjkg.exe
                                                      C:\Windows\system32\Pnfdcjkg.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4104
                                                      • C:\Windows\SysWOW64\Pdpmpdbd.exe
                                                        C:\Windows\system32\Pdpmpdbd.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4600
                                                        • C:\Windows\SysWOW64\Pcbmka32.exe
                                                          C:\Windows\system32\Pcbmka32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:4864
                                                          • C:\Windows\SysWOW64\Pfaigm32.exe
                                                            C:\Windows\system32\Pfaigm32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4440
                                                            • C:\Windows\SysWOW64\Qnhahj32.exe
                                                              C:\Windows\system32\Qnhahj32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Modifies registry class
                                                              PID:3488
                                                              • C:\Windows\SysWOW64\Qqfmde32.exe
                                                                C:\Windows\system32\Qqfmde32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1128
                                                                • C:\Windows\SysWOW64\Qceiaa32.exe
                                                                  C:\Windows\system32\Qceiaa32.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Modifies registry class
                                                                  PID:864
                                                                  • C:\Windows\SysWOW64\Qjoankoi.exe
                                                                    C:\Windows\system32\Qjoankoi.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:224
                                                                    • C:\Windows\SysWOW64\Qmmnjfnl.exe
                                                                      C:\Windows\system32\Qmmnjfnl.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:1112
                                                                      • C:\Windows\SysWOW64\Qqijje32.exe
                                                                        C:\Windows\system32\Qqijje32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:3360
                                                                        • C:\Windows\SysWOW64\Qcgffqei.exe
                                                                          C:\Windows\system32\Qcgffqei.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3020
                                                                          • C:\Windows\SysWOW64\Qffbbldm.exe
                                                                            C:\Windows\system32\Qffbbldm.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            PID:5100
                                                                            • C:\Windows\SysWOW64\Anmjcieo.exe
                                                                              C:\Windows\system32\Anmjcieo.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:2132
                                                                              • C:\Windows\SysWOW64\Aqkgpedc.exe
                                                                                C:\Windows\system32\Aqkgpedc.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • Modifies registry class
                                                                                PID:2792
                                                                                • C:\Windows\SysWOW64\Acjclpcf.exe
                                                                                  C:\Windows\system32\Acjclpcf.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1240
                                                                                  • C:\Windows\SysWOW64\Afhohlbj.exe
                                                                                    C:\Windows\system32\Afhohlbj.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:4044
                                                                                    • C:\Windows\SysWOW64\Ajckij32.exe
                                                                                      C:\Windows\system32\Ajckij32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies registry class
                                                                                      PID:1460
                                                                                      • C:\Windows\SysWOW64\Ambgef32.exe
                                                                                        C:\Windows\system32\Ambgef32.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1476
                                                                                        • C:\Windows\SysWOW64\Aeiofcji.exe
                                                                                          C:\Windows\system32\Aeiofcji.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies registry class
                                                                                          PID:5056
                                                                                          • C:\Windows\SysWOW64\Aclpap32.exe
                                                                                            C:\Windows\system32\Aclpap32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            PID:3424
                                                                                            • C:\Windows\SysWOW64\Ajfhnjhq.exe
                                                                                              C:\Windows\system32\Ajfhnjhq.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Modifies registry class
                                                                                              PID:4196
                                                                                              • C:\Windows\SysWOW64\Amddjegd.exe
                                                                                                C:\Windows\system32\Amddjegd.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1252
                                                                                                • C:\Windows\SysWOW64\Aqppkd32.exe
                                                                                                  C:\Windows\system32\Aqppkd32.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Modifies registry class
                                                                                                  PID:2280
                                                                                                  • C:\Windows\SysWOW64\Acnlgp32.exe
                                                                                                    C:\Windows\system32\Acnlgp32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4040
                                                                                                    • C:\Windows\SysWOW64\Afmhck32.exe
                                                                                                      C:\Windows\system32\Afmhck32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:3244
                                                                                                      • C:\Windows\SysWOW64\Andqdh32.exe
                                                                                                        C:\Windows\system32\Andqdh32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Modifies registry class
                                                                                                        PID:2396
                                                                                                        • C:\Windows\SysWOW64\Amgapeea.exe
                                                                                                          C:\Windows\system32\Amgapeea.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Modifies registry class
                                                                                                          PID:2380
                                                                                                          • C:\Windows\SysWOW64\Aeniabfd.exe
                                                                                                            C:\Windows\system32\Aeniabfd.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1052
                                                                                                            • C:\Windows\SysWOW64\Afoeiklb.exe
                                                                                                              C:\Windows\system32\Afoeiklb.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:4444
                                                                                                              • C:\Windows\SysWOW64\Aminee32.exe
                                                                                                                C:\Windows\system32\Aminee32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                PID:4536
                                                                                                                • C:\Windows\SysWOW64\Aepefb32.exe
                                                                                                                  C:\Windows\system32\Aepefb32.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4852
                                                                                                                  • C:\Windows\SysWOW64\Accfbokl.exe
                                                                                                                    C:\Windows\system32\Accfbokl.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:2232
                                                                                                                    • C:\Windows\SysWOW64\Bfabnjjp.exe
                                                                                                                      C:\Windows\system32\Bfabnjjp.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Modifies registry class
                                                                                                                      PID:3004
                                                                                                                      • C:\Windows\SysWOW64\Bnhjohkb.exe
                                                                                                                        C:\Windows\system32\Bnhjohkb.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:3672
                                                                                                                        • C:\Windows\SysWOW64\Bmkjkd32.exe
                                                                                                                          C:\Windows\system32\Bmkjkd32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1896
                                                                                                                          • C:\Windows\SysWOW64\Bebblb32.exe
                                                                                                                            C:\Windows\system32\Bebblb32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1224
                                                                                                                            • C:\Windows\SysWOW64\Bganhm32.exe
                                                                                                                              C:\Windows\system32\Bganhm32.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Modifies registry class
                                                                                                                              PID:3088
                                                                                                                              • C:\Windows\SysWOW64\Bjokdipf.exe
                                                                                                                                C:\Windows\system32\Bjokdipf.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:3440
                                                                                                                                • C:\Windows\SysWOW64\Bmngqdpj.exe
                                                                                                                                  C:\Windows\system32\Bmngqdpj.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:3784
                                                                                                                                  • C:\Windows\SysWOW64\Baicac32.exe
                                                                                                                                    C:\Windows\system32\Baicac32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:4696
                                                                                                                                    • C:\Windows\SysWOW64\Bchomn32.exe
                                                                                                                                      C:\Windows\system32\Bchomn32.exe
                                                                                                                                      66⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:1488
                                                                                                                                      • C:\Windows\SysWOW64\Bffkij32.exe
                                                                                                                                        C:\Windows\system32\Bffkij32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:3268
                                                                                                                                        • C:\Windows\SysWOW64\Bnmcjg32.exe
                                                                                                                                          C:\Windows\system32\Bnmcjg32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4588
                                                                                                                                          • C:\Windows\SysWOW64\Balpgb32.exe
                                                                                                                                            C:\Windows\system32\Balpgb32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:4392
                                                                                                                                            • C:\Windows\SysWOW64\Bcjlcn32.exe
                                                                                                                                              C:\Windows\system32\Bcjlcn32.exe
                                                                                                                                              70⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:3392
                                                                                                                                              • C:\Windows\SysWOW64\Bjddphlq.exe
                                                                                                                                                C:\Windows\system32\Bjddphlq.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                PID:2884
                                                                                                                                                • C:\Windows\SysWOW64\Bmbplc32.exe
                                                                                                                                                  C:\Windows\system32\Bmbplc32.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:2784
                                                                                                                                                  • C:\Windows\SysWOW64\Beihma32.exe
                                                                                                                                                    C:\Windows\system32\Beihma32.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2788
                                                                                                                                                    • C:\Windows\SysWOW64\Bhhdil32.exe
                                                                                                                                                      C:\Windows\system32\Bhhdil32.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:524
                                                                                                                                                      • C:\Windows\SysWOW64\Bjfaeh32.exe
                                                                                                                                                        C:\Windows\system32\Bjfaeh32.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:3056
                                                                                                                                                        • C:\Windows\SysWOW64\Bnbmefbg.exe
                                                                                                                                                          C:\Windows\system32\Bnbmefbg.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:2664
                                                                                                                                                          • C:\Windows\SysWOW64\Bmemac32.exe
                                                                                                                                                            C:\Windows\system32\Bmemac32.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            PID:948
                                                                                                                                                            • C:\Windows\SysWOW64\Cndikf32.exe
                                                                                                                                                              C:\Windows\system32\Cndikf32.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:5092
                                                                                                                                                              • C:\Windows\SysWOW64\Cabfga32.exe
                                                                                                                                                                C:\Windows\system32\Cabfga32.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:2588
                                                                                                                                                                • C:\Windows\SysWOW64\Cdabcm32.exe
                                                                                                                                                                  C:\Windows\system32\Cdabcm32.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:3728
                                                                                                                                                                  • C:\Windows\SysWOW64\Cjkjpgfi.exe
                                                                                                                                                                    C:\Windows\system32\Cjkjpgfi.exe
                                                                                                                                                                    81⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    PID:2024
                                                                                                                                                                    • C:\Windows\SysWOW64\Cmiflbel.exe
                                                                                                                                                                      C:\Windows\system32\Cmiflbel.exe
                                                                                                                                                                      82⤵
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:2956
                                                                                                                                                                      • C:\Windows\SysWOW64\Caebma32.exe
                                                                                                                                                                        C:\Windows\system32\Caebma32.exe
                                                                                                                                                                        83⤵
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:1832
                                                                                                                                                                        • C:\Windows\SysWOW64\Chokikeb.exe
                                                                                                                                                                          C:\Windows\system32\Chokikeb.exe
                                                                                                                                                                          84⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:892
                                                                                                                                                                          • C:\Windows\SysWOW64\Cfbkeh32.exe
                                                                                                                                                                            C:\Windows\system32\Cfbkeh32.exe
                                                                                                                                                                            85⤵
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:1688
                                                                                                                                                                            • C:\Windows\SysWOW64\Cagobalc.exe
                                                                                                                                                                              C:\Windows\system32\Cagobalc.exe
                                                                                                                                                                              86⤵
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:3624
                                                                                                                                                                              • C:\Windows\SysWOW64\Cdfkolkf.exe
                                                                                                                                                                                C:\Windows\system32\Cdfkolkf.exe
                                                                                                                                                                                87⤵
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:3368
                                                                                                                                                                                • C:\Windows\SysWOW64\Cmnpgb32.exe
                                                                                                                                                                                  C:\Windows\system32\Cmnpgb32.exe
                                                                                                                                                                                  88⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:4092
                                                                                                                                                                                  • C:\Windows\SysWOW64\Cdhhdlid.exe
                                                                                                                                                                                    C:\Windows\system32\Cdhhdlid.exe
                                                                                                                                                                                    89⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:5140
                                                                                                                                                                                    • C:\Windows\SysWOW64\Cjbpaf32.exe
                                                                                                                                                                                      C:\Windows\system32\Cjbpaf32.exe
                                                                                                                                                                                      90⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:5184
                                                                                                                                                                                      • C:\Windows\SysWOW64\Cmqmma32.exe
                                                                                                                                                                                        C:\Windows\system32\Cmqmma32.exe
                                                                                                                                                                                        91⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:5228
                                                                                                                                                                                        • C:\Windows\SysWOW64\Dfiafg32.exe
                                                                                                                                                                                          C:\Windows\system32\Dfiafg32.exe
                                                                                                                                                                                          92⤵
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:5272
                                                                                                                                                                                          • C:\Windows\SysWOW64\Danecp32.exe
                                                                                                                                                                                            C:\Windows\system32\Danecp32.exe
                                                                                                                                                                                            93⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5316
                                                                                                                                                                                            • C:\Windows\SysWOW64\Dhhnpjmh.exe
                                                                                                                                                                                              C:\Windows\system32\Dhhnpjmh.exe
                                                                                                                                                                                              94⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              PID:5360
                                                                                                                                                                                              • C:\Windows\SysWOW64\Djgjlelk.exe
                                                                                                                                                                                                C:\Windows\system32\Djgjlelk.exe
                                                                                                                                                                                                95⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:5404
                                                                                                                                                                                                • C:\Windows\SysWOW64\Delnin32.exe
                                                                                                                                                                                                  C:\Windows\system32\Delnin32.exe
                                                                                                                                                                                                  96⤵
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:5448
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ddonekbl.exe
                                                                                                                                                                                                    C:\Windows\system32\Ddonekbl.exe
                                                                                                                                                                                                    97⤵
                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:5488
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dkifae32.exe
                                                                                                                                                                                                      C:\Windows\system32\Dkifae32.exe
                                                                                                                                                                                                      98⤵
                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:5540
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Deokon32.exe
                                                                                                                                                                                                        C:\Windows\system32\Deokon32.exe
                                                                                                                                                                                                        99⤵
                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                        PID:5584
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Ddakjkqi.exe
                                                                                                                                                                                                          C:\Windows\system32\Ddakjkqi.exe
                                                                                                                                                                                                          100⤵
                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          PID:5628
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Dogogcpo.exe
                                                                                                                                                                                                            C:\Windows\system32\Dogogcpo.exe
                                                                                                                                                                                                            101⤵
                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:5672
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Deagdn32.exe
                                                                                                                                                                                                              C:\Windows\system32\Deagdn32.exe
                                                                                                                                                                                                              102⤵
                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:5716
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Dknpmdfc.exe
                                                                                                                                                                                                                C:\Windows\system32\Dknpmdfc.exe
                                                                                                                                                                                                                103⤵
                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:5760
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                                                                                  C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                                                                                  104⤵
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:5804
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5804 -s 400
                                                                                                                                                                                                                    105⤵
                                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                                    PID:5892
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5804 -ip 5804
    1⤵
      PID:5868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Bmbplc32.exe

      Filesize

      64KB

      MD5

      bd2073acd88a5fae528e5d40332714ca

      SHA1

      cfa39f8d11b1d507ff8b8669fd5d48009db45b4b

      SHA256

      54030fe772c26926cc783536aeafdb0adc6440911ddb2099360102e362e34ea4

      SHA512

      0188634c7a1ba12391b52321ecc9905b1054dbeac962946943822e1c2d2996cc97cf7c0819e9790506c7175647baee8594350f3afaf7fa4fb1a1a0cb1ac119e7

    • C:\Windows\SysWOW64\Bmkjkd32.exe

      Filesize

      64KB

      MD5

      3ca939bdcaaee3019974ae21b3c960d7

      SHA1

      0a2cda36afb0a79a231eb36a0595cb4c1980047a

      SHA256

      fb426ab3278cf26e58f08c788ce4969b13e2f97cdb5c38befcdc07d337ef21df

      SHA512

      d7e918cdcb9e2901c262d16c93dab64666569a4abf19c3c9d1c1e43ac718b7010fc382ba84b610d15efa142d37b77f83015d886c4b059b3c20c78db24941b416

    • C:\Windows\SysWOW64\Cdabcm32.exe

      Filesize

      64KB

      MD5

      c60226eeaaec435c63837cc8806d45d6

      SHA1

      eb5b453411fab40bd603a8ade9ec48db9968fc84

      SHA256

      e7d435cd79a1f736440cdf577d2eaeae787626215482378fdadf37d50b78ef20

      SHA512

      f06a95c455a9d7401d928c22328f9f0d819ff1c99d2d19006365f6ab2c35156b1c764a8b2469919097d41f5f7472844a70450fdd3b703064e09a1b596398dba0

    • C:\Windows\SysWOW64\Ddonekbl.exe

      Filesize

      64KB

      MD5

      84c0459de7bc3fce9d7dd676782c4421

      SHA1

      0bad0b9265f2189f062061385a381a71dbbaeae5

      SHA256

      c607c3f59b45764d1e7951fd5cddbebc2bbc3a15279f968de5cc3d2b7932854b

      SHA512

      5a8b16d30e9d6d33a9a23aa1e29ac83a04975ab9c4d640ede3eaef10d01023f11d359cdaef80f51e358365f35627126e9987ab081eab06a5718e32dd5f54a1ea

    • C:\Windows\SysWOW64\Dfiafg32.exe

      Filesize

      64KB

      MD5

      c4bd842a88673f689380a58bde2f4a65

      SHA1

      a1a087bfa6ba5ef6d5809f1693c93387af285685

      SHA256

      43580b9e6dc5585aa96e3f0d93f1f4f3e21649802cdcd5a29bb75224cf46f44f

      SHA512

      7069d894a044964e8846036f10260cbe70cc85bfba740627b046c21a3c7b5fcb7bf4c6e18d7365eca06478c57083744d9f36b79a6c7b06668e10cf6477c499cb

    • C:\Windows\SysWOW64\Ocdqjceo.exe

      Filesize

      64KB

      MD5

      fab5f15398c9df854f8791b8d5171158

      SHA1

      8f2f89364b0ba8b699e976020baa3d6330f98a44

      SHA256

      2e4c7a1e68f45a3b7e9b63f0ab81b0a2fe4a7cd410f2d791fd1795d285df5d86

      SHA512

      0d6251abbb6be630e66be9c5026af3e3f9253fd5d5b94048695209fb3801f307e7d93328689f1a5c0521ecc0e6cfda59ee3977f4e9895a71ee050fc43a437164

    • C:\Windows\SysWOW64\Ocgmpccl.exe

      Filesize

      64KB

      MD5

      7326302c2022f1ff7ec3b842a53aabcb

      SHA1

      4833085e62cd69e904d9702090574ef716dfbbf6

      SHA256

      32b88637e55fa93ffe818d5fe50d935d6fc1e89053e71d10656b679d062e6903

      SHA512

      4f66c15fbac17895ee654ced9b864acd058a9709e5e98dec13fc2ce0ddaa5ba0762915b8b981a2a15d299472f5db7e956661b219506a73a786a9b98fdd768df8

    • C:\Windows\SysWOW64\Ofcmfodb.exe

      Filesize

      64KB

      MD5

      761a19ddbf2d0c230d238cfbd0a712e9

      SHA1

      f1692c75bbd3f5a8c972c51056662682a1be55a2

      SHA256

      7db13cc2ce498661d7947c6cc55fd65cc07a2d1526da7f83f5cadf7fa1b1d287

      SHA512

      113d1d2b3abd0ccf13fd6304ccbc163d416158ef123057876063af4d9bfa9ac2d08986da5e82d7e0802b07574c08c1779db1fa9721e8de437721c6fee5cad712

    • C:\Windows\SysWOW64\Ognpebpj.exe

      Filesize

      64KB

      MD5

      0e366374d0b46279cdfc5718dcdea5fa

      SHA1

      73118ef4943adadb383a7f46c776c988fc168456

      SHA256

      aaf3fc560c946be108af589a8a947d2dcbd1378e49c3574c197f76d66ce72e42

      SHA512

      c4f6a6ef2b668601836c29778dd53a4cea77aba581075040bd7c9edd4b5952bb630be312bd8b4988aae307978509f8d86df1ded64c0190c133aab956b8106a7e

    • C:\Windows\SysWOW64\Ojaelm32.exe

      Filesize

      64KB

      MD5

      4b64e8ebdee61a0002342e0a69b9e350

      SHA1

      b8e6baaa2adc1dbecb53874cc1fd1f53feef7712

      SHA256

      96495921be4d795d57618b8d477b55adca0013178855a52a376bd40f6a2a0b08

      SHA512

      79ab1d03f6546e2d8248c518d72a1f539045dc90438eaf744dcd11b801e04e4d82edca2ce5719ed66b2631b91d8858ed1c7cf9d83b06e1f902b351125d513c35

    • C:\Windows\SysWOW64\Onhhamgg.exe

      Filesize

      64KB

      MD5

      64f20cf1f10b8c5ba27d711ead86133e

      SHA1

      2baf8a2db4154a862c15fb9df3f0d8ab9f63fc35

      SHA256

      b9c234a24bae74c0458c8eb97cb710702903e2835828a7dffe2e6537d27681f9

      SHA512

      2216c5b1da0181ed700499b1fb16fe3932b30dc14f9f582ca5b73fd0499a06c11f8d6bb6af879b101fdd404a224b9305e0e2ac1b61f112fb10a5b277b1f97f3a

    • C:\Windows\SysWOW64\Onjegled.exe

      Filesize

      64KB

      MD5

      db5fce5d7019a50127ec508b59872d68

      SHA1

      697410d45409bc062e56b752e711ff5540fe17ec

      SHA256

      02c9251fdff49643f55df8757bf30e5f01b40b01ac46e1c5e290391af49ee9ac

      SHA512

      e596abe0b2eeb319c52b181d15f7e209c45871ec7704c615f2ddb9d7387fd65a47678ca5ed6c23e58ecd8b2c49e289b26d9b1adf8b3406d79bae89a15f750a79

    • C:\Windows\SysWOW64\Oqfdnhfk.exe

      Filesize

      64KB

      MD5

      ffc6955cc24309c70da99db880fdef85

      SHA1

      fc4c6930af037d6a1018b6eb7c16d8ff5171bbc9

      SHA256

      42b0d33d6667f4a3e959c13a696c01cf94a288b6e3ada6fbe4b163387ec3c070

      SHA512

      6a8d50ff7bde1f79815b621aed249e8b4b378980e5c283c441dc726fafc00244072af62b05ee9a252e11471442a9b2913265fcbe52ad05bdaf62fec1e9a1a1c7

    • C:\Windows\SysWOW64\Oqhacgdh.exe

      Filesize

      64KB

      MD5

      17f16bb4bd715b0822a6b2991fd15494

      SHA1

      f427f0278907502cb919a9ceeb1f56e757b3303d

      SHA256

      5e49389c41c806cc63614621ddeb5afe3230b65b5e6980f1fc8ad0c44902a6e9

      SHA512

      23f4d83f29d2d876a191ff45e4fa18331bed9de94323651eb9a3004152b2df4f3dde87d6c8b8f91ce382eafe07076593f97b31a302b110ba4156398e0acc93b1

    • C:\Windows\SysWOW64\Pcbmka32.exe

      Filesize

      64KB

      MD5

      93c7a0c0b51dba7cdef2f464ada2229c

      SHA1

      0dfc1bbeebdb176dada07646479321059fb2761d

      SHA256

      081dccd2cd23f44afbc9d514feac162e9c2436976bd2f34ea98d967c5cb3d9d8

      SHA512

      8ec58a02d6aebf86667aea3675d130eb26fb53f5b757245cebdd730c004011320040c5dd68e1d37f73976c3890b35017db109519271109fe93adb7fb26f6ff98

    • C:\Windows\SysWOW64\Pclgkb32.exe

      Filesize

      64KB

      MD5

      23a111bff7563e45d852f1d439d52e07

      SHA1

      042ba32a008eed4945f6a091a6abb9dda86c8939

      SHA256

      b62225cb390913f2d066875f8a50b1a74a7720bbaa52181b33c8adb0048e9f11

      SHA512

      c5d043f1acaa1e443a9be4ab6f92683bbd9403954f6437514ff7dadcad870255613e619353ea55493a1fd0ebd596924c957babc9398aec0a6f6ac81db81ec4c4

    • C:\Windows\SysWOW64\Pcncpbmd.exe

      Filesize

      64KB

      MD5

      69899b05a5e2fe0de08ad765237c44de

      SHA1

      73fc5e60de10dec9d36f10dc70ea7f1c19abb855

      SHA256

      322ece618fca1043d64f22cd6a74004e9901986b8d3ebc116bc10e80b4763e53

      SHA512

      6c836f926e4a63239c36b65e3aa371b7ad040a5e6b998de22bbc69366cc82c542066509cbc332bdfb85bea65fd446aff37b5ebe6b6d8f1f18924b61c3ed96dea

    • C:\Windows\SysWOW64\Pcppfaka.exe

      Filesize

      64KB

      MD5

      f168e83ac9b5f70b256dfc8613d7adfe

      SHA1

      5db298a34a2336120923c6f3fd5c5c3f6d9b07dd

      SHA256

      281881ad40c6794b69a95c7c069c0c3876d8d3777e9757e7024998a8ceea2bae

      SHA512

      069501dc78f970e4e438142b5731c171705c1b828637495d0d7398065c5cc050e0e0f6034466a834d734a1028abd74ee230d5175189b92cacc5140cba9a398c1

    • C:\Windows\SysWOW64\Pdfjifjo.exe

      Filesize

      64KB

      MD5

      c9cecded9f182027aa11c8daf2c3abe0

      SHA1

      a63ae5bec7d4372e448d16d7c4dd8069dae98f81

      SHA256

      300f0796ff0e9825ac6ca83d500c801f492d3a2b2c41d8fe16f8e924a6397cd2

      SHA512

      e3211dd579554a6d0176354e87d8e57194d49f607ca4523daf3a9ee427e8f717bba8f1f647db99ee9a9e339960bc9a1480a08e6a55522c62f81a465bdb96b057

    • C:\Windows\SysWOW64\Pdpmpdbd.exe

      Filesize

      64KB

      MD5

      6029a998b0bb044ba230e25e6b6fbdc4

      SHA1

      5c0b7e80615bdd0574ec00f294de32cc9d65c8c2

      SHA256

      3b37185798b59a91d6308b733966656de16a9bafc9beae783f719008860b7b35

      SHA512

      35abd7ace4220a73c646a682cc220d89195c757d076a237489a9f272acffcf35b865bdca8705c0640a76e8a68ea8c28eb628f8a65d7f10f5a615b4e9bad73a02

    • C:\Windows\SysWOW64\Pfaigm32.exe

      Filesize

      64KB

      MD5

      b0247b926dc1bf9e6d35dd2c183fe83f

      SHA1

      65b96bce4ec6a42f55c8da8fa1864ed95c0d4d01

      SHA256

      cee2b8015863b9d0b2f4abaf9c24353d4dc18574eba94bbc39f93e47e014032e

      SHA512

      c77b6684c95417b22729fc117ac61e10a95ab6be677b426c1216d4d7ca932136bb20835dd2dcfc11a881e652d246854f2899c217d6fcd2a3a7b1f9c2cb807b34

    • C:\Windows\SysWOW64\Pflplnlg.exe

      Filesize

      64KB

      MD5

      b25cbc316550e6e108b60ce089b3444c

      SHA1

      d412c0048244f2ba8431d5ebf2356df7de5b24d5

      SHA256

      010ccd1fb32c831bdb95b372b6c580e265ba9509280f73f17e7fdd014e6c9a3f

      SHA512

      f50e903647b908548830e98f3e86cf4f3e948a5054be7fe38ed739af10c0dee5ef22dd330ae3979ebd85bb052dab10fe432ca09bbc16d5e1158e9a4ee927b884

    • C:\Windows\SysWOW64\Pfolbmje.exe

      Filesize

      64KB

      MD5

      77e4e76595a9d2dd25636221dfbd7058

      SHA1

      30267f2f72c5a09f1952f857015f92c5b620a50f

      SHA256

      ce47391725762233445e477585fbb6a2d3d326e53521fd97d8de74e228f2b8ed

      SHA512

      12af9286437a1d0ad8deef703dbfa83dcc067a21022e6ee152aef662e3338d9fff9bf313b82c07295c34a779ae35c8f6c673b97afc111a75ef4bd9f9bf104694

    • C:\Windows\SysWOW64\Pgefeajb.exe

      Filesize

      64KB

      MD5

      a651f6581a721e0d3c1d82c9e91f9db9

      SHA1

      d0051449ac3f6490cb736f57c5f117857e001613

      SHA256

      81e243c1ca9a46183ff9f12505fac66ecce45f51ecf9b6041b3c574306b4e1a5

      SHA512

      54ca3a28895a963292ca381d52ef7aeecedf2c8a89405770e1e8d31505ab8cc2e7c6522c18bbfff840b4f8a01173804c468d1345afc748a7c585392b6cf6aa1d

    • C:\Windows\SysWOW64\Pggbkagp.exe

      Filesize

      64KB

      MD5

      5636a9ed5a67a5cfd322b08dab8ca99f

      SHA1

      1c705c7e05b8fcfbfed1657203dd8015636236c5

      SHA256

      58f48a26369dfbc3c6eb9b48d5fab829b2274dfd0782a0ad83ed241cdab90f51

      SHA512

      1eecfcf30250afbd71e52a12540089f05340ac4275441fdb478524a469fa5310ca5c059563ccebda3b099746b3ceca3edcff8334cb077ee045a885e06564bf40

    • C:\Windows\SysWOW64\Pjcbbmif.exe

      Filesize

      64KB

      MD5

      a9cb6533f061c1e14a2441ca710fda01

      SHA1

      660a6c7b66fdef8ab996988e6e42da05e6136605

      SHA256

      24237887f910654faf6d5e0a62d30950d6298cbdc2cd880d68a454acfb5c1783

      SHA512

      b1e3fc95004edd1fd14b928fd8161f74f533d5e386ecbbc6be766517a2fa4559af8b693b54e33193c4bb9de1502816efb8d4b996dcb560f65232757eea5080fc

    • C:\Windows\SysWOW64\Pmoahijl.exe

      Filesize

      64KB

      MD5

      b5f881e750c82d9f3a5658a83f6cbb19

      SHA1

      c7ec1d33513009a5991e0176fc778642f5bc24a2

      SHA256

      cd24ac907a776da439309e14c8897dfa1a09a4909caf08147ca8aeb466ee9533

      SHA512

      3f18737f2db1601d1e943d1d9429867aefdb8d4c78ff5a1a0bec134b39baa0c55649eb5ef1e5e9e431b7f9cc61f617fc666839769aeb033e65006fd502eccfdc

    • C:\Windows\SysWOW64\Pnakhkol.exe

      Filesize

      64KB

      MD5

      b4587b1078cd01817bb0578a904d34a1

      SHA1

      b0cc9240c6ce455bdb4d38c0004e147c0b491052

      SHA256

      f5abf23b7d307f3b49bcab2d88787e3c9d855a62d822d31d92ac3421cf53bfae

      SHA512

      ae5916d7234cb234505cfddff1de09c71a2d3a673e417ec3140e81724ed1dea4fa74c6c3aecabf69e0c42dc2f7755cb983360d4ec0375509b831f866d96e2ffc

    • C:\Windows\SysWOW64\Pncgmkmj.exe

      Filesize

      64KB

      MD5

      bfdf0e89488623b111621f6f18c202ee

      SHA1

      b49b864ec6bcdc4d03745b7585d3294bc6b28aae

      SHA256

      6eff9939fdd6f20ce4638d353f2070f4e017090818a49afc3010c84ad58b6a07

      SHA512

      f283278fdf8213d484634310932203cb08abd839a922132b3a0ec9039df87b81ee83214b04f5777d7b3a22206ae5c21b9a1543016542c3328c8fc48039d43122

    • C:\Windows\SysWOW64\Pnfdcjkg.exe

      Filesize

      64KB

      MD5

      1f8e1012db08073f879e7e90e6187f63

      SHA1

      c3a4ae98da703b91c1ff9efbe6dea5c897de8a16

      SHA256

      76eecfd5930f386d59d232fec87dbb073674fedc4e3e20f8b0982d9ee7954389

      SHA512

      38a358cd54158962e848cf2351139c7092d68362c11f620b7216c3f27bf0f53685fef5adddd08f2e13e9f6be7eeeb9a93c432dbf718cc067237f93d01a816538

    • C:\Windows\SysWOW64\Pqbdjfln.exe

      Filesize

      64KB

      MD5

      59a3b7fe088879b12f43e32e31e543e9

      SHA1

      aa15e4d5d4a08841c477a449d30ace6c5114305d

      SHA256

      c1a8073fd4fe25f41599deffe20d7810a10bddbb59ff550b2db96763a0dc28ed

      SHA512

      cd360c1b1e8cd6c635d3aa9bf4eee1debef9328325357d219fa06ef97c80d4b81433c4e52ed1ca5a6a678083278031af0b28c3537cf40297b3ea6d91da2f05b8

    • C:\Windows\SysWOW64\Pqmjog32.exe

      Filesize

      64KB

      MD5

      83921586755556ed3fc3e0f2e95b9bfc

      SHA1

      a865420b5a5b25b0d1827587446448e124a97282

      SHA256

      54951e149231237369e487e9ce60d64c529ff6ef23ecaf01b5c8ed6bec0420a9

      SHA512

      ff0ab407a3e093c9262008dd65ceeee93aec23222d6cb73274ef33e56df3c31ff33a5d52148a7160f56f6cc8adf513a3811673cdf186b568bab37068b51d4f4e

    • C:\Windows\SysWOW64\Pqpgdfnp.exe

      Filesize

      64KB

      MD5

      0820425ef09bf372a5d974523d32361a

      SHA1

      5bbf9edfe047b7611f3ea4b704849f86679bfce7

      SHA256

      48d4921240b79c9640a1b0ec4d3935c9ed903f312608c0e1e48457259d8095db

      SHA512

      58478df612717432ceb33323eca0233aeb1c7a23501670b9000dbe94dc1c35d551267713349193b61643f932918a5aa1bc6619d7339b27613ea3b245f2afd9c4

    • C:\Windows\SysWOW64\Qceiaa32.exe

      Filesize

      64KB

      MD5

      eca2d145b726043c282e076e70615c63

      SHA1

      8cc1721839538e8e9b1dd9a67e221e6febec5d99

      SHA256

      b6a73091b5bd0b3a7cc40f46d36d62d84f52e5e45ccaa5754fea0fa7639bff27

      SHA512

      05268861cf92f87003ab70be5b28e6af86f2c4e3c54d30a3df4ef4c93270a3ea419fa58b930d91e1609e403319549dcbffbcca66ca9c1b86d3a9cb4ce19f0f92

    • C:\Windows\SysWOW64\Qjoankoi.exe

      Filesize

      64KB

      MD5

      623eb0de4a11baca462e7465cb55c172

      SHA1

      90423a92120a069aa27db947f4cd6f999ed5f056

      SHA256

      6384c97d363fbced26b65b27b6b02ee31766d248878ff3549424f592bce644e1

      SHA512

      e5e2c8485e9c8bc8702a7621e18dc2066565f45ae88fd76baa41103c6877488cbe901df661f6b8fc7f660410f21ccec3d40c11aa323b2f84fdcddabe1275738f

    • C:\Windows\SysWOW64\Qnhahj32.exe

      Filesize

      64KB

      MD5

      d47a2b4bfd7f82a66c5775024b9c112e

      SHA1

      b4f79b62a20c6e90ebf2ae16e40b34b058291663

      SHA256

      6d0c9e9ce4a76b685f13ec018763e640eeed7240a37113be032a230c1876215a

      SHA512

      f3e5924f697673da02fc66897877a7e135096fad004069ef8ebfe56f060a4a585c8f03d79348c6dda781d41bfc50976e8e37e1771fa4998bcf27ebb60c4c41b8

    • C:\Windows\SysWOW64\Qqfmde32.exe

      Filesize

      64KB

      MD5

      27d80a0f66b4f2dfac73530fee1cd10e

      SHA1

      ad5cff678cba490869e222056b5b5152cb61d2c3

      SHA256

      4571edfbc43f27aa9904518a7efe5b13d3dbb6928fb903b53cc1b58463127ccb

      SHA512

      8fff101dde108d170786f58db4dc65d37aec7ed044ced77461366960c9787cd15caae3dc45b551d2a5f808a5319a8db55c286201c5c794b80e8b4d8f19b3a759

    • memory/224-256-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/448-176-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/524-503-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/764-144-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/864-248-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/892-571-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/948-521-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1052-377-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1112-263-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1128-240-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1224-425-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1240-299-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1252-341-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1288-64-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1444-160-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1448-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/1448-0-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1448-539-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1460-311-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1476-317-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1488-455-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1688-574-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1740-559-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1740-16-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1832-560-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1896-419-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1968-587-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/1968-48-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2024-546-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2132-287-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2232-401-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2280-352-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2380-371-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2396-365-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2476-40-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2476-580-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2588-533-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2664-515-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2744-80-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2784-491-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2788-497-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2792-293-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2844-104-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2884-485-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/2956-553-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3004-407-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3020-275-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3056-509-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3088-431-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3180-136-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3208-129-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3244-359-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3268-461-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3280-168-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3360-269-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3368-588-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3392-479-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3420-189-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3424-329-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3440-437-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3488-232-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3624-581-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3672-413-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3728-540-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3784-447-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3860-573-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3860-32-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/3956-112-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4040-353-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4044-305-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4084-125-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4104-201-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4192-192-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4196-335-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4392-473-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4428-57-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4428-594-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4440-225-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4444-383-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4536-389-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4588-467-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4600-212-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4688-566-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4688-25-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4696-449-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4724-72-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4828-152-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4832-552-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4832-9-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4852-395-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4864-216-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4920-89-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/5036-97-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/5056-323-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/5092-527-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/5100-281-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB