Analysis

  • max time kernel
    97s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:42

General

  • Target

    fb759e7cfa50af3a44b3ac81fb2e44a8d0e54777667a7b423d77930f9e91d164.exe

  • Size

    576KB

  • MD5

    bd3d1215448c2a05a7c84c2db6b4e734

  • SHA1

    db4645b9280537e44783721dc4a46c22417c637a

  • SHA256

    fb759e7cfa50af3a44b3ac81fb2e44a8d0e54777667a7b423d77930f9e91d164

  • SHA512

    ee2e27f66af469f67e84724d1ae5a0c889eb9c1a7aeb97d857ce11061ebaac8f9e6274b8a65f008e71b57175790a768876f551a432ce2c217a97a562fa981046

  • SSDEEP

    12288:dqNNurQg5W/+zrWAI5KFum/+zrWAIAqWim/+zrWAI5KFHTP7rXp:dENurQg5Wm0BmmvFimm0MTP7V

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb759e7cfa50af3a44b3ac81fb2e44a8d0e54777667a7b423d77930f9e91d164.exe
    "C:\Users\Admin\AppData\Local\Temp\fb759e7cfa50af3a44b3ac81fb2e44a8d0e54777667a7b423d77930f9e91d164.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\Klqcioba.exe
      C:\Windows\system32\Klqcioba.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Windows\SysWOW64\Llcpoo32.exe
        C:\Windows\system32\Llcpoo32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\Lfhdlh32.exe
          C:\Windows\system32\Lfhdlh32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Windows\SysWOW64\Lmbmibhb.exe
            C:\Windows\system32\Lmbmibhb.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3424
            • C:\Windows\SysWOW64\Ldoaklml.exe
              C:\Windows\system32\Ldoaklml.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1384
              • C:\Windows\SysWOW64\Lpebpm32.exe
                C:\Windows\system32\Lpebpm32.exe
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1572
                • C:\Windows\SysWOW64\Lingibiq.exe
                  C:\Windows\system32\Lingibiq.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3692
                  • C:\Windows\SysWOW64\Medgncoe.exe
                    C:\Windows\system32\Medgncoe.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4232
                    • C:\Windows\SysWOW64\Mpjlklok.exe
                      C:\Windows\system32\Mpjlklok.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:4940
                      • C:\Windows\SysWOW64\Mchhggno.exe
                        C:\Windows\system32\Mchhggno.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2572
                        • C:\Windows\SysWOW64\Megdccmb.exe
                          C:\Windows\system32\Megdccmb.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4820
                          • C:\Windows\SysWOW64\Mmnldp32.exe
                            C:\Windows\system32\Mmnldp32.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1192
                            • C:\Windows\SysWOW64\Migjoaaf.exe
                              C:\Windows\system32\Migjoaaf.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:2400
                              • C:\Windows\SysWOW64\Mdmnlj32.exe
                                C:\Windows\system32\Mdmnlj32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4980
                                • C:\Windows\SysWOW64\Mgkjhe32.exe
                                  C:\Windows\system32\Mgkjhe32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of WriteProcessMemory
                                  PID:3308
                                  • C:\Windows\SysWOW64\Menjdbgj.exe
                                    C:\Windows\system32\Menjdbgj.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:2516
                                    • C:\Windows\SysWOW64\Mnebeogl.exe
                                      C:\Windows\system32\Mnebeogl.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:4812
                                      • C:\Windows\SysWOW64\Npcoakfp.exe
                                        C:\Windows\system32\Npcoakfp.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of WriteProcessMemory
                                        PID:2296
                                        • C:\Windows\SysWOW64\Ncbknfed.exe
                                          C:\Windows\system32\Ncbknfed.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:1736
                                          • C:\Windows\SysWOW64\Nepgjaeg.exe
                                            C:\Windows\system32\Nepgjaeg.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:712
                                            • C:\Windows\SysWOW64\Nilcjp32.exe
                                              C:\Windows\system32\Nilcjp32.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:668
                                              • C:\Windows\SysWOW64\Nngokoej.exe
                                                C:\Windows\system32\Nngokoej.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:3128
                                                • C:\Windows\SysWOW64\Npfkgjdn.exe
                                                  C:\Windows\system32\Npfkgjdn.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:1220
                                                  • C:\Windows\SysWOW64\Ndaggimg.exe
                                                    C:\Windows\system32\Ndaggimg.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1604
                                                    • C:\Windows\SysWOW64\Ngpccdlj.exe
                                                      C:\Windows\system32\Ngpccdlj.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:224
                                                      • C:\Windows\SysWOW64\Nebdoa32.exe
                                                        C:\Windows\system32\Nebdoa32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        PID:4576
                                                        • C:\Windows\SysWOW64\Njnpppkn.exe
                                                          C:\Windows\system32\Njnpppkn.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1920
                                                          • C:\Windows\SysWOW64\Nlmllkja.exe
                                                            C:\Windows\system32\Nlmllkja.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            PID:1428
                                                            • C:\Windows\SysWOW64\Ncfdie32.exe
                                                              C:\Windows\system32\Ncfdie32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              PID:2688
                                                              • C:\Windows\SysWOW64\Neeqea32.exe
                                                                C:\Windows\system32\Neeqea32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:3520
                                                                • C:\Windows\SysWOW64\Njqmepik.exe
                                                                  C:\Windows\system32\Njqmepik.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Modifies registry class
                                                                  PID:1380
                                                                  • C:\Windows\SysWOW64\Nloiakho.exe
                                                                    C:\Windows\system32\Nloiakho.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    PID:3508
                                                                    • C:\Windows\SysWOW64\Npjebj32.exe
                                                                      C:\Windows\system32\Npjebj32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:2136
                                                                      • C:\Windows\SysWOW64\Ncianepl.exe
                                                                        C:\Windows\system32\Ncianepl.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:3548
                                                                        • C:\Windows\SysWOW64\Ngdmod32.exe
                                                                          C:\Windows\system32\Ngdmod32.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          PID:3440
                                                                          • C:\Windows\SysWOW64\Nfgmjqop.exe
                                                                            C:\Windows\system32\Nfgmjqop.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:2468
                                                                            • C:\Windows\SysWOW64\Nnneknob.exe
                                                                              C:\Windows\system32\Nnneknob.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:1144
                                                                              • C:\Windows\SysWOW64\Nlaegk32.exe
                                                                                C:\Windows\system32\Nlaegk32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2836
                                                                                • C:\Windows\SysWOW64\Ndhmhh32.exe
                                                                                  C:\Windows\system32\Ndhmhh32.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  PID:4996
                                                                                  • C:\Windows\SysWOW64\Nggjdc32.exe
                                                                                    C:\Windows\system32\Nggjdc32.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:5052
                                                                                    • C:\Windows\SysWOW64\Nfjjppmm.exe
                                                                                      C:\Windows\system32\Nfjjppmm.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3924
                                                                                      • C:\Windows\SysWOW64\Nnqbanmo.exe
                                                                                        C:\Windows\system32\Nnqbanmo.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4944
                                                                                        • C:\Windows\SysWOW64\Oponmilc.exe
                                                                                          C:\Windows\system32\Oponmilc.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies registry class
                                                                                          PID:3876
                                                                                          • C:\Windows\SysWOW64\Ocnjidkf.exe
                                                                                            C:\Windows\system32\Ocnjidkf.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies registry class
                                                                                            PID:5012
                                                                                            • C:\Windows\SysWOW64\Oflgep32.exe
                                                                                              C:\Windows\system32\Oflgep32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:4844
                                                                                              • C:\Windows\SysWOW64\Olfobjbg.exe
                                                                                                C:\Windows\system32\Olfobjbg.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                PID:3100
                                                                                                • C:\Windows\SysWOW64\Odmgcgbi.exe
                                                                                                  C:\Windows\system32\Odmgcgbi.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:3160
                                                                                                  • C:\Windows\SysWOW64\Ogkcpbam.exe
                                                                                                    C:\Windows\system32\Ogkcpbam.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1476
                                                                                                    • C:\Windows\SysWOW64\Ojjolnaq.exe
                                                                                                      C:\Windows\system32\Ojjolnaq.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:4072
                                                                                                      • C:\Windows\SysWOW64\Olhlhjpd.exe
                                                                                                        C:\Windows\system32\Olhlhjpd.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        PID:4716
                                                                                                        • C:\Windows\SysWOW64\Odocigqg.exe
                                                                                                          C:\Windows\system32\Odocigqg.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Modifies registry class
                                                                                                          PID:3108
                                                                                                          • C:\Windows\SysWOW64\Ognpebpj.exe
                                                                                                            C:\Windows\system32\Ognpebpj.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:4468
                                                                                                            • C:\Windows\SysWOW64\Ofqpqo32.exe
                                                                                                              C:\Windows\system32\Ofqpqo32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1612
                                                                                                              • C:\Windows\SysWOW64\Onhhamgg.exe
                                                                                                                C:\Windows\system32\Onhhamgg.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:4372
                                                                                                                • C:\Windows\SysWOW64\Oqfdnhfk.exe
                                                                                                                  C:\Windows\system32\Oqfdnhfk.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4740
                                                                                                                  • C:\Windows\SysWOW64\Ocdqjceo.exe
                                                                                                                    C:\Windows\system32\Ocdqjceo.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4916
                                                                                                                    • C:\Windows\SysWOW64\Ogpmjb32.exe
                                                                                                                      C:\Windows\system32\Ogpmjb32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3156
                                                                                                                      • C:\Windows\SysWOW64\Ojoign32.exe
                                                                                                                        C:\Windows\system32\Ojoign32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:2276
                                                                                                                        • C:\Windows\SysWOW64\Olmeci32.exe
                                                                                                                          C:\Windows\system32\Olmeci32.exe
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:4800
                                                                                                                          • C:\Windows\SysWOW64\Oqhacgdh.exe
                                                                                                                            C:\Windows\system32\Oqhacgdh.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:4308
                                                                                                                            • C:\Windows\SysWOW64\Ocgmpccl.exe
                                                                                                                              C:\Windows\system32\Ocgmpccl.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Modifies registry class
                                                                                                                              PID:1020
                                                                                                                              • C:\Windows\SysWOW64\Ofeilobp.exe
                                                                                                                                C:\Windows\system32\Ofeilobp.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:3552
                                                                                                                                • C:\Windows\SysWOW64\Ojaelm32.exe
                                                                                                                                  C:\Windows\system32\Ojaelm32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:968
                                                                                                                                  • C:\Windows\SysWOW64\Pmoahijl.exe
                                                                                                                                    C:\Windows\system32\Pmoahijl.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:3564
                                                                                                                                    • C:\Windows\SysWOW64\Pdfjifjo.exe
                                                                                                                                      C:\Windows\system32\Pdfjifjo.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:2612
                                                                                                                                      • C:\Windows\SysWOW64\Pgefeajb.exe
                                                                                                                                        C:\Windows\system32\Pgefeajb.exe
                                                                                                                                        67⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:2724
                                                                                                                                        • C:\Windows\SysWOW64\Pjcbbmif.exe
                                                                                                                                          C:\Windows\system32\Pjcbbmif.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          PID:2864
                                                                                                                                          • C:\Windows\SysWOW64\Pnonbk32.exe
                                                                                                                                            C:\Windows\system32\Pnonbk32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            PID:1516
                                                                                                                                            • C:\Windows\SysWOW64\Pqmjog32.exe
                                                                                                                                              C:\Windows\system32\Pqmjog32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:1724
                                                                                                                                              • C:\Windows\SysWOW64\Pclgkb32.exe
                                                                                                                                                C:\Windows\system32\Pclgkb32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:1632
                                                                                                                                                • C:\Windows\SysWOW64\Pfjcgn32.exe
                                                                                                                                                  C:\Windows\system32\Pfjcgn32.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:3576
                                                                                                                                                  • C:\Windows\SysWOW64\Pnakhkol.exe
                                                                                                                                                    C:\Windows\system32\Pnakhkol.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    PID:5156
                                                                                                                                                    • C:\Windows\SysWOW64\Pdkcde32.exe
                                                                                                                                                      C:\Windows\system32\Pdkcde32.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:5196
                                                                                                                                                      • C:\Windows\SysWOW64\Pgioqq32.exe
                                                                                                                                                        C:\Windows\system32\Pgioqq32.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:5236
                                                                                                                                                        • C:\Windows\SysWOW64\Pjhlml32.exe
                                                                                                                                                          C:\Windows\system32\Pjhlml32.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                          PID:5276
                                                                                                                                                          • C:\Windows\SysWOW64\Pncgmkmj.exe
                                                                                                                                                            C:\Windows\system32\Pncgmkmj.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            PID:5324
                                                                                                                                                            • C:\Windows\SysWOW64\Pqbdjfln.exe
                                                                                                                                                              C:\Windows\system32\Pqbdjfln.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:5356
                                                                                                                                                              • C:\Windows\SysWOW64\Pcppfaka.exe
                                                                                                                                                                C:\Windows\system32\Pcppfaka.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                PID:5396
                                                                                                                                                                • C:\Windows\SysWOW64\Pfolbmje.exe
                                                                                                                                                                  C:\Windows\system32\Pfolbmje.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:5440
                                                                                                                                                                  • C:\Windows\SysWOW64\Pnfdcjkg.exe
                                                                                                                                                                    C:\Windows\system32\Pnfdcjkg.exe
                                                                                                                                                                    81⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:5476
                                                                                                                                                                    • C:\Windows\SysWOW64\Pqdqof32.exe
                                                                                                                                                                      C:\Windows\system32\Pqdqof32.exe
                                                                                                                                                                      82⤵
                                                                                                                                                                        PID:5516
                                                                                                                                                                        • C:\Windows\SysWOW64\Pcbmka32.exe
                                                                                                                                                                          C:\Windows\system32\Pcbmka32.exe
                                                                                                                                                                          83⤵
                                                                                                                                                                            PID:5556
                                                                                                                                                                            • C:\Windows\SysWOW64\Pfaigm32.exe
                                                                                                                                                                              C:\Windows\system32\Pfaigm32.exe
                                                                                                                                                                              84⤵
                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                              PID:5596
                                                                                                                                                                              • C:\Windows\SysWOW64\Pjmehkqk.exe
                                                                                                                                                                                C:\Windows\system32\Pjmehkqk.exe
                                                                                                                                                                                85⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:5640
                                                                                                                                                                                • C:\Windows\SysWOW64\Qmkadgpo.exe
                                                                                                                                                                                  C:\Windows\system32\Qmkadgpo.exe
                                                                                                                                                                                  86⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  PID:5676
                                                                                                                                                                                  • C:\Windows\SysWOW64\Qdbiedpa.exe
                                                                                                                                                                                    C:\Windows\system32\Qdbiedpa.exe
                                                                                                                                                                                    87⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:5724
                                                                                                                                                                                    • C:\Windows\SysWOW64\Qjoankoi.exe
                                                                                                                                                                                      C:\Windows\system32\Qjoankoi.exe
                                                                                                                                                                                      88⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:5756
                                                                                                                                                                                      • C:\Windows\SysWOW64\Qmmnjfnl.exe
                                                                                                                                                                                        C:\Windows\system32\Qmmnjfnl.exe
                                                                                                                                                                                        89⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        PID:5796
                                                                                                                                                                                        • C:\Windows\SysWOW64\Qddfkd32.exe
                                                                                                                                                                                          C:\Windows\system32\Qddfkd32.exe
                                                                                                                                                                                          90⤵
                                                                                                                                                                                            PID:5844
                                                                                                                                                                                            • C:\Windows\SysWOW64\Qcgffqei.exe
                                                                                                                                                                                              C:\Windows\system32\Qcgffqei.exe
                                                                                                                                                                                              91⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              PID:5876
                                                                                                                                                                                              • C:\Windows\SysWOW64\Qffbbldm.exe
                                                                                                                                                                                                C:\Windows\system32\Qffbbldm.exe
                                                                                                                                                                                                92⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:5916
                                                                                                                                                                                                • C:\Windows\SysWOW64\Anmjcieo.exe
                                                                                                                                                                                                  C:\Windows\system32\Anmjcieo.exe
                                                                                                                                                                                                  93⤵
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:5956
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Aqkgpedc.exe
                                                                                                                                                                                                    C:\Windows\system32\Aqkgpedc.exe
                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                    PID:5996
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Acjclpcf.exe
                                                                                                                                                                                                      C:\Windows\system32\Acjclpcf.exe
                                                                                                                                                                                                      95⤵
                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      PID:6036
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Afhohlbj.exe
                                                                                                                                                                                                        C:\Windows\system32\Afhohlbj.exe
                                                                                                                                                                                                        96⤵
                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:6076
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Anogiicl.exe
                                                                                                                                                                                                          C:\Windows\system32\Anogiicl.exe
                                                                                                                                                                                                          97⤵
                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:6116
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Aqncedbp.exe
                                                                                                                                                                                                            C:\Windows\system32\Aqncedbp.exe
                                                                                                                                                                                                            98⤵
                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:3172
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Aclpap32.exe
                                                                                                                                                                                                              C:\Windows\system32\Aclpap32.exe
                                                                                                                                                                                                              99⤵
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:1044
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Afjlnk32.exe
                                                                                                                                                                                                                C:\Windows\system32\Afjlnk32.exe
                                                                                                                                                                                                                100⤵
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:4392
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Anadoi32.exe
                                                                                                                                                                                                                  C:\Windows\system32\Anadoi32.exe
                                                                                                                                                                                                                  101⤵
                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:4124
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Amddjegd.exe
                                                                                                                                                                                                                    C:\Windows\system32\Amddjegd.exe
                                                                                                                                                                                                                    102⤵
                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:3196
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Acnlgp32.exe
                                                                                                                                                                                                                      C:\Windows\system32\Acnlgp32.exe
                                                                                                                                                                                                                      103⤵
                                                                                                                                                                                                                        PID:312
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Afmhck32.exe
                                                                                                                                                                                                                          C:\Windows\system32\Afmhck32.exe
                                                                                                                                                                                                                          104⤵
                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                          PID:2000
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Andqdh32.exe
                                                                                                                                                                                                                            C:\Windows\system32\Andqdh32.exe
                                                                                                                                                                                                                            105⤵
                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                            PID:3964
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Aabmqd32.exe
                                                                                                                                                                                                                              C:\Windows\system32\Aabmqd32.exe
                                                                                                                                                                                                                              106⤵
                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                              PID:5124
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Acqimo32.exe
                                                                                                                                                                                                                                C:\Windows\system32\Acqimo32.exe
                                                                                                                                                                                                                                107⤵
                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                PID:5204
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Aglemn32.exe
                                                                                                                                                                                                                                  C:\Windows\system32\Aglemn32.exe
                                                                                                                                                                                                                                  108⤵
                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                  PID:5264
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ajkaii32.exe
                                                                                                                                                                                                                                    C:\Windows\system32\Ajkaii32.exe
                                                                                                                                                                                                                                    109⤵
                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                    PID:5340
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Aminee32.exe
                                                                                                                                                                                                                                      C:\Windows\system32\Aminee32.exe
                                                                                                                                                                                                                                      110⤵
                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                      PID:5392
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Aepefb32.exe
                                                                                                                                                                                                                                        C:\Windows\system32\Aepefb32.exe
                                                                                                                                                                                                                                        111⤵
                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                        PID:4656
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Agoabn32.exe
                                                                                                                                                                                                                                          C:\Windows\system32\Agoabn32.exe
                                                                                                                                                                                                                                          112⤵
                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                          PID:5512
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bjmnoi32.exe
                                                                                                                                                                                                                                            C:\Windows\system32\Bjmnoi32.exe
                                                                                                                                                                                                                                            113⤵
                                                                                                                                                                                                                                              PID:5592
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bmkjkd32.exe
                                                                                                                                                                                                                                                C:\Windows\system32\Bmkjkd32.exe
                                                                                                                                                                                                                                                114⤵
                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                PID:4624
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Bebblb32.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\Bebblb32.exe
                                                                                                                                                                                                                                                  115⤵
                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                  PID:3740
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bganhm32.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\Bganhm32.exe
                                                                                                                                                                                                                                                    116⤵
                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                    PID:5752
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Bjokdipf.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\Bjokdipf.exe
                                                                                                                                                                                                                                                      117⤵
                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                      PID:5804
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Bnkgeg32.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\Bnkgeg32.exe
                                                                                                                                                                                                                                                        118⤵
                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:5864
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Baicac32.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\Baicac32.exe
                                                                                                                                                                                                                                                          119⤵
                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                          PID:5928
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bchomn32.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\Bchomn32.exe
                                                                                                                                                                                                                                                            120⤵
                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                            PID:5980
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Bffkij32.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\Bffkij32.exe
                                                                                                                                                                                                                                                              121⤵
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              PID:1060
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bnmcjg32.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\Bnmcjg32.exe
                                                                                                                                                                                                                                                                122⤵
                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                PID:6064
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Balpgb32.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\Balpgb32.exe
                                                                                                                                                                                                                                                                  123⤵
                                                                                                                                                                                                                                                                    PID:6124
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Bcjlcn32.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\Bcjlcn32.exe
                                                                                                                                                                                                                                                                      124⤵
                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                      PID:3036
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Bfhhoi32.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\Bfhhoi32.exe
                                                                                                                                                                                                                                                                        125⤵
                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                        PID:4828
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Bnpppgdj.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\Bnpppgdj.exe
                                                                                                                                                                                                                                                                          126⤵
                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                          PID:3544
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Banllbdn.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\Banllbdn.exe
                                                                                                                                                                                                                                                                            127⤵
                                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                            PID:1552
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Bclhhnca.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\Bclhhnca.exe
                                                                                                                                                                                                                                                                              128⤵
                                                                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                              PID:4644
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Bnbmefbg.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\Bnbmefbg.exe
                                                                                                                                                                                                                                                                                129⤵
                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                PID:5148
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Bapiabak.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\Bapiabak.exe
                                                                                                                                                                                                                                                                                  130⤵
                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                  PID:3224
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Bcoenmao.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\Bcoenmao.exe
                                                                                                                                                                                                                                                                                    131⤵
                                                                                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                    PID:4440
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Cfmajipb.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\Cfmajipb.exe
                                                                                                                                                                                                                                                                                      132⤵
                                                                                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                                      PID:1280
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Cmgjgcgo.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\Cmgjgcgo.exe
                                                                                                                                                                                                                                                                                        133⤵
                                                                                                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                        PID:5468
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Cenahpha.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\Cenahpha.exe
                                                                                                                                                                                                                                                                                          134⤵
                                                                                                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                                          PID:2860
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Cfpnph32.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\Cfpnph32.exe
                                                                                                                                                                                                                                                                                            135⤵
                                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                            PID:5660
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Caebma32.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\Caebma32.exe
                                                                                                                                                                                                                                                                                              136⤵
                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                                                              PID:4400
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Cdhhdlid.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\Cdhhdlid.exe
                                                                                                                                                                                                                                                                                                137⤵
                                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                PID:4712
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Cmqmma32.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Cmqmma32.exe
                                                                                                                                                                                                                                                                                                  138⤵
                                                                                                                                                                                                                                                                                                    PID:5872
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dopigd32.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\Dopigd32.exe
                                                                                                                                                                                                                                                                                                      139⤵
                                                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                      PID:5952
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Dhhnpjmh.exe
                                                                                                                                                                                                                                                                                                        C:\Windows\system32\Dhhnpjmh.exe
                                                                                                                                                                                                                                                                                                        140⤵
                                                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                                                        PID:1088
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Ddonekbl.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\system32\Ddonekbl.exe
                                                                                                                                                                                                                                                                                                          141⤵
                                                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                                                          PID:6104
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\Dkifae32.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\system32\Dkifae32.exe
                                                                                                                                                                                                                                                                                                            142⤵
                                                                                                                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                            PID:1036
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Deokon32.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\system32\Deokon32.exe
                                                                                                                                                                                                                                                                                                              143⤵
                                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                              PID:5208
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Dfpgffpm.exe
                                                                                                                                                                                                                                                                                                                C:\Windows\system32\Dfpgffpm.exe
                                                                                                                                                                                                                                                                                                                144⤵
                                                                                                                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                PID:1016
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Daekdooc.exe
                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\Daekdooc.exe
                                                                                                                                                                                                                                                                                                                  145⤵
                                                                                                                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                                                  PID:5248
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Dknpmdfc.exe
                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\Dknpmdfc.exe
                                                                                                                                                                                                                                                                                                                    146⤵
                                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                                    PID:5528
                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                                                                                                                                                                                      147⤵
                                                                                                                                                                                                                                                                                                                        PID:5244
                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 5244 -s 416
                                                                                                                                                                                                                                                                                                                          148⤵
                                                                                                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                                                                                                          PID:5564
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5244 -ip 5244
                    1⤵
                      PID:5588

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\SysWOW64\Caebma32.exe

                      Filesize

                      576KB

                      MD5

                      e0bf9e3e4c2db021a8230b2728a4dfb9

                      SHA1

                      d2d562cb7d635a7d643e8eb937087d4fa5a32051

                      SHA256

                      e633690aa4151af81aee66ce19ffde862fc09e3fd86d3568d1a3c72c70390913

                      SHA512

                      7622a307ebb12c4417d7dcb1f40109ed061a25947dab01c96a5cf107e54f4ad6585ce1bed12bd5815a30c343f2245ad8c2c4fcc02987a0b83cdcbb5293df32f8

                    • C:\Windows\SysWOW64\Cenahpha.exe

                      Filesize

                      576KB

                      MD5

                      0263fe1f5496798a75cd106a2678c8b7

                      SHA1

                      f9bc4e95ec2919428a75606632c3448e4c305700

                      SHA256

                      ac4adab88bf09ec69dd055f73187ddd1ef4ca6351f139ce0b5da8b597b5780ab

                      SHA512

                      b77e4649c6c2ea56cae8f53b9eb3c4a6f78e5c7f18236ed351c6765a004a943355cea2442b9b20ee10e0feb0df7d03fde65d30a1bbc3c872fa32d1f6ba4e722a

                    • C:\Windows\SysWOW64\Daekdooc.exe

                      Filesize

                      576KB

                      MD5

                      a2730d28ffd682c08f28855cef5080a6

                      SHA1

                      16eee28387608832997f6cce18072508bba99b9f

                      SHA256

                      30123b053826d78acd37b32decae6e429823bf4a368119048003ffee232d632b

                      SHA512

                      22721f1f22bd491d7daafa9a0eea4f65020549e6c7eefe088929a0240c0bccf480066908746b78f45d91bba3f94cabfbf86db2e7096e5a71e76d81d86763ec36

                    • C:\Windows\SysWOW64\Dkifae32.exe

                      Filesize

                      576KB

                      MD5

                      ce55469a1f271e68728753114ace1b4d

                      SHA1

                      db182b7f1424b14e064bf3c911c488d048248a1c

                      SHA256

                      513d3c70b2745bbf5a8ae28a5589324446f9c234f7fcbabf1bd44cb9cbb29586

                      SHA512

                      b23aaaf5d1565692e12d407a48d27cb504e39297d3e860b530972d11a297ed76f8052bd5c1893dcaa24a6ea570072b1024d801c953a92d8097b3d53cab91fc91

                    • C:\Windows\SysWOW64\Dknpmdfc.exe

                      Filesize

                      192KB

                      MD5

                      10013a4abe79a0e5c6dfabc9c3aa339f

                      SHA1

                      e0692ecd44143b0877ebc47a0a5ccc879e6b032c

                      SHA256

                      218f278a6ffba8c600d72cd53e65a04fe7ce634d65931a17ea7a2dd6effbd717

                      SHA512

                      da25c854ea4c58a8f847476c208b9fb22e38b456262b0132468845fcfca83913cd633c2763a735ca05162bb63190e0d65755cf60a83c055546af352bacba7eb1

                    • C:\Windows\SysWOW64\Dopigd32.exe

                      Filesize

                      576KB

                      MD5

                      60b7ef58430a64d3dd8b62d3e613395d

                      SHA1

                      259e9c6db2454aff2468b85f8119e2e4df3240f9

                      SHA256

                      1bfbde576843147d72d8d5363e1f710f54e12b6cf3698942ee958f2628265248

                      SHA512

                      21edaae3f8cea46341f86111e373bc6e3c21a7ada1a7e3b267dcc7c6e15857471ec381a75ce0df03a0c1d0e29842b3d9d9d69b7ed1e1b45311a1417748c27144

                    • C:\Windows\SysWOW64\Hflheb32.dll

                      Filesize

                      7KB

                      MD5

                      f26e1e29b51a4506a0fa7d5550c53964

                      SHA1

                      4c07959f87eb64be4342ee4ddd5b33432c9bc969

                      SHA256

                      ed699cc84cf7bb332bc3a75aeaf23e9ee8d638c59bc104a91464b0dc83355b8c

                      SHA512

                      325b361d40011ba129dfef9d941b5270bddd12e67d6df5b464cf571ad7e45de27dd0a7805dfe96287b6e8e2d94560b53e34885d4522a9d26424e79acbe991263

                    • C:\Windows\SysWOW64\Klqcioba.exe

                      Filesize

                      576KB

                      MD5

                      f847ef4ec97342c7c71b15886fee9026

                      SHA1

                      9a9e9990a22718e55d997dc6aa35326e91db678a

                      SHA256

                      fa2dda2fdbb01963bd058a41597471a3b15c2355d1a98d446d0a8bb61aa1595c

                      SHA512

                      a7aa525cc798a9f5d3eb9eb79df73c410495b6f2a81b29aec2cd2f0ff6b9642b27bd929f91e4196ab398eac184b721e4750d58fe9431a0abd333922b09845b1b

                    • C:\Windows\SysWOW64\Ldoaklml.exe

                      Filesize

                      576KB

                      MD5

                      86f44b5d1a1e9bba1517fc88229cde5d

                      SHA1

                      cf35573754dca97d3fb2cc907217f9467503f54e

                      SHA256

                      f6769eff9d10e8fc44ce80ca470446faf79b65206a322c0143e3e6831b64fbf8

                      SHA512

                      b186c45fce66f6c52a18a9cdd568fb78bacfda1ab6e55cabfccd44150d147704fa6c304ba8e13cd225d0b9f5885a5f116dc12e4a8f8263f00ae06ed1969e88c7

                    • C:\Windows\SysWOW64\Lfhdlh32.exe

                      Filesize

                      576KB

                      MD5

                      98fd2d9d0c74a951b115d8bc498b9dff

                      SHA1

                      e02ae34dfb50b493c08e5a41440c8bd235cdb6f4

                      SHA256

                      1424e16ec4fefef8030b2e5d6d3352e8c81fb4a40095bdbe8a6613d01b6fad7e

                      SHA512

                      183f8484a37ea4a42f9f6f48b38a862093c395bbf9f9e10ce8bea07aa2e1b19b8d5bebc07eb355d74c515b5f48f54ce01f5edc2cd925f679cd984ec98cff906f

                    • C:\Windows\SysWOW64\Lingibiq.exe

                      Filesize

                      576KB

                      MD5

                      8785b5b44c9b57dad396b071ef719934

                      SHA1

                      3b55fe976e642fe10fe64371e3a606eacac02d1d

                      SHA256

                      7f5735090e0eae9c8a5e4663bcfd16db6784bfc906579aec81be96ef40f66ee6

                      SHA512

                      0a645c7cedd86b240cfb6d35544dc862c7dbbe3add56fd36288bacf34858be023a4d47ef72639fc0f39b077c875b7d5933e22f35bd23e57c8d5e37e37fe86b27

                    • C:\Windows\SysWOW64\Llcpoo32.exe

                      Filesize

                      576KB

                      MD5

                      343c497e076de316bf159335845be7f3

                      SHA1

                      6a6bdab5ddfee6fafb42662ab0e2cda62ba21895

                      SHA256

                      29cdbe60c3ee8f1b030f2a4cd4cda07fa9162fd2d7599d9651ce43fe120af9bc

                      SHA512

                      12b3adfbc1eefb270f24a0b8deca7b8a4381a61df91bb6b2f65b352f93cbbcca1437222aa68d38bd582f3a6182b97bf2547dbcac9671a6a7c46bccb82bcba7b3

                    • C:\Windows\SysWOW64\Lmbmibhb.exe

                      Filesize

                      576KB

                      MD5

                      bb23053789226a502a7ba6400126d602

                      SHA1

                      1d783167a13b374c1244c5228c83bcc0075c58c5

                      SHA256

                      63627769d505ae3fe6c4106bde3c2d370e1a77baad7b1ec1ee60d5fe5f3f8cb0

                      SHA512

                      bd58960ac298121dbd87e6e6ef3cbd65dfe21ad5cb6be8645580f284a715217b6159e4ff8a2567a453a17d237613824540c718984588676990be13851b7657f0

                    • C:\Windows\SysWOW64\Lpebpm32.exe

                      Filesize

                      576KB

                      MD5

                      46bb84d5210a63abd57e576147b5ded3

                      SHA1

                      6ffab852b80d60d0ffe6231eb55b9b5a0a7c3752

                      SHA256

                      c6bce354b64c36b8e3c14c648755217183e08c4d7726712b9df9156d9ec6b03a

                      SHA512

                      dd46967de09ac140540884f01a8e8db1198ab02e73ca001b131cbd08ace7b59efeafc5cdfbed963fda4eab78925beb9351ac11b7802b874c3c02bf640de71357

                    • C:\Windows\SysWOW64\Mchhggno.exe

                      Filesize

                      576KB

                      MD5

                      3d88bf022d1ac549ed18c3f39859c6bb

                      SHA1

                      ed251b081d48b90f79bc748f7393ccf481f8c222

                      SHA256

                      6f2229edc65961f9228dba314f7fcaa3cc4cd53fa0f1433b351f8dbfc478f517

                      SHA512

                      0c08c362894317c0388559ad3e8090faa82e72a2a2a564a7684a0780d1709a4b4640331b3840b1112760bd61e916428a5d4cbe2daa1a99c433f17a04f4a37a72

                    • C:\Windows\SysWOW64\Mdmnlj32.exe

                      Filesize

                      576KB

                      MD5

                      8b158c22e779f10806a8e0d323c4b357

                      SHA1

                      fc2abe1c5c4bf71e1f9589cd8b5d5c1f322ed20f

                      SHA256

                      9dd9fd681c1d70e672687eb0032d0f8ea84e687ae9a0214b2c2b78c1d1ddf42d

                      SHA512

                      28be29563b147330ded0c9cdea48bcd071c29b075897913e6dbe8b59c43458169670270e9d6dc9b80080d091b184fc88f11982dce643ae47bd79670059ac1eca

                    • C:\Windows\SysWOW64\Medgncoe.exe

                      Filesize

                      576KB

                      MD5

                      715cd9016bedf3863c16bfb0b1a14326

                      SHA1

                      ddc701e7d9c2f59555b957df92b0a45f2e01c324

                      SHA256

                      b777e2b1d9c43f9bd897ddad4721c897bb56390d3aad31c0a667b7ac9b0ee911

                      SHA512

                      dd6b38be111cfe00ad430c0f53823871041a35cb6b2a59c65dd6d9f9ee0c4af349e863ca9181f064b5aa2d4eb764bda657b41f83da5c5da879a66a08f02c4ba7

                    • C:\Windows\SysWOW64\Megdccmb.exe

                      Filesize

                      576KB

                      MD5

                      058ef8290854e87b8f50786707245411

                      SHA1

                      fa0f3e3669226ce8d7fe12beea44c761f640da10

                      SHA256

                      dd0f7f0722553666f4554c50314088f24763b72f3263a4e1b99aae33e09fa8f5

                      SHA512

                      eb75c0cdc1d4f5704b75d02afe4cd78698ad59ccaf206d4c7d6d1b55a1ad086897bc040329931e284930fd5fffebc8c2de6133666f6db3222bd7cf3bcd3ab288

                    • C:\Windows\SysWOW64\Menjdbgj.exe

                      Filesize

                      576KB

                      MD5

                      a137e44798398c6ef58eee6d07c6b9fb

                      SHA1

                      81c7930949aeff49b788905bcdc6c6d956337243

                      SHA256

                      fd102a915452dc66cc09feb4ccaeb46e79956ca820fe27692093e313cab8cb5b

                      SHA512

                      01457888d9cf6f3095320d70fec709518f3c693214492aa695a2fdc2d7be58a9402d845214152c05ec49415ea0e4cbab02ca05c05fa1d7172686a155a89db793

                    • C:\Windows\SysWOW64\Mgkjhe32.exe

                      Filesize

                      576KB

                      MD5

                      0ac6231fe79f3ac290101f8c56182942

                      SHA1

                      a2515c796274a76987bace8a16b480b961e94fc1

                      SHA256

                      f4f7aef81807537fa4f6e5b321f320622e236db6d425c728246766b10a755654

                      SHA512

                      96bcbaa7b43fd0ff35744da252266f908aacfc3143c2c0903406eeebbae47fed6e3435cdf57f17c18da4de01a63658c7eef81ef83474c0588da69a9132301538

                    • C:\Windows\SysWOW64\Migjoaaf.exe

                      Filesize

                      576KB

                      MD5

                      a2f20d05e9b22d2f422592c6ec621f1a

                      SHA1

                      67c7794e009a085d59ddb868b86178ee6a14e608

                      SHA256

                      21e76691514148f22aa4c5c487954c319c6a38f23253770b084f17a3ee8fba8f

                      SHA512

                      54b14cbecd9c56d14b56f2a18fd7c396c241fc77a8ec986d774dbe1ec3f74d1eef453017e1290090085a02381a98445f1eee4ca426b0660424c470e0a6bbd255

                    • C:\Windows\SysWOW64\Mmnldp32.exe

                      Filesize

                      576KB

                      MD5

                      36f4b37945a0c59a6e80a1faaf84aaa8

                      SHA1

                      ba77d108bbe0c121cdb655824117e3f5ee11f9b6

                      SHA256

                      ddaa6d81f0c7412684703b3ff7f2254752d278e3fc1f2c33187731eb5b07e278

                      SHA512

                      f6c25ba73fa177b2c2775a1546b556f3fa72a4edf8cc7be1d32b65009b3a717750750fb6f3e5c8099ddd1eb34b2994392b1cdb162b14508cfe7c08ed58eb3d32

                    • C:\Windows\SysWOW64\Mmnldp32.exe

                      Filesize

                      576KB

                      MD5

                      f502e473818bd5e02faacd96e55654d4

                      SHA1

                      7a56ac8b9e9587b6813464c772995cd55919ee42

                      SHA256

                      b948cb1536990e4d1663e5c0069c3494c9e68d8d9caf7fc5446d6cfea2c4041c

                      SHA512

                      f19c1e79c70392d4b004f7654fd5a38474cd3f721d931e84d6cf750134dcfc91c98ec768766b69a1cf456a9a363a3ca565e9e156d8d451e8cb0569e159de2a13

                    • C:\Windows\SysWOW64\Mnebeogl.exe

                      Filesize

                      576KB

                      MD5

                      2cf712ddfb89a3f53c3b28dd4fe1be7f

                      SHA1

                      3c823159ae512cf08fac8ce0daa4d5fc60ac0ba7

                      SHA256

                      08cfec251d823ebbc09f6b8f63530e03547540e7b1cab7d8408b17b625cba99d

                      SHA512

                      efd45fb10d523fcb04e436aaf8c2e5c3643a6297e5387c342b13acb2b4059dd5a59d1e8cb095fcc594f33d0266079a9fe31bd23b9c8614678ce8faa96f931d55

                    • C:\Windows\SysWOW64\Mpjlklok.exe

                      Filesize

                      576KB

                      MD5

                      207c5547dc0b2ffc358d61ca1dc4b064

                      SHA1

                      dfe880a7ab073ef7ddf5476723244cffe4aefff0

                      SHA256

                      80bae04e0f487353f2abb48095903c1d6b5b45ad03c5f61d5f5502aff4d388e5

                      SHA512

                      8bfa888665caf2932e6b59c9e458e68f45f4ef07875c9c56eec085d884e6831c8acdb64c47bbddf491bf20336a473fa145b44d22f7ea715c1a4f9d35ac9199b7

                    • C:\Windows\SysWOW64\Ncbknfed.exe

                      Filesize

                      576KB

                      MD5

                      032daf9f9265e846d9b86f8612977620

                      SHA1

                      f54e0d16e1d010a1522b90acb46518b2e9fba842

                      SHA256

                      2fbeabfea476ae0d487a54eb8a5eed0819db71265ee30a33a3bc28419af19b21

                      SHA512

                      d7c4a0925f3a8f652d6711d90116726d344f42c37bc0695259e4d5fc1b0f4710e59a2790483ff9ad8690edc845e85cd22bcc205e2f8d4e29e2fc66197546f41c

                    • C:\Windows\SysWOW64\Ncfdie32.exe

                      Filesize

                      576KB

                      MD5

                      e52b7eae39d31d4a5426dbb67f05f85b

                      SHA1

                      cb68f6aff62b1185792653fee5982b0b726e58b3

                      SHA256

                      75bacd58ca75f3807400c80c7123c9631f89a248b10009beb6f97bfea47486c5

                      SHA512

                      963f854a809d544c9d550e87e053f47829a3048d45cfec140df374fdea2d97da95d69102594de1402ba49bca787c19536bff3e164663b3118e6fbff74345ebf2

                    • C:\Windows\SysWOW64\Ndaggimg.exe

                      Filesize

                      576KB

                      MD5

                      d3f15e911e3c5a51495e1f3ef709581f

                      SHA1

                      a8ddc39226d6de051d7ba2e0dc2d40cc7a6e30b6

                      SHA256

                      a8f1efc590da0448ebd14f8cc32b19c9a7b0a5a572bed619a881307ccb9833d5

                      SHA512

                      a6819f790ae9aeece53dde96e6607e2e2d0aedb29ea79be53fdebb280f404f2589939b2751375dce70c89d82124b290c68428188186770ebbc52d05dacce0c52

                    • C:\Windows\SysWOW64\Nebdoa32.exe

                      Filesize

                      576KB

                      MD5

                      6f3e6e8ac31dc74e162546a17a9f41e4

                      SHA1

                      fdd7bc7160c5f6deb17aa0759ea0ed475b5fddeb

                      SHA256

                      5088ab751c2f1629f073633b42d182a723d56d38c0f9554dc85f2a8e6a2a4eb4

                      SHA512

                      ce01b7b08315d07776291c34db80640f5f680bee3f8aed4edba1511c9967114953ff9e13a55cf8757f6c601f69b3ddedc3e4d69087963bd4d6792bfd27cf8e6c

                    • C:\Windows\SysWOW64\Neeqea32.exe

                      Filesize

                      576KB

                      MD5

                      282837763f750deaa3a2d64bc1664927

                      SHA1

                      4a9f9c738ceb3a954d9bd294d6dd2f9cc3398baa

                      SHA256

                      e8a6dea22b6a4a6dbc34e26aca8156c70f9e7c939b47e0a1285587683ef8cf4f

                      SHA512

                      ee5056a1c3a9b0aa30347906a0196a9f182cd2c52b1a97d9c9fe5a51c5fd064857cfa71ddb1a4b736378a9a3d0542ea34c4b21b72f784fe1e027b47d734de697

                    • C:\Windows\SysWOW64\Nepgjaeg.exe

                      Filesize

                      576KB

                      MD5

                      af73fc515bf4a069723bed7087310ff8

                      SHA1

                      739777fba5e21af0a4d1ec1df2a5d12829e04abf

                      SHA256

                      def48693d4de71076f0a52180f2e9b77bd5b4056d29dde7cc48b2bf8d4154044

                      SHA512

                      954c78e402291cfc02fa4aeb111adc9959dbde6e46953309ad95cc013fb237092e76d460a7498f01034397081776312c18b132cbe5b0bd909f5fb4263372ff34

                    • C:\Windows\SysWOW64\Ngpccdlj.exe

                      Filesize

                      576KB

                      MD5

                      d5f66d114923f1603f4393e453743f67

                      SHA1

                      a6ba1bd791c93ab12bb21f94e2318f447652cf51

                      SHA256

                      98ad638b1550d09065921a475b65a2cd665e272cf65b2660b29c9415360e9852

                      SHA512

                      c9a4a22b7684686e68bc32744a00ba191043477edb1cb03226fefbdccbf7f4fa45f8b551d269faac31ef684f780f6bcf13974401995dfec957585af11ccdc0db

                    • C:\Windows\SysWOW64\Nilcjp32.exe

                      Filesize

                      576KB

                      MD5

                      20ba5cb598338eef007f67cdd59669f7

                      SHA1

                      e1c69e23d143a576586a8211859655a05326aec9

                      SHA256

                      c310bdbcd7d217cfabe4c1f5460fdd7c398ea3dcb6aaa1f8877e21f12ba116a2

                      SHA512

                      3c8fd62aa4c99841f0b6a00c5c83ff086c84081c4d809c8111a5bb1eb54a8f6114cb1cf2fd17117122af649733266fda5ac696462d92c9d84e4b2670fbbfe749

                    • C:\Windows\SysWOW64\Njnpppkn.exe

                      Filesize

                      576KB

                      MD5

                      b72dbdd9f4b5d317f6a606abe3741bc4

                      SHA1

                      76db49097b5d02845eaf1b44a024e739cd92c32e

                      SHA256

                      1b2f076f617551c22d10914a85352e8380865139e755e81cd88d934dd1531184

                      SHA512

                      30e86d0613c531b6ae44731b704b0de33a3d98f6ee30f99766006c1b32454481452f91a8cde1d360e1f49336fddb86f9379c9d507e435d36daf8ef5fe432ad50

                    • C:\Windows\SysWOW64\Njqmepik.exe

                      Filesize

                      576KB

                      MD5

                      f6e065af9355a56d822c06191ae11168

                      SHA1

                      21f518640d614a428cf0ef4757bd1f7016dce0de

                      SHA256

                      6ff570dd653eee7f17a84346d679f5b77241bb74fed56171b38faf13a865dfe4

                      SHA512

                      22c5685759fdd1da83e5dc76a93f75431601c75b9462d2c18364531e98ed5f44fc9ae72f1978e9ab236ae987b8d8baf5ea44b09b97ad609cd37ab06bf8a8a4e4

                    • C:\Windows\SysWOW64\Nlmllkja.exe

                      Filesize

                      576KB

                      MD5

                      5966d141aaacab7953c6375c1b6a034e

                      SHA1

                      dd6af4d5de4c2db7c8afcc7d8eb1bff3d6a15fbb

                      SHA256

                      1610bfe88fb5c41df21b321eb12d68049995b72cb258d7ebb3bec39920764deb

                      SHA512

                      5679be727928151ac4db160f44cd2103791cfc7903942994eb6ae99b61cac51dfbc82ee25dca7eda79c1b00df2a442a401544e567ddd55bdc9024924113ceb6d

                    • C:\Windows\SysWOW64\Nloiakho.exe

                      Filesize

                      576KB

                      MD5

                      2cc04f0c51789bb535d645ec61a5b375

                      SHA1

                      bafc39fc89e7b83c1b80959df7f169c6369dd36c

                      SHA256

                      d5e2ee1239bee2faf0a2040cf087e01fdbc785ee334886560c269f5a84d927ca

                      SHA512

                      2cafad6cce8be0caca402d5cbffc62404ebcf92ecfb203a84851364e8265027cf953c9c5da323ba5f99eb335a2d657b5480ba0c14f53cea9aa4307d95bd0853b

                    • C:\Windows\SysWOW64\Nngokoej.exe

                      Filesize

                      576KB

                      MD5

                      de45c5117b09770b8913d738606f09f1

                      SHA1

                      6361909f9f689dbc7a7da265b42eea0dcae42adc

                      SHA256

                      60040f8831551bf210a4cb2cbd257027bf815827e6656e2170f5b635177b6d71

                      SHA512

                      ee0e6c92960e27960228db810186d33d5f15607f36fad429da59349a5871ef7b050fbb92c29000524aeb9252df0b82404973c6f4bf894388caf64666d4fca667

                    • C:\Windows\SysWOW64\Npcoakfp.exe

                      Filesize

                      576KB

                      MD5

                      fba222614145ae8ce5c6973f3c2a0f3b

                      SHA1

                      f13569dafed61d8c255ac9519a8767f457ed1587

                      SHA256

                      38cf34af919f4ee69e07633f535eeae83c2e13a8740d97e2c96218cdb8d42069

                      SHA512

                      bce5fb9c8868b4cff90d7b960e8d8486df5f3fde111a40794fe9eb54ccdf3caca0360a34a65931752634fbd1d141e106b76f87481954941a69d0ed28030cb2b6

                    • C:\Windows\SysWOW64\Npfkgjdn.exe

                      Filesize

                      576KB

                      MD5

                      7295d16642fd7a19b9ecac169ab8aa36

                      SHA1

                      c3f0bc3b442b4d1f3d4d04f244792b88674dbb43

                      SHA256

                      0ad3efb995addfea737cb8aa3d10d8db4ae53e22873466613e34916c44b6a058

                      SHA512

                      5eabcb34c76659d73fd1958bf363fe4b5cc9fa80a480ce1b4a8154d2f43c775a082c7ec4fd2efc1113551357dd95d5d376ad7587e638c7d685c2109826618ea7

                    • memory/224-216-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/668-181-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/712-172-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/968-459-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1020-447-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1144-303-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1152-82-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1152-0-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1192-104-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1220-198-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1380-264-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1384-39-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1384-127-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1428-241-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1476-369-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1516-489-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1572-47-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1572-137-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1604-206-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1612-399-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1632-501-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1724-495-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1736-165-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1920-232-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1924-15-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/1924-103-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2136-279-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2276-429-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2296-156-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2400-197-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2400-107-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2468-297-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2516-138-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2560-28-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2572-88-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2612-471-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2688-248-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2724-477-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2836-308-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/2864-483-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3100-357-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3108-387-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3128-189-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3156-423-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3160-362-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3308-214-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3308-128-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3424-119-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3424-31-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3440-290-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3508-273-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3520-257-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3548-284-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3552-453-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3564-465-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3576-507-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3692-56-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3692-142-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3748-7-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3748-89-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3876-339-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/3924-327-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4072-375-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4232-63-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4232-155-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4308-441-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4372-405-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4468-393-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4576-224-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4716-381-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4740-410-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4800-435-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4812-231-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4812-143-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4820-91-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4820-180-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4844-351-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4916-417-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4940-77-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4944-333-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4980-120-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/4996-315-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5012-345-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5052-320-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5156-513-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5196-519-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5236-525-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5276-530-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5324-537-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5356-543-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5396-548-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5440-555-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5476-561-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5516-567-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5556-573-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB

                    • memory/5596-578-0x0000000000400000-0x0000000000448000-memory.dmp

                      Filesize

                      288KB