Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 13:13

General

  • Target

    f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe

  • Size

    296KB

  • MD5

    d6c960f0ee144b7cbe12e6471fc331ef

  • SHA1

    de9d1dca5c0a7de396c04b1361c3125d4c7d34f0

  • SHA256

    f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555

  • SHA512

    b001d18cbae2218df89ed93ae1dd0dfc62a39173f8a134b870b46a5b9152c69c070ffbd032ff76740680efe909d18e76b4c682551b80ab1ddb40df30e497649d

  • SSDEEP

    3072:4ww81Knd4/EOp01w7dztsjRtARA1+6NhZ6P0c9fpxg6pg:BPKd4/EOp01w3slvNPKG6g

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe
    "C:\Users\Admin\AppData\Local\Temp\f97fdac4b5cc6eced5dc1b386699cc4f58c4c8bf081d9b5a4daa0b736c84c555.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\SysWOW64\Nckndeni.exe
      C:\Windows\system32\Nckndeni.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\SysWOW64\Oponmilc.exe
        C:\Windows\system32\Oponmilc.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Windows\SysWOW64\Ogifjcdp.exe
          C:\Windows\system32\Ogifjcdp.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3308
          • C:\Windows\SysWOW64\Ogkcpbam.exe
            C:\Windows\system32\Ogkcpbam.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2440
            • C:\Windows\SysWOW64\Odocigqg.exe
              C:\Windows\system32\Odocigqg.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3724
              • C:\Windows\SysWOW64\Ojllan32.exe
                C:\Windows\system32\Ojllan32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3456
                • C:\Windows\SysWOW64\Olkhmi32.exe
                  C:\Windows\system32\Olkhmi32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3224
                  • C:\Windows\SysWOW64\Ofcmfodb.exe
                    C:\Windows\system32\Ofcmfodb.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1084
                    • C:\Windows\SysWOW64\Olmeci32.exe
                      C:\Windows\system32\Olmeci32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1224
                      • C:\Windows\SysWOW64\Ogbipa32.exe
                        C:\Windows\system32\Ogbipa32.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1548
                        • C:\Windows\SysWOW64\Pnlaml32.exe
                          C:\Windows\system32\Pnlaml32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:3552
                          • C:\Windows\SysWOW64\Pgefeajb.exe
                            C:\Windows\system32\Pgefeajb.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:5068
                            • C:\Windows\SysWOW64\Pjcbbmif.exe
                              C:\Windows\system32\Pjcbbmif.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:4296
                              • C:\Windows\SysWOW64\Pclgkb32.exe
                                C:\Windows\system32\Pclgkb32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:1864
                                • C:\Windows\SysWOW64\Pmdkch32.exe
                                  C:\Windows\system32\Pmdkch32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4792
                                  • C:\Windows\SysWOW64\Pdkcde32.exe
                                    C:\Windows\system32\Pdkcde32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2400
                                    • C:\Windows\SysWOW64\Pqbdjfln.exe
                                      C:\Windows\system32\Pqbdjfln.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:2700
                                      • C:\Windows\SysWOW64\Pqdqof32.exe
                                        C:\Windows\system32\Pqdqof32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:1620
                                        • C:\Windows\SysWOW64\Pfaigm32.exe
                                          C:\Windows\system32\Pfaigm32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:3244
                                          • C:\Windows\SysWOW64\Qqfmde32.exe
                                            C:\Windows\system32\Qqfmde32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:3996
                                            • C:\Windows\SysWOW64\Qgqeappe.exe
                                              C:\Windows\system32\Qgqeappe.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of WriteProcessMemory
                                              PID:5092
                                              • C:\Windows\SysWOW64\Qqijje32.exe
                                                C:\Windows\system32\Qqijje32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:4304
                                                • C:\Windows\SysWOW64\Qcgffqei.exe
                                                  C:\Windows\system32\Qcgffqei.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4708
                                                  • C:\Windows\SysWOW64\Qffbbldm.exe
                                                    C:\Windows\system32\Qffbbldm.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4196
                                                    • C:\Windows\SysWOW64\Aqkgpedc.exe
                                                      C:\Windows\system32\Aqkgpedc.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2128
                                                      • C:\Windows\SysWOW64\Acjclpcf.exe
                                                        C:\Windows\system32\Acjclpcf.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        PID:2420
                                                        • C:\Windows\SysWOW64\Ageolo32.exe
                                                          C:\Windows\system32\Ageolo32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:2092
                                                          • C:\Windows\SysWOW64\Ajckij32.exe
                                                            C:\Windows\system32\Ajckij32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1080
                                                            • C:\Windows\SysWOW64\Ambgef32.exe
                                                              C:\Windows\system32\Ambgef32.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4960
                                                              • C:\Windows\SysWOW64\Aclpap32.exe
                                                                C:\Windows\system32\Aclpap32.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:2860
                                                                • C:\Windows\SysWOW64\Ajfhnjhq.exe
                                                                  C:\Windows\system32\Ajfhnjhq.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3152
                                                                  • C:\Windows\SysWOW64\Anadoi32.exe
                                                                    C:\Windows\system32\Anadoi32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:1924
                                                                    • C:\Windows\SysWOW64\Aeklkchg.exe
                                                                      C:\Windows\system32\Aeklkchg.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Modifies registry class
                                                                      PID:4260
                                                                      • C:\Windows\SysWOW64\Acnlgp32.exe
                                                                        C:\Windows\system32\Acnlgp32.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:116
                                                                        • C:\Windows\SysWOW64\Afmhck32.exe
                                                                          C:\Windows\system32\Afmhck32.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:3440
                                                                          • C:\Windows\SysWOW64\Aeniabfd.exe
                                                                            C:\Windows\system32\Aeniabfd.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4692
                                                                            • C:\Windows\SysWOW64\Afoeiklb.exe
                                                                              C:\Windows\system32\Afoeiklb.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies registry class
                                                                              PID:4756
                                                                              • C:\Windows\SysWOW64\Ajkaii32.exe
                                                                                C:\Windows\system32\Ajkaii32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2060
                                                                                • C:\Windows\SysWOW64\Aadifclh.exe
                                                                                  C:\Windows\system32\Aadifclh.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2064
                                                                                  • C:\Windows\SysWOW64\Agoabn32.exe
                                                                                    C:\Windows\system32\Agoabn32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry class
                                                                                    PID:4104
                                                                                    • C:\Windows\SysWOW64\Bnhjohkb.exe
                                                                                      C:\Windows\system32\Bnhjohkb.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:1436
                                                                                      • C:\Windows\SysWOW64\Bebblb32.exe
                                                                                        C:\Windows\system32\Bebblb32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1020
                                                                                        • C:\Windows\SysWOW64\Bfdodjhm.exe
                                                                                          C:\Windows\system32\Bfdodjhm.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:2960
                                                                                          • C:\Windows\SysWOW64\Baicac32.exe
                                                                                            C:\Windows\system32\Baicac32.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies registry class
                                                                                            PID:3956
                                                                                            • C:\Windows\SysWOW64\Bgcknmop.exe
                                                                                              C:\Windows\system32\Bgcknmop.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Modifies registry class
                                                                                              PID:1804
                                                                                              • C:\Windows\SysWOW64\Bmpcfdmg.exe
                                                                                                C:\Windows\system32\Bmpcfdmg.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:620
                                                                                                • C:\Windows\SysWOW64\Beglgani.exe
                                                                                                  C:\Windows\system32\Beglgani.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4140
                                                                                                  • C:\Windows\SysWOW64\Bnpppgdj.exe
                                                                                                    C:\Windows\system32\Bnpppgdj.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2768
                                                                                                    • C:\Windows\SysWOW64\Bclhhnca.exe
                                                                                                      C:\Windows\system32\Bclhhnca.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Modifies registry class
                                                                                                      PID:1868
                                                                                                      • C:\Windows\SysWOW64\Bnbmefbg.exe
                                                                                                        C:\Windows\system32\Bnbmefbg.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Modifies registry class
                                                                                                        PID:2308
                                                                                                        • C:\Windows\SysWOW64\Belebq32.exe
                                                                                                          C:\Windows\system32\Belebq32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Modifies registry class
                                                                                                          PID:2276
                                                                                                          • C:\Windows\SysWOW64\Cfmajipb.exe
                                                                                                            C:\Windows\system32\Cfmajipb.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Modifies registry class
                                                                                                            PID:2156
                                                                                                            • C:\Windows\SysWOW64\Cndikf32.exe
                                                                                                              C:\Windows\system32\Cndikf32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Modifies registry class
                                                                                                              PID:4536
                                                                                                              • C:\Windows\SysWOW64\Cenahpha.exe
                                                                                                                C:\Windows\system32\Cenahpha.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:5036
                                                                                                                • C:\Windows\SysWOW64\Cfpnph32.exe
                                                                                                                  C:\Windows\system32\Cfpnph32.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4488
                                                                                                                  • C:\Windows\SysWOW64\Ceqnmpfo.exe
                                                                                                                    C:\Windows\system32\Ceqnmpfo.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Modifies registry class
                                                                                                                    PID:2096
                                                                                                                    • C:\Windows\SysWOW64\Cnicfe32.exe
                                                                                                                      C:\Windows\system32\Cnicfe32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2840
                                                                                                                      • C:\Windows\SysWOW64\Cagobalc.exe
                                                                                                                        C:\Windows\system32\Cagobalc.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Modifies registry class
                                                                                                                        PID:4784
                                                                                                                        • C:\Windows\SysWOW64\Cdfkolkf.exe
                                                                                                                          C:\Windows\system32\Cdfkolkf.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:4816
                                                                                                                          • C:\Windows\SysWOW64\Cjpckf32.exe
                                                                                                                            C:\Windows\system32\Cjpckf32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1888
                                                                                                                            • C:\Windows\SysWOW64\Ceehho32.exe
                                                                                                                              C:\Windows\system32\Ceehho32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4268
                                                                                                                              • C:\Windows\SysWOW64\Cjbpaf32.exe
                                                                                                                                C:\Windows\system32\Cjbpaf32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3128
                                                                                                                                • C:\Windows\SysWOW64\Cegdnopg.exe
                                                                                                                                  C:\Windows\system32\Cegdnopg.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:4984
                                                                                                                                  • C:\Windows\SysWOW64\Ddjejl32.exe
                                                                                                                                    C:\Windows\system32\Ddjejl32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:864
                                                                                                                                    • C:\Windows\SysWOW64\Djdmffnn.exe
                                                                                                                                      C:\Windows\system32\Djdmffnn.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:2036
                                                                                                                                      • C:\Windows\SysWOW64\Dmcibama.exe
                                                                                                                                        C:\Windows\system32\Dmcibama.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:3640
                                                                                                                                        • C:\Windows\SysWOW64\Ddmaok32.exe
                                                                                                                                          C:\Windows\system32\Ddmaok32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:5060
                                                                                                                                          • C:\Windows\SysWOW64\Dmefhako.exe
                                                                                                                                            C:\Windows\system32\Dmefhako.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:1812
                                                                                                                                            • C:\Windows\SysWOW64\Delnin32.exe
                                                                                                                                              C:\Windows\system32\Delnin32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:3592
                                                                                                                                              • C:\Windows\SysWOW64\Dhkjej32.exe
                                                                                                                                                C:\Windows\system32\Dhkjej32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:1676
                                                                                                                                                • C:\Windows\SysWOW64\Daconoae.exe
                                                                                                                                                  C:\Windows\system32\Daconoae.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3320
                                                                                                                                                  • C:\Windows\SysWOW64\Ddakjkqi.exe
                                                                                                                                                    C:\Windows\system32\Ddakjkqi.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:1688
                                                                                                                                                    • C:\Windows\SysWOW64\Dogogcpo.exe
                                                                                                                                                      C:\Windows\system32\Dogogcpo.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:4420
                                                                                                                                                      • C:\Windows\SysWOW64\Dddhpjof.exe
                                                                                                                                                        C:\Windows\system32\Dddhpjof.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:5104
                                                                                                                                                        • C:\Windows\SysWOW64\Dgbdlf32.exe
                                                                                                                                                          C:\Windows\system32\Dgbdlf32.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:2152
                                                                                                                                                          • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                            C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:3700
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 408
                                                                                                                                                              78⤵
                                                                                                                                                              • Program crash
                                                                                                                                                              PID:4048
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3700 -ip 3700
    1⤵
      PID:4200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Aadifclh.exe

      Filesize

      296KB

      MD5

      bb608ed95dc39190b0a9f314d07a894a

      SHA1

      3b29ffd8fcfaee8923bd2c506db877e7fd665aa1

      SHA256

      7e333cca8d89338e9b2218f12511803b1f510f0ae31eaa4998a621b04e327a76

      SHA512

      17961e2b8deeaeb12e4f4809efed18ec01ba98b469d81818dbbec8f25bc468328120feb86297bdbc69f34aa0fbc3c8712e95f932597fe9736de9ceaffcf2a5f1

    • C:\Windows\SysWOW64\Acjclpcf.exe

      Filesize

      296KB

      MD5

      c70a2e39921e308fede4e7959bd3935b

      SHA1

      24605482f861eea1a26ef8f63677c6ef028a10c4

      SHA256

      21c1340c986ba08264f18e98cf6f4ceee95f7848981ea1de8a34b3aa1d553ffb

      SHA512

      c429c70f00ac10374f15ccd48d99a906a568e2fe6e58079ac6ab0f64eb97ed4b877318260f0a5ac1844cab426397a5eb6c89582d9fd53188c9116f8b757ee8d1

    • C:\Windows\SysWOW64\Aclpap32.exe

      Filesize

      296KB

      MD5

      59737f854375476e9deecf9be926f12f

      SHA1

      f00c46d68868fe41ca9dab0009de2502b8f7fdcd

      SHA256

      b2d35ad9567c98ad17dfa6fd9927d72e1327ec5399eb548609b364c51faa82f9

      SHA512

      20428ddea4b273cc147c3ad252dd5256ea7d545724b4200827facf30426aef36a15bbd6e7e68fb57d1b2756ba34a8ca30651846c4070ccc25d863b09d89d3113

    • C:\Windows\SysWOW64\Afoeiklb.exe

      Filesize

      296KB

      MD5

      123157507e057ce8ea9cd461ec2e7787

      SHA1

      a7ed6fc15fc125e62d2347c8b28b277f4080bac9

      SHA256

      8e2d60ed0a5f873394eee9d8c491402291f32a2d8d676cccf2ca99741a04da6d

      SHA512

      ee51522a6a4a38b9e46105b9c9ae2e93f2631fc0cdce90b822cf72440d52d330ebcf5808ff17ff26ddd9aca71a43e902c38d1e6db40e38f07646da2e799e9561

    • C:\Windows\SysWOW64\Ageolo32.exe

      Filesize

      296KB

      MD5

      36b55ff3e1c6b2041540f4295aa44933

      SHA1

      d8abf98fa06e1eca3d4f47823286406c755c1a56

      SHA256

      27488fe2a9b2d9ded4eaca6e838fc616144ddd1cf2fa7f8fd12774db5a1046a5

      SHA512

      4b56f1590d281080ed6126b9d759ee4c396150428cb57dcad8a91166407b122743e5708d3eaa40016569ccf4d267386c30d746ce4cb186f820741aa6ff1c180b

    • C:\Windows\SysWOW64\Ajckij32.exe

      Filesize

      296KB

      MD5

      4f43a763fc7c73aea4d9c6abebf86d83

      SHA1

      40937d7e24ebea228a73473849be3ff47a8047ce

      SHA256

      709973116e7cb696a7e302e4942561b708c6db06d13a36c538bad2c69c4a98cb

      SHA512

      e0c9084e3725ba106c440cfcfba0f240493bc0cc8681ea6a025b1c543643f58d8051a8b2147fa0f19e01599f158162323a178af8f4024239eb5fd12c68c05f80

    • C:\Windows\SysWOW64\Ajfhnjhq.exe

      Filesize

      296KB

      MD5

      52d2c43c7f9a7ca49110c33de06f4e30

      SHA1

      d723518128f2d22f16f3f10cf212f0fe3af366bd

      SHA256

      04812a385ccc1744f5684303f8d341b1c89306881efdb311fc823785b904604e

      SHA512

      f1304b6e441e42b3135ee04e46036859c9db55a3b16994febbfb117147f575f4f12ac8af1737f0efe990d275636ac4eaa6dea6b01561b46a11929ba280fc6e69

    • C:\Windows\SysWOW64\Ambgef32.exe

      Filesize

      296KB

      MD5

      2bb262050cae566b80f7765e77e42ee1

      SHA1

      b0cd1ea6932daa4641f7ce97cee9d4c040a8308a

      SHA256

      5ffc7992f5625c6fa502c2b4c3c719775722015a20965b43f386e81a933dd435

      SHA512

      e027d122454d5f3f30af527fc6432f15965da26fc8bcfa5154a5ad7dbfec5948bd4af479f836c3873b271b385f9494d09520fd398fbee0583beda944880c60d6

    • C:\Windows\SysWOW64\Anadoi32.exe

      Filesize

      296KB

      MD5

      e2f678ffeab230c66cce8a37100846a5

      SHA1

      88701caf58a1a564401e2d5e4baec07fda3ec28b

      SHA256

      093e0ad9c5c77fec9b0db880f0114191d0ad0d0f787035a1a065af31a13d4ee0

      SHA512

      412c0ca649ad49a192921ca5bf75941fa59621f2d2aefd61304042d34302cd9699104a7c55eda94c39c32d39e4f8c869ac0395c9bcf3a4d36276b29e9d7f88b6

    • C:\Windows\SysWOW64\Aqkgpedc.exe

      Filesize

      296KB

      MD5

      697f6b470de26d3233b6aadc20b85f77

      SHA1

      9f2cadec2882b83e07337866a4fc396d81a70d82

      SHA256

      d1345f524366365af11ebb996ecb1dfc2b9ce2e6e96b963e454d5b2935098eec

      SHA512

      1c11a7d3fa32a222c2c7e15e2a715984ca04b1c2d2909a4d72a223649ac9f6ec400e322470cf64769b729ac5114462d11bd45aa93f7335034d1cfc52025c70fc

    • C:\Windows\SysWOW64\Bclhhnca.exe

      Filesize

      296KB

      MD5

      bf6ceb76f97b8ca84858256c351453ed

      SHA1

      83b69bcb7b8f54a719638a178d3acbfc458d3e1e

      SHA256

      8bec6d6c2c3fc14a682ccbaf8afccc82577252c0f17e533ee11b5cdc5068b097

      SHA512

      9124792b8a8d1efacb8ec246245114cce3ce0fbead128a01f32f9c45c0e70e5db0bb2dd2ca220fbcf145c4c3e9628ec971f34a95897ac6207b12a72a86e4e80b

    • C:\Windows\SysWOW64\Bfdodjhm.exe

      Filesize

      192KB

      MD5

      ad27ee51bfe86e9295c50a74df40610e

      SHA1

      7f01e98580d18171ac45949b89d3ba046028bd9e

      SHA256

      6d3acb66e505d1e8df0aa8deabc1fa5583c15810da119aaf4ec66a0d7afbcc84

      SHA512

      57a0150dc72be1df8b4bec263f0a3af336502bfdbf2b1ee5860132b96e2b46657da978d50028410283fcedf905d8482ca518ebb92ffd56c78a47864ec10e16f4

    • C:\Windows\SysWOW64\Cdfkolkf.exe

      Filesize

      296KB

      MD5

      c7ed76d4805c4a6c87b130b6d25550e0

      SHA1

      0046e0460dc0e711d487273bf6d19242ffd421b7

      SHA256

      7dab8b1b8f02aed6b091e9f2c42d297c6797dfc8f454e87b74997286c615e78e

      SHA512

      cd9f9d3b9d6cca74fd45fdf7dd1dba20778195d20fa34623bf07d0cb5bd59396ce81af0773ad6ff0a20543dc249ab222f72ed4b495712de1388400ce7a4b82fe

    • C:\Windows\SysWOW64\Cfmajipb.exe

      Filesize

      296KB

      MD5

      c934b8a4a0657942bced4059e7f1319f

      SHA1

      cf585b3b3ea109f7f28c32c5ae3c19ca4619c8d9

      SHA256

      f669fca1836cf212138e214c8edb8b5ef727effcdc686b9b2087ea791df9b38c

      SHA512

      7fe0a168e90cb41f4eb735e03e5a7478389e9d4a5e5932be1ca130a21e4948c92ca95af8e6a21688ea90c5fe38a3b77ef0d07af43b10d7667a46fcc5362f23b5

    • C:\Windows\SysWOW64\Cfpnph32.exe

      Filesize

      296KB

      MD5

      57e34bc9fb9ca92b507030feeba4bb13

      SHA1

      8b0e07caf929ffd687642570422f45187f2062a3

      SHA256

      407c4aac9ffa79838d3dc59f120183152a1ebbd508f11a5deb912922dd6d490c

      SHA512

      0515b96fb92a0a3ad8667854936390634f16eea8e4cff720a696cedff34a35d8cc81313fb872ca6903d739d3f1550d8c7468ed7fc78597fa3d717ee7933d51e3

    • C:\Windows\SysWOW64\Cnicfe32.exe

      Filesize

      296KB

      MD5

      35a4f6d416d411b69cfbdcb5d62eae2e

      SHA1

      e4e804ef9c914db1a9f719aac81227cefe2a17c5

      SHA256

      56908da7bf2d80c38ebe31c227fb7ecdfa4bad3e1cc32677fdf688565b6614fe

      SHA512

      806fdd6866112f4bc4ab3d8bae36f4e4d48989244c82ee7340512321f4f313ee5c4a96517c0ba5bd080f282935240f7ad86263bbd4a9c643d77a6910a1d368f6

    • C:\Windows\SysWOW64\Ddmaok32.exe

      Filesize

      296KB

      MD5

      4320275b0fbfab6a980e7fd651bdd50f

      SHA1

      daa31a4b1879c029173e02c3e977d1271298a450

      SHA256

      7c6324beba7e578e90254e62e763c4ebd716d8fc791a30fd437854d1f7856735

      SHA512

      912489d9d45c689a37ed854af6122dc70367535b6c18df9178648ea114cc6e82907e7be1787b1ed289c5d3c51c41448dcb882f35749c2df1646239df64003807

    • C:\Windows\SysWOW64\Dogogcpo.exe

      Filesize

      296KB

      MD5

      fd6cb5a159de4c85101d1f2557beabe5

      SHA1

      ea3b76fb1588517a8357cf86738823b142371064

      SHA256

      36b3f35e43bf842df43463db082fb98ffa67f5468dfdf9efa159bf66ce9e9191

      SHA512

      c614cfeb68ddd2ce0393266c7d6882b1bdcacb6eac533bf51e47d773f26f48fc04416edd0ca7235b9c8f46aa77fbdff21ddab83f9e2f01bb3d502994dc048ca2

    • C:\Windows\SysWOW64\Jbaqqh32.dll

      Filesize

      7KB

      MD5

      b6432211abe4e47fda0db2d773bf964c

      SHA1

      d360ac1396a10f8e76944da34edd3928e94a00b6

      SHA256

      4fe155d835e2f1ef997cb1c824c4435c97d01d4503813c5e0ea9e437adc54638

      SHA512

      bfec2c09eb7e3d1640de01c91db717efb69bccf85d54a77f613c9ea3ca86b8ab77eac869bbd0e27e393452fd995eadbce79d0dd2ec22bef991dd84f71334e54f

    • C:\Windows\SysWOW64\Nckndeni.exe

      Filesize

      296KB

      MD5

      9551b7f6fd21d27b9e303b3ac75a43c4

      SHA1

      5e2230d8966c10da26c8ec5ced9c73503a670da7

      SHA256

      937f1912ad064b6b308ab8e0b6e88a146ba991f06e09564c1aea28762447de0e

      SHA512

      13054e21fe69542a120d884621910357c2dd8357279d10ae365598f62f16eadda164f2c77cd94f664264c334dfe69dfabb3ae2757ccbc04dcb8d4ab312aa0687

    • C:\Windows\SysWOW64\Odocigqg.exe

      Filesize

      296KB

      MD5

      4418ca634aa9017b2315cb78f2fc4d92

      SHA1

      058e1d451572628c397e7f72f74197611fcb1929

      SHA256

      28a9708c02984a8a54c10e5ac9b37d9bc4a761fea55e1fc3e8ea4a8ed9777986

      SHA512

      eb78ff538505223e51bab203f4e60352088fe32338fb4abf95391f51b5590d8428e20050dea9ba8673faaf8af34c35435d11eb4395f95f102d0ace94a5629d21

    • C:\Windows\SysWOW64\Ofcmfodb.exe

      Filesize

      296KB

      MD5

      671da1249126b4ea43d0568329c19f00

      SHA1

      971990fbbae9f29362cdea06f93f920e01ee22f2

      SHA256

      c812c332ad29a2b3c4b180c37a0d72f0b7b8dd2e7a797b5d5b802d737c659e84

      SHA512

      004805c89712fedd0f832484e0066fc96503b32e89859e6918971d60110df8bbbddbea3b1922c338d6164f09ba065a0d53b01542490b08fabd8f638b7738a8c8

    • C:\Windows\SysWOW64\Ogbipa32.exe

      Filesize

      296KB

      MD5

      8df6a0feadf3a8ec777219855a9b950f

      SHA1

      6cce82124ef7e1a3c2827e7dfd5bcb13771ffb61

      SHA256

      f1fc76c1a3ac611bf2f53125b26881e5dff99ea992a4e28dc747de50dd24717f

      SHA512

      018d3103117873094be1daa9a2ffc8ee2148a1a0c7ef16612f5b4a3d8e22f133d37769543fffdf3baad4de1b30ebb9bbb65128ab202261e772f09aaf262ab43a

    • C:\Windows\SysWOW64\Ogifjcdp.exe

      Filesize

      296KB

      MD5

      b94dbf1637f4f8a8f4f1e730469a2bd7

      SHA1

      a1f3d16cf3b00a567f08cd03890022e8975da249

      SHA256

      54ef23c5df0ebf776425213d77165da38a98765eb0e678833e7ea96a78dc53b4

      SHA512

      ba3d4805b3559ba137bb83b5a050f255097d33b3be8ba38cde1ea6d4627ea6174246e1d2582920f91a3194c11ff39f2d45d3715f173fa857d160333efe745e66

    • C:\Windows\SysWOW64\Ogkcpbam.exe

      Filesize

      296KB

      MD5

      82703dde36cdd1c705e8ea2c3c7d8c56

      SHA1

      45718560dae6a5fe31bb144d03cb1107ae3b64c0

      SHA256

      a1ffbdf0679386346ffca9eed4338d714a34bd3e26abfbbe3e3870f83bcbb7cc

      SHA512

      4a86acfce0d139ce07a8c10ac9e3b02747a5b24c17e19114d64df4a2abda91348fe1adf654a8b9f18d35d5ab2be190a18aca4ff22bc2425288192f6a73fd95c0

    • C:\Windows\SysWOW64\Ojllan32.exe

      Filesize

      296KB

      MD5

      307b4314cd2b0267c942224c764f4b6d

      SHA1

      225f97df9a3839e23d2c63b2230a18a8db7c69a6

      SHA256

      24d455e88f72299f314e8e1e0b796ff99470bba55dd7d5980939746ca783c9f9

      SHA512

      7516ed1822e128f5ce11caadce66f9ba914aa40cc9f57d030f6525626098272cfc02a658907f4dfea4ce64fde6ef8ad994e64e2564b114ef5d92cf03427de2b3

    • C:\Windows\SysWOW64\Olkhmi32.exe

      Filesize

      296KB

      MD5

      9f4fe660c14b6f774ccb292e320d4924

      SHA1

      5da786beb3472f3cd9c3811e05f2d483b6972695

      SHA256

      ab7135136ceb5ff48e5a1743be1b5d9aeb89f1e5a6bf9666bac7600e6ade506f

      SHA512

      b9f4fdae50fef1b40ca336d475d6febf049475eb9da594a18af3ac4d2273f1d5a74c2b0c3d53ea7beacc0664b30b66e4513b8e3ad61bf6de8bdc415797c9969e

    • C:\Windows\SysWOW64\Olmeci32.exe

      Filesize

      296KB

      MD5

      22e6868f47e0d1b5d6bd80beb8d9f2de

      SHA1

      f2d3e4578af62effe9dd014a74c6c70efe5b970d

      SHA256

      5fd3649700ace8f0894a6034269ab8f3538839758acdde91a570545ae013dc75

      SHA512

      d0f159942a648900fc93d503b722c1e66400b252a5f5106df90efe889d9ce3d8972dd41e3aaf6565f5c7b19407861a4d6858841e4e9276536a8bde697a329c7d

    • C:\Windows\SysWOW64\Oponmilc.exe

      Filesize

      296KB

      MD5

      382ad68a83867e1aec58f2cfcd8f36e7

      SHA1

      7df4a34d4303d973994bb5ff60c16dde9fe67ca3

      SHA256

      b29db350cc53cc52b5bd05d37931f97e7c5f024a2a635f96a7e1bd00966fb7a1

      SHA512

      286950701f7e5dc86f39623d78af8cc918962137b4c2a1dc3000f155e4b10385e8b97e898ccace69ce78662342b19dbc7ec390d89db1805e82855c7e7856df14

    • C:\Windows\SysWOW64\Pclgkb32.exe

      Filesize

      296KB

      MD5

      f9bf127f2aa86ddebb10da8cdce1b63a

      SHA1

      30b1233eb0c5c1852625cce802aea0a69ca3cb93

      SHA256

      aa3657c13dc9733339d7a974a806c898f60b1b65edac517c5d31962ee2c8b10f

      SHA512

      93cd171e1de8382621c737830aceef8a1cc7bf0ec3290764fb5dba5964baa41c624793121ac5670c201e72266889662cc1f9c9bfb67a6e0ebab0127d052dc2b7

    • C:\Windows\SysWOW64\Pdkcde32.exe

      Filesize

      296KB

      MD5

      58b9e2f007236f951920e52a57ade3dd

      SHA1

      fe6b080752242ea22790444abd2e4e17824f8e3b

      SHA256

      b25c59af4fd27323a8747bd47711f7f1f45af6a9297bb1118240f61c1442fb9d

      SHA512

      1ed67fe5df88833380e6c873f3cf6a8f544fd815c85c32c57e218873e5c0dbc5ef2e329a1386a0f3e3161b18bff396768509916cc39750c69ce63d2e42d00c7e

    • C:\Windows\SysWOW64\Pfaigm32.exe

      Filesize

      296KB

      MD5

      d2ccb44176051be76d328560e3ece2a3

      SHA1

      9ed6d15ca9ac5eac0cc677202d35f14c700a2921

      SHA256

      b03aa294d86e235400503498c03441362885b1b25400353765680ffc7d4b507a

      SHA512

      04dc1ed26eeaab804a522eae10fa95f414193bf7a8f826d58116da9b3488a3d3d68912789f4b59f189bbcb4c08c2b7543c99b013b5a48d4404c152516302c0b3

    • C:\Windows\SysWOW64\Pgefeajb.exe

      Filesize

      296KB

      MD5

      9b1963edaac936a4bc3eafa41ad37a23

      SHA1

      22993cf2393c12326a06d3a92bc1d04dade01838

      SHA256

      3c03131877147d5dbefd684ba7d028759109a6e29a66f4f8ea9f19070c046ca4

      SHA512

      15e860c59531e0a0415b932e64730534c0e68ff80a3699c1d37215fc206b105a5d77b1b3cb3810679b04974e00d9aea1df80997b158353e010b0271b8b11f2c1

    • C:\Windows\SysWOW64\Pjcbbmif.exe

      Filesize

      296KB

      MD5

      357eb6101c102c58d92c5694c0cb2a33

      SHA1

      5d86f1d0dd74883cba3ceeb6f7de028e1775d38b

      SHA256

      01e0b8c6e4d752bbaa9ecc68ad838bc52a1d5490890258906c6c1b3ab57b842f

      SHA512

      4c1babc4d82e575c04f12208d4723ec50282a80e71a426e16f6bc9d4e15ea0f11eb6ff8bb0ca2c76243c369dc1600067c4cf40760e3d8d796c34c6b57581a7d3

    • C:\Windows\SysWOW64\Pmdkch32.exe

      Filesize

      296KB

      MD5

      c03643965c3e4062a53c1e4689ab52a2

      SHA1

      39b56ea657c5e4b157730527ecaea0249276e870

      SHA256

      4f77c34f703e1738e621099b3e1fb8d9bdd3d245c32683352e734e03b273f5af

      SHA512

      47aea8efa4468d3bc0e82b5870c5a14e8c6237dd09df91a06a238c236ca13407639e8ef15f7c1048293eb709c03c309291c904f90ef7c19871466a8a54eea68b

    • C:\Windows\SysWOW64\Pnlaml32.exe

      Filesize

      296KB

      MD5

      3e2cc4d88bfa8f54925f7e42f22e407f

      SHA1

      255b21f1f6cd87a2a56a10b0225b260462e6bc51

      SHA256

      2547ae25402b0a2a17bdf4a63c394126926e9426bb499c41b5c679db1f90b70b

      SHA512

      a8695c3e4a6f2b70666bf2ccd91410d54548f03161cd7cc5619155e9884019f0d84b8bade0948601eef8a2a17418a536c9d1e3a7a893100b15d2df64a3cdadd9

    • C:\Windows\SysWOW64\Pqbdjfln.exe

      Filesize

      296KB

      MD5

      5bbb9ca072d2690da3d4b14921f58f7c

      SHA1

      b223891fe00b212bc504d6cf208a343a6aaaf6c1

      SHA256

      2d8b1ced5f0efb397262db7855768e2e0dd6261be302c49c795162d40b4f4f4a

      SHA512

      38d8fcfbb8c2464f38790fe23d0309f6e74fab20cba5c1165f2e7af4b9448b5e9d53ca35ee3a8c1fa437ae8adb2d153b4744f518f875e0bb886353832c08ec33

    • C:\Windows\SysWOW64\Pqdqof32.exe

      Filesize

      296KB

      MD5

      563cfec6b4a3208d632dca2da15b5710

      SHA1

      84cfc4cbcaabe22af22a309a97dff927f6c93528

      SHA256

      63bb78c314fbed5bd12f1c48abd2a6d2a69fe21e5c23149284cd4488be0b00ce

      SHA512

      79e9f341e99a93301632176ded24ecc88b1b7d9f1a23eb95282227d21580bf09ebada25686d4d779599be17f3ea5baee59dbaf807677d851a86061d6151dfaca

    • C:\Windows\SysWOW64\Qcgffqei.exe

      Filesize

      296KB

      MD5

      f12eeda6a85c27a3ed7540cc5786911a

      SHA1

      cffad59b0f8927829496395441bd09d5a1b1b2b3

      SHA256

      4b8b9993c7bca798eda61aa83a711205610e3a39f9115d3642bf6fb13e91e28b

      SHA512

      e95201d1127c0698512d586bb3f6d0e865efff0b288815b6ed5822bc9591a2596814d24a7828ad602b6c3ab55cbe3b67d1b3bb597b10f04efdc676c819d9f61f

    • C:\Windows\SysWOW64\Qffbbldm.exe

      Filesize

      296KB

      MD5

      39bfd106b1d65499ba66ffcaba80f3f8

      SHA1

      c595f49f68aea1541e7ee6ec9141b4ed58b0f3a5

      SHA256

      e8736b14fffa4ab2d380a00a631819cb7700dfd2c8e864d02ea26f59ff855040

      SHA512

      78b7a73e5a63acbc286355a7acf5ef35438bd66f40b517e0ea0271e5b11dc8140435dbe7ca150efc8d1a6775ce641c3f92dd6fbb8c7bbdaa56845f4fa9f39717

    • C:\Windows\SysWOW64\Qgqeappe.exe

      Filesize

      296KB

      MD5

      046127ada4ff76c91f9119b88cc6c70f

      SHA1

      d59cdea6060e8d0af213653153ada98be107811d

      SHA256

      c245d0c16055b9186909dc007895fa9437ba9a7cc1ae9d9880b17179125beed9

      SHA512

      eee773a9e43a0f2c09331feb33ad0948e09561d3e8cbca7bf90b320485d15af3d106bc217b8440964c4c096512ec342c4296adb983d622f2b032473dc03cc5e5

    • C:\Windows\SysWOW64\Qqfmde32.exe

      Filesize

      296KB

      MD5

      9b924207ee5219f4747e47bf1fb4b7bb

      SHA1

      090943a85e30f2b03ba07a3cd558d3c2f57636bb

      SHA256

      067f662624f962ef361486bfa57adde759b631ecca1d140b438335701bac46de

      SHA512

      2daff62e0b1dcd00be3035e5d3b1d73bca929fc96d173105beb349b51ec80d48472d047ef62e50630617891251141a0565b5c5d174d0ff8d6dfc8577834ef8d3

    • C:\Windows\SysWOW64\Qqijje32.exe

      Filesize

      296KB

      MD5

      e45fb301f0ceb964e79260a96be336fc

      SHA1

      bfc5a022b8eccbba854a75bbd17b2f0ef1569aa5

      SHA256

      a1e56339112f49a64ff47c55c20ddbe33940ad6af30deb5f89a3a2026fb9be82

      SHA512

      6608e433bebc4ec7f478d37835c84610fb6fa097920fd47aac605bc869dd69b2530b64e8d8f49b7c513c1dc598a67740662c267535dcc6ef24c75a35ed62770a

    • memory/116-268-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/620-340-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/864-453-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1020-316-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1080-229-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1084-64-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1224-71-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1436-310-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1548-79-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1616-7-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1620-143-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1676-484-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1676-533-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1688-496-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1688-530-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1804-334-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1812-537-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1812-472-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1864-111-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1868-358-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1888-551-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1888-424-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1924-261-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2036-459-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2060-292-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2064-298-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2092-221-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2096-559-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2096-400-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2128-200-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2152-524-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2152-514-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2156-376-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2276-370-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2308-364-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2400-127-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2420-213-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2440-31-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2588-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2700-135-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2768-352-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2840-557-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2840-406-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2860-240-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2960-322-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3128-547-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3128-436-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3152-252-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3224-55-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3244-151-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3308-24-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3320-490-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3320-534-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3440-274-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3456-48-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3552-87-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3592-483-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3640-460-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3640-541-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3700-523-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3700-520-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3724-39-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3956-328-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3996-159-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4104-304-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4140-346-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4196-191-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4260-267-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4268-549-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4268-430-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4296-103-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4304-176-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4420-528-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4420-502-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4488-394-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4488-561-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4536-382-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4692-280-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4708-184-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4756-286-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4784-555-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4784-412-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4792-120-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4816-418-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4816-553-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4960-232-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4984-442-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4984-545-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5036-388-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5052-16-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5060-466-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5060-539-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5068-95-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5092-167-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5104-508-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/5104-526-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB