Analysis

  • max time kernel
    93s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 23:37

General

  • Target

    3a4e5f29de778d3c6c85cd3caa237ff0de23477ddef31127dab543c53bbca2d5.exe

  • Size

    70KB

  • MD5

    26a94394e256250ee719d25abd36934f

  • SHA1

    cb80771f15ae50d4907d7978e699da43bb2fd23b

  • SHA256

    3a4e5f29de778d3c6c85cd3caa237ff0de23477ddef31127dab543c53bbca2d5

  • SHA512

    c2d2faa1a671eb5da42aafbd09f78bbd110405afbfcb94766e7f13ea19efcf622629a191480f818700317a6cc6c7269a5a4d408e184a93ce3be151f8773939e0

  • SSDEEP

    1536:x+RH34FIaR8YdGlrA6b2LiRF+FoQs2jvB/w:K3haaJ0iRo68jvB/w

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a4e5f29de778d3c6c85cd3caa237ff0de23477ddef31127dab543c53bbca2d5.exe
    "C:\Users\Admin\AppData\Local\Temp\3a4e5f29de778d3c6c85cd3caa237ff0de23477ddef31127dab543c53bbca2d5.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Windows\SysWOW64\Oqfdnhfk.exe
      C:\Windows\system32\Oqfdnhfk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Windows\SysWOW64\Ocdqjceo.exe
        C:\Windows\system32\Ocdqjceo.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Windows\SysWOW64\Ogpmjb32.exe
          C:\Windows\system32\Ogpmjb32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1224
          • C:\Windows\SysWOW64\Ojoign32.exe
            C:\Windows\system32\Ojoign32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Windows\SysWOW64\Oddmdf32.exe
              C:\Windows\system32\Oddmdf32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3500
              • C:\Windows\SysWOW64\Ocgmpccl.exe
                C:\Windows\system32\Ocgmpccl.exe
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4840
                • C:\Windows\SysWOW64\Ojaelm32.exe
                  C:\Windows\system32\Ojaelm32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:840
                  • C:\Windows\SysWOW64\Pmoahijl.exe
                    C:\Windows\system32\Pmoahijl.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2708
                    • C:\Windows\SysWOW64\Pdfjifjo.exe
                      C:\Windows\system32\Pdfjifjo.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:5092
                      • C:\Windows\SysWOW64\Pgefeajb.exe
                        C:\Windows\system32\Pgefeajb.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:556
                        • C:\Windows\SysWOW64\Pnonbk32.exe
                          C:\Windows\system32\Pnonbk32.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1456
                          • C:\Windows\SysWOW64\Pqmjog32.exe
                            C:\Windows\system32\Pqmjog32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:3376
                            • C:\Windows\SysWOW64\Pclgkb32.exe
                              C:\Windows\system32\Pclgkb32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:1840
                              • C:\Windows\SysWOW64\Pfjcgn32.exe
                                C:\Windows\system32\Pfjcgn32.exe
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:3116
                                • C:\Windows\SysWOW64\Pnakhkol.exe
                                  C:\Windows\system32\Pnakhkol.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1552
                                  • C:\Windows\SysWOW64\Pmdkch32.exe
                                    C:\Windows\system32\Pmdkch32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:448
                                    • C:\Windows\SysWOW64\Pcncpbmd.exe
                                      C:\Windows\system32\Pcncpbmd.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:4256
                                      • C:\Windows\SysWOW64\Pflplnlg.exe
                                        C:\Windows\system32\Pflplnlg.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:916
                                        • C:\Windows\SysWOW64\Pncgmkmj.exe
                                          C:\Windows\system32\Pncgmkmj.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:4672
                                          • C:\Windows\SysWOW64\Pqbdjfln.exe
                                            C:\Windows\system32\Pqbdjfln.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of WriteProcessMemory
                                            PID:464
                                            • C:\Windows\SysWOW64\Pgllfp32.exe
                                              C:\Windows\system32\Pgllfp32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:4480
                                              • C:\Windows\SysWOW64\Pnfdcjkg.exe
                                                C:\Windows\system32\Pnfdcjkg.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:756
                                                • C:\Windows\SysWOW64\Pqdqof32.exe
                                                  C:\Windows\system32\Pqdqof32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  PID:2164
                                                  • C:\Windows\SysWOW64\Pcbmka32.exe
                                                    C:\Windows\system32\Pcbmka32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2760
                                                    • C:\Windows\SysWOW64\Pjmehkqk.exe
                                                      C:\Windows\system32\Pjmehkqk.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:4976
                                                      • C:\Windows\SysWOW64\Qmkadgpo.exe
                                                        C:\Windows\system32\Qmkadgpo.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4952
                                                        • C:\Windows\SysWOW64\Qdbiedpa.exe
                                                          C:\Windows\system32\Qdbiedpa.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          PID:740
                                                          • C:\Windows\SysWOW64\Qceiaa32.exe
                                                            C:\Windows\system32\Qceiaa32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies registry class
                                                            PID:4736
                                                            • C:\Windows\SysWOW64\Qjoankoi.exe
                                                              C:\Windows\system32\Qjoankoi.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:212
                                                              • C:\Windows\SysWOW64\Qnjnnj32.exe
                                                                C:\Windows\system32\Qnjnnj32.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4788
                                                                • C:\Windows\SysWOW64\Qqijje32.exe
                                                                  C:\Windows\system32\Qqijje32.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Modifies registry class
                                                                  PID:4560
                                                                  • C:\Windows\SysWOW64\Qddfkd32.exe
                                                                    C:\Windows\system32\Qddfkd32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4696
                                                                    • C:\Windows\SysWOW64\Anmjcieo.exe
                                                                      C:\Windows\system32\Anmjcieo.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3556
                                                                      • C:\Windows\SysWOW64\Aqkgpedc.exe
                                                                        C:\Windows\system32\Aqkgpedc.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:3520
                                                                        • C:\Windows\SysWOW64\Acjclpcf.exe
                                                                          C:\Windows\system32\Acjclpcf.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:864
                                                                          • C:\Windows\SysWOW64\Ageolo32.exe
                                                                            C:\Windows\system32\Ageolo32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            PID:1784
                                                                            • C:\Windows\SysWOW64\Ajckij32.exe
                                                                              C:\Windows\system32\Ajckij32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies registry class
                                                                              PID:612
                                                                              • C:\Windows\SysWOW64\Ambgef32.exe
                                                                                C:\Windows\system32\Ambgef32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                PID:3644
                                                                                • C:\Windows\SysWOW64\Aclpap32.exe
                                                                                  C:\Windows\system32\Aclpap32.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:4592
                                                                                  • C:\Windows\SysWOW64\Afjlnk32.exe
                                                                                    C:\Windows\system32\Afjlnk32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry class
                                                                                    PID:888
                                                                                    • C:\Windows\SysWOW64\Anadoi32.exe
                                                                                      C:\Windows\system32\Anadoi32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1540
                                                                                      • C:\Windows\SysWOW64\Amddjegd.exe
                                                                                        C:\Windows\system32\Amddjegd.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:3480
                                                                                        • C:\Windows\SysWOW64\Aeklkchg.exe
                                                                                          C:\Windows\system32\Aeklkchg.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4376
                                                                                          • C:\Windows\SysWOW64\Acnlgp32.exe
                                                                                            C:\Windows\system32\Acnlgp32.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:4940
                                                                                            • C:\Windows\SysWOW64\Afmhck32.exe
                                                                                              C:\Windows\system32\Afmhck32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2136
                                                                                              • C:\Windows\SysWOW64\Amgapeea.exe
                                                                                                C:\Windows\system32\Amgapeea.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2588
                                                                                                • C:\Windows\SysWOW64\Acqimo32.exe
                                                                                                  C:\Windows\system32\Acqimo32.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4868
                                                                                                  • C:\Windows\SysWOW64\Aminee32.exe
                                                                                                    C:\Windows\system32\Aminee32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:3940
                                                                                                    • C:\Windows\SysWOW64\Aepefb32.exe
                                                                                                      C:\Windows\system32\Aepefb32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Modifies registry class
                                                                                                      PID:1760
                                                                                                      • C:\Windows\SysWOW64\Accfbokl.exe
                                                                                                        C:\Windows\system32\Accfbokl.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:920
                                                                                                        • C:\Windows\SysWOW64\Bjmnoi32.exe
                                                                                                          C:\Windows\system32\Bjmnoi32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:3124
                                                                                                          • C:\Windows\SysWOW64\Bnhjohkb.exe
                                                                                                            C:\Windows\system32\Bnhjohkb.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Modifies registry class
                                                                                                            PID:868
                                                                                                            • C:\Windows\SysWOW64\Bagflcje.exe
                                                                                                              C:\Windows\system32\Bagflcje.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:1556
                                                                                                              • C:\Windows\SysWOW64\Bebblb32.exe
                                                                                                                C:\Windows\system32\Bebblb32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:4076
                                                                                                                • C:\Windows\SysWOW64\Bjokdipf.exe
                                                                                                                  C:\Windows\system32\Bjokdipf.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3460
                                                                                                                  • C:\Windows\SysWOW64\Bmngqdpj.exe
                                                                                                                    C:\Windows\system32\Bmngqdpj.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:428
                                                                                                                    • C:\Windows\SysWOW64\Beeoaapl.exe
                                                                                                                      C:\Windows\system32\Beeoaapl.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3616
                                                                                                                      • C:\Windows\SysWOW64\Bchomn32.exe
                                                                                                                        C:\Windows\system32\Bchomn32.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:1852
                                                                                                                        • C:\Windows\SysWOW64\Bffkij32.exe
                                                                                                                          C:\Windows\system32\Bffkij32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:4804
                                                                                                                          • C:\Windows\SysWOW64\Bmpcfdmg.exe
                                                                                                                            C:\Windows\system32\Bmpcfdmg.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4348
                                                                                                                            • C:\Windows\SysWOW64\Balpgb32.exe
                                                                                                                              C:\Windows\system32\Balpgb32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2736
                                                                                                                              • C:\Windows\SysWOW64\Bcjlcn32.exe
                                                                                                                                C:\Windows\system32\Bcjlcn32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Modifies registry class
                                                                                                                                PID:2412
                                                                                                                                • C:\Windows\SysWOW64\Bfhhoi32.exe
                                                                                                                                  C:\Windows\system32\Bfhhoi32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:3980
                                                                                                                                  • C:\Windows\SysWOW64\Ceckcp32.exe
                                                                                                                                    C:\Windows\system32\Ceckcp32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:5180
                                                                                                                                    • C:\Windows\SysWOW64\Chagok32.exe
                                                                                                                                      C:\Windows\system32\Chagok32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:5216
                                                                                                                                      • C:\Windows\SysWOW64\Cnkplejl.exe
                                                                                                                                        C:\Windows\system32\Cnkplejl.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5264
                                                                                                                                        • C:\Windows\SysWOW64\Cdhhdlid.exe
                                                                                                                                          C:\Windows\system32\Cdhhdlid.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:5304
                                                                                                                                          • C:\Windows\SysWOW64\Cffdpghg.exe
                                                                                                                                            C:\Windows\system32\Cffdpghg.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:5348
                                                                                                                                            • C:\Windows\SysWOW64\Cnnlaehj.exe
                                                                                                                                              C:\Windows\system32\Cnnlaehj.exe
                                                                                                                                              70⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:5388
                                                                                                                                              • C:\Windows\SysWOW64\Calhnpgn.exe
                                                                                                                                                C:\Windows\system32\Calhnpgn.exe
                                                                                                                                                71⤵
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:5428
                                                                                                                                                • C:\Windows\SysWOW64\Cegdnopg.exe
                                                                                                                                                  C:\Windows\system32\Cegdnopg.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5468
                                                                                                                                                  • C:\Windows\SysWOW64\Ddjejl32.exe
                                                                                                                                                    C:\Windows\system32\Ddjejl32.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:5508
                                                                                                                                                    • C:\Windows\SysWOW64\Dfiafg32.exe
                                                                                                                                                      C:\Windows\system32\Dfiafg32.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      PID:5548
                                                                                                                                                      • C:\Windows\SysWOW64\Dopigd32.exe
                                                                                                                                                        C:\Windows\system32\Dopigd32.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        PID:5588
                                                                                                                                                        • C:\Windows\SysWOW64\Danecp32.exe
                                                                                                                                                          C:\Windows\system32\Danecp32.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:5636
                                                                                                                                                          • C:\Windows\SysWOW64\Ddmaok32.exe
                                                                                                                                                            C:\Windows\system32\Ddmaok32.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:5684
                                                                                                                                                            • C:\Windows\SysWOW64\Djgjlelk.exe
                                                                                                                                                              C:\Windows\system32\Djgjlelk.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:5732
                                                                                                                                                              • C:\Windows\SysWOW64\Dmefhako.exe
                                                                                                                                                                C:\Windows\system32\Dmefhako.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:5772
                                                                                                                                                                • C:\Windows\SysWOW64\Daqbip32.exe
                                                                                                                                                                  C:\Windows\system32\Daqbip32.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:5812
                                                                                                                                                                  • C:\Windows\SysWOW64\Ddonekbl.exe
                                                                                                                                                                    C:\Windows\system32\Ddonekbl.exe
                                                                                                                                                                    81⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:5856
                                                                                                                                                                    • C:\Windows\SysWOW64\Dhkjej32.exe
                                                                                                                                                                      C:\Windows\system32\Dhkjej32.exe
                                                                                                                                                                      82⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:5896
                                                                                                                                                                      • C:\Windows\SysWOW64\Dkifae32.exe
                                                                                                                                                                        C:\Windows\system32\Dkifae32.exe
                                                                                                                                                                        83⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:5944
                                                                                                                                                                        • C:\Windows\SysWOW64\Dmgbnq32.exe
                                                                                                                                                                          C:\Windows\system32\Dmgbnq32.exe
                                                                                                                                                                          84⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:5984
                                                                                                                                                                          • C:\Windows\SysWOW64\Daconoae.exe
                                                                                                                                                                            C:\Windows\system32\Daconoae.exe
                                                                                                                                                                            85⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:6028
                                                                                                                                                                            • C:\Windows\SysWOW64\Ddakjkqi.exe
                                                                                                                                                                              C:\Windows\system32\Ddakjkqi.exe
                                                                                                                                                                              86⤵
                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:6064
                                                                                                                                                                              • C:\Windows\SysWOW64\Dhmgki32.exe
                                                                                                                                                                                C:\Windows\system32\Dhmgki32.exe
                                                                                                                                                                                87⤵
                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                PID:6116
                                                                                                                                                                                • C:\Windows\SysWOW64\Dkkcge32.exe
                                                                                                                                                                                  C:\Windows\system32\Dkkcge32.exe
                                                                                                                                                                                  88⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:808
                                                                                                                                                                                  • C:\Windows\SysWOW64\Dmjocp32.exe
                                                                                                                                                                                    C:\Windows\system32\Dmjocp32.exe
                                                                                                                                                                                    89⤵
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:2804
                                                                                                                                                                                    • C:\Windows\SysWOW64\Dhocqigp.exe
                                                                                                                                                                                      C:\Windows\system32\Dhocqigp.exe
                                                                                                                                                                                      90⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:3836
                                                                                                                                                                                      • C:\Windows\SysWOW64\Dgbdlf32.exe
                                                                                                                                                                                        C:\Windows\system32\Dgbdlf32.exe
                                                                                                                                                                                        91⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        PID:1336
                                                                                                                                                                                        • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                                                          C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                                                          92⤵
                                                                                                                                                                                            PID:5232
                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 396
                                                                                                                                                                                              93⤵
                                                                                                                                                                                              • Program crash
                                                                                                                                                                                              PID:5380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5232 -ip 5232
      1⤵
        PID:5332

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Ambgef32.exe

        Filesize

        70KB

        MD5

        835879640272af19616f3478eb37c36f

        SHA1

        8a764f81e4dd8e683de917029c2e9bf0e73fabf8

        SHA256

        934e69e1c651ce6abbfea643b4152981342aa8c72b0b57f3ecb678580ed567f1

        SHA512

        57bf022dbce0835e01ba18fbe2d340e1c56504537385b9a06da5864b22d0a76fbeff5721a45ffc32190ab2764717f133687a30aa5c264504977c56173148fbe1

      • C:\Windows\SysWOW64\Bjmnoi32.exe

        Filesize

        70KB

        MD5

        b8c484e118be54d3814545e059e43286

        SHA1

        d904a3696f7e236983b56d1e4c209f45852fb454

        SHA256

        dd6ff7f3f76a4326b961bb83ea071e2ed31431eabdeaa64955513eb986c2c475

        SHA512

        b63b05f150c2d9b91c734279c197a7c51631a193cf66dd541f0ec42783b6f922fc82390c716d4e5e2c294c04c2e5c59dc61d41108b7f815baac602a39b708c09

      • C:\Windows\SysWOW64\Dmjocp32.exe

        Filesize

        70KB

        MD5

        f678fe942971e9bf45450dd81712267a

        SHA1

        40e1d5afe5ede61e98db172e1cfb1703d453d285

        SHA256

        83e550083a34c89578a1aaa5fd918a59c8cca902d13c99e7512494b990236eeb

        SHA512

        c1ba0ccd1bdf664f586971e6f1dd345098b44c120821e07de2750fbac9e57717871c89ca597cbb1039a394f818b3cc85bf68afe029503fef4f7b4cf44bdc479b

      • C:\Windows\SysWOW64\Ocdqjceo.exe

        Filesize

        70KB

        MD5

        571c06840a3729da9eb6b29abdfc2c68

        SHA1

        cff37af7cd8553772da37b38121744e029939d97

        SHA256

        9b286849195d7ad44479b17ebe708399c4e6725c8d44f2594ca2a01e8176b5e8

        SHA512

        7ccd3acd5ec2174519c55dac9535aca2e43a2507fd931f321d8bf524f829c30bdde045e23aaab0421dec6b7d14b66cb37064f5d55568772094214f3e58135f95

      • C:\Windows\SysWOW64\Ocgmpccl.exe

        Filesize

        70KB

        MD5

        0083533c4fac5ad0de19db520b9455a3

        SHA1

        12aed4cac7a5d16bc4dd96ce7a0efad0dcbf29b8

        SHA256

        fb229ecec54ac036000f5c4bc63077776ce0aa135316b75a36cba9da5e5ff28b

        SHA512

        19bbb21d23920adaa3c4aa66a45015b4d2b8aa22e32295b41bc2862428e1bc7ed709502b2f7447dc4f1b386783d782aae645536cc04ca4af1dac0dc4067bb864

      • C:\Windows\SysWOW64\Oddmdf32.exe

        Filesize

        70KB

        MD5

        77304abf37c46a86c0fec9498bc72139

        SHA1

        ca2f4843fd0168467777c1fc58a7f2d0c4aa72a7

        SHA256

        9c8a963d3330c8a74eee7fdb94dd5de945f82c619f35ece4d0496618bddfd409

        SHA512

        1ea0358280b3e663fa62f01db52fb178d38ad2a8d705e7126e69896f662115f8530963e7b65a9a5e9359c2320cb53356581530e5e9d6c7cb273170398d400d51

      • C:\Windows\SysWOW64\Ogpmjb32.exe

        Filesize

        70KB

        MD5

        e8c30f3b936b5f407e4ed87ce4b835f3

        SHA1

        c7184ecdc80ac4418f1ee331a578d8b992a50f79

        SHA256

        a07421572d0a571ad46f1762ba1425043281c1525290671c2b0d8bf3aabeeebe

        SHA512

        2b99d3df29312fd6abf006646b2f1dc5823fc2279f060814178e46ab2b1a76f5066a0f3fe139aa6e1f1ca9b5edfd3b5aed7ac89157c07a27dceba65bbc96faf4

      • C:\Windows\SysWOW64\Ojaelm32.exe

        Filesize

        70KB

        MD5

        3c7cab0d2d2989e0428048bd9db67bc7

        SHA1

        e1526c7722c44c6265dd12e98e8dffa92e77d1fb

        SHA256

        f5051cd8acfb52ef5726d48c220d451855aeabecf81f77d28441780d99a8fc23

        SHA512

        bb74be7728092554ac5f2397cd6bb97ad7258320261fdcd342d7dbe14b74fabd31d6c9c12750885855cea7943a3794b0c4c590f5cbda6d6bdbe0d6ed69342272

      • C:\Windows\SysWOW64\Ojoign32.exe

        Filesize

        70KB

        MD5

        e297da04b6877263ac0a36f8345f73d4

        SHA1

        f43a05edbed6802d0c50e1c418a230faff161bc1

        SHA256

        88df1ac9ef66871227b7ee725e5bf0af39c629e3c4f9ff04569196df5d12351b

        SHA512

        7cd23d6aa27ffa262775870a753adebd6f8614e821d452149e508a875ab07ea5dc8ba81b0eb15315dbada380841d03242ec9d2e4a349eb48b1072379eb9b9002

      • C:\Windows\SysWOW64\Oqfdnhfk.exe

        Filesize

        70KB

        MD5

        e4720e0c8ace50cb694a421038b934e6

        SHA1

        fa0093a55a8812cad0ff12e07a3546f3d7ae51f1

        SHA256

        1cc5c0500d6c0ee61058ce7b2406e0258dbe0e927986306c41baf049be6d2f9f

        SHA512

        fc31344711b327725eef4f4bf25737f30ad0e7e107b90da82131100bc53bce503d54bcad8c33ea1479f4e5058c8250242e7fc6caac11f8f17d5cb06a55eb5e78

      • C:\Windows\SysWOW64\Pcbmka32.exe

        Filesize

        70KB

        MD5

        a438a8e152ac0b12f2d5aaa10eab3b4a

        SHA1

        34458ba3509e17bddecaf9f8814df826018c41f8

        SHA256

        614a39ab973c00cdb3628e4249c5fbb96ff810ab0fd9099545a213cfd0984b45

        SHA512

        5e0a9cd4af60ef47e1a95bc7542ed17b67563d59e682cc468ca570a222a353a5a761e7bf0ee7979d303781419dc8931cc3006b21c9f876be1018e4e37348ade7

      • C:\Windows\SysWOW64\Pclgkb32.exe

        Filesize

        70KB

        MD5

        f64cbf2f48577789b87bd21ceac10607

        SHA1

        6c3ca6237baede813404ecee88d1d841ee561ef4

        SHA256

        50a7f050a634dad2336c49a964ca593a66fcf66f62ec2f3de53ecad180e779b8

        SHA512

        7e15b428261b60e45fab0b7b4148aceff30240661523b6c9b21ff128cc7623edbd8322fbf15bffdbb9244d5617366545ce373380b59db556be76edafcbf9c85c

      • C:\Windows\SysWOW64\Pcncpbmd.exe

        Filesize

        70KB

        MD5

        4d63532030985a877805687bbe35473e

        SHA1

        164d0fcd0e5508c3024e6e3f69e4a040e1bab056

        SHA256

        34c411f105a14044ec11656a5a7cb18ee0e897e4224c1ab877d9e8152e8ef5b5

        SHA512

        0898a6bf7b7f4db15431b7c3222e24d2f032dea932265d36109106dbb1d47bf80569815119278fccfb75fd5814fe8e21a48b23a312c448bdc48fd7f896a40a40

      • C:\Windows\SysWOW64\Pdfjifjo.exe

        Filesize

        70KB

        MD5

        909dc236ca25e28a17f4e1a46030645f

        SHA1

        188898cf7089309eb4ef206260523c3fc793f75d

        SHA256

        6d8cc01312a8d689a0ad58aaca3c9f2895dca8c12bce888941de1cb3d2f082cd

        SHA512

        d69a43a2fed6ef56b88785dfd383828b4bf55543f41942abb3a0b4f1f6aada722a0997ee39d22d20c8e639b5472a3e1b684db34dd2013582e6a8a84f44a7057e

      • C:\Windows\SysWOW64\Pfjcgn32.exe

        Filesize

        70KB

        MD5

        54aea03a8e6cd079694bff8e80de5dc2

        SHA1

        58b6d75d9c28ecbc5423872d394eff4c1b6ef6b1

        SHA256

        2e0484325c3bd49beebb2834806a8d5dd0bb02e93f17fb90a3a9698b56a77623

        SHA512

        f533a82706b785d6a21aa9cb72f7b5207efa16000f084a495cb57341ee4d3c92f3b24410b7585f94209053cbe70f970b310a82be4d98bfb2473c9b67ecab93a3

      • C:\Windows\SysWOW64\Pflplnlg.exe

        Filesize

        70KB

        MD5

        6bf1d3d1e2ef83ab25a7a8debbdee678

        SHA1

        c472e279a859c0d00f51b0f82ef1a88c951c9c14

        SHA256

        802278fadba01a7bd7d5c70ac208363f7f059b4c95bd8d87396d6e65f08cd958

        SHA512

        97d5e9633a79552b4c74f7bf47d54567e7199385ce53e7cec88edea82c3f89f44f5a44c1800123e6edf3891d9a53141e68052c817de73887a5c4ed6e037bed51

      • C:\Windows\SysWOW64\Pgefeajb.exe

        Filesize

        70KB

        MD5

        acf550cd23f5e162b9f76591dfb26ed2

        SHA1

        ed8d7c02f8fd6f5c891dfa61377515b4cbab4eaf

        SHA256

        63ed3097e71b47513d6b782fafd0853a45c0a8d4fb43afc096d57808f919d5e8

        SHA512

        57f5cd4031d8b70c5a3921a4a54f051e637f1638e75b2bb8111187a8ca21287297839176b961d0d38bb980d3dfc71c593e1750e03684132c04b3f0789a9d8152

      • C:\Windows\SysWOW64\Pgllfp32.exe

        Filesize

        70KB

        MD5

        5baccc16b6019c10b39d9f0b2d319b78

        SHA1

        1638d327f9cb72329e32549c590ceaa9a86a8559

        SHA256

        a0c29789f34a63e364e36eabc7fbdd27d4fb9ee4865b829ea25688f1a5e27ec8

        SHA512

        6221757c3d3494dca2b2abadb21fe6c91e60ece6b6e01e6c75d5af674899d67957bed63802ea5595c9f03daeac2233308913120c4e00cdf235667f32c03f7e10

      • C:\Windows\SysWOW64\Pjmehkqk.exe

        Filesize

        70KB

        MD5

        1dced261b2939f50255a418a260c6450

        SHA1

        a37e936b4d7c8e5bcc44de60fd1f60f86ae52e20

        SHA256

        a449bb982ecf468754dd219c123dd62f341c1db5694678d90434114f19cb8a8e

        SHA512

        6fb52faac13b7723cb1dc1643b20f1a6d5603b30d7b9356b05869bdb075f758765a5a8c8988e020ed11e2756d3c47164eab000569ecf1301a8a93c8a7b9724ed

      • C:\Windows\SysWOW64\Pmdkch32.exe

        Filesize

        70KB

        MD5

        35ba7ec47fd65dc090e6eaaadb6e07e1

        SHA1

        cf6855d7e0aa20581dc226e8d165268094b4d75e

        SHA256

        35b3b6394363cf6573fc346ef4b520a9c074ce80325d1c9e5c55c16633244189

        SHA512

        bb6acd17802fe4c3c2f11d40a1777674c96bd6eff1ceeea6a03405c3d274f8ec6d678ae8265b8303d2ff92c1d25532cb2a387788fa36cdadeed5e833d3b92db4

      • C:\Windows\SysWOW64\Pmoahijl.exe

        Filesize

        70KB

        MD5

        b51cac062f428fafa2b9f1d291d0cde1

        SHA1

        239c2efed83ee4100ff53f89ab2c194bd86197c0

        SHA256

        ef32d6850dc3b0f811825192a68c25eebc7047d959ef887d871bac02fd53b084

        SHA512

        9e6ea0d577a157811645c7a30f6f989048e499b6271f011a6f9e3b367326062c88797916d61c13664ec8a2adeda0948a6ac7963e88ca1431b8194eaf4eaa4af1

      • C:\Windows\SysWOW64\Pnakhkol.exe

        Filesize

        70KB

        MD5

        e97510f0092d8866ccf37ab6f7a3b31b

        SHA1

        6e2bbda1a2def4c2aae2e6451fdd1e16b3077912

        SHA256

        e1a15caefcdd11a7ed6c5e47da79219ea9e7b65c2b36900df768cef0f568e736

        SHA512

        46dc531e7414ee81a655e67f06980e5ee00ed7955e2e1928a53a96da1406d672c828159df9d743a6ab9aefc16a1d32b94ef5677eb5d329481523b3f9a16de5ea

      • C:\Windows\SysWOW64\Pncgmkmj.exe

        Filesize

        70KB

        MD5

        d140065a4d207356bc682ee8ef442190

        SHA1

        3452398795ce40cf37cb4d52d0ca7b5134c4a374

        SHA256

        b9c7d795efdf42dceb7da8461335a416569ded7d8116013f1567045bc489f6f8

        SHA512

        6cf9b44b9f9737a438cc36c5404be21c84e1798f9c4f99a763c7de7efb6e0b401865017b445a0eb1bde8a7a3fccb25e2833863bf2980b62a90e2710294ba3abb

      • C:\Windows\SysWOW64\Pnfdcjkg.exe

        Filesize

        70KB

        MD5

        c4a0010bb48dacb5748dd2b0edc4d13d

        SHA1

        0d0acb6e657b86fc70433b79274d29f8467351d8

        SHA256

        24c35b27dd84d7cb0d9245511150641abf016f579a454102d8debcb107e6ea99

        SHA512

        0318cca741603dd64db4783091ddf99529af76c6b2ca92feb338f322e35c620363a3f41ce3e2c9a3defa819a91683242933e64581a2fee1d2fb810b6a1f6f586

      • C:\Windows\SysWOW64\Pnonbk32.exe

        Filesize

        70KB

        MD5

        8681063532cf940fce9febb4996b2ffd

        SHA1

        7bc879eba50f2527eea1bd4a1369897c97d51b3b

        SHA256

        64c31e466d3098e6efbeefa89d5c82e64d57e7d557afce22b31988c8ae2b60f2

        SHA512

        e1983e94c7c439d7c9614d245c20e511277b4ad054ebd31ab3383ac7070fc6f8943497738fa61dcc9d2093eefbc7f7e20f540afd2d5d56e8a01e1a0670426525

      • C:\Windows\SysWOW64\Pqbdjfln.exe

        Filesize

        70KB

        MD5

        0c82d35968afdc332efe374b4b016eae

        SHA1

        3c66e2cedc4053ae612d0ad8c6e1c98b86941198

        SHA256

        385244d30edfcb3c62cad030c7624a9d1f20202ac25cd506bc4e6d9ca28a7aab

        SHA512

        805c97ddf2fa71e013800731d6bec6905a6cbd28e5bb16a9b21e89458a6c7fb4e590da7a794c9bc13fd0912445446257d390a5060b65a3dd7b4819a72bffa994

      • C:\Windows\SysWOW64\Pqdqof32.exe

        Filesize

        70KB

        MD5

        faee80983a5cc611a17fc18cf0352a02

        SHA1

        d422e2670fb1715d058d491667982ffefee8c44c

        SHA256

        2eede6ebe6c91ec5a48551ee5180777d3711b3239433a581374d63e2da7e22be

        SHA512

        cbc029920d4b39222052d9bfb59934de372fa90d3e659158445709d00ffc377327588622042516358ca755a3d8ec66e6917f0cb986451c63edea6bec57ce8ec8

      • C:\Windows\SysWOW64\Pqmjog32.exe

        Filesize

        70KB

        MD5

        300cc993acfa3363fa96bdabb33fdb0c

        SHA1

        22799d6fdea5ff0e4ef5a685cbc7a69c5675d12b

        SHA256

        d4854950e2592acc753c4a6871f09ddef065ef54a53f3ef128ecbf4dcf5826f0

        SHA512

        de08f7eec425be92e587ff5b6d25c90e691a280690aea8ad7bd7552dee33f31ff4dea3c67a7a4f5a781865df622587e45ae657830452c560848cde17ed56753f

      • C:\Windows\SysWOW64\Qceiaa32.exe

        Filesize

        70KB

        MD5

        8f01e6bf17f6b60526247b683080fd27

        SHA1

        2afe59a92f658f67a1786f493453fcfdff18a308

        SHA256

        6e0c6693f602019247ac9f6cdae8dc09f37528a12c73ab2eae260a87d30f8fe7

        SHA512

        58076c4c8a1a1a20e894612a9399aee95d1aff473e58d9292b409c3c97479c4fd3fc514421af6dee79a06df1aa8eae1a93a6624050b5a828f3ada7e5e4ae0ddd

      • C:\Windows\SysWOW64\Qdbiedpa.exe

        Filesize

        70KB

        MD5

        e8e7d2b1b6496cb970c495130e390b32

        SHA1

        a03ad1f3cf63f6e8a58da7ea3e8d0df690e8f63b

        SHA256

        21ca6ab69d95b5fbe993501090e68ac0cd964b0637fc6aa0dc347b1e7242a5a8

        SHA512

        f15646dd1b386757e52226ccc18765711cd5e8154fee5e4b1910fb83d41fb167a9d57239c27a7ee639a737b78ad748f1692756af2a9e88b00f4472e182f84192

      • C:\Windows\SysWOW64\Qddfkd32.exe

        Filesize

        70KB

        MD5

        6892b961e7ab7ac588c54d2af673528f

        SHA1

        769e620646395419d2a9c750e7bce1ed40b409dc

        SHA256

        3c7a8c5ab390f0691fc1edc5d39e05edfcb96fcee36a7f23ed4ded179835ef4e

        SHA512

        dcf32a6d8ecc5a2bb9fa2b9dd17703cbab02d2e08085ec48d59330e810d6a687c7ea974ce5d4774af49671d4d63407a8e8b4ac4ec84188153cde7f3b9e558440

      • C:\Windows\SysWOW64\Qjoankoi.exe

        Filesize

        70KB

        MD5

        2acb1bd373355b6bf1ec08ecce3c1bfb

        SHA1

        45f1aaaa89d578276a5ad50290b5492de6b9b2db

        SHA256

        29521d4bca1a3fa6d36f1ab60eeab56ae826b535954592fefbf001710a2abec2

        SHA512

        e7f607312ae37c5f2192e033e210b70298f9704bb2dd52a154a58315dcee55665399758a2e987030d84af83dc5853d1acabd88702a3e396d8ee60c1dfe2d5d4e

      • C:\Windows\SysWOW64\Qmkadgpo.exe

        Filesize

        70KB

        MD5

        5deae046bd380d8805f25f49d1a2b47d

        SHA1

        626f6fcc9c4b777a9e66e9d2214e5049aaa08b98

        SHA256

        6b528aa0f20e4e3d8f6d00d3f4574a68488affda84b294ef6be1346fd9bb36e7

        SHA512

        54980c70f85c99c660dcf3952fc12bf1d096b3a48e756c89f9d1ffcfe307b11acbc79be40b0cb0eeb7673cc42b70b7fd3aa574a0208caffce1ca61422849cf9a

      • C:\Windows\SysWOW64\Qnjnnj32.exe

        Filesize

        70KB

        MD5

        3d4b99de3351015a018acfd355c09385

        SHA1

        c207c7c47a54aa7758441f630084e3fb2905b0e2

        SHA256

        ab6b34fb6811e31ea463e4d9756d35ac86cc731c79799421fba149dd67a2a9dd

        SHA512

        9979f7a9acc9f5bc1e000048c7036cb6cf4aa43a215080f1133ede22a1c72edaed9ad11f9ebe9a4aefaaeacd98cede293e5d598c51f03009cdeeb1feedb71534

      • C:\Windows\SysWOW64\Qqijje32.exe

        Filesize

        70KB

        MD5

        a11961a23363130144cd3cc5bf9c41d4

        SHA1

        347ceaf4c849814dd242630b63da1a05878d401b

        SHA256

        2f6c089f4cbf996dc9fcd4d30a2719ab94b9a88c1fed99a7b0ec4aa8f81173c0

        SHA512

        b85369d8eedd81df3f605a9dfc6d5bdec3349fd4d08a12de6c7747ad48e89bd1c6181d4b93ec95e5a096da98e2929eb41ae76d09937fdd3a397d73c76d63a512

      • memory/212-237-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/428-401-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/448-128-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/464-160-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/556-80-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/612-287-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/740-216-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/756-177-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/808-593-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/840-56-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/840-592-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/864-279-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/868-377-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/888-305-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/916-144-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/920-365-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1224-29-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1284-21-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1456-88-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1540-311-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1552-121-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1556-383-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1728-32-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1728-571-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1760-359-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1784-281-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1840-105-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1852-413-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2136-335-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2164-184-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2412-437-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2588-341-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2708-64-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2708-599-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2736-431-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2760-192-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2804-628-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3116-113-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3124-371-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3376-96-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3460-395-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3480-317-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3500-578-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3500-40-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3520-269-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3556-263-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3616-407-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3644-293-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3940-353-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3980-443-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4076-389-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4228-9-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4228-552-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4256-137-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4348-425-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4376-323-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4480-168-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4560-248-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4592-299-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4672-153-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4696-256-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4736-224-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4788-245-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4804-419-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4840-589-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4840-48-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4868-347-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4940-329-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4952-208-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4960-539-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4960-0-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4960-1-0x0000000000431000-0x0000000000432000-memory.dmp

        Filesize

        4KB

      • memory/4976-200-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5092-72-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5180-453-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5216-455-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5264-461-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5304-467-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5348-473-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5388-479-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5428-486-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5468-491-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5508-497-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5548-507-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5588-509-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5636-519-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5684-521-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5732-527-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5772-533-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5812-540-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5856-546-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5896-553-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5944-559-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5984-565-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/6028-576-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/6064-579-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/6116-590-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB