Analysis
-
max time kernel
137s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 00:24
Behavioral task
behavioral1
Sample
1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe
-
Size
113KB
-
MD5
1d8be59c6082e5caeb694e2b42f963d0
-
SHA1
5439240651745171b71b4393ecf90d7480c99499
-
SHA256
706613d3518c27f800d07ab0392dbe676ade7c862a1bb8e828ee97c96e36e777
-
SHA512
0879cb7c9731737bea4bf27bd3d2bc641c84e999f2bdf2fd03f78bc0296f47218bcb76b7a951f5d2f64741c14bcce8aad1515c92fd8ffc04f1e432ef4588782f
-
SSDEEP
1536:H+lg6DUtF0Z+/rX0KbjoO617DWkZFfScD7SzCbHWrAW8wTWiliX:HYS9PbjoOuGkZFfFSebHWrH8wTW0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jbhmdbnp.exeJkdnpo32.exeLmqgnhmp.exeLpfijcfl.exeMgnnhk32.exeJibeql32.exeJjbako32.exeJiikak32.exeMjjmog32.exeNdghmo32.exeIiibkn32.exeIapjlk32.exeLaalifad.exeJpojcf32.exeKbapjafe.exeKilhgk32.exeKknafn32.exeNgpjnkpf.exeNnolfdcn.exeIannfk32.exeIpegmg32.exeKckbqpnj.exeMciobn32.exeMpdelajl.exeNcgkcl32.exeIcljbg32.exeJbocea32.exeLcgblncm.exeJjmhppqd.exeJangmibi.exeKpccnefa.exeLgkhlnbn.exeNqiogp32.exeKbfiep32.exeKmnjhioc.exeLcdegnep.exeMjcgohig.exeMajopeii.exeNjacpf32.exeIfmcdblq.exeLpocjdld.exeLknjmkdo.exeNbhkac32.exeKkpnlm32.exeNdbnboqb.exeLnhmng32.exeMgidml32.exeNqfbaq32.exeIjfboafl.exe1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhmdbnp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkdnpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmqgnhmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpfijcfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jibeql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjbako32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiikak32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjjmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjjmog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndghmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiibkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iapjlk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpojcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbapjafe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kknafn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngpjnkpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iannfk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipegmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jibeql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kckbqpnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mciobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpdelajl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncgkcl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbocea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcgblncm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjmhppqd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jangmibi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpccnefa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgkhlnbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqiogp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbfiep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmnjhioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcdegnep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjcgohig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Majopeii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqiogp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njacpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiibkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifmcdblq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpocjdld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbhkac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iannfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbhmdbnp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkpnlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpocjdld.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpdelajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndbnboqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngpjnkpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iapjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnhmng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lknjmkdo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgidml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndghmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijfboafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijfboafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkpnlm32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral2/memory/2348-0-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Iiffen32.exe family_berbew C:\Windows\SysWOW64\Iannfk32.exe family_berbew behavioral2/memory/2328-13-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Icljbg32.exe family_berbew C:\Windows\SysWOW64\Ibojncfj.exe family_berbew behavioral2/memory/2520-44-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Iiibkn32.exe family_berbew behavioral2/memory/2820-52-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Imdnklfp.exe family_berbew behavioral2/memory/3100-60-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Iapjlk32.exe family_berbew C:\Windows\SysWOW64\Ijfboafl.exe family_berbew behavioral2/memory/1080-64-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/4696-36-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/940-28-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/2524-21-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Ifmcdblq.exe family_berbew behavioral2/memory/4872-76-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Iikopmkd.exe family_berbew behavioral2/memory/4400-79-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Ipegmg32.exe family_berbew behavioral2/memory/2540-88-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Ifopiajn.exe family_berbew behavioral2/memory/2796-96-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Iinlemia.exe family_berbew behavioral2/memory/4680-103-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jdcpcf32.exe family_berbew behavioral2/memory/4452-111-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jjmhppqd.exe family_berbew behavioral2/memory/2764-120-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jmkdlkph.exe family_berbew behavioral2/memory/224-127-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jbhmdbnp.exe family_berbew behavioral2/memory/4408-136-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jibeql32.exe family_berbew behavioral2/memory/4264-144-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jplmmfmi.exe family_berbew behavioral2/memory/388-152-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jbkjjblm.exe family_berbew behavioral2/memory/3280-163-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jjbako32.exe family_berbew behavioral2/memory/1664-167-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jpojcf32.exe family_berbew behavioral2/memory/3952-176-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jbmfoa32.exe family_berbew behavioral2/memory/4904-184-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jkdnpo32.exe family_berbew behavioral2/memory/412-192-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jangmibi.exe family_berbew behavioral2/memory/3428-199-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jbocea32.exe family_berbew behavioral2/memory/1520-212-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Jiikak32.exe family_berbew behavioral2/memory/1800-216-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Kpccnefa.exe family_berbew behavioral2/memory/1684-224-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Kbapjafe.exe family_berbew behavioral2/memory/4756-232-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Kilhgk32.exe family_berbew behavioral2/memory/948-245-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Kacphh32.exe family_berbew behavioral2/memory/4364-247-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew C:\Windows\SysWOW64\Kaemnhla.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Iiffen32.exeIannfk32.exeIcljbg32.exeIbojncfj.exeIjfboafl.exeIiibkn32.exeImdnklfp.exeIapjlk32.exeIfmcdblq.exeIikopmkd.exeIpegmg32.exeIfopiajn.exeIinlemia.exeJdcpcf32.exeJjmhppqd.exeJmkdlkph.exeJbhmdbnp.exeJibeql32.exeJplmmfmi.exeJbkjjblm.exeJjbako32.exeJpojcf32.exeJbmfoa32.exeJkdnpo32.exeJangmibi.exeJbocea32.exeJiikak32.exeKpccnefa.exeKbapjafe.exeKilhgk32.exeKacphh32.exeKaemnhla.exeKbfiep32.exeKknafn32.exeKmlnbi32.exeKagichjo.exeKcifkp32.exeKkpnlm32.exeKmnjhioc.exeKpmfddnf.exeKckbqpnj.exeKkbkamnl.exeLmqgnhmp.exeLpocjdld.exeLcmofolg.exeLkdggmlj.exeLmccchkn.exeLpappc32.exeLgkhlnbn.exeLijdhiaa.exeLaalifad.exeLdohebqh.exeLgneampk.exeLnhmng32.exeLpfijcfl.exeLcdegnep.exeLklnhlfb.exeLnjjdgee.exeLphfpbdi.exeLcgblncm.exeLknjmkdo.exeMahbje32.exeMdfofakp.exeMciobn32.exepid process 2328 Iiffen32.exe 2524 Iannfk32.exe 940 Icljbg32.exe 4696 Ibojncfj.exe 2520 Ijfboafl.exe 2820 Iiibkn32.exe 3100 Imdnklfp.exe 1080 Iapjlk32.exe 4872 Ifmcdblq.exe 4400 Iikopmkd.exe 2540 Ipegmg32.exe 2796 Ifopiajn.exe 4680 Iinlemia.exe 4452 Jdcpcf32.exe 2764 Jjmhppqd.exe 224 Jmkdlkph.exe 4408 Jbhmdbnp.exe 4264 Jibeql32.exe 388 Jplmmfmi.exe 3280 Jbkjjblm.exe 1664 Jjbako32.exe 3952 Jpojcf32.exe 4904 Jbmfoa32.exe 412 Jkdnpo32.exe 3428 Jangmibi.exe 1520 Jbocea32.exe 1800 Jiikak32.exe 1684 Kpccnefa.exe 4756 Kbapjafe.exe 948 Kilhgk32.exe 4364 Kacphh32.exe 2768 Kaemnhla.exe 2572 Kbfiep32.exe 1536 Kknafn32.exe 332 Kmlnbi32.exe 4444 Kagichjo.exe 748 Kcifkp32.exe 1716 Kkpnlm32.exe 2364 Kmnjhioc.exe 4760 Kpmfddnf.exe 1116 Kckbqpnj.exe 2908 Kkbkamnl.exe 4656 Lmqgnhmp.exe 5104 Lpocjdld.exe 1064 Lcmofolg.exe 4268 Lkdggmlj.exe 1528 Lmccchkn.exe 4100 Lpappc32.exe 3104 Lgkhlnbn.exe 4604 Lijdhiaa.exe 4648 Laalifad.exe 4536 Ldohebqh.exe 512 Lgneampk.exe 868 Lnhmng32.exe 4592 Lpfijcfl.exe 2256 Lcdegnep.exe 892 Lklnhlfb.exe 2344 Lnjjdgee.exe 3264 Lphfpbdi.exe 3888 Lcgblncm.exe 1532 Lknjmkdo.exe 1660 Mahbje32.exe 636 Mdfofakp.exe 4992 Mciobn32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kbapjafe.exeKpmfddnf.exeLpocjdld.exeMdmegp32.exeMjjmog32.exeMgnnhk32.exeJmkdlkph.exeJpojcf32.exeLdohebqh.exeJjmhppqd.exeKckbqpnj.exeLgneampk.exeLcdegnep.exeMaohkd32.exeJbmfoa32.exeKpccnefa.exeKaemnhla.exeKkpnlm32.exeLcmofolg.exeLknjmkdo.exeNqiogp32.exeIiibkn32.exeJibeql32.exeJbocea32.exeKknafn32.exeIiffen32.exeJplmmfmi.exeJjbako32.exeMjcgohig.exeMpolqa32.exeNgpjnkpf.exeLaalifad.exeNqmhbpba.exeIbojncfj.exeNcgkcl32.exeNnolfdcn.exeKmlnbi32.exeIinlemia.exeKmnjhioc.exeNjacpf32.exeKbfiep32.exeKagichjo.exeLklnhlfb.exeMciobn32.exeMgghhlhq.exeMpdelajl.exeJbkjjblm.exeLmqgnhmp.exeMajopeii.exeMjhqjg32.exeNgedij32.exedescription ioc process File created C:\Windows\SysWOW64\Kkdeek32.dll Kbapjafe.exe File opened for modification C:\Windows\SysWOW64\Kckbqpnj.exe Kpmfddnf.exe File created C:\Windows\SysWOW64\Offdjb32.dll Lpocjdld.exe File created C:\Windows\SysWOW64\Mjjmog32.exe Mdmegp32.exe File created C:\Windows\SysWOW64\Gbbkdl32.dll Mjjmog32.exe File created C:\Windows\SysWOW64\Nkjjij32.exe Mgnnhk32.exe File created C:\Windows\SysWOW64\Bgllgqcp.dll Jmkdlkph.exe File created C:\Windows\SysWOW64\Jbmfoa32.exe Jpojcf32.exe File opened for modification C:\Windows\SysWOW64\Lgneampk.exe Ldohebqh.exe File created C:\Windows\SysWOW64\Jmkdlkph.exe Jjmhppqd.exe File created C:\Windows\SysWOW64\Kkbkamnl.exe Kckbqpnj.exe File opened for modification C:\Windows\SysWOW64\Lnhmng32.exe Lgneampk.exe File created C:\Windows\SysWOW64\Dnapla32.dll Lgneampk.exe File created C:\Windows\SysWOW64\Bheenp32.dll Lcdegnep.exe File created C:\Windows\SysWOW64\Fneiph32.dll Maohkd32.exe File created C:\Windows\SysWOW64\Egqcbapl.dll Mgnnhk32.exe File opened for modification C:\Windows\SysWOW64\Jkdnpo32.exe Jbmfoa32.exe File created C:\Windows\SysWOW64\Lmmcfa32.dll Kpccnefa.exe File created C:\Windows\SysWOW64\Ppaaagol.dll Kaemnhla.exe File opened for modification C:\Windows\SysWOW64\Kmnjhioc.exe Kkpnlm32.exe File created C:\Windows\SysWOW64\Lkdggmlj.exe Lcmofolg.exe File created C:\Windows\SysWOW64\Ibhblqpo.dll Lknjmkdo.exe File created C:\Windows\SysWOW64\Pipfna32.dll Nqiogp32.exe File created C:\Windows\SysWOW64\Imdnklfp.exe Iiibkn32.exe File opened for modification C:\Windows\SysWOW64\Jplmmfmi.exe Jibeql32.exe File opened for modification C:\Windows\SysWOW64\Jiikak32.exe Jbocea32.exe File opened for modification C:\Windows\SysWOW64\Kilhgk32.exe Kbapjafe.exe File created C:\Windows\SysWOW64\Akanejnd.dll Kknafn32.exe File created C:\Windows\SysWOW64\Iannfk32.exe Iiffen32.exe File created C:\Windows\SysWOW64\Ibimpp32.dll Jplmmfmi.exe File opened for modification C:\Windows\SysWOW64\Jpojcf32.exe Jjbako32.exe File created C:\Windows\SysWOW64\Kmlnbi32.exe Kknafn32.exe File opened for modification C:\Windows\SysWOW64\Majopeii.exe Mjcgohig.exe File created C:\Windows\SysWOW64\Cnacjn32.dll Mpolqa32.exe File opened for modification C:\Windows\SysWOW64\Nklfoi32.exe Ngpjnkpf.exe File created C:\Windows\SysWOW64\Ldohebqh.exe Laalifad.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Nqmhbpba.exe File opened for modification C:\Windows\SysWOW64\Ijfboafl.exe Ibojncfj.exe File opened for modification C:\Windows\SysWOW64\Mgidml32.exe Mpolqa32.exe File created C:\Windows\SysWOW64\Lmbnpm32.dll Ncgkcl32.exe File opened for modification C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe File opened for modification C:\Windows\SysWOW64\Kagichjo.exe Kmlnbi32.exe File opened for modification C:\Windows\SysWOW64\Mdmegp32.exe Maohkd32.exe File created C:\Windows\SysWOW64\Jgiacnii.dll Iinlemia.exe File opened for modification C:\Windows\SysWOW64\Kpmfddnf.exe Kmnjhioc.exe File created C:\Windows\SysWOW64\Ipkobd32.dll Njacpf32.exe File opened for modification C:\Windows\SysWOW64\Kknafn32.exe Kbfiep32.exe File opened for modification C:\Windows\SysWOW64\Kcifkp32.exe Kagichjo.exe File created C:\Windows\SysWOW64\Lcmofolg.exe Lpocjdld.exe File created C:\Windows\SysWOW64\Fldggfbc.dll Lklnhlfb.exe File opened for modification C:\Windows\SysWOW64\Mjcgohig.exe Mciobn32.exe File opened for modification C:\Windows\SysWOW64\Mpolqa32.exe Mgghhlhq.exe File opened for modification C:\Windows\SysWOW64\Mdpalp32.exe Mpdelajl.exe File created C:\Windows\SysWOW64\Feambf32.dll Jbkjjblm.exe File created C:\Windows\SysWOW64\Jeiooj32.dll Jpojcf32.exe File created C:\Windows\SysWOW64\Mjcgohig.exe Mciobn32.exe File created C:\Windows\SysWOW64\Jchbak32.dll Lmqgnhmp.exe File opened for modification C:\Windows\SysWOW64\Mgghhlhq.exe Majopeii.exe File created C:\Windows\SysWOW64\Pbcfgejn.dll Mjhqjg32.exe File opened for modification C:\Windows\SysWOW64\Njcpee32.exe Ngedij32.exe File created C:\Windows\SysWOW64\Fbkmec32.dll Jjbako32.exe File created C:\Windows\SysWOW64\Bgcomh32.dll Laalifad.exe File created C:\Windows\SysWOW64\Mgidml32.exe Mpolqa32.exe File created C:\Windows\SysWOW64\Mdmegp32.exe Maohkd32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5284 5188 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
Jjbako32.exeMdfofakp.exeIcljbg32.exeIapjlk32.exeKacphh32.exeLnhmng32.exeMpolqa32.exeKagichjo.exeJbocea32.exeLgneampk.exeJjmhppqd.exeJmkdlkph.exeJkdnpo32.exeLcgblncm.exeNkjjij32.exeIannfk32.exeJdcpcf32.exeLkdggmlj.exe1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exeJibeql32.exeMahbje32.exeMajopeii.exeNqfbaq32.exeNcgkcl32.exeKbapjafe.exeLaalifad.exeNqiogp32.exeNjcpee32.exeIbojncfj.exeIjfboafl.exeKaemnhla.exeKckbqpnj.exeLmqgnhmp.exeLknjmkdo.exeKkpnlm32.exeNjacpf32.exeNqmhbpba.exeNnolfdcn.exeIfmcdblq.exeIikopmkd.exeJpojcf32.exeJiikak32.exeLcmofolg.exeNgedij32.exeIiffen32.exeKilhgk32.exeMgghhlhq.exeLdohebqh.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjbako32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fojkiimn.dll" Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iapjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kacphh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpolqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kagichjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icljbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbocea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgneampk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjmhppqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgllgqcp.dll" Jmkdlkph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lppaheqp.dll" Jkdnpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcgblncm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmkdlkph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iannfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjobcj32.dll" Jdcpcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dendnoah.dll" Iannfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkdggmlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbbjnidp.dll" Jibeql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flfmin32.dll" Mahbje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agbnmibj.dll" Majopeii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmbnpm32.dll" Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkdeek32.dll" Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Laalifad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqiogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pipfna32.dll" Nqiogp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgcomh32.dll" Laalifad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibojncfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijfboafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdcpcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jflepa32.dll" Jbocea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kaemnhla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kckbqpnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbocea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmqgnhmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dihcoe32.dll" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkpnlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kckbqpnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njacpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifmcdblq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kflflhfg.dll" Iikopmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpojcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jiikak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgejif32.dll" Lcmofolg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibhblqpo.dll" Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddpfgd32.dll" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmebabl.dll" Iiffen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kilhgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kacphh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnapla32.dll" Lgneampk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odegmceb.dll" Mgghhlhq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibojncfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbocda32.dll" Ldohebqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqmhbpba.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exeIiffen32.exeIannfk32.exeIcljbg32.exeIbojncfj.exeIjfboafl.exeIiibkn32.exeImdnklfp.exeIapjlk32.exeIfmcdblq.exeIikopmkd.exeIpegmg32.exeIfopiajn.exeIinlemia.exeJdcpcf32.exeJjmhppqd.exeJmkdlkph.exeJbhmdbnp.exeJibeql32.exeJplmmfmi.exeJbkjjblm.exeJjbako32.exedescription pid process target process PID 2348 wrote to memory of 2328 2348 1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe Iiffen32.exe PID 2348 wrote to memory of 2328 2348 1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe Iiffen32.exe PID 2348 wrote to memory of 2328 2348 1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe Iiffen32.exe PID 2328 wrote to memory of 2524 2328 Iiffen32.exe Iannfk32.exe PID 2328 wrote to memory of 2524 2328 Iiffen32.exe Iannfk32.exe PID 2328 wrote to memory of 2524 2328 Iiffen32.exe Iannfk32.exe PID 2524 wrote to memory of 940 2524 Iannfk32.exe Icljbg32.exe PID 2524 wrote to memory of 940 2524 Iannfk32.exe Icljbg32.exe PID 2524 wrote to memory of 940 2524 Iannfk32.exe Icljbg32.exe PID 940 wrote to memory of 4696 940 Icljbg32.exe Ibojncfj.exe PID 940 wrote to memory of 4696 940 Icljbg32.exe Ibojncfj.exe PID 940 wrote to memory of 4696 940 Icljbg32.exe Ibojncfj.exe PID 4696 wrote to memory of 2520 4696 Ibojncfj.exe Ijfboafl.exe PID 4696 wrote to memory of 2520 4696 Ibojncfj.exe Ijfboafl.exe PID 4696 wrote to memory of 2520 4696 Ibojncfj.exe Ijfboafl.exe PID 2520 wrote to memory of 2820 2520 Ijfboafl.exe Iiibkn32.exe PID 2520 wrote to memory of 2820 2520 Ijfboafl.exe Iiibkn32.exe PID 2520 wrote to memory of 2820 2520 Ijfboafl.exe Iiibkn32.exe PID 2820 wrote to memory of 3100 2820 Iiibkn32.exe Imdnklfp.exe PID 2820 wrote to memory of 3100 2820 Iiibkn32.exe Imdnklfp.exe PID 2820 wrote to memory of 3100 2820 Iiibkn32.exe Imdnklfp.exe PID 3100 wrote to memory of 1080 3100 Imdnklfp.exe Iapjlk32.exe PID 3100 wrote to memory of 1080 3100 Imdnklfp.exe Iapjlk32.exe PID 3100 wrote to memory of 1080 3100 Imdnklfp.exe Iapjlk32.exe PID 1080 wrote to memory of 4872 1080 Iapjlk32.exe Ifmcdblq.exe PID 1080 wrote to memory of 4872 1080 Iapjlk32.exe Ifmcdblq.exe PID 1080 wrote to memory of 4872 1080 Iapjlk32.exe Ifmcdblq.exe PID 4872 wrote to memory of 4400 4872 Ifmcdblq.exe Iikopmkd.exe PID 4872 wrote to memory of 4400 4872 Ifmcdblq.exe Iikopmkd.exe PID 4872 wrote to memory of 4400 4872 Ifmcdblq.exe Iikopmkd.exe PID 4400 wrote to memory of 2540 4400 Iikopmkd.exe Ipegmg32.exe PID 4400 wrote to memory of 2540 4400 Iikopmkd.exe Ipegmg32.exe PID 4400 wrote to memory of 2540 4400 Iikopmkd.exe Ipegmg32.exe PID 2540 wrote to memory of 2796 2540 Ipegmg32.exe Ifopiajn.exe PID 2540 wrote to memory of 2796 2540 Ipegmg32.exe Ifopiajn.exe PID 2540 wrote to memory of 2796 2540 Ipegmg32.exe Ifopiajn.exe PID 2796 wrote to memory of 4680 2796 Ifopiajn.exe Iinlemia.exe PID 2796 wrote to memory of 4680 2796 Ifopiajn.exe Iinlemia.exe PID 2796 wrote to memory of 4680 2796 Ifopiajn.exe Iinlemia.exe PID 4680 wrote to memory of 4452 4680 Iinlemia.exe Jdcpcf32.exe PID 4680 wrote to memory of 4452 4680 Iinlemia.exe Jdcpcf32.exe PID 4680 wrote to memory of 4452 4680 Iinlemia.exe Jdcpcf32.exe PID 4452 wrote to memory of 2764 4452 Jdcpcf32.exe Jjmhppqd.exe PID 4452 wrote to memory of 2764 4452 Jdcpcf32.exe Jjmhppqd.exe PID 4452 wrote to memory of 2764 4452 Jdcpcf32.exe Jjmhppqd.exe PID 2764 wrote to memory of 224 2764 Jjmhppqd.exe Jmkdlkph.exe PID 2764 wrote to memory of 224 2764 Jjmhppqd.exe Jmkdlkph.exe PID 2764 wrote to memory of 224 2764 Jjmhppqd.exe Jmkdlkph.exe PID 224 wrote to memory of 4408 224 Jmkdlkph.exe Jbhmdbnp.exe PID 224 wrote to memory of 4408 224 Jmkdlkph.exe Jbhmdbnp.exe PID 224 wrote to memory of 4408 224 Jmkdlkph.exe Jbhmdbnp.exe PID 4408 wrote to memory of 4264 4408 Jbhmdbnp.exe Jibeql32.exe PID 4408 wrote to memory of 4264 4408 Jbhmdbnp.exe Jibeql32.exe PID 4408 wrote to memory of 4264 4408 Jbhmdbnp.exe Jibeql32.exe PID 4264 wrote to memory of 388 4264 Jibeql32.exe Jplmmfmi.exe PID 4264 wrote to memory of 388 4264 Jibeql32.exe Jplmmfmi.exe PID 4264 wrote to memory of 388 4264 Jibeql32.exe Jplmmfmi.exe PID 388 wrote to memory of 3280 388 Jplmmfmi.exe Jbkjjblm.exe PID 388 wrote to memory of 3280 388 Jplmmfmi.exe Jbkjjblm.exe PID 388 wrote to memory of 3280 388 Jplmmfmi.exe Jbkjjblm.exe PID 3280 wrote to memory of 1664 3280 Jbkjjblm.exe Jjbako32.exe PID 3280 wrote to memory of 1664 3280 Jbkjjblm.exe Jjbako32.exe PID 3280 wrote to memory of 1664 3280 Jbkjjblm.exe Jjbako32.exe PID 1664 wrote to memory of 3952 1664 Jjbako32.exe Jpojcf32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1d8be59c6082e5caeb694e2b42f963d0_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iiffen32.exeC:\Windows\system32\Iiffen32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iannfk32.exeC:\Windows\system32\Iannfk32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Icljbg32.exeC:\Windows\system32\Icljbg32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ibojncfj.exeC:\Windows\system32\Ibojncfj.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ijfboafl.exeC:\Windows\system32\Ijfboafl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iiibkn32.exeC:\Windows\system32\Iiibkn32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iapjlk32.exeC:\Windows\system32\Iapjlk32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iikopmkd.exeC:\Windows\system32\Iikopmkd.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ipegmg32.exeC:\Windows\system32\Ipegmg32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ifopiajn.exeC:\Windows\system32\Ifopiajn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iinlemia.exeC:\Windows\system32\Iinlemia.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jjmhppqd.exeC:\Windows\system32\Jjmhppqd.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jmkdlkph.exeC:\Windows\system32\Jmkdlkph.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jbhmdbnp.exeC:\Windows\system32\Jbhmdbnp.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jibeql32.exeC:\Windows\system32\Jibeql32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jbkjjblm.exeC:\Windows\system32\Jbkjjblm.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jjbako32.exeC:\Windows\system32\Jjbako32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jpojcf32.exeC:\Windows\system32\Jpojcf32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jkdnpo32.exeC:\Windows\system32\Jkdnpo32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jangmibi.exeC:\Windows\system32\Jangmibi.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jiikak32.exeC:\Windows\system32\Jiikak32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kpccnefa.exeC:\Windows\system32\Kpccnefa.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kacphh32.exeC:\Windows\system32\Kacphh32.exe32⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kaemnhla.exeC:\Windows\system32\Kaemnhla.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kbfiep32.exeC:\Windows\system32\Kbfiep32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kknafn32.exeC:\Windows\system32\Kknafn32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kmlnbi32.exeC:\Windows\system32\Kmlnbi32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kcifkp32.exeC:\Windows\system32\Kcifkp32.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kkbkamnl.exeC:\Windows\system32\Kkbkamnl.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lcmofolg.exeC:\Windows\system32\Lcmofolg.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lkdggmlj.exeC:\Windows\system32\Lkdggmlj.exe47⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Laalifad.exeC:\Windows\system32\Laalifad.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe63⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe64⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe68⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe69⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe71⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe72⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe73⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mjjmog32.exeC:\Windows\system32\Mjjmog32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe76⤵
-
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe78⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nklfoi32.exeC:\Windows\system32\Nklfoi32.exe82⤵
-
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe88⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe89⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe91⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe92⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 41293⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5188 -ip 51881⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Iannfk32.exeFilesize
113KB
MD5731a52f33599178315b4e5c9445d06f9
SHA1aaa65b592125d901e8565f5be43aeac25659834c
SHA256de45d4d78be3536ba93d312c7250d35f73a24d22759244f79a024a4517b34233
SHA51287d3c5bce4c6d89a38985b41da0cd8c99e6a914ce148d8ea04cce6d50c8b3f125b2be50087b77f95b6d62b91ef6cfc8b36c7f0ebefb1049285b85ee50bb7cbb0
-
C:\Windows\SysWOW64\Iapjlk32.exeFilesize
113KB
MD5a42b063470fb5402dd224d04cbf44910
SHA1855cc92b96a208a39fa9d813954fc7b598fe18fe
SHA256f0b623916c8d03f1e8c89b237c7515472d93fa2c850112b56cc551cbbd25a512
SHA51260622ced6f44561eaee3683c14862c717fa5a909102a82aa58d301cfcb28244a5c8530002100fbef8c29ea2c02140ed46fee1fef742ab089ff7affb139229a10
-
C:\Windows\SysWOW64\Ibojncfj.exeFilesize
113KB
MD5d401be210bc5a6bca8ec08e20bb15d99
SHA1f9ed72db796e2f825bdc50ab525d46a3364667b9
SHA2569f9809673b538998321f6f8da5228943865a7f846648bd16ee5d554da3fd9495
SHA51239bc1fcfab1de5fa70432f4033cdfb11e8fedba90540d64dd27fe2b427f2573d704e8f4232c7c43bd8f1d854f5b1c62270d616005df7eae46b177c7329093e16
-
C:\Windows\SysWOW64\Icljbg32.exeFilesize
113KB
MD51d5b8a1ea1bf225755b8c4efd7901169
SHA1a1ab6487815a98b41db1af3369ae486080e9e447
SHA2567dbc7a04453dcac5b8df2481554e8a61ce78126b214a99026e59a508157f823b
SHA512d6cacb01cf7b00bf0f05d9f726bf162104d2fe62c3710d8e71926d30cb6fda707e10cbea1fd5da90fd141683ab8383234ab96063de9ddc7de3d35f900c42629f
-
C:\Windows\SysWOW64\Ifmcdblq.exeFilesize
113KB
MD5c169ae6500906dc1de14f9a591a90723
SHA1613a06a19010ed752268b59a866ba3d20a9823e9
SHA256c711c44bcfe47ee9cfe3fc213edc2c7ee71b68ed0b8bbf1c62c09a72b8d83bf7
SHA512c69045c9249aecc3158b7c9b30cf1d9440b5e9cfe71b2be6b36a90640eb70118de2466e5341aec4b76b017f2261be47bc02e58967473a67086b77f443e24ff16
-
C:\Windows\SysWOW64\Ifopiajn.exeFilesize
113KB
MD513c2b32021010a90b0e783b039103e9f
SHA14692bbb81a2c8d2c799be25efe02664941aa12b0
SHA2567094c498cd8a6d4b5ab885c24ed57a32efb1e722cd9b427811426edfb416e993
SHA5122de31fa99f5a66ad805281f1887032bd4e60bcff21985d934bcbb54a1bc0c3f487ea59f2ac656aae34b66838d866182a09a24fb1cf5229429335387c1a595afc
-
C:\Windows\SysWOW64\Iiffen32.exeFilesize
113KB
MD53944b055611ec8cfd65df7e69cd48334
SHA1a49ed0ab3bc46f7ff55e30fba8f7c027d8218868
SHA25656d80a964af7cda19523b4fff156d5e489deb68b8412e503744045dae5a54810
SHA512b1ee59cae18e38265874b2b0a717bddc2da754dab604760ffe8ac1376fc189ee37f76a6492a5f7789c58d242e57144ea4dac5643df424c709880d7ad446bcfd1
-
C:\Windows\SysWOW64\Iiibkn32.exeFilesize
113KB
MD5201b94adddbb15c26ad98ef987653d57
SHA1163897622e8ea38b9550e7d05b82b32094d488a7
SHA256a478a81a056c2e5784c8eed8b731a45f1171e418209a23f52777c34352021397
SHA512f2c9874ce3c1c60d108f30f8b571bd648f36843d5cb1f81c209f871aa58b2715de56fcf885b56453eee7cc250882cdab05c5fb05b5c0278c9f052f4ff82cbc69
-
C:\Windows\SysWOW64\Iikopmkd.exeFilesize
113KB
MD5ff908f69eaac473713ed2368222d5b93
SHA1a96c0cbd7e553f7b1a4c0f8fe3e0c2303009b261
SHA2565a73936e76780e81c5a931e98835194aaffbb2f50297d1d4005541eaa17bed46
SHA5124089caeddfa045eaa690175a4daf03ce187d246015149f83207fff220e27b721a4d37d668df59d9d3add64e5ebb2d1ea6a862744cf91ddb8f94b5fde8031a322
-
C:\Windows\SysWOW64\Iinlemia.exeFilesize
113KB
MD551a2987b6b34740df8d0764c3e0321f5
SHA1c4259aa4c6671bd02261c2411402c62041f41155
SHA2567290e55dde12515d6d613fc9732c11d2a7ec389d037c8a1716e9e05439fac97b
SHA5129ff4b21db2f12c564a2310501e3624b97d7202f566c589aeae31be2d484f0dd4681a3b02c2cc2b5b8bf8018cd6dba8135b3f53d987ffd2cdaab46b630973afe0
-
C:\Windows\SysWOW64\Ijfboafl.exeFilesize
113KB
MD54e6a81b0b9f2fea072322e60e1cc787c
SHA1ba90d7fbd0e6cb9f1f302d02f532c4f58905662e
SHA256a3d1b9c93ea41feebcde604912dc3ca9f37addb42253a7b4f3883eea715ea0e8
SHA512e758339351955045c38049336aba6ae29fadaab300c85c042d1695e09b502f27c0e61409d09b65a6b4f6303ffbc00d50a836070de9b2c39b782a8a85d985e1e4
-
C:\Windows\SysWOW64\Imdnklfp.exeFilesize
113KB
MD5ad9ffa03a15c38eaf1a5bb8d023134d6
SHA19eb43f9bb68f98cd42044f0f153bc1373eb2887b
SHA256fa4b1af5eb91fdbcb1994ff88f985fa9b70d8b223c82a2a020b1c79fa18764de
SHA5129b221e86cff8aadc61bf78bb35905b02b13fea3222cb660ae2283a54da2e467e2d8afe3fda2a1dfff9cb39bf23aa18fdc7a088c09019e167b7f68bf3c263e7e8
-
C:\Windows\SysWOW64\Ipegmg32.exeFilesize
113KB
MD5a265839f4590c6149265e60cf78793eb
SHA11be4f593aa0742a349403b94b5550793890c9654
SHA2569a68b7aa27e85d7df20253d01d4ff245c8352ea3f0508944d1826e8607e65110
SHA51224070ed0fbd5944d7b94cfbb1e10efa775f294a08d43605a49519ac18e25dc0871b4ea3a31108128993bd2931f11f11518d7aadbf151ab9b5ea5d83bd9321252
-
C:\Windows\SysWOW64\Jangmibi.exeFilesize
113KB
MD5e85239da529f67cf40989f92827d87dd
SHA15b9645ff0af000cc5aa7845dd229a045e136292f
SHA2560f1154d890ae7d10418036d0c0502c9fd876e67004d80edeb16ccdfc90186d45
SHA512c6eaa7683e026cc5f39c51c8074ab9577c94eea43812acd7f43c1f3f338120973e2ceaeaad34f050432db9c9cb4cca97b331a9f5955a080d7c2053d43e50f1b7
-
C:\Windows\SysWOW64\Jbhmdbnp.exeFilesize
113KB
MD51a65baf66ee8264c332ea8c093beb0ca
SHA1acf4073322dc5eb2b21c220d14f4d8bf72bfdbdb
SHA25668acf2ff8ce3fabb32b762dd6b48242b529c79ae361597ce6a7ce8c29ded4bd6
SHA5124786fe7c9c235488313002c47a051d442625b79bd46bab9df46f575745025c18fa8a1f110d74a6fb2ce2082bd16668833064278ebcdeefde434498f27aea2b88
-
C:\Windows\SysWOW64\Jbkjjblm.exeFilesize
113KB
MD5ca5931942c88668d3d0c2b9cbbdd48a8
SHA18f118f60bf914a001a051b4b15a8bca2242b544c
SHA25667aebbc29f79a55601e534cb8ce6ccd600fd0697d949eb3722efb0efafd86267
SHA5121a5a2b16464c2a8eb989b78b0aad3cf673cd639d111f22e8f0388c32cc366ee652374a3f956e65a8e5ff1dcc93a00296ab8c1e64963dc264b80f6b6475804b27
-
C:\Windows\SysWOW64\Jbmfoa32.exeFilesize
113KB
MD57a8662a9c767d83ff204171dd98caf42
SHA1a02dbe595a4393207956e2d54605b9efaf738a71
SHA256924c45ef05ed12e64bba026bdf7a262bf4addbcf63abaab1fdb1385c9a9fc926
SHA5123c9678b7b7bb5c6341174a5ebcc2c0fade720d91f5f712e1ad5396154c52ffa652691b7c0eac2b039bdf0401c2bb056967cccef55722a971a099f337bab2b875
-
C:\Windows\SysWOW64\Jbocea32.exeFilesize
113KB
MD5e991f626165664d57e9dd7b4ade94766
SHA1c36801cfe4a8f3fa75f1725e621976522b12facd
SHA2565a1a24f009b5d8c5557439e1b497cd14ad93e12600d8ead46ce46afc90590c36
SHA512e2ff80c30bbcc22f7673fbdcba586264904623bb66a9a2f84a09c985901b2b9f12720e99cd35a7260198f9c8b72035491e33268a8354f87c137d2856176c683b
-
C:\Windows\SysWOW64\Jdcpcf32.exeFilesize
113KB
MD5c9fc4ae25db672a2c48ccd9b3c28e216
SHA1fd9ae8a66299d04a40840ef40e1c10714597c06b
SHA256d4c7d742ec997589cecb30e1d9872c637e94aa6fcf1e57612731baaac91c8e0c
SHA512d9925c9c49869e696b441fb15c732a498801070a58df53519f1ad0fccfa8519a2ca9ea4b3b3c6f4f4d349da1bfdf3025e8983d0819afb24ee58fc4ba3ce525e4
-
C:\Windows\SysWOW64\Jibeql32.exeFilesize
113KB
MD565e55dfc64c1cff04acb7fe710f00b6d
SHA1edd2252c6c0541606727a07de3148adc0efea516
SHA256d3ee925741cf08af5b46869c1ad202b12fbbfc59f08d40251c7d45bbeb1bd6fe
SHA5123f9f5f37f7cc484f3000070bc5e673ee6b4ba8da8c6e0f1d6d13a9d71e36f0421052ca1df80c62e48816c56246162770278c857ad1c0adc59dbff956152fb8c7
-
C:\Windows\SysWOW64\Jiikak32.exeFilesize
113KB
MD5b6261075df7d17efdefa5dd0cc0efc62
SHA1e09b48133422eabc0c78b2213701930b0e10aa5d
SHA256225006d2ffaee32856362d95c39c9dc297e17e091472bf0a40e07c6483c12503
SHA51285124bfdc8bf283a1fc7b82a5c2d48ddae90b63c2ef0852b32e5f7362dcaaba35949b44678efe4bfe67b6688d56afe0f6bdd5771503ae7679e75b9c5b195a0df
-
C:\Windows\SysWOW64\Jjbako32.exeFilesize
113KB
MD50669535a209387a1671ee74410b5c773
SHA1e034df6c480c47ec81bfc4bfefbd4c71b1b5edf8
SHA25683f20172d97cf7ac36e9b2f3c20cef29ff2bdc3070ea3c57791ca057265475fd
SHA512f06bd21e0d44585ffeb42ee67593c9fa57fd72abbb594d486b616b11fb54b56a08143cdd47b94cab37f419e4ea67707f1408bcff3c1b6289c1194512e794e35d
-
C:\Windows\SysWOW64\Jjmhppqd.exeFilesize
113KB
MD5d76585de1feebb4c861aae0b3c41fe3e
SHA19f8be829024378e09a85fdf2c0f54c5b0b7bcfbc
SHA25600e013b32857f35cd19fe137a700609d1aeabfd55e25c97580cecd661c90c0a7
SHA512b70e0d4d08bc0b266da6dd9d20d25bb45d661c23d270dd15ad0e7684c78bd2dc5ad5da66fd5308ee2e6bc3e810dd8146960e0886503c1fea11f577308b663169
-
C:\Windows\SysWOW64\Jkdnpo32.exeFilesize
113KB
MD579a95e8bbe1c424c76b5ccbc9f179a09
SHA1cf92891206170fa521346eccc4bdd43484497e59
SHA256604704cc96b42f73beda3744e7874ae350c701e1b71a8f75e263888c337d6968
SHA512f19d55d54215fcb3f8c339c9b7d53513b42249a5e91f2cabe4161779fd4c59ffc4214f8b3eb753572f278849668a5f2cd15e1e1fe0c4b8cf98dcab7c7d72c4ac
-
C:\Windows\SysWOW64\Jmkdlkph.exeFilesize
113KB
MD505727c7cca5fa966da82700ddd01ee55
SHA1f691749415f0999427590427232dac229a2018ca
SHA256d8adcb8310b2e6535bca2ef76b477a98cc3a5cfb9c96f504b9d93d86f230ed3f
SHA512e7b3bcb1fc0d9b1d81f0ffb56c875a0d5a41736c895e8919709000f81b8bfa228d04b89e94abee094392920d7b62be861ad77be5f9c315245f2951632defa423
-
C:\Windows\SysWOW64\Jplmmfmi.exeFilesize
113KB
MD554511192a6c14c8cefd425e0e791919a
SHA1c6572fce689fdb6f750b485ec09abbfd7e62429d
SHA256981a2080f95f2b3773dd50a1d858e5f963af15d9d6c543ccc8d884dcc6582d45
SHA5122aab2ab02bd54b641c243116c77a598e8101fb883378e0c13fc7524340004ce883928be556f29938a79f6153bc8b3b9947fbcea36fe2f9cb3ba2c3ba1c616397
-
C:\Windows\SysWOW64\Jpojcf32.exeFilesize
113KB
MD52d36ec99f7e345d4c88e3d3a193b71cd
SHA1ca1c3a4ecffdd492aaab5388df610debfd372141
SHA25666826f7c5c5021ccb6d71a945d9d443ee73279ac1849b6fe3b78ff0923cab6f4
SHA51246f6a82c6e695dc21f3a8982fbddac00108e833af8ec56bc11f02658b1e33e8a9268716c1f32cdeb90fafff974568570a669ffe3ed92ddbbcfc5a6ef8f3d1e61
-
C:\Windows\SysWOW64\Kacphh32.exeFilesize
113KB
MD58660a3b9d2d8c5fbd4773082eba20730
SHA1c64a44e3b2a45006cd5ea79bdb32b1ca9d54e8f3
SHA2561d904001fd9d91651da3c1214166644ca0eb2d9cbc29e913ec5e030ccd9e2829
SHA5121f9bda2e6c827e88b2ed29f28838b67fb20b67c038953666db0df55b7d3265b43b4fdabe4aef82cb714369bb715003f1e5de810ccc981851a9ef9df43daefb70
-
C:\Windows\SysWOW64\Kaemnhla.exeFilesize
113KB
MD585cb69c2ffc61ca62c5d0317ebd6f50f
SHA1435761a3e6df087917b7b21b4bf8f21352ffb255
SHA25674002fa5eacd94e0758cfc158001640beab2d2938f4e4f0e8a45efe21d296b47
SHA5125d7836bddb031a973e931b77ff3ce2eb38a9fc46850333e09840ebc693ca79c9cfcac73993703f2b789965fc31f2cf0c218f569f0861001c2e0d0785d4e366d7
-
C:\Windows\SysWOW64\Kbapjafe.exeFilesize
113KB
MD57f07d5b1cff2627419603404f4f44ad2
SHA1d6329f3c1892e36e0f69e6b75b2dbbb03fef36f5
SHA256b64332e887d4542d68bd65c3e384d0de8baaefc45faa9e67cb6e5fe01f214ccb
SHA5120b4883a3739ef7a8782d77a8919658d0b88e55a1db5d03ceda3937b250c581464fbc662c1756040d25cba58413571b6e5c0f14f7c14d12aafd79a2e1402db526
-
C:\Windows\SysWOW64\Kilhgk32.exeFilesize
113KB
MD5441dd81f3f0b4abc8ce5313cf0a42748
SHA15aec5435783e461318eab026fe2c4f9522ea09b8
SHA25682dca5be37005bba2335887290891ac7f87488aeb09b9ae73c2b5408207027b1
SHA5120ab6c3f18d227f7f377d5a2aaee94e4a440b0c616f9ae46b8ab40834e24e5f496fe1dca8df1570884a9d870426ee0da43553bb23daa2e24cb28b272722c566be
-
C:\Windows\SysWOW64\Kpccnefa.exeFilesize
113KB
MD50471d38a0f9646fe6c39c82935f3e840
SHA188da9fa3e01e3101b17d9cd444e9aa08ad753998
SHA25636f9f419112b0898179f3c29396dd84815990a444f587f52fdb0e9d7058ca4fd
SHA5122b7c209670caf0735091650321e5f6ae2a01598559d1be94cbc7e38efa8be06807f933ae4a86664c049cb357e965be4a7660404b234370a6cd5dfd2197e0e190
-
C:\Windows\SysWOW64\Nqiogp32.exeFilesize
113KB
MD54d3a350f6cfd7c51e4fdfabef2eaa359
SHA16dd24330cf5e7db0dc674e4a0cbae3cf61d5f420
SHA256f1db4fc4fb52118362ecf463865efd44db91944ab69a642a86a465374c6f77bb
SHA5120684482c95292a946f893257d616639ed8262ba1f2dbe37825e7c9ae26246da5d1b4a80106241ab2356f40e5b0b6dc1b53e7330a13819d5c55f358d880604cda
-
memory/224-127-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/332-279-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/388-152-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/412-192-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/512-382-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/636-447-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/748-286-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/868-392-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/892-410-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/924-583-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/940-28-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/948-245-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1052-508-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1064-338-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1080-593-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1080-64-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1116-310-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1128-496-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1520-212-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1528-351-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1532-430-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1536-272-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1548-454-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1660-440-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1664-167-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1684-224-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1716-292-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1800-216-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1832-532-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1912-579-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1940-567-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2060-482-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2256-404-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2328-13-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2344-412-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2348-548-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2348-0-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2364-303-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2520-44-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2524-21-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2540-88-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2540-613-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2544-494-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2572-267-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2764-120-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2768-255-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2796-96-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2800-486-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2820-52-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2908-320-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3092-562-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3100-60-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3104-363-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3112-550-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3264-422-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3280-163-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3356-460-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3416-573-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3428-199-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3572-524-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3708-472-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3888-428-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/3952-176-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4100-352-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4116-526-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4132-591-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4264-144-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4268-340-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4288-470-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4344-599-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4364-247-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4372-538-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4400-606-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4400-79-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4408-136-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4444-280-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4452-111-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4504-605-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4536-380-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4560-551-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4592-394-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4604-364-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4648-370-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4656-322-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4680-103-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4696-36-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4756-232-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4760-304-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4784-519-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4872-76-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4896-502-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4904-184-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4992-448-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/5104-328-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/5140-607-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/5188-614-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB