Analysis
-
max time kernel
140s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe
-
Size
163KB
-
MD5
d15f8c4fbcbc2179b5ff9a4a7a756e20
-
SHA1
75f6f97650583e00737f4104d5f224b2612696da
-
SHA256
2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb
-
SHA512
f983bfbd8af6ed14e1e4d2bda7eb6646845a63902447ebe61ec6735935625dd57f5e8df748aceba4264f8d8fa057b230290bacfb62d4b2adda1727a4f4a056c8
-
SSDEEP
3072:nYqFvumbaFKtaJGyqDyltOrWKDBr+yJb:Yqp7cJaDyLOf
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Cggimh32.exeDgjoif32.exeDoccpcja.exeIpbaol32.exeAbhqefpg.exeFcpakn32.exeNnojho32.exeLjpaqmgb.exeMlljnf32.exeBapgdm32.exeEqkondfl.exePjdpelnc.exeIialhaad.exeMofmobmo.exeBdlfjh32.exeFkcpql32.exePfagighf.exeEaaiahei.exeFooclapd.exeHbihjifh.exeQbajeg32.exeAidehpea.exeGjaphgpl.exeKjgeedch.exeKamjda32.exeOokoaokf.exeCpfmlghd.exeMfchlbfd.exeJpgdai32.exeNoppeaed.exeNcbafoge.exeOfgdcipq.exeGegkpf32.exeIojkeh32.exePbcncibp.exeEdaaccbj.exeDncpkjoc.exeGaqhjggp.exeEjlnfjbd.exeLfgipd32.exeBbaclegm.exe2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exeNjjmni32.exeBdmmeo32.exeLchfib32.exeLckboblp.exeKofkbk32.exeBnlhncgi.exePcegclgp.exeAbmjqe32.exeEafbmgad.exeFcneeo32.exeFqdbdbna.exeOfckhj32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cggimh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgjoif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doccpcja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipbaol32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abhqefpg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcpakn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnojho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljpaqmgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlljnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bapgdm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqkondfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjdpelnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iialhaad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mofmobmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdlfjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkcpql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfagighf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaaiahei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fooclapd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbihjifh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbajeg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aidehpea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkcpql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjaphgpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjgeedch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kamjda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ookoaokf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpfmlghd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfchlbfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpgdai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noppeaed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncbafoge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofgdcipq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfagighf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gegkpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iojkeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbcncibp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edaaccbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgjoif32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dncpkjoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gaqhjggp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljpaqmgb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejlnfjbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfgipd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbaclegm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njjmni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdmmeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lchfib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lckboblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbcncibp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bapgdm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kofkbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnlhncgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lchfib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcegclgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abmjqe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eafbmgad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcneeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqdbdbna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mofmobmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncbafoge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofckhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcegclgp.exe -
Executes dropped EXE 64 IoCs
Processes:
Jiglnf32.exeKjblje32.exeKjgeedch.exeKofkbk32.exeLlmhaold.exeLfgipd32.exeLggejg32.exeMjjkaabc.exeMfchlbfd.exeNnojho32.exeNpbceggm.exeNjjdho32.exeOjajin32.exeOghghb32.exeOfmdio32.exePjkmomfn.exePaiogf32.exePjdpelnc.exeQpcecb32.exeAkblfj32.exeBdmmeo32.exeBacjdbch.exeBnlhncgi.exeCggimh32.exeCdmfllhn.exeCdpcal32.exeCgqlcg32.exeDhphmj32.exeDakikoom.exeDgjoif32.exeDoccpcja.exeEhndnh32.exeEqlfhjig.exeEbkbbmqj.exeFooclapd.exeFndpmndl.exeFbbicl32.exeFkmjaa32.exeFgcjfbed.exeGegkpf32.exeGanldgib.exeGaqhjggp.exeGijmad32.exeGbbajjlp.exeHpfbcn32.exeHajkqfoe.exeHbihjifh.exeHnphoj32.exeHbnaeh32.exeIpbaol32.exeIafkld32.exeIojkeh32.exeIialhaad.exeJlbejloe.exeJbojlfdp.exeJbagbebm.exeJbccge32.exeJpgdai32.exeKakmna32.exeKamjda32.exeKapfiqoj.exeKpqggh32.exeKpccmhdg.exeLljdai32.exepid process 4564 Jiglnf32.exe 2680 Kjblje32.exe 1988 Kjgeedch.exe 3708 Kofkbk32.exe 660 Llmhaold.exe 4380 Lfgipd32.exe 1956 Lggejg32.exe 5072 Mjjkaabc.exe 2472 Mfchlbfd.exe 1692 Nnojho32.exe 4940 Npbceggm.exe 1688 Njjdho32.exe 1964 Ojajin32.exe 2168 Oghghb32.exe 2944 Ofmdio32.exe 4312 Pjkmomfn.exe 1360 Paiogf32.exe 1468 Pjdpelnc.exe 2308 Qpcecb32.exe 1620 Akblfj32.exe 2336 Bdmmeo32.exe 720 Bacjdbch.exe 2152 Bnlhncgi.exe 5008 Cggimh32.exe 2156 Cdmfllhn.exe 4668 Cdpcal32.exe 568 Cgqlcg32.exe 3572 Dhphmj32.exe 1444 Dakikoom.exe 2268 Dgjoif32.exe 5020 Doccpcja.exe 1436 Ehndnh32.exe 4620 Eqlfhjig.exe 416 Ebkbbmqj.exe 1492 Fooclapd.exe 2084 Fndpmndl.exe 3472 Fbbicl32.exe 4836 Fkmjaa32.exe 4840 Fgcjfbed.exe 4592 Gegkpf32.exe 2652 Ganldgib.exe 1332 Gaqhjggp.exe 1476 Gijmad32.exe 3100 Gbbajjlp.exe 2248 Hpfbcn32.exe 5012 Hajkqfoe.exe 4212 Hbihjifh.exe 3888 Hnphoj32.exe 4408 Hbnaeh32.exe 4184 Ipbaol32.exe 1652 Iafkld32.exe 456 Iojkeh32.exe 4296 Iialhaad.exe 616 Jlbejloe.exe 1268 Jbojlfdp.exe 3424 Jbagbebm.exe 3032 Jbccge32.exe 4576 Jpgdai32.exe 1016 Kakmna32.exe 2648 Kamjda32.exe 4728 Kapfiqoj.exe 4456 Kpqggh32.exe 1248 Kpccmhdg.exe 4700 Lljdai32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kamjda32.exeAbhqefpg.exeFcneeo32.exeJbccge32.exePcegclgp.exePjkmomfn.exeGegkpf32.exeNoppeaed.exeEafbmgad.exeIpbaol32.exeFcpakn32.exeFbbicl32.exeFdbkja32.exeHbihjifh.exeBapgdm32.exeLljdai32.exeLckboblp.exeKpccmhdg.exeAidehpea.exeOghghb32.exeCibain32.exeFbfkceca.exeEhndnh32.exeFooclapd.exeGkalbj32.exeHajkqfoe.exeQbajeg32.exeKjblje32.exeBnlhncgi.exeBbaclegm.exeGjaphgpl.exeLggejg32.exeOfjqihnn.exeCggimh32.exeMlljnf32.exeCdhffg32.exeCdpcal32.exeCgqlcg32.exeDdfbgelh.exeIialhaad.exeLjpaqmgb.exeBdlfjh32.exeBdmmeo32.exeFndpmndl.exeQpcecb32.exeIojkeh32.exeLpochfji.exeKapfiqoj.exeLchfib32.exeDhphmj32.exeQclmck32.exeLlmhaold.exeNpbceggm.exeHbnaeh32.exedescription ioc process File created C:\Windows\SysWOW64\Leboon32.dll Kamjda32.exe File created C:\Windows\SysWOW64\Amnebo32.exe Abhqefpg.exe File created C:\Windows\SysWOW64\Jfqqddpi.dll Fcneeo32.exe File created C:\Windows\SysWOW64\Mneoha32.dll Jbccge32.exe File created C:\Windows\SysWOW64\Mpagaf32.dll Pcegclgp.exe File opened for modification C:\Windows\SysWOW64\Paiogf32.exe Pjkmomfn.exe File created C:\Windows\SysWOW64\Ganldgib.exe Gegkpf32.exe File created C:\Windows\SysWOW64\Fanmld32.dll Noppeaed.exe File opened for modification C:\Windows\SysWOW64\Egbken32.exe Eafbmgad.exe File opened for modification C:\Windows\SysWOW64\Iafkld32.exe Ipbaol32.exe File created C:\Windows\SysWOW64\Fqdbdbna.exe Fcpakn32.exe File created C:\Windows\SysWOW64\Fkmjaa32.exe Fbbicl32.exe File created C:\Windows\SysWOW64\Fbfkceca.exe Fdbkja32.exe File opened for modification C:\Windows\SysWOW64\Hnphoj32.exe Hbihjifh.exe File opened for modification C:\Windows\SysWOW64\Amnebo32.exe Abhqefpg.exe File opened for modification C:\Windows\SysWOW64\Bbaclegm.exe Bapgdm32.exe File opened for modification C:\Windows\SysWOW64\Lpgmhg32.exe Lljdai32.exe File created C:\Windows\SysWOW64\Mjpnkbfj.dll Lckboblp.exe File opened for modification C:\Windows\SysWOW64\Lljdai32.exe Kpccmhdg.exe File created C:\Windows\SysWOW64\Aafjpc32.dll Aidehpea.exe File created C:\Windows\SysWOW64\Ofmdio32.exe Oghghb32.exe File opened for modification C:\Windows\SysWOW64\Ofmdio32.exe Oghghb32.exe File created C:\Windows\SysWOW64\Bbaclegm.exe Bapgdm32.exe File created C:\Windows\SysWOW64\Pnlhmpgg.dll Cibain32.exe File opened for modification C:\Windows\SysWOW64\Gjaphgpl.exe Fbfkceca.exe File created C:\Windows\SysWOW64\Eqlfhjig.exe Ehndnh32.exe File created C:\Windows\SysWOW64\Lhpapf32.dll Fooclapd.exe File created C:\Windows\SysWOW64\Gdiakp32.exe Gkalbj32.exe File created C:\Windows\SysWOW64\Hbihjifh.exe Hajkqfoe.exe File opened for modification C:\Windows\SysWOW64\Apggckbf.exe Qbajeg32.exe File created C:\Windows\SysWOW64\Aablof32.dll Kjblje32.exe File opened for modification C:\Windows\SysWOW64\Cggimh32.exe Bnlhncgi.exe File created C:\Windows\SysWOW64\Nodeaima.dll Bbaclegm.exe File created C:\Windows\SysWOW64\Gdgdeppb.exe Gjaphgpl.exe File opened for modification C:\Windows\SysWOW64\Mjjkaabc.exe Lggejg32.exe File opened for modification C:\Windows\SysWOW64\Eqlfhjig.exe Ehndnh32.exe File created C:\Windows\SysWOW64\Fljhbbae.dll Ofjqihnn.exe File created C:\Windows\SysWOW64\Cdmfllhn.exe Cggimh32.exe File created C:\Windows\SysWOW64\Baampdgc.dll Fbbicl32.exe File created C:\Windows\SysWOW64\Mbibfm32.exe Mlljnf32.exe File created C:\Windows\SysWOW64\Nppbddqg.dll Cdhffg32.exe File created C:\Windows\SysWOW64\Cgqlcg32.exe Cdpcal32.exe File opened for modification C:\Windows\SysWOW64\Dhphmj32.exe Cgqlcg32.exe File created C:\Windows\SysWOW64\Pjcblekh.dll Ddfbgelh.exe File created C:\Windows\SysWOW64\Jlbejloe.exe Iialhaad.exe File created C:\Windows\SysWOW64\Lchfib32.exe Ljpaqmgb.exe File created C:\Windows\SysWOW64\Bapgdm32.exe Bdlfjh32.exe File created C:\Windows\SysWOW64\Lqppgj32.dll Bdmmeo32.exe File created C:\Windows\SysWOW64\Mlkhbi32.dll Ipbaol32.exe File created C:\Windows\SysWOW64\Mlbmonhi.dll Fndpmndl.exe File created C:\Windows\SysWOW64\Oqoefand.exe Ofjqihnn.exe File opened for modification C:\Windows\SysWOW64\Akblfj32.exe Qpcecb32.exe File opened for modification C:\Windows\SysWOW64\Iialhaad.exe Iojkeh32.exe File opened for modification C:\Windows\SysWOW64\Jlbejloe.exe Iialhaad.exe File created C:\Windows\SysWOW64\Caecnh32.dll Lpochfji.exe File opened for modification C:\Windows\SysWOW64\Kpqggh32.exe Kapfiqoj.exe File created C:\Windows\SysWOW64\Amcpgoem.dll Lchfib32.exe File opened for modification C:\Windows\SysWOW64\Dakikoom.exe Dhphmj32.exe File created C:\Windows\SysWOW64\Fndpmndl.exe Fooclapd.exe File opened for modification C:\Windows\SysWOW64\Lpochfji.exe Lckboblp.exe File opened for modification C:\Windows\SysWOW64\Qbajeg32.exe Qclmck32.exe File opened for modification C:\Windows\SysWOW64\Lfgipd32.exe Llmhaold.exe File created C:\Windows\SysWOW64\Bgemej32.dll Npbceggm.exe File opened for modification C:\Windows\SysWOW64\Ipbaol32.exe Hbnaeh32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6220 5672 WerFault.exe Gbmadd32.exe -
Modifies registry class 64 IoCs
Processes:
Lpochfji.exeBfaigclq.exeDnqcfjae.exePaiogf32.exeGaqhjggp.exeKpccmhdg.exeApggckbf.exeFdbkja32.exeBacjdbch.exeEhndnh32.exeIojkeh32.exeLckboblp.exeGjaphgpl.exeLfgipd32.exeEqlfhjig.exeIafkld32.exeEaaiahei.exeNpbceggm.exeBdmmeo32.exeFooclapd.exeKapfiqoj.exeLlmhaold.exeDncpkjoc.exeEafbmgad.exeNnojho32.exeJlbejloe.exeLljdai32.exeDdfbgelh.exeQpcecb32.exeFbbicl32.exeKamjda32.exeNciopppp.exeGanldgib.exeHbihjifh.exeJbagbebm.exeJbccge32.exeOfckhj32.exeCibain32.exeEkqckmfb.exeNoppeaed.exeAbhqefpg.exeFndpmndl.exeLpgmhg32.exe2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exeDgjoif32.exeGbbajjlp.exeFkcpql32.exeOjajin32.exeIialhaad.exeJpgdai32.exeBdlfjh32.exeOfjqihnn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caecnh32.dll" Lpochfji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfaigclq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnqcfjae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Paiogf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaqhjggp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhbacd32.dll" Kpccmhdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apggckbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpiedd32.dll" Fdbkja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bacjdbch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehndnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iojkeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lckboblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbjlpn32.dll" Gjaphgpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmimp32.dll" Lfgipd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgcpfdbd.dll" Eqlfhjig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngekilj.dll" Iafkld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eaaiahei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npbceggm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdmmeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fooclapd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kapfiqoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gaqhjggp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Polcjq32.dll" Apggckbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkjdipap.dll" Llmhaold.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dncpkjoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eafbmgad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnojho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jlbejloe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjliff32.dll" Lljdai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddfbgelh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dapgni32.dll" Qpcecb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baampdgc.dll" Fbbicl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Leboon32.dll" Kamjda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nciopppp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmapoggk.dll" Ganldgib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jggocdgo.dll" Hbihjifh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iafkld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbagbebm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbccge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpldbefn.dll" Ofckhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnlhmpgg.dll" Cibain32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odanidih.dll" Ekqckmfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqlfhjig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aglafhih.dll" Iojkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fanmld32.dll" Noppeaed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcckiibj.dll" Abhqefpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlbmonhi.dll" Fndpmndl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpgmhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfchag32.dll" Bfaigclq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhbjnc32.dll" Eafbmgad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofckhj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgjoif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfibjl32.dll" Gbbajjlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhpapf32.dll" Fooclapd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkcpql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojenek32.dll" Ojajin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fooclapd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iialhaad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpgdai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdlfjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbkqqe32.dll" Jlbejloe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjpnkbfj.dll" Lckboblp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofjqihnn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exeJiglnf32.exeKjblje32.exeKjgeedch.exeKofkbk32.exeLlmhaold.exeLfgipd32.exeLggejg32.exeMjjkaabc.exeMfchlbfd.exeNnojho32.exeNpbceggm.exeNjjdho32.exeOjajin32.exeOghghb32.exeOfmdio32.exePjkmomfn.exePaiogf32.exePjdpelnc.exeQpcecb32.exeAkblfj32.exeBdmmeo32.exedescription pid process target process PID 380 wrote to memory of 4564 380 2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe Jiglnf32.exe PID 380 wrote to memory of 4564 380 2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe Jiglnf32.exe PID 380 wrote to memory of 4564 380 2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe Jiglnf32.exe PID 4564 wrote to memory of 2680 4564 Jiglnf32.exe Kjblje32.exe PID 4564 wrote to memory of 2680 4564 Jiglnf32.exe Kjblje32.exe PID 4564 wrote to memory of 2680 4564 Jiglnf32.exe Kjblje32.exe PID 2680 wrote to memory of 1988 2680 Kjblje32.exe Kjgeedch.exe PID 2680 wrote to memory of 1988 2680 Kjblje32.exe Kjgeedch.exe PID 2680 wrote to memory of 1988 2680 Kjblje32.exe Kjgeedch.exe PID 1988 wrote to memory of 3708 1988 Kjgeedch.exe Kofkbk32.exe PID 1988 wrote to memory of 3708 1988 Kjgeedch.exe Kofkbk32.exe PID 1988 wrote to memory of 3708 1988 Kjgeedch.exe Kofkbk32.exe PID 3708 wrote to memory of 660 3708 Kofkbk32.exe Llmhaold.exe PID 3708 wrote to memory of 660 3708 Kofkbk32.exe Llmhaold.exe PID 3708 wrote to memory of 660 3708 Kofkbk32.exe Llmhaold.exe PID 660 wrote to memory of 4380 660 Llmhaold.exe Lfgipd32.exe PID 660 wrote to memory of 4380 660 Llmhaold.exe Lfgipd32.exe PID 660 wrote to memory of 4380 660 Llmhaold.exe Lfgipd32.exe PID 4380 wrote to memory of 1956 4380 Lfgipd32.exe Lggejg32.exe PID 4380 wrote to memory of 1956 4380 Lfgipd32.exe Lggejg32.exe PID 4380 wrote to memory of 1956 4380 Lfgipd32.exe Lggejg32.exe PID 1956 wrote to memory of 5072 1956 Lggejg32.exe Mjjkaabc.exe PID 1956 wrote to memory of 5072 1956 Lggejg32.exe Mjjkaabc.exe PID 1956 wrote to memory of 5072 1956 Lggejg32.exe Mjjkaabc.exe PID 5072 wrote to memory of 2472 5072 Mjjkaabc.exe Mfchlbfd.exe PID 5072 wrote to memory of 2472 5072 Mjjkaabc.exe Mfchlbfd.exe PID 5072 wrote to memory of 2472 5072 Mjjkaabc.exe Mfchlbfd.exe PID 2472 wrote to memory of 1692 2472 Mfchlbfd.exe Nnojho32.exe PID 2472 wrote to memory of 1692 2472 Mfchlbfd.exe Nnojho32.exe PID 2472 wrote to memory of 1692 2472 Mfchlbfd.exe Nnojho32.exe PID 1692 wrote to memory of 4940 1692 Nnojho32.exe Npbceggm.exe PID 1692 wrote to memory of 4940 1692 Nnojho32.exe Npbceggm.exe PID 1692 wrote to memory of 4940 1692 Nnojho32.exe Npbceggm.exe PID 4940 wrote to memory of 1688 4940 Npbceggm.exe Njjdho32.exe PID 4940 wrote to memory of 1688 4940 Npbceggm.exe Njjdho32.exe PID 4940 wrote to memory of 1688 4940 Npbceggm.exe Njjdho32.exe PID 1688 wrote to memory of 1964 1688 Njjdho32.exe Ojajin32.exe PID 1688 wrote to memory of 1964 1688 Njjdho32.exe Ojajin32.exe PID 1688 wrote to memory of 1964 1688 Njjdho32.exe Ojajin32.exe PID 1964 wrote to memory of 2168 1964 Ojajin32.exe Oghghb32.exe PID 1964 wrote to memory of 2168 1964 Ojajin32.exe Oghghb32.exe PID 1964 wrote to memory of 2168 1964 Ojajin32.exe Oghghb32.exe PID 2168 wrote to memory of 2944 2168 Oghghb32.exe Ofmdio32.exe PID 2168 wrote to memory of 2944 2168 Oghghb32.exe Ofmdio32.exe PID 2168 wrote to memory of 2944 2168 Oghghb32.exe Ofmdio32.exe PID 2944 wrote to memory of 4312 2944 Ofmdio32.exe Pjkmomfn.exe PID 2944 wrote to memory of 4312 2944 Ofmdio32.exe Pjkmomfn.exe PID 2944 wrote to memory of 4312 2944 Ofmdio32.exe Pjkmomfn.exe PID 4312 wrote to memory of 1360 4312 Pjkmomfn.exe Paiogf32.exe PID 4312 wrote to memory of 1360 4312 Pjkmomfn.exe Paiogf32.exe PID 4312 wrote to memory of 1360 4312 Pjkmomfn.exe Paiogf32.exe PID 1360 wrote to memory of 1468 1360 Paiogf32.exe Pjdpelnc.exe PID 1360 wrote to memory of 1468 1360 Paiogf32.exe Pjdpelnc.exe PID 1360 wrote to memory of 1468 1360 Paiogf32.exe Pjdpelnc.exe PID 1468 wrote to memory of 2308 1468 Pjdpelnc.exe Qpcecb32.exe PID 1468 wrote to memory of 2308 1468 Pjdpelnc.exe Qpcecb32.exe PID 1468 wrote to memory of 2308 1468 Pjdpelnc.exe Qpcecb32.exe PID 2308 wrote to memory of 1620 2308 Qpcecb32.exe Akblfj32.exe PID 2308 wrote to memory of 1620 2308 Qpcecb32.exe Akblfj32.exe PID 2308 wrote to memory of 1620 2308 Qpcecb32.exe Akblfj32.exe PID 1620 wrote to memory of 2336 1620 Akblfj32.exe Bdmmeo32.exe PID 1620 wrote to memory of 2336 1620 Akblfj32.exe Bdmmeo32.exe PID 1620 wrote to memory of 2336 1620 Akblfj32.exe Bdmmeo32.exe PID 2336 wrote to memory of 720 2336 Bdmmeo32.exe Bacjdbch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2bed9032f02b00f87c1112bcb7012589871d3452b1bd441fcdca3f70fa9d46fb_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jiglnf32.exeC:\Windows\system32\Jiglnf32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kjblje32.exeC:\Windows\system32\Kjblje32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kjgeedch.exeC:\Windows\system32\Kjgeedch.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kofkbk32.exeC:\Windows\system32\Kofkbk32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Llmhaold.exeC:\Windows\system32\Llmhaold.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lfgipd32.exeC:\Windows\system32\Lfgipd32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lggejg32.exeC:\Windows\system32\Lggejg32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mjjkaabc.exeC:\Windows\system32\Mjjkaabc.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mfchlbfd.exeC:\Windows\system32\Mfchlbfd.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Nnojho32.exeC:\Windows\system32\Nnojho32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Npbceggm.exeC:\Windows\system32\Npbceggm.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Njjdho32.exeC:\Windows\system32\Njjdho32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ojajin32.exeC:\Windows\system32\Ojajin32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oghghb32.exeC:\Windows\system32\Oghghb32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ofmdio32.exeC:\Windows\system32\Ofmdio32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pjkmomfn.exeC:\Windows\system32\Pjkmomfn.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Paiogf32.exeC:\Windows\system32\Paiogf32.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pjdpelnc.exeC:\Windows\system32\Pjdpelnc.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qpcecb32.exeC:\Windows\system32\Qpcecb32.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Akblfj32.exeC:\Windows\system32\Akblfj32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bdmmeo32.exeC:\Windows\system32\Bdmmeo32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bacjdbch.exeC:\Windows\system32\Bacjdbch.exe23⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Bnlhncgi.exeC:\Windows\system32\Bnlhncgi.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cggimh32.exeC:\Windows\system32\Cggimh32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cdmfllhn.exeC:\Windows\system32\Cdmfllhn.exe26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cdpcal32.exeC:\Windows\system32\Cdpcal32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cgqlcg32.exeC:\Windows\system32\Cgqlcg32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dhphmj32.exeC:\Windows\system32\Dhphmj32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dakikoom.exeC:\Windows\system32\Dakikoom.exe30⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dgjoif32.exeC:\Windows\system32\Dgjoif32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Doccpcja.exeC:\Windows\system32\Doccpcja.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ehndnh32.exeC:\Windows\system32\Ehndnh32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eqlfhjig.exeC:\Windows\system32\Eqlfhjig.exe34⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ebkbbmqj.exeC:\Windows\system32\Ebkbbmqj.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fooclapd.exeC:\Windows\system32\Fooclapd.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fndpmndl.exeC:\Windows\system32\Fndpmndl.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fbbicl32.exeC:\Windows\system32\Fbbicl32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fkmjaa32.exeC:\Windows\system32\Fkmjaa32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fgcjfbed.exeC:\Windows\system32\Fgcjfbed.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gegkpf32.exeC:\Windows\system32\Gegkpf32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ganldgib.exeC:\Windows\system32\Ganldgib.exe42⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Gaqhjggp.exeC:\Windows\system32\Gaqhjggp.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Gijmad32.exeC:\Windows\system32\Gijmad32.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gbbajjlp.exeC:\Windows\system32\Gbbajjlp.exe45⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hpfbcn32.exeC:\Windows\system32\Hpfbcn32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hajkqfoe.exeC:\Windows\system32\Hajkqfoe.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hbihjifh.exeC:\Windows\system32\Hbihjifh.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Hnphoj32.exeC:\Windows\system32\Hnphoj32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hbnaeh32.exeC:\Windows\system32\Hbnaeh32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ipbaol32.exeC:\Windows\system32\Ipbaol32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iafkld32.exeC:\Windows\system32\Iafkld32.exe52⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Iojkeh32.exeC:\Windows\system32\Iojkeh32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Iialhaad.exeC:\Windows\system32\Iialhaad.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jlbejloe.exeC:\Windows\system32\Jlbejloe.exe55⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jbojlfdp.exeC:\Windows\system32\Jbojlfdp.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jbagbebm.exeC:\Windows\system32\Jbagbebm.exe57⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jbccge32.exeC:\Windows\system32\Jbccge32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jpgdai32.exeC:\Windows\system32\Jpgdai32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kakmna32.exeC:\Windows\system32\Kakmna32.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kamjda32.exeC:\Windows\system32\Kamjda32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kapfiqoj.exeC:\Windows\system32\Kapfiqoj.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kpqggh32.exeC:\Windows\system32\Kpqggh32.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kpccmhdg.exeC:\Windows\system32\Kpccmhdg.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lljdai32.exeC:\Windows\system32\Lljdai32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lpgmhg32.exeC:\Windows\system32\Lpgmhg32.exe66⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ljpaqmgb.exeC:\Windows\system32\Ljpaqmgb.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lchfib32.exeC:\Windows\system32\Lchfib32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lckboblp.exeC:\Windows\system32\Lckboblp.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lpochfji.exeC:\Windows\system32\Lpochfji.exe70⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mablfnne.exeC:\Windows\system32\Mablfnne.exe71⤵
-
C:\Windows\SysWOW64\Mofmobmo.exeC:\Windows\system32\Mofmobmo.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mlljnf32.exeC:\Windows\system32\Mlljnf32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mbibfm32.exeC:\Windows\system32\Mbibfm32.exe74⤵
-
C:\Windows\SysWOW64\Nciopppp.exeC:\Windows\system32\Nciopppp.exe75⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Noppeaed.exeC:\Windows\system32\Noppeaed.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ncmhko32.exeC:\Windows\system32\Ncmhko32.exe77⤵
-
C:\Windows\SysWOW64\Njjmni32.exeC:\Windows\system32\Njjmni32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ncbafoge.exeC:\Windows\system32\Ncbafoge.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ofckhj32.exeC:\Windows\system32\Ofckhj32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ookoaokf.exeC:\Windows\system32\Ookoaokf.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ofgdcipq.exeC:\Windows\system32\Ofgdcipq.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ofjqihnn.exeC:\Windows\system32\Ofjqihnn.exe83⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Oqoefand.exeC:\Windows\system32\Oqoefand.exe84⤵
-
C:\Windows\SysWOW64\Pbcncibp.exeC:\Windows\system32\Pbcncibp.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pfagighf.exeC:\Windows\system32\Pfagighf.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pcegclgp.exeC:\Windows\system32\Pcegclgp.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Paihlpfi.exeC:\Windows\system32\Paihlpfi.exe88⤵
-
C:\Windows\SysWOW64\Ppnenlka.exeC:\Windows\system32\Ppnenlka.exe89⤵
-
C:\Windows\SysWOW64\Qclmck32.exeC:\Windows\system32\Qclmck32.exe90⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qbajeg32.exeC:\Windows\system32\Qbajeg32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Apggckbf.exeC:\Windows\system32\Apggckbf.exe92⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Amkhmoap.exeC:\Windows\system32\Amkhmoap.exe93⤵
-
C:\Windows\SysWOW64\Abhqefpg.exeC:\Windows\system32\Abhqefpg.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Amnebo32.exeC:\Windows\system32\Amnebo32.exe95⤵
-
C:\Windows\SysWOW64\Aidehpea.exeC:\Windows\system32\Aidehpea.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Abmjqe32.exeC:\Windows\system32\Abmjqe32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bdlfjh32.exeC:\Windows\system32\Bdlfjh32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bapgdm32.exeC:\Windows\system32\Bapgdm32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bbaclegm.exeC:\Windows\system32\Bbaclegm.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bfaigclq.exeC:\Windows\system32\Bfaigclq.exe101⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bagmdllg.exeC:\Windows\system32\Bagmdllg.exe102⤵
-
C:\Windows\SysWOW64\Cibain32.exeC:\Windows\system32\Cibain32.exe103⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Cdhffg32.exeC:\Windows\system32\Cdhffg32.exe104⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ccblbb32.exeC:\Windows\system32\Ccblbb32.exe105⤵
-
C:\Windows\SysWOW64\Cpfmlghd.exeC:\Windows\system32\Cpfmlghd.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dcffnbee.exeC:\Windows\system32\Dcffnbee.exe107⤵
-
C:\Windows\SysWOW64\Ddfbgelh.exeC:\Windows\system32\Ddfbgelh.exe108⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ddhomdje.exeC:\Windows\system32\Ddhomdje.exe109⤵
-
C:\Windows\SysWOW64\Dnqcfjae.exeC:\Windows\system32\Dnqcfjae.exe110⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dncpkjoc.exeC:\Windows\system32\Dncpkjoc.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ddmhhd32.exeC:\Windows\system32\Ddmhhd32.exe112⤵
-
C:\Windows\SysWOW64\Eaaiahei.exeC:\Windows\system32\Eaaiahei.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ejlnfjbd.exeC:\Windows\system32\Ejlnfjbd.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Edaaccbj.exeC:\Windows\system32\Edaaccbj.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eafbmgad.exeC:\Windows\system32\Eafbmgad.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Egbken32.exeC:\Windows\system32\Egbken32.exe117⤵
-
C:\Windows\SysWOW64\Eqkondfl.exeC:\Windows\system32\Eqkondfl.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ekqckmfb.exeC:\Windows\system32\Ekqckmfb.exe119⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fkcpql32.exeC:\Windows\system32\Fkcpql32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Fcneeo32.exeC:\Windows\system32\Fcneeo32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fcpakn32.exeC:\Windows\system32\Fcpakn32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fqdbdbna.exeC:\Windows\system32\Fqdbdbna.exe123⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fdbkja32.exeC:\Windows\system32\Fdbkja32.exe124⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fbfkceca.exeC:\Windows\system32\Fbfkceca.exe125⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gjaphgpl.exeC:\Windows\system32\Gjaphgpl.exe126⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Gdgdeppb.exeC:\Windows\system32\Gdgdeppb.exe127⤵
-
C:\Windows\SysWOW64\Gkalbj32.exeC:\Windows\system32\Gkalbj32.exe128⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gdiakp32.exeC:\Windows\system32\Gdiakp32.exe129⤵
-
C:\Windows\SysWOW64\Gbmadd32.exeC:\Windows\system32\Gbmadd32.exe130⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5672 -s 400131⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5672 -ip 56721⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3828 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Abmjqe32.exeFilesize
163KB
MD52b9e810d941ab3fcf610f97155569a48
SHA1d5b4fc597507a0f8c255670da424905cc57e7f15
SHA256030afb0681c88acf642ad400efba905907c7a90f9373e12e91c17eea0414af7a
SHA512028ccb7a9a234515e929e7b72b1a8983ecbf606c95b85c5d44a2f03d055e243a3477dd44d661fdedc62f5787d1e4e7f2ddc1563604dfe64aaf68796ffe0b2b5b
-
C:\Windows\SysWOW64\Akblfj32.exeFilesize
163KB
MD5fafb383f30584c23158a32061c54c78e
SHA1835701fde8bcd1bca77efd3122482f434cab97f5
SHA256f4caf822f4a3547a0013c51c1478b780b08717fb0d116b766fe85069667283a0
SHA51248a5ea007678fbdbe8a3bafbc0d65b231211a7999afce3bc1fdc7ba83f36d91cbb61c98f25fe66d47b0453fbb6c8e1a454b72470ddbc3bdaa432f3202c86ba37
-
C:\Windows\SysWOW64\Bacjdbch.exeFilesize
163KB
MD592fd25b0921cec6aeed573904368761c
SHA191981ee4954c6d50b8480f587f62b51f2c6479da
SHA2563a81869acb079b982e4b26da0bbacd7007f07502a7cb4e490cd69b2338b8e4c1
SHA512d1d9bee8ee23db41f27c28459edc3dd62e42f2b26085b94f2b35b17eb3e90fe3b4d5a40204ab7e21885fa2de2f103697558d87df65e5bc14912c8ec8f63c5144
-
C:\Windows\SysWOW64\Bdmmeo32.exeFilesize
163KB
MD5ce889e86769a824a05effc58dbe17123
SHA18977bda2418d2aeb2cdda4826dfd8b687cf91fa0
SHA256e25fa9cc23de5b83583997dd655cd96ef5378547b3b9f06e2a968c467fdc30a5
SHA5122abf358e23a1bf6858333b9dba3abe4e4e81daf31c2dbac969fbb5c32794030bb4e8ef60eb27ab88353c6b782cb98be3438f1c8cb4b1f4a04eaacfda14ce0bd2
-
C:\Windows\SysWOW64\Bnlhncgi.exeFilesize
163KB
MD5ca36f13de6763b095c0f53e991ec9358
SHA1f09b5968c63953b035b83911a7f8813cbc1c132f
SHA256970c1bb5afcc40e751cc25b85ddf4238cea37677687b5132a47615209520d94b
SHA5121f5e3d16884ea037b844718757c3c8588e7add732d5cce56b75190dbab5a31e1915aaf6fe546812e90233fcc4e934c7430be6669bac9dc6bf35dee10d64ac1fe
-
C:\Windows\SysWOW64\Ccblbb32.exeFilesize
163KB
MD5f2d9246a62636b5d58b98eedf8722b96
SHA1494ce96d928bd9beb35e13e4689f0a32806b3d32
SHA256e19e0b7d8c2da31b14e77597b210c6295d9140c37b7392b48844c72cb07dc2a1
SHA512f8a771a1e667880c133b574d299c052d7ed32364c6680cb1336996060dbbb7f7f0fb2fb3acc86ab537c9d29eaaf7ae9be4cf74e6380c8b6d20cb99d75e1e1323
-
C:\Windows\SysWOW64\Cdmfllhn.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\SysWOW64\Cdmfllhn.exeFilesize
163KB
MD57c23f88f2eb41b2fcda8292eaa0bc019
SHA1cd2213e797e59f05f26d8b6978206bc917d136cb
SHA2561d392c408c7ebf1e169ec8d4887e666b4ce81441a65e03d17c6835528e03bc7e
SHA512effaa9f9a57a5fa32fced9b15113d534062f6f2ec871ca3f75b9030132241e485dd5292d8c499f3db90a48d8f8739423ff8824479abe4eff2f15f1794568973f
-
C:\Windows\SysWOW64\Cdpcal32.exeFilesize
163KB
MD52aad605f40f211cc3ab5566eb3f5bd9b
SHA1a82a8505764a6847cf4425f1295e28ea5da994c1
SHA2568e244cee385b4c88248cc073626370534b72bb6fa8df719c9669fb0da9d10e4a
SHA5120c77bb8f30c2ec264fc0b1f6c6b0a302e9c9de64e582b7fedb35b1d72dae1e4952ce850ac3ce55f7680f5dcbe5af1c2f032fde4304b7cdd2c2f014d7c663b92d
-
C:\Windows\SysWOW64\Cggimh32.exeFilesize
163KB
MD587fe0ea0bad8b1cf3a507236b07279e0
SHA1be32161e872e355872db1a43b55929077369f88c
SHA25661e66ac7fa3c50568f4d988968f7499496d0625631575a0ccbb12ab46ad320c7
SHA51243b0085c12ebac47d18851fc5bff31d9c472f79e7da5c40097e2302a1942739bc9543eabd9da295269566dd3fd1c3db2668559a31cd3c08b9834aac96c117f0f
-
C:\Windows\SysWOW64\Cgqlcg32.exeFilesize
163KB
MD5b3213eb61f68f851d631fb6688a3ca81
SHA146e0a4f7837310b6f33754fc08ee340fc59f9821
SHA2567b65da748669e177cceb707f303634a8c5b8171da796d5db4dfbb9f68169dbce
SHA512d9009081af7c2c13a0da092bf6ec76b666ff27fbf4d26b96489a3174ab471de861cb296ee74c4ec47919ce295d3cd6c101d33328ef01390219831ab325e73893
-
C:\Windows\SysWOW64\Dakikoom.exeFilesize
163KB
MD569dab71917a2df58de39d55d3a438207
SHA12340095301d58715e54975c00df4a32f2e4b8212
SHA256c0ebaa9750b21d42ee4738aa428c1ff23b50918160fc5c9d0f1dd824f90a9510
SHA51259473e552d437f8939c39681c61cbad8bb410aeb0b6c1bdeba9b0dbcc92d882d6a18ba73c2b0942aed9ad7f7ef6a921f7525322eac990248f9993538f9fd2978
-
C:\Windows\SysWOW64\Dcffnbee.exeFilesize
163KB
MD5305fec73b6b66f4c24114fa1a64eabe1
SHA10015a9189f5404fb3e4416da27377f2132ae5ca0
SHA2563be274371eff1878665d443e23214db0482d4a483e9e9b97d3aa3aa839d76798
SHA512623e054edc7ce1d4d16da910967d612eb94c98fda9cd0d85c7715e03ad31a09be554794283bf7d79f878605f7876db0d1581d10181988f38a488f1f91cf88fd0
-
C:\Windows\SysWOW64\Ddmhhd32.exeFilesize
163KB
MD52f0cb0ea9b8ad75c6cd04a0a39c40b87
SHA190262257dc8c449b5df60e7a8da67f2039dac6cf
SHA256ec27f3945c4d6f17b9468d21ccad440c31a4701d44e6a7c323098792d06fa084
SHA5123762c92e6415711d9fdfb6190672b33331bf1060ac6bf22a88d0700149f7621f6e9aca2d4dda4ae5567f893c03db7b7d369fd2f9d282ec685bb1fede5ce986b9
-
C:\Windows\SysWOW64\Dgjoif32.exeFilesize
163KB
MD5d96c04153d007d73f644b7ca5723f8c4
SHA1ec1e60c0bfecb39200c13b7036982b29c0d47399
SHA2567aeada5584387c7aa6534a403fb7709e46d1bc9f748e6709c6baaae56179a9b3
SHA5123b6bf40491986c092d5f5488d903554c0f9ee7a6034713c12301460c21a5f35a71c64d792224b1e1cb44111eeb251aec8e6b36ee28faa201e9fb8b8aaf5b1267
-
C:\Windows\SysWOW64\Dhphmj32.exeFilesize
163KB
MD50e4345a352e223cbafb879af97c31e2f
SHA1fbe54cd10cb7964a085b19b844fddcce20ec3a7b
SHA25651f626f4a2a5264559f6818cebbb6497f0579cbde5c7955b487c1a718e46e698
SHA51253cd464d92519afcdf3e09f9c12b2a5b2891d678b59339ec758626d3048126f3aa7083f8c045cdd1c794e9e38838397e2e748a633bb646c93a355a9414c9469d
-
C:\Windows\SysWOW64\Dnqcfjae.exeFilesize
163KB
MD5c87ac5072e55cf5227f8635b32ef64f0
SHA10c4b9310894bd4e9b917be1767dcb3c180d47d96
SHA256fab6cfd740cfe32720e454852f838387a1f3096a51640e414108d7b1be603700
SHA5124ee8862c909a72a7a01a1e39ddd3128c5286e2b30fe401f9a6341b27a38af82fc7e059289fbb41a1ccee983ce4341e0ab16d260d6dacf09d9aa59cc93d95cd1c
-
C:\Windows\SysWOW64\Doccpcja.exeFilesize
163KB
MD5ef9d8c3e50a3388288a9f4274215be14
SHA1dab35c8c1c192e21f3b7b54e5f578962c4d3b75e
SHA2565ddaca372c797aaf296138d749662cd55b9aa67def7d8261dfd2266d239dfd1c
SHA51287aec2c03a207e3a0c4ac6870b3a1cf51fb3243153e1255a1c3ac9e1a33027d3bd8dbd1fd47a9aeaeca6ff848f77cdc248be19f9f04b616ef8b41e3e1e9d2710
-
C:\Windows\SysWOW64\Egbken32.exeFilesize
163KB
MD587b082e04aa2bf942aa6c6d2d0edde1e
SHA1d86c3e5335a8547f195a819fb3e20946ae828d5f
SHA2565ec9fcfd29b15ef482eb0219a91c7844c28ff093ae45431e509e05004c99e679
SHA51226bda73c6def722c28e8bf2ec4ea5bf65e1ff1896d066b069daf7b35c1dc8977ea205c334edc55a9b79cb4cfcde9aa51d7c32099106f6b18760ba63903002d9a
-
C:\Windows\SysWOW64\Ehndnh32.exeFilesize
163KB
MD5d39e5875a2a0c4d735a42d264bd9afd6
SHA143a63f816c5e06fda5b004e407256a191143be2d
SHA256344b21d8885c2f324cd40b9ae5fe80122a91de3a5106ff195d0ff1d6c595acb2
SHA51277dc39cc9a0c9e5412616d5d41b9ddb376e67af112e33f7160da6ac8deb7c91a5b8139439e9b993ca411eb80b4e9574cade8dd515cc7bb1568f739335cef32b4
-
C:\Windows\SysWOW64\Ekqckmfb.exeFilesize
163KB
MD5d9436bd0d3f791b4aa1d4d63cf3f58e5
SHA1353dfee34109cce331f6cb1de4dc3eeb1a5307ca
SHA256c43c101cd3ea3963fcc2053e90ad8279f5d0e8b298e7995323573580f26d1c41
SHA512eac018813a220a7e52d9cdfe6f4d1fe872a1a9bff92f50dfda984baf93ca2c34ce44c030e58995a3a0477d5bf8b22538ca420998cedb83359f559c2ec0340e55
-
C:\Windows\SysWOW64\Gaqhjggp.exeFilesize
163KB
MD59b729700a2396c3b6390c652fec9da44
SHA1bb0c0ad0a44cf448a32e57035d2051254dfbd8bb
SHA25617c02e1bc3f5bf2ee0f3b98ab51a9adda2e258ee0c27aaa002fab1480ac49b08
SHA512919a0283014fd74371253190688b9686e13562fba774d27d03916c188e75ed22ebe32daf0d0414b29478ed0616596bccae1e98736751828412c2d2e6e4818070
-
C:\Windows\SysWOW64\Hpfbcn32.exeFilesize
163KB
MD55f16f6c57a9d86cd7a03a25dd05e26ac
SHA1c215c227936981762b4311820613f556e6647eb1
SHA2567bb096adcb0db9d7454124664d2a9d152f00334291771861da64ee87e79cbe04
SHA51217f8e6936fcdc938ad6eda448e81a8c7d6a2bf83f13d53647b26d64889cd5f7f674e37b1ac84874f4fd61edfabb125dc2c7843bffe321ae411fb356a342b1667
-
C:\Windows\SysWOW64\Iialhaad.exeFilesize
163KB
MD5d6c55c2ee054aac1d3949cf22c6803b8
SHA18ad2cd7e5c8de7f4eec3991944ca1843b5afd7b6
SHA25692e8342668ac7b02b1098b675ea4b75b09e8af222ae1ce10ee37e40dd50876c0
SHA512935e8fff160e229bd5de097cb89b8cdca5bbfba4d823adba9a0343ea0a9db13feadcebd4741f5250ff9e25fd5ae428516e85eb0ce214acf5171fd5d37b7b7442
-
C:\Windows\SysWOW64\Jiglnf32.exeFilesize
163KB
MD52e08ae7af677e8541647b5f70c95fa04
SHA1ec39c373d018e9a2f710afc5a68bd12dc714cc26
SHA2566aeab072af7ab9d256750d9099acd8c3c898a3576f0768beedb0747ad2f47730
SHA512f7acc2807348adb58e963668cdcddb67c7e00bf2e041b179b28dbef4ee2b8e533dd0920a63633befeda8a67dc01bf2d33d23d5cd84677da321de4006ce093712
-
C:\Windows\SysWOW64\Jpgdai32.exeFilesize
163KB
MD586191019980909b809f4adac577955ca
SHA182adfd4a747eb8db13d90b6c6e9e20f8294b4f32
SHA256acabb5b20a00d4b0b367d31db652a260d6772faf9cae954f939705b4a4dba7fa
SHA512c5c43b3d803be7eea35581f8a865fa4d2abe3c2b93504be0493f77bd260c2855af973f03a9c3fc7a475a1abb03cbc5c021744819171b2a73d363eebe6bbd02bf
-
C:\Windows\SysWOW64\Kjblje32.exeFilesize
163KB
MD50937249a2773ac0aff326bd75759bbc1
SHA12453c3ca02587b2c2d652ae50c775ec86f389c9a
SHA2565c6c6bf7c968ae6878d53a1c8cc2dc92775c2593ac8e24807817a6f5036d46c0
SHA5129fd9ca4f322f8b780a5458659e95413d7db3571369c73fff6b7b073b9226c2bd768b5072f3bfde29df065c650e425da7928c61bba702c533114c5aac5e74fab4
-
C:\Windows\SysWOW64\Kjgeedch.exeFilesize
128KB
MD5e9ab1e6187e7bdeabde450b3608004c3
SHA11985c109f6a1a00e9808cd6d671be44fa76ba913
SHA256b2aa2b3f828abc62c627625077627eb1fc1c44feea4d502e6c24b5953f0ee5f5
SHA5123005864f150cf20a933b4073cce50b2ee6deb46f55b7d1a7b2c6df257fe2a00ce58c539d539fad135f86e8d820a4be830a479c144097a4e6a263ae26dc1d792c
-
C:\Windows\SysWOW64\Kjgeedch.exeFilesize
163KB
MD5572757ec7576a9e112a5c3ffb0fde2ef
SHA17691e309771995319421808c0884195c95ead2f7
SHA2569db554b48d881943cda1dc97ab5ba8096240168a7d6bfc933059271967003076
SHA5120416c08b5df1e2c61ae9a86ae539f6fd9d68c2b034512a211fc7fc5f9ab8762968b5b75abc05eecb569d6d015eba4062c2b1222ae4bd3e34506b265800675b81
-
C:\Windows\SysWOW64\Kofkbk32.exeFilesize
163KB
MD531c77b84682d651ac9c9ab964e65602b
SHA1ce9409b2b65789f06d39d93a7235f6204eb060e7
SHA2567b817982dc2b36919937cd60f1e8b407b3d983a152a376cc8d80a4d27fd7f07a
SHA512f8e2c3459633f600679e41e6d2f3ff48c37b3afd2fb097c8ba9d7185da0efe7369cde759e677762dbd0fac24630bc43d3243ec8212ef5146ff35995442995f71
-
C:\Windows\SysWOW64\Kpccmhdg.exeFilesize
163KB
MD59dcca3bb7ac479a01cc879d725485090
SHA15745895769695c4eced9ce394d32655fdc187415
SHA256fbf42ae6e38b61534b639f7fda7fd37411b8c838a31e0aecf114e97efea994cb
SHA5127971a083fb385810f94e353a274182c7e693612dd30c4afbbc927c2c73ee60b8f1ae6ccda0d02cd362ab785fe8727b8b23cfb4f0c8aa4e43ba00c62643258983
-
C:\Windows\SysWOW64\Lchfib32.exeFilesize
163KB
MD5e50ecb2e0187c4df3eff361d20ed97b4
SHA1b0486aa69169a2b868cec0c5452f38d6382cb5ea
SHA2560e763e4eda86ef972afdcd3c1d9bef8d1f4dcdbb948241de6671a5fb2cb714f9
SHA512787f21a79162d3a65228cee5b215498b4c70127cc6a24102e30eec459c275df0e18591fe9215ef86f009499ba54e26612788586f2b98bd430224c86600199237
-
C:\Windows\SysWOW64\Lfgipd32.exeFilesize
163KB
MD53cf3b7076344a96d0cc26eee91f708c9
SHA1b30d0a586e1d161835f59dd03c61ae89ba6e4835
SHA256d579868c5856c97930ccb4cb0b24cffd7cfe42296328d9f8b3807affd892a2db
SHA512411790582014a4189ef3addef9614be87735a78d9b90069a9b70b8dd101398c7ff66b8a76fb823242716475c4571905a4f3e4c367187c03d5372a9b5a518758d
-
C:\Windows\SysWOW64\Lggejg32.exeFilesize
163KB
MD598e8faab66b03f64d2fe3c759a285a5c
SHA16c0ce8258d0303bf8ab82257e135752efefdacc8
SHA256b3ac1ca54c0dc636024cec4dc7f32b7a341d741b7a7adf4cb662d2463beb6a28
SHA5121aea47e6684367b24d1ed145c1f73bdedb095927435ac0c123ed2a9854d39422cf67bcd1b5c4bfaf34f27d0b873ea3579690208abb7e3b8c699e84956f3a1822
-
C:\Windows\SysWOW64\Llmhaold.exeFilesize
163KB
MD58366e3709db3babad798b8210d6104f2
SHA126a1efe3f65e7280cfca499f555cdfa1f9d8cb38
SHA25696b049b845e9369770f61b881f8d5f514b06578c93d41374d0899e541731ac52
SHA512b4106a0f8a6d3339de8fc13a82873338ee4958e48402b23a9d39318c642a6700c96162bfaaa379c42bd3c5bde49bc3577f685aaafabb5ffbbcf4fa60c957ef13
-
C:\Windows\SysWOW64\Lpgmhg32.exeFilesize
163KB
MD57d4576e74f5016f0a6dd414e11fa6105
SHA19c2c798a907da3e6448ef9602989da3d7a9d4205
SHA256b74d69fd403acef585ca913bb2ff05710ed6ac3c8bc571140ab60fa22fc86253
SHA512619f029e0b27c64771a4d4876fb919dc7580d1db78d4ac80d501b2673131c375c6c544c500cff384c74a9d44180c8b64e41ba91ee6c143dec20b182ec4d82d9b
-
C:\Windows\SysWOW64\Mfchlbfd.exeFilesize
163KB
MD5df61adb53812bedb5dd40f28fffb76c8
SHA1fe80e8c5643e68a9465bce514c91beb84e0023a8
SHA2560f9ea495633ba95eac02a2760b57dbf2d12a0de9e8a4db088380746e62aff6f1
SHA5125b4c7afaf4c4163532669ed943687e6125d7925926f176cc14af53eabb425e84412d8447fe22d0b46eae91d90efa3762432af65a78e6857b4a18678a3a37149e
-
C:\Windows\SysWOW64\Mjjkaabc.exeFilesize
163KB
MD5f7735c94b5379c92a0f054a3a7af82e2
SHA143a5f49b6356ba75ae009bdeb9e573fa6da0c90a
SHA2568163110829fcb80270e15a042c1a1322216db9900549fbda45ae2b64a12d63b6
SHA512c373b47f4c11b38b13d9b99b6fa55be4cab88ca834c24d4488367a5e46936b1bc6b64faeb00c3e082aa288b2faf534cdfe61b7c1ff70d6a5718b9a3a1ded72b9
-
C:\Windows\SysWOW64\Njjdho32.exeFilesize
163KB
MD50995208cf30d45ea5d8f1351c3791458
SHA16cd79fdfcb9c96b4a93db10dc17efad2d1fc7894
SHA2566a324bd1d01b12ca3bec0897af01527126abf1aeec041280bf6cdbc64bcd5281
SHA5125427bca42d4692e1c15bc90d25022d683a7057ab4e0e982fc3dab2e26a28c391198689cf4a2fec52210a56e9171ac351bd26f12015c587843d463ad1bdca46ae
-
C:\Windows\SysWOW64\Nnojho32.exeFilesize
163KB
MD50543a7f809f964ce802f8f2b61b41b11
SHA11efefebfe7d6c0fc1cf5baf962099c6aa4906ef2
SHA256dfb8d5be19c0da3c748820ac0666698f72f4ee61ea34b2f771ccef1bbf682188
SHA5125d9e3a82171414af77b8c970933fb57c4a937e8a7835ce5437f3af7f80fb1d8117e19829e25f0a5c380871a770454b1dfafe1cbd954b3f1e992adf839a20eba9
-
C:\Windows\SysWOW64\Noppeaed.exeFilesize
163KB
MD5528c500849da987da4bd98e8fb45a47b
SHA12b78b6189bce8f502e392b1c0b8ff17f6dc683dc
SHA256728236c01f36c65aa5ff75844dd2aebd3f1c095699a43e504c92e2be2cf220da
SHA512e88e04613e4e1cb32da2ae3aa17ae223bdf9ee4e3376adf88bab50ed39d6f9389d08b8d876821146b7844cb7bc6abb49e94551ca126fb1a664444e851da5c865
-
C:\Windows\SysWOW64\Npbceggm.exeFilesize
163KB
MD5f08a405a029dae4cb96975a4c727e984
SHA1ba75c15f23dc52c701ee47ad4d6e034654830686
SHA2565afaf1e86654b5e7eb11480939f248e9ee7cf703e1e896ef83a43702d38deab7
SHA51206405b35f78caa8e976b702cab9e65988959e763d528f61a9f19210a1949126b0bf343a39984caf046458ec7198f2f26b0bbd5ef1f11459734d34354502be49a
-
C:\Windows\SysWOW64\Ofmdio32.exeFilesize
163KB
MD5b706a727c62c0a2fd91df0bc2a28bc87
SHA1e97e35c3ab991d262df13541867927827e22bd15
SHA2569afbc89176f1ad50f626f2a93f979c7407252fe0156f9fd4480689a285ea8082
SHA51217982f46eacba487cbf7368912b00a1fb60883953589f7f256707f4a578611a0c32f36de46148cc6e57d82937148afc5d6c6e3b497ce063407053d00ed5bc235
-
C:\Windows\SysWOW64\Oghghb32.exeFilesize
163KB
MD55ad52ff684173e140485e9abc0429084
SHA11ec89823e90571f9394526f00901a51d10e07d94
SHA25609f24dee5d339be631dc6ec37a47d867dc9c16b6e9663413597a34e5a4b5491e
SHA51208e6275ffa1921805b5e0a94c370565a9289a694f3c02df3e8cc8a9aa0c063f972f7443415b4705ff91cffac11b5baabb1aea2720671c103ce618b020de8cb3e
-
C:\Windows\SysWOW64\Ojajin32.exeFilesize
163KB
MD5ce6706df75c35089c0a90a0e23bab98f
SHA13375b41fdaef4d3473559415e1142ec1d75ce069
SHA256bb451d036c715435e76ba099b95f835df3fcefed1c99879ec7ccbed4f90a8aeb
SHA512baa706462ca90a15aedc748ae5983705374f4df7894414e80ca8bcd83c3aaa1c418c768dd0991d96061b09b3448a9201da9618495dba79e69472c60aa514e124
-
C:\Windows\SysWOW64\Paiogf32.exeFilesize
163KB
MD5058923a9d03dd6d4a48058b7ff9028ce
SHA1183eea6e7e4ee88e9742e9c1ccfbf0357f48fb94
SHA2564e6430d2333dc764091dc937896bdeb6f142810aab6c22dc1f8d923e9604f7c2
SHA5127bcba1f06d8782cc5c91e741c35bf71f37eea177784b342e8768e29d1577e1a17171b5f3e185b5cfb7acf6d17f7410fdb67fbe1deeb2dcc4b983f5628addd539
-
C:\Windows\SysWOW64\Pbcncibp.exeFilesize
163KB
MD5fd78a71795193f48a6a727b2ccd82c16
SHA125359f7fb2f2ba7a0c065f0d50d3ca5aae747fbe
SHA25628c8719de1ca58d286ffa44f4f80bade95e4f275d1576761c9ff994bb27da04f
SHA512f4e0379053ca46c4ca50ca276a899bde1a0b726b4e4aaddaded469dcca6d2fe457c4e8330aacad3cd5e157f0d2d368fdafef6f9dd5794e4ae7e5eca066e58f1b
-
C:\Windows\SysWOW64\Pjdpelnc.exeFilesize
163KB
MD56d7e6d33afd583f8847ac172b43aa325
SHA100912836cd00ea0304d9270524a8869f67ecd048
SHA25602fedaa9bc47e300d83df5c6649db5c9d9e2346c3ce025b3972be7ee922b9aba
SHA51245f85aaf1f5211fac5ef67a1859eb0a843c7a142a6679dcc049fc90b2d4b5d10f4ca9629bbfcfc1856e13216d753159dc26dc919e12bffeb47c2427d9f2dccf4
-
C:\Windows\SysWOW64\Pjkmomfn.exeFilesize
163KB
MD594013dc35c993cfad1446a064b9db597
SHA1c0439d07e4de3514a55e4ef17ad63a11674e4234
SHA2568a00df9748a54feb3feda6730a7935ae6535c23623a7e622dd44f73ca21c35c9
SHA512b40367960bcd9a2c52814716d3d7d813ab93df0bce68441fd782339743d543f94bff607f38e9c2f35c292a096e431adc324223ff6ce7dafc8375667754b23426
-
C:\Windows\SysWOW64\Qpcecb32.exeFilesize
163KB
MD5bce7e369ae812e7c3d92a60109de8190
SHA1e909bbcf8d28e7d4ddc1180190129045c35eafe6
SHA2567bbf3a38851a0edb26ad254fff724754e1b02957a8501b81b2733e124e2599fd
SHA512e7dc0c876849df2e62a07e45069893ce7d3d935078986dc205b9fd8a18c0f9ed0efdb21032192932e24ae3d20e9a9c53a48e440b1ffd7b9b2892a122748dde72
-
memory/380-1-0x0000000000432000-0x0000000000433000-memory.dmpFilesize
4KB
-
memory/380-543-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/380-0-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/416-270-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/456-378-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/568-218-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/616-390-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/660-40-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/660-594-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/720-178-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/976-1022-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/976-516-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1056-1011-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1056-552-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1248-448-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1332-318-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1360-138-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1364-525-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1436-258-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1444-234-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1468-145-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1476-324-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1492-276-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1524-466-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1524-1038-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1620-161-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1652-376-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1688-97-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1692-80-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1956-56-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1956-608-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1964-105-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1988-24-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1988-579-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2084-282-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2108-537-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2128-510-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2152-186-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2156-202-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2168-113-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2188-558-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2248-336-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2248-1079-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2268-241-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2308-154-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2336-169-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2348-491-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2472-623-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2472-72-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2648-426-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2652-312-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2680-572-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2680-16-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2876-531-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2944-121-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3032-1056-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3032-407-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3100-1081-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3100-330-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3424-401-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3472-288-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3560-497-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3572-1114-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3572-226-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3708-33-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3708-586-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3756-484-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3888-354-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4088-472-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4184-366-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4212-348-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4296-388-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4296-1064-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4312-130-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4380-601-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4380-48-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4408-360-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4456-439-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4560-463-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4564-8-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4564-564-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4576-416-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4592-1089-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4592-310-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4620-264-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4636-508-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4668-209-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4684-544-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4700-452-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4728-1047-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4728-437-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4836-294-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4840-300-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4940-90-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5008-193-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5012-342-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5020-250-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5020-1101-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5072-64-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5072-616-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5128-565-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5168-961-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5216-580-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5264-587-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5352-602-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5404-609-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5448-617-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5500-624-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5544-990-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5664-947-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5952-972-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB