Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe
-
Size
72KB
-
MD5
975b9d99ab539d9900e3711be9d7fc20
-
SHA1
a9cb0a007459491e201b0ece514338f217254a28
-
SHA256
2ab65b323c0d36a32407e02e006b17d9f01bd141e77c318b3dfae918a300ccdc
-
SHA512
b37737997198b1fbbe4865cba5960c791bf24bd5f19e41c96ba8dff4bfc50e7856919319f103271ed146dc085cfdf72cfde9ad0b482ea9e40014e266e973b0fa
-
SSDEEP
1536:02iNvwX0RQ21eHEyknG0VNKmEiAlQH2LJxPMTB4:xX0K21eHEJnZVcmOPyTB4
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oikjkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apeknk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmbgdl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oikjkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qbonoghb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Affikdfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpjmph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckbncapd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apeknk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajmladbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apjdikqd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amnebo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Affikdfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckggnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ccblbb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bphqji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pblajhje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccblbb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfepdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bkmeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckbncapd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdjblf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ppgomnai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daeifj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dgpeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofgdcipq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppgomnai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Piocecgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpjmph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckpamabg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgpeha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apjdikqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bboffejp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbonoghb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pfepdg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajmladbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckggnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bboffejp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdjblf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daeifj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pblajhje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amnebo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkmeha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofgdcipq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Piocecgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bphqji32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckpamabg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmbgdl32.exe -
Executes dropped EXE 25 IoCs
pid Process 4000 Ofgdcipq.exe 1668 Oikjkc32.exe 1892 Ppgomnai.exe 4580 Piocecgj.exe 224 Pfepdg32.exe 3832 Pblajhje.exe 3564 Qbonoghb.exe 3984 Apeknk32.exe 2056 Ajmladbl.exe 1368 Apjdikqd.exe 1564 Amnebo32.exe 2632 Affikdfn.exe 4360 Bboffejp.exe 2784 Bphqji32.exe 1456 Bkmeha32.exe 1884 Bpjmph32.exe 2060 Ckpamabg.exe 4692 Ckbncapd.exe 828 Cdjblf32.exe 4592 Cmbgdl32.exe 3872 Ckggnp32.exe 456 Ccblbb32.exe 660 Dgpeha32.exe 2172 Daeifj32.exe 3160 Diqnjl32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Daeifj32.exe Dgpeha32.exe File created C:\Windows\SysWOW64\Gejimf32.dll 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe File created C:\Windows\SysWOW64\Oikjkc32.exe Ofgdcipq.exe File created C:\Windows\SysWOW64\Nhoped32.dll Oikjkc32.exe File created C:\Windows\SysWOW64\Iblbgn32.dll Ajmladbl.exe File created C:\Windows\SysWOW64\Lcckiibj.dll Apjdikqd.exe File created C:\Windows\SysWOW64\Bfajnjho.dll Amnebo32.exe File opened for modification C:\Windows\SysWOW64\Ppgomnai.exe Oikjkc32.exe File created C:\Windows\SysWOW64\Piocecgj.exe Ppgomnai.exe File created C:\Windows\SysWOW64\Pfepdg32.exe Piocecgj.exe File opened for modification C:\Windows\SysWOW64\Pblajhje.exe Pfepdg32.exe File created C:\Windows\SysWOW64\Apeknk32.exe Qbonoghb.exe File created C:\Windows\SysWOW64\Ckbncapd.exe Ckpamabg.exe File created C:\Windows\SysWOW64\Ofgdcipq.exe 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe File created C:\Windows\SysWOW64\Nohjfifo.dll Piocecgj.exe File created C:\Windows\SysWOW64\Pblajhje.exe Pfepdg32.exe File created C:\Windows\SysWOW64\Mpiedk32.dll Pfepdg32.exe File created C:\Windows\SysWOW64\Cdjblf32.exe Ckbncapd.exe File created C:\Windows\SysWOW64\Ckggnp32.exe Cmbgdl32.exe File opened for modification C:\Windows\SysWOW64\Ccblbb32.exe Ckggnp32.exe File created C:\Windows\SysWOW64\Lhnoigkk.dll Ofgdcipq.exe File created C:\Windows\SysWOW64\Fnihje32.dll Affikdfn.exe File opened for modification C:\Windows\SysWOW64\Bpjmph32.exe Bkmeha32.exe File created C:\Windows\SysWOW64\Qecffhdo.dll Ckbncapd.exe File opened for modification C:\Windows\SysWOW64\Ckggnp32.exe Cmbgdl32.exe File created C:\Windows\SysWOW64\Dgpeha32.exe Ccblbb32.exe File opened for modification C:\Windows\SysWOW64\Piocecgj.exe Ppgomnai.exe File opened for modification C:\Windows\SysWOW64\Affikdfn.exe Amnebo32.exe File opened for modification C:\Windows\SysWOW64\Bboffejp.exe Affikdfn.exe File created C:\Windows\SysWOW64\Bphqji32.exe Bboffejp.exe File created C:\Windows\SysWOW64\Epgldbkn.dll Pblajhje.exe File created C:\Windows\SysWOW64\Ajmladbl.exe Apeknk32.exe File opened for modification C:\Windows\SysWOW64\Ajmladbl.exe Apeknk32.exe File created C:\Windows\SysWOW64\Fdakcc32.dll Ckpamabg.exe File opened for modification C:\Windows\SysWOW64\Ofgdcipq.exe 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe File created C:\Windows\SysWOW64\Iponmakp.dll Bkmeha32.exe File opened for modification C:\Windows\SysWOW64\Cdjblf32.exe Ckbncapd.exe File opened for modification C:\Windows\SysWOW64\Cmbgdl32.exe Cdjblf32.exe File created C:\Windows\SysWOW64\Dcjdilmf.dll Cdjblf32.exe File created C:\Windows\SysWOW64\Qbonoghb.exe Pblajhje.exe File opened for modification C:\Windows\SysWOW64\Apeknk32.exe Qbonoghb.exe File created C:\Windows\SysWOW64\Apjdikqd.exe Ajmladbl.exe File opened for modification C:\Windows\SysWOW64\Amnebo32.exe Apjdikqd.exe File opened for modification C:\Windows\SysWOW64\Bphqji32.exe Bboffejp.exe File created C:\Windows\SysWOW64\Bkmeha32.exe Bphqji32.exe File created C:\Windows\SysWOW64\Nppbddqg.dll Ckggnp32.exe File opened for modification C:\Windows\SysWOW64\Oikjkc32.exe Ofgdcipq.exe File opened for modification C:\Windows\SysWOW64\Pfepdg32.exe Piocecgj.exe File created C:\Windows\SysWOW64\Bboffejp.exe Affikdfn.exe File created C:\Windows\SysWOW64\Bpjmph32.exe Bkmeha32.exe File created C:\Windows\SysWOW64\Cmbgdl32.exe Cdjblf32.exe File created C:\Windows\SysWOW64\Lpcgahca.dll Ccblbb32.exe File created C:\Windows\SysWOW64\Mjaofnii.dll Bboffejp.exe File opened for modification C:\Windows\SysWOW64\Ckpamabg.exe Bpjmph32.exe File created C:\Windows\SysWOW64\Iheocj32.dll Ppgomnai.exe File opened for modification C:\Windows\SysWOW64\Apjdikqd.exe Ajmladbl.exe File created C:\Windows\SysWOW64\Dodebo32.dll Cmbgdl32.exe File created C:\Windows\SysWOW64\Ccblbb32.exe Ckggnp32.exe File opened for modification C:\Windows\SysWOW64\Dgpeha32.exe Ccblbb32.exe File opened for modification C:\Windows\SysWOW64\Diqnjl32.exe Daeifj32.exe File created C:\Windows\SysWOW64\Qahlom32.dll Daeifj32.exe File created C:\Windows\SysWOW64\Ppgomnai.exe Oikjkc32.exe File created C:\Windows\SysWOW64\Khihgadg.dll Qbonoghb.exe File created C:\Windows\SysWOW64\Klhacomg.dll Apeknk32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 220 3160 WerFault.exe 115 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpiedk32.dll" Pfepdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Apjdikqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bphqji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Daeifj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oikjkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ppgomnai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Piocecgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pblajhje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Amnebo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bpjmph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daeifj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gejimf32.dll" 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofgdcipq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oikjkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Apeknk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iblbgn32.dll" Ajmladbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfajnjho.dll" Amnebo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Affikdfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pblajhje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dodebo32.dll" Cmbgdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qahlom32.dll" Daeifj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bboffejp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnihje32.dll" Affikdfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khokadah.dll" Bphqji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bpjmph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdakcc32.dll" Ckpamabg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajmladbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajmladbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bboffejp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bkmeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cmbgdl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dgpeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnokmd32.dll" Dgpeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iheocj32.dll" Ppgomnai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qbonoghb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcckiibj.dll" Apjdikqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bkmeha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cmbgdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nppbddqg.dll" Ckggnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpcgahca.dll" Ccblbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khihgadg.dll" Qbonoghb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Apeknk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Affikdfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cdjblf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ckggnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ccblbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pfepdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qecffhdo.dll" Ckbncapd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcjdilmf.dll" Cdjblf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qbonoghb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bphqji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nohjfifo.dll" Piocecgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofgdcipq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhoped32.dll" Oikjkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjaofnii.dll" Bboffejp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iponmakp.dll" Bkmeha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckbncapd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdjblf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Piocecgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klhacomg.dll" Apeknk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 4000 1876 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe 91 PID 1876 wrote to memory of 4000 1876 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe 91 PID 1876 wrote to memory of 4000 1876 975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe 91 PID 4000 wrote to memory of 1668 4000 Ofgdcipq.exe 92 PID 4000 wrote to memory of 1668 4000 Ofgdcipq.exe 92 PID 4000 wrote to memory of 1668 4000 Ofgdcipq.exe 92 PID 1668 wrote to memory of 1892 1668 Oikjkc32.exe 93 PID 1668 wrote to memory of 1892 1668 Oikjkc32.exe 93 PID 1668 wrote to memory of 1892 1668 Oikjkc32.exe 93 PID 1892 wrote to memory of 4580 1892 Ppgomnai.exe 94 PID 1892 wrote to memory of 4580 1892 Ppgomnai.exe 94 PID 1892 wrote to memory of 4580 1892 Ppgomnai.exe 94 PID 4580 wrote to memory of 224 4580 Piocecgj.exe 95 PID 4580 wrote to memory of 224 4580 Piocecgj.exe 95 PID 4580 wrote to memory of 224 4580 Piocecgj.exe 95 PID 224 wrote to memory of 3832 224 Pfepdg32.exe 96 PID 224 wrote to memory of 3832 224 Pfepdg32.exe 96 PID 224 wrote to memory of 3832 224 Pfepdg32.exe 96 PID 3832 wrote to memory of 3564 3832 Pblajhje.exe 97 PID 3832 wrote to memory of 3564 3832 Pblajhje.exe 97 PID 3832 wrote to memory of 3564 3832 Pblajhje.exe 97 PID 3564 wrote to memory of 3984 3564 Qbonoghb.exe 98 PID 3564 wrote to memory of 3984 3564 Qbonoghb.exe 98 PID 3564 wrote to memory of 3984 3564 Qbonoghb.exe 98 PID 3984 wrote to memory of 2056 3984 Apeknk32.exe 99 PID 3984 wrote to memory of 2056 3984 Apeknk32.exe 99 PID 3984 wrote to memory of 2056 3984 Apeknk32.exe 99 PID 2056 wrote to memory of 1368 2056 Ajmladbl.exe 100 PID 2056 wrote to memory of 1368 2056 Ajmladbl.exe 100 PID 2056 wrote to memory of 1368 2056 Ajmladbl.exe 100 PID 1368 wrote to memory of 1564 1368 Apjdikqd.exe 101 PID 1368 wrote to memory of 1564 1368 Apjdikqd.exe 101 PID 1368 wrote to memory of 1564 1368 Apjdikqd.exe 101 PID 1564 wrote to memory of 2632 1564 Amnebo32.exe 102 PID 1564 wrote to memory of 2632 1564 Amnebo32.exe 102 PID 1564 wrote to memory of 2632 1564 Amnebo32.exe 102 PID 2632 wrote to memory of 4360 2632 Affikdfn.exe 103 PID 2632 wrote to memory of 4360 2632 Affikdfn.exe 103 PID 2632 wrote to memory of 4360 2632 Affikdfn.exe 103 PID 4360 wrote to memory of 2784 4360 Bboffejp.exe 104 PID 4360 wrote to memory of 2784 4360 Bboffejp.exe 104 PID 4360 wrote to memory of 2784 4360 Bboffejp.exe 104 PID 2784 wrote to memory of 1456 2784 Bphqji32.exe 105 PID 2784 wrote to memory of 1456 2784 Bphqji32.exe 105 PID 2784 wrote to memory of 1456 2784 Bphqji32.exe 105 PID 1456 wrote to memory of 1884 1456 Bkmeha32.exe 106 PID 1456 wrote to memory of 1884 1456 Bkmeha32.exe 106 PID 1456 wrote to memory of 1884 1456 Bkmeha32.exe 106 PID 1884 wrote to memory of 2060 1884 Bpjmph32.exe 107 PID 1884 wrote to memory of 2060 1884 Bpjmph32.exe 107 PID 1884 wrote to memory of 2060 1884 Bpjmph32.exe 107 PID 2060 wrote to memory of 4692 2060 Ckpamabg.exe 108 PID 2060 wrote to memory of 4692 2060 Ckpamabg.exe 108 PID 2060 wrote to memory of 4692 2060 Ckpamabg.exe 108 PID 4692 wrote to memory of 828 4692 Ckbncapd.exe 109 PID 4692 wrote to memory of 828 4692 Ckbncapd.exe 109 PID 4692 wrote to memory of 828 4692 Ckbncapd.exe 109 PID 828 wrote to memory of 4592 828 Cdjblf32.exe 110 PID 828 wrote to memory of 4592 828 Cdjblf32.exe 110 PID 828 wrote to memory of 4592 828 Cdjblf32.exe 110 PID 4592 wrote to memory of 3872 4592 Cmbgdl32.exe 111 PID 4592 wrote to memory of 3872 4592 Cmbgdl32.exe 111 PID 4592 wrote to memory of 3872 4592 Cmbgdl32.exe 111 PID 3872 wrote to memory of 456 3872 Ckggnp32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\975b9d99ab539d9900e3711be9d7fc20_NEIKI.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\Ofgdcipq.exeC:\Windows\system32\Ofgdcipq.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\Oikjkc32.exeC:\Windows\system32\Oikjkc32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\Ppgomnai.exeC:\Windows\system32\Ppgomnai.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\Piocecgj.exeC:\Windows\system32\Piocecgj.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Pfepdg32.exeC:\Windows\system32\Pfepdg32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\Pblajhje.exeC:\Windows\system32\Pblajhje.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\Qbonoghb.exeC:\Windows\system32\Qbonoghb.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\Apeknk32.exeC:\Windows\system32\Apeknk32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\Ajmladbl.exeC:\Windows\system32\Ajmladbl.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Apjdikqd.exeC:\Windows\system32\Apjdikqd.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\Amnebo32.exeC:\Windows\system32\Amnebo32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\Affikdfn.exeC:\Windows\system32\Affikdfn.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Bboffejp.exeC:\Windows\system32\Bboffejp.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\Bphqji32.exeC:\Windows\system32\Bphqji32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Bkmeha32.exeC:\Windows\system32\Bkmeha32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Bpjmph32.exeC:\Windows\system32\Bpjmph32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Ckpamabg.exeC:\Windows\system32\Ckpamabg.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\Ckbncapd.exeC:\Windows\system32\Ckbncapd.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\Cdjblf32.exeC:\Windows\system32\Cdjblf32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\Cmbgdl32.exeC:\Windows\system32\Cmbgdl32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\Ckggnp32.exeC:\Windows\system32\Ckggnp32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\Ccblbb32.exeC:\Windows\system32\Ccblbb32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:456 -
C:\Windows\SysWOW64\Dgpeha32.exeC:\Windows\system32\Dgpeha32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:660 -
C:\Windows\SysWOW64\Daeifj32.exeC:\Windows\system32\Daeifj32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2172 -
C:\Windows\SysWOW64\Diqnjl32.exeC:\Windows\system32\Diqnjl32.exe26⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 41227⤵
- Program crash
PID:220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3160 -ip 31601⤵PID:4188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4420 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD507f3732fde7b8ddee8f3fc88fe3361e0
SHA159c4aa6621822fe0666b60ff5a90f37693a1d985
SHA256a04063cf3d060f69d3ca306efbd028d836abb508b3a486a4fbf5cb72983236c1
SHA51259c1ef865f44ddc6ca5ad525dc388851575e5824ba123fad4df114f73bec253dd3e7cd6205310af7a754cab15b687a530bcc9056cc4bf43128d7655194ad4d31
-
Filesize
72KB
MD50524f11e684c0ea45afd1cf14f9fa18f
SHA15ddd1eebfd186745ac62be1ef8774f6bc4b2f442
SHA256502c299d2b9c4f28d666be49241c888be291277eae67ca550ba951584bd8a8e8
SHA51266f7093e6701abe4dbb492ea00db48471113ff3b662301e9c91f10e3fb1c65902691d9f1aa28243bd8eb4c7b18ee04db77075403d915da35aadf4267f865b7f4
-
Filesize
72KB
MD5e07e5428bf230d4a38178766ed57cf6a
SHA18d68a694fe03af94d8b8d74325d531117caf75ff
SHA256ba16e29b1aaeb6472dfbb2d3580d07495145293a6e9304d25ebe8ee718c03ee7
SHA5124881a939d3fe942b10a63411f4b1172da1c974fe134b346d6d8e9e6250755c2e930e7c7e2ff0a44c35bbd6a38c29bcda81a079118a1a251702fb2a8e8d1f6daf
-
Filesize
72KB
MD598154d308da2309fd6276194fae75aa8
SHA1a0f2f29c3fbf5abfca4a99c3e4d513659f1e6592
SHA25648be43a59eb4c455e39ce5fdc85fcbe1739d386c44d47a08e4364b5a0b7c3e24
SHA512cdc7f38d4dcd403eb6f8aa7890f244d6df43dafd2bc9f178dc57c4f19a7b60dd16683f2e4e7faee0ec81d8f7da944075e0e5190701560849158ef3f6164bf590
-
Filesize
72KB
MD54a6b6c3ce2ccbfa1a2acd25f1f95f067
SHA157448a28fcfcf6b0a20a794b4e82132b6f4e4453
SHA256c66b26e679208e49464f42486758c0b041d64f831ea435eec1fe9ca73932bf38
SHA512797940e231fb368622752819829e8fc944577a3d8aa7c1d36205b47247f15e74a7699f95aff830101b0df9c71055995fe8b32d0575e6cb4c3460fc9d5e946cfc
-
Filesize
72KB
MD52e75ea0d3b633715e6756a7391a16d8f
SHA1a64f119e5dc7ccc3074705b57b52cd2213a4f50a
SHA256f8bded73e5300e913fee409b42a25d15b098d2a33babf3f2a47ee3cda0c14daa
SHA512dc2d52dc25b252eecb01e44bb5635ec5e6d7fe98a19725523f0ebc0e83473a076996264c758455ab9fe11f11c058833faf3174888ace094c412b351550473f97
-
Filesize
72KB
MD5bf27b4dc5a9dc9aad7b2cdde790ba1d1
SHA123afa4d276d66d608d56abe52a9f30609a5bcba2
SHA256b0a3a9536515330f44010544e4b38ee2f56bc8fd08c5d6b333dddfeb9a31bf32
SHA512cc350921f4edc523cdf4e14acb3f53f09552b58dfb7e3a09056ece1019857cdf99483361f427e51dc42c9a3532dfa486a6e71ce98c459729875d4eb7a60fe577
-
Filesize
72KB
MD5a21b143f632ba1dedfbbedddfdcd95c7
SHA15882a10f40a3f7dc5886ba718b25e319d4996483
SHA2564ce4d0bbf53c9e28dceb882fbf16261126fe9a504297709eb49ea385856cb953
SHA512d1c3214591b976c82556b588870c704c85df355e8bd74d4de7577ec5782629c0d80a3b6999405a584569e23c7468da5af1930817acedce87a2be951ab935fde2
-
Filesize
72KB
MD5a3180c79a16f8ffe395ab2a4b7ded731
SHA11f2049594baa3fc7531796c61e878abca3ae369f
SHA256af0c8deb13176f8848b89ac0a414f04bc53fca3f98a6c322b03ad74a4c4d04a9
SHA51216c14ffdc890ca191a7802b138dd3899c7a000edb101e723a41888d38abed0992f98909cd03a104ef6ede0a4fc04a08697fbdeb724b11c5f97f759b6c3d3f72b
-
Filesize
72KB
MD5fcfd7aec98ccce89a1c6988a045d124a
SHA1e7812c89f6b230af9dbb896be7e2078dd66ed416
SHA256e3b325161aed4ee2fd2c9cc16c1d327b4aeece10e6b9e2454f30b0d7be3c311b
SHA512b4ddd665f67e5ca278c3a7ddc62c9069b87062d601f46c9b0022b7b5747c99ffbafcb40ee23885e6a8755a52715395f88a246ae07009909ac317a778f2aeb30b
-
Filesize
72KB
MD5f303d06b9373c0afd07dc78504d9299c
SHA1f920d25a98fa0e6cbf99e91320006649f4ab17e3
SHA2566863ce9b2e01d4398f457639917795880ce9ddfd0de854956081eaff1770bf13
SHA51292f2e0053f4e737d149101ecdec2e18d0a5b41af003eefd596cb2e51056e649751da649d43aab55b4f72b45a689beddf5a299da6559a6f32a366de5f5c2c5e60
-
Filesize
72KB
MD55ec634213b17a07bc1a06463d4bc8dd3
SHA1ddc8269e6175784bf20b2724830eda7cf1534b38
SHA2569281739e4fed109948717b04c1aab9e9707bad5d3c47561542710200368d1b47
SHA5123a4b63c859cd88f3733880888ef4ea1d0ad03f4267b3219ab51fd578a38e1cc9d9597a5ced64b864cbdd957cd5e45df724f4f4e93e5263896405e8e5ea62b933
-
Filesize
72KB
MD5eaf3058bdb108f99acddb9256a2a625d
SHA17fec6ded8a09bed176484dce326b6e67025e5007
SHA2561d9d92788a0dd67aa4b04fe49df22af76ffb4047285a92353396974e97c12fd0
SHA512a0ff1be342f2202ff05ffa2b0e61b4bcb300ff6a952369a90a948438d3582e8c25ca60c7089d37bd14fb0608b1fd973d0e4939c2a12e5ae2669ee94e5c566965
-
Filesize
72KB
MD587e5b15c93038fd52064c323f230a740
SHA15092f139afacbeca941261f8415c51ff70aacf30
SHA25617c1c693219e68cf934ba38e73e6ae5689db6e89bfc18d1bd87fdb673ec1078f
SHA512b2a1f794f5049955d0cf10ce6732f4cef6b1d842da18f118b7bb7330c65ca69fa41d9865ade6775533c6f053b9a9a68b843f3ec27ac7d76f25433efb606a458b
-
Filesize
72KB
MD53de3a87a21a2425c063dae11f0c75963
SHA1547301911567c1151191aad5c86a1e6622836323
SHA2563cbc0edce9cc3b404c8970ead9fe0738e034666d342c91a89b7e4f12fbf03a74
SHA51261d7cc6eb04fc1aa6b6ba6c8deb55f2f57452c13abf4f503d925df7bc9cb4ae50bba8d5a279a0e08f097070d1fcefeb7cf920e8e9e893118c8d585f41beae61b
-
Filesize
72KB
MD52be2e404b6ddf8eb256cd4aaab2de94c
SHA11a6ad3ffa2190f0cf6387f6767160265bdd2f20a
SHA25674ab942e20e12370178a9b3599aa8587a70ed68fea7e740f77e2662bc8f613a7
SHA5120d6e9f4a32e7605260a762f49ed3f558c5d46e647c3c4e2f360cdd376f5f5c9ccdd7fcdb1f6c213445b39405a0cbc75caf3c2c6a95345de694d458d55cc4428c
-
Filesize
72KB
MD540da7e7c34c7a919a2fefe6c13417650
SHA18910adfadaff45f8058fdb7782cb4bac83cbf458
SHA2569ab8c9e7a0cffa07507d597f483dc7a866d959c38b1d968096fdf68c4280bf57
SHA512857517615ac78ac20d1158f364caa63dfa395dc4215a6ccb04386c51ccf02f6b41225d78177ecef30e74a5d1506773cf537df82e4c59dbec299eb28154b5e301
-
Filesize
72KB
MD5a570e29f66c3d70cd8b07d3796f8b489
SHA11a91d0ffd8f0c543a073bd46ccb4756629ecdc7e
SHA25648a64518709e5377fe8d24c728d81257654fb5afadd2c9986db3e31508ad09c2
SHA512cf3c388bf842c7c62c954f9332413b9a36f612d4e29e0505ee842c43d716c0fbcc3fc7604d582b9d4c19b4b1021b90133ff5ab851b67735d67f2a48ece25c541
-
Filesize
72KB
MD57702a527d1672a06351a31661b04dcf4
SHA1c78792aac211ee87984a86d311013e65f13abdc6
SHA2560fc23f086dd792810d09c3fe39083c917799620557fd0ee1c6bdb3ac2480fcb2
SHA5121c0c9c330a604fba7842812af2d93e25c819290016fd5d9b77983afb146f9da5c82f42ef55e0fba0bfefec0b7e6110807565ef3661cba7a60732bfb725de3a81
-
Filesize
72KB
MD54d37612213feadc5edc59e72c9874bae
SHA16f2b16e2c19c3bee9fb8d5b37fa34d56d3f565a5
SHA256a76d19d56d024819f8c1bda14a8d8e827b3b8857789582a72971251792b57850
SHA512b21b41b30099145024b5da101ccb1f69487f74a483db613a609ce76070eede74e0587e1f19f95cb4a6fd1fb439272a66b9b8209f64281beff471e0c546991197
-
Filesize
7KB
MD59ee627c180bca87e09b53adacfd7091e
SHA1ccdca7790264f361b9c2c065b579ab91c391a9d3
SHA2562ce094dd41bd2a9d3f5cbf15a5e76e67b87719fdb827c19cbfabc1702061598d
SHA5123b054515cfda5acff19811052b59598c63df3c61441173bb047fc312a9cd45182be7f62ed6e1f73fe15170f2bd4f8d07c6ebf81fdd9d7542dd469ba19e976731
-
Filesize
72KB
MD5a603e31d84c9478a745b00b2510507ab
SHA1e4ee01bd06d430c8c612fec5a848cc4922b40ebe
SHA2563f932496ebd32b50fe7682fccf7a4d1e0b9060e9189fbbb4d00fc991f7fe191f
SHA512c2185999df30a8f9bf94aaed55f31748eeea55c48cfdc281a842b4dc44287c8f1d13e023e093d658dc63898015989615d8268ddbee0095449c25fee78df523d1
-
Filesize
72KB
MD50b57ccf4cbb9843058907cbd2a9d03dc
SHA1810b3509c83ac572f854da9bcc35373111b69044
SHA256239a55be35cdb2db1a08da8911d22090ea32e549429412497b57561839f210db
SHA512b761098dc507d529bea7118b3087e7b637695f0c56897690aa19f817be25ba29cd4818802aaab5441d780870d7cd6a6e211c85d8881e9123cc3f51adbd6dc086
-
Filesize
72KB
MD5ba03207698da498beeb98c1fa6655a39
SHA13a11ba7523e8504285d7e3dc7382dc8e26c34614
SHA25621fa846609d3f0fe6ba2bf3b40e11d88e5572295dfdf768efb21b7e4a7c7b029
SHA512dbbd7602687d5c9cb7203b46bb6afaaab9db4bdc988a7c23ce4ec9c7a9185075ec3e82e5dd18494fe061105689340ea7ca29411f31db881c4d093f9a08ba754c
-
Filesize
72KB
MD5ac2320422dcc3fbc1bee995cdccefef5
SHA1799adc5ba0ab11eb840cc85b6534059e151bdf23
SHA2568f94145d8d420faa903acfdad690ca7daada58822f23a82efac44eaa5cb2fa51
SHA512c4ed83d6053a0cf1b14cb76c65e206c8d37939081f6fa5d0f8210c1294a69d46b4905e5268281c03309330beaa9bf0a261a68097552a5b376435a661af451f4b
-
Filesize
72KB
MD52f30176066308a3e673709d09ae2a7e6
SHA1b2603330a04e53d24c4dfd7b2f8c4b4920dd0755
SHA256458cf1b9889e8460946b2a54e2fa33f5e6be4bdc6667a7a73042ee1a90c63e85
SHA512414e8626a0be3e24c2844966b52caa1c5ae0cd37bf0e9e2129ce84d55bfdefc38bba332464d7a8b82d99be9f56e254d46a5c0b73996f1e80a75ea37d132e936f
-
Filesize
72KB
MD505623d89fbfb8027148d4f9002162cdb
SHA1047fd92f0278019cd0116b9fa6b1f6756a0eb2f5
SHA2562f13343cb54089445aa5cc864dbd9302e02b17e1e34f030a64e882c168e3c4ed
SHA512d34bf41b463bf958e24259ff2c49c89cb057225a6d48247b32980dd0662823353f89389b29916773f29dc1eff9620cb006843bb27f0de1db32ab2de210df4a62
-
Filesize
72KB
MD5285043585d14f1a0892b09602f420451
SHA1e6c54155edcce165c65d396b22f6343ebb092bd3
SHA256944496f46bb6890670847764a25b68975a937919595fc13efb5bd8183175e4d3
SHA5125da9ebcf62f795a592d0b8f11ee5f29a2e231822bdd8bc67b40fd78b98c547192c711f0e3091c2b2f7cfa6ea0ae169ca2b747c8b827974412fb62b46c691ee5d
-
Filesize
72KB
MD59ba71af7af1a3af2156b91ac41d2f4e0
SHA1e458fcf017146164447aa085b864e05f2b93998e
SHA2569f240c3d8f9570ec014a3d75e07d24007c83ca7ba6a7228728a55cc407fa7b49
SHA51295cea68fe6f037fb5e17bf5ef74580056d5c9c2adbf9d719afd29dab0e65e724368a3c4bfea4d0f0088b3b2b24b149846256d51b27f28095e8ab1b1ee4a120c3
-
Filesize
72KB
MD5340218adf6ca75696027185fb9d6b449
SHA1df18078af3ae33b8a854603f2d713b82a3999053
SHA2568da8beb62572011a6ab86ae2c74d19abb5713719dedd674d61d4fe0b8c59f657
SHA512a457e209a97110def40b2a2019ec5e8a4611d9b784124c3c0aaf86ddc1b64d7bbc4f644f7ed0207a1285d4b850ba5f93fba5204e9f641fd94daf39f3f01a460d