Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 03:28

General

  • Target

    df08e4fdbeb8437eca7525104c286d10_NEIKI.exe

  • Size

    340KB

  • MD5

    df08e4fdbeb8437eca7525104c286d10

  • SHA1

    563bb4fe3d950204b36fc34b4e0df35dbefd0e20

  • SHA256

    d91fcd865f230331e7238207989c2eaf8a79383f1fc2dbd64993e765f476df0c

  • SHA512

    e60447f14baf6c48bd85ed56147f8dbcefe5de3b1abfe545a093cd18783acd50976e0c5919b1b16fba32f1666b30b93b5ed270bdaae90446d18b92736d46b284

  • SSDEEP

    6144:F72mwrJ8IyedZwlNPjLs+H8rtMsQBJyJyymeH:9lwrhyGZwlNPjLYRMsXJvmeH

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Malware Dropper & Backdoor - Berbew 39 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df08e4fdbeb8437eca7525104c286d10_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\df08e4fdbeb8437eca7525104c286d10_NEIKI.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Windows\SysWOW64\Jmpngk32.exe
      C:\Windows\system32\Jmpngk32.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\Jdjfcecp.exe
        C:\Windows\system32\Jdjfcecp.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Windows\SysWOW64\Jfhbppbc.exe
          C:\Windows\system32\Jfhbppbc.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Windows\SysWOW64\Jigollag.exe
            C:\Windows\system32\Jigollag.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\SysWOW64\Jpaghf32.exe
              C:\Windows\system32\Jpaghf32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4696
              • C:\Windows\SysWOW64\Jdmcidam.exe
                C:\Windows\system32\Jdmcidam.exe
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3936
                • C:\Windows\SysWOW64\Jkfkfohj.exe
                  C:\Windows\system32\Jkfkfohj.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:5112
                  • C:\Windows\SysWOW64\Kpccnefa.exe
                    C:\Windows\system32\Kpccnefa.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:1428
                    • C:\Windows\SysWOW64\Kbapjafe.exe
                      C:\Windows\system32\Kbapjafe.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:2336
                      • C:\Windows\SysWOW64\Kacphh32.exe
                        C:\Windows\system32\Kacphh32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:3880
                        • C:\Windows\SysWOW64\Kdaldd32.exe
                          C:\Windows\system32\Kdaldd32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1012
                          • C:\Windows\SysWOW64\Kgphpo32.exe
                            C:\Windows\system32\Kgphpo32.exe
                            13⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1524
                            • C:\Windows\SysWOW64\Kmjqmi32.exe
                              C:\Windows\system32\Kmjqmi32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2348
                              • C:\Windows\SysWOW64\Kphmie32.exe
                                C:\Windows\system32\Kphmie32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:3212
                                • C:\Windows\SysWOW64\Kgbefoji.exe
                                  C:\Windows\system32\Kgbefoji.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:3160
                                  • C:\Windows\SysWOW64\Kipabjil.exe
                                    C:\Windows\system32\Kipabjil.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of WriteProcessMemory
                                    PID:3480
                                    • C:\Windows\SysWOW64\Kagichjo.exe
                                      C:\Windows\system32\Kagichjo.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:3468
                                      • C:\Windows\SysWOW64\Kcifkp32.exe
                                        C:\Windows\system32\Kcifkp32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:4004
                                        • C:\Windows\SysWOW64\Kmnjhioc.exe
                                          C:\Windows\system32\Kmnjhioc.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:1440
                                          • C:\Windows\SysWOW64\Kpmfddnf.exe
                                            C:\Windows\system32\Kpmfddnf.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:1040
                                            • C:\Windows\SysWOW64\Kckbqpnj.exe
                                              C:\Windows\system32\Kckbqpnj.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:2260
                                              • C:\Windows\SysWOW64\Lmqgnhmp.exe
                                                C:\Windows\system32\Lmqgnhmp.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:828
                                                • C:\Windows\SysWOW64\Lgikfn32.exe
                                                  C:\Windows\system32\Lgikfn32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:464
                                                  • C:\Windows\SysWOW64\Liggbi32.exe
                                                    C:\Windows\system32\Liggbi32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:4720
                                                    • C:\Windows\SysWOW64\Lmccchkn.exe
                                                      C:\Windows\system32\Lmccchkn.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:544
                                                      • C:\Windows\SysWOW64\Lcpllo32.exe
                                                        C:\Windows\system32\Lcpllo32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        PID:3600
                                                        • C:\Windows\SysWOW64\Lkgdml32.exe
                                                          C:\Windows\system32\Lkgdml32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:4792
                                                          • C:\Windows\SysWOW64\Laalifad.exe
                                                            C:\Windows\system32\Laalifad.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:3020
                                                            • C:\Windows\SysWOW64\Ldohebqh.exe
                                                              C:\Windows\system32\Ldohebqh.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              PID:2884
                                                              • C:\Windows\SysWOW64\Lgneampk.exe
                                                                C:\Windows\system32\Lgneampk.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:3064
                                                                • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                  C:\Windows\system32\Ldaeka32.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:2036
                                                                  • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                    C:\Windows\system32\Lgpagm32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:2832
                                                                    • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                                      C:\Windows\system32\Lnjjdgee.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:3676
                                                                      • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                        C:\Windows\system32\Lddbqa32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:1508
                                                                        • C:\Windows\SysWOW64\Lknjmkdo.exe
                                                                          C:\Windows\system32\Lknjmkdo.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:3332
                                                                          • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                            C:\Windows\system32\Mjqjih32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            PID:4592
                                                                            • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                              C:\Windows\system32\Mpkbebbf.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:4928
                                                                              • C:\Windows\SysWOW64\Mdfofakp.exe
                                                                                C:\Windows\system32\Mdfofakp.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                PID:1348
                                                                                • C:\Windows\SysWOW64\Mciobn32.exe
                                                                                  C:\Windows\system32\Mciobn32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  PID:2116
                                                                                  • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                    C:\Windows\system32\Mkpgck32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:804
                                                                                    • C:\Windows\SysWOW64\Mnocof32.exe
                                                                                      C:\Windows\system32\Mnocof32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:3084
                                                                                      • C:\Windows\SysWOW64\Majopeii.exe
                                                                                        C:\Windows\system32\Majopeii.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:5092
                                                                                        • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                          C:\Windows\system32\Mdiklqhm.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:1412
                                                                                          • C:\Windows\SysWOW64\Mcklgm32.exe
                                                                                            C:\Windows\system32\Mcklgm32.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:3740
                                                                                            • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                              C:\Windows\system32\Mgghhlhq.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:5008
                                                                                              • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                                                C:\Windows\system32\Mjeddggd.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:3948
                                                                                                • C:\Windows\SysWOW64\Mamleegg.exe
                                                                                                  C:\Windows\system32\Mamleegg.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:912
                                                                                                  • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                    C:\Windows\system32\Mdkhapfj.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:2608
                                                                                                    • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                      C:\Windows\system32\Mgidml32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:1100
                                                                                                      • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                        C:\Windows\system32\Mkepnjng.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        PID:5076
                                                                                                        • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                          C:\Windows\system32\Mjhqjg32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:3128
                                                                                                          • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                            C:\Windows\system32\Maohkd32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:3940
                                                                                                            • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                              C:\Windows\system32\Mpaifalo.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:3688
                                                                                                              • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                                C:\Windows\system32\Mcpebmkb.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                PID:2324
                                                                                                                • C:\Windows\SysWOW64\Mglack32.exe
                                                                                                                  C:\Windows\system32\Mglack32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  PID:4616
                                                                                                                  • C:\Windows\SysWOW64\Mjjmog32.exe
                                                                                                                    C:\Windows\system32\Mjjmog32.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    PID:1480
                                                                                                                    • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                      C:\Windows\system32\Mpdelajl.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:4088
                                                                                                                      • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                                        C:\Windows\system32\Mcbahlip.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:2176
                                                                                                                        • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                          C:\Windows\system32\Nkjjij32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          PID:684
                                                                                                                          • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                            C:\Windows\system32\Nnhfee32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:2240
                                                                                                                            • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                              C:\Windows\system32\Nqfbaq32.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:1008
                                                                                                                              • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                                                C:\Windows\system32\Ndbnboqb.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:4256
                                                                                                                                • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                                  C:\Windows\system32\Njogjfoj.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:4016
                                                                                                                                  • C:\Windows\SysWOW64\Nnjbke32.exe
                                                                                                                                    C:\Windows\system32\Nnjbke32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:1244
                                                                                                                                    • C:\Windows\SysWOW64\Nqiogp32.exe
                                                                                                                                      C:\Windows\system32\Nqiogp32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4240
                                                                                                                                      • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                                                        C:\Windows\system32\Nddkgonp.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        PID:3452
                                                                                                                                        • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                          C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                          68⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          PID:2668
                                                                                                                                          • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                                            C:\Windows\system32\Nnmopdep.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:3644
                                                                                                                                            • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                                              C:\Windows\system32\Nqklmpdd.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:4340
                                                                                                                                              • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                                C:\Windows\system32\Ncihikcg.exe
                                                                                                                                                71⤵
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:3616
                                                                                                                                                • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                                  C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:536
                                                                                                                                                  • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                    C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:4596
                                                                                                                                                    • C:\Windows\SysWOW64\Nqmhbpba.exe
                                                                                                                                                      C:\Windows\system32\Nqmhbpba.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      PID:2920
                                                                                                                                                      • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                                        C:\Windows\system32\Ncldnkae.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:436
                                                                                                                                                        • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                          C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                          76⤵
                                                                                                                                                            PID:1728
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 400
                                                                                                                                                              77⤵
                                                                                                                                                              • Program crash
                                                                                                                                                              PID:4844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1728 -ip 1728
      1⤵
        PID:4104

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Jdjfcecp.exe

              Filesize

              340KB

              MD5

              5b9d970c3bc8b985c5cc5342b5eb9999

              SHA1

              13e7550d094024e9b4fc3ddee76f9b9d1e6ab4b4

              SHA256

              f4cfc657496843da389be8b7a2ed8b8a7b51757c64f1c1263273b1d323dbda2b

              SHA512

              ca3cd219fad09c1b39957aa32f0eeee31affdabe7089978b0703e29334fee3f3ade83d138196a3a3f8a1c2a0c3195ffb60aa0972db185f92c8b34f0bdec779ab

            • C:\Windows\SysWOW64\Jdmcidam.exe

              Filesize

              340KB

              MD5

              1f750371de08686900b8f476a67a969c

              SHA1

              ddfeb278759023f98ff6c9ae539c38e244520374

              SHA256

              44ebbfb3315d3f1ebcb3d9985ec973a7947cf607624e5bd149ef3088681da5bc

              SHA512

              5e4edca210b74252a90704de7ba8115f62e2aec94ee0d98910c6fc67de0bb166a58c56872361f50957c6e3517b1dc79c3c6fa87e1f737b3d78036cb9dc271743

            • C:\Windows\SysWOW64\Jfhbppbc.exe

              Filesize

              340KB

              MD5

              d68179d958abc404a38f0552251c31dc

              SHA1

              dc816d247356040788f5144c83831c195dea4415

              SHA256

              646ea1867f8c7fabbe556a958b26a29755d4faf38c290835340781b7524af4a9

              SHA512

              f598a48ea88dd4ba1bc563d045af68d1f6ee4e5395772cac61c4362e3cad2be4e879d9fd62da517db090a8ddb965e907a8acb57db1424011b5aab384661b0d27

            • C:\Windows\SysWOW64\Jigollag.exe

              Filesize

              340KB

              MD5

              dfd5dbc9a7e20d72bbc9dde989d37c91

              SHA1

              525923c9b98792ce8d53992956e7d21685d57eca

              SHA256

              7a4a1966b8ab92bd4b499e02b8d5a030ee6cec72ffd4d365d46ac513268c429c

              SHA512

              e8ccd043953a0bc0dcba30b8d0a49f0c5c1134b24a9c5aaf122f431e892210a5080043b97db2139df6e334a8d5136725baf2817116e23f5786b51dae9bfa7594

            • C:\Windows\SysWOW64\Jkfkfohj.exe

              Filesize

              340KB

              MD5

              99236f0a459fb5a1e73ea6067538d6f9

              SHA1

              270c629ef407005dea2f3b1397dd01ac63253348

              SHA256

              12334e0f845fd1a96a8240060125e6f4358c7773b529c839e8073bac0a2b7c24

              SHA512

              e67c4ade65bc0e984ccdeb9393e2463fa77e513c6f79c0899368184d9ac603169a20d2d5013b0cd7a5a10b3b76ff0541097f455adc558f9858f6762be22f24bb

            • C:\Windows\SysWOW64\Jmpngk32.exe

              Filesize

              340KB

              MD5

              6c1a5fa333a7f02502227f48ab41a7b6

              SHA1

              0b7625750078e9c3cd5af405dc7880a4ee315458

              SHA256

              822cf8340eb9ff527bff4f09ac60357b287ce2c973cb77df1a9a035fec2c7c9e

              SHA512

              7bf2eb334505e3ae499cd1f24f9dbc1c423f369119e446abb03929485fc949d7d798b8aca6d8bbd4cb249ee3df15d1845a9d6f5bb7e74de2b567875f51480c41

            • C:\Windows\SysWOW64\Jpaghf32.exe

              Filesize

              340KB

              MD5

              86312ad5bbac90ef26b10120ad910858

              SHA1

              177695f2095b752da4b19a854fa4dde19ccf8a63

              SHA256

              a9fe736f6857d88f39aad9e5d2d32eabb712df720616150c868eb860338a8036

              SHA512

              85df83d4c7d0c6d4191c9652d7fd88b3038d113c57a2a9071db557e451b79091084cc57233fc6c9296566c825c8077d0377c811570b6d3f351c6c1b308861b0d

            • C:\Windows\SysWOW64\Kacphh32.exe

              Filesize

              340KB

              MD5

              dca836599f9c2fd3c2381433b1c1e838

              SHA1

              9f5fda706464b218cdab8637d10d9beb2e4658a3

              SHA256

              93687142758625a3c8b89eecf265f17ca6a0416f16d93282749d07ca12ca8a40

              SHA512

              8157a14bbadd185f0c26e5dfe1a96d878686052d526be2cd6a598aefbc1a6ed1648ef8df17dd3ce821b03eb8fa94b96391f6f83bdd891f5fbae164f5ce86f4f2

            • C:\Windows\SysWOW64\Kagichjo.exe

              Filesize

              340KB

              MD5

              3fcdd517d8347265194b85778851e3c8

              SHA1

              70c394e47a66527b9accfaef49ad6d62dc418859

              SHA256

              ec6fa9d8d3a820ce4cec5f531f852139349fd2e7b6bbd593c5c86da39b4117ac

              SHA512

              848a13dea982cb5ffc982b99d5baba2c4d2b813acdcf6997bc18d86cc8e0fb3cd2f78d7abe64c3a0a4cbcfa2fa7b5787978007a12c3927a65cc5546f06772c7e

            • C:\Windows\SysWOW64\Kbapjafe.exe

              Filesize

              340KB

              MD5

              77a5d1f761478ffb81fad237b617b5eb

              SHA1

              1c1e20cf38e2d2bd7317d6cb4fdd690747283513

              SHA256

              5967744028589f88842c13479a562e565a8f5ddaccf59f042445afe49007fae0

              SHA512

              e2b95dbf4ef063b5c3c13c1ab7fca676e1642d8875a99bca0ffadc50d04ae616644d48f32a98be05aecb64355445adc22ab9617b7ef6e99d69cf689f33e20b2c

            • C:\Windows\SysWOW64\Kcifkp32.exe

              Filesize

              340KB

              MD5

              9c9b767cefc5337b819fc7674239263f

              SHA1

              87e1bfa4f45d03e86cc129f7826f093ddad40abd

              SHA256

              d188e12c02a12881b738e7266dfcf81f4c4ef34824eee1f8a355b0290393ec2d

              SHA512

              7744c2eec73fcebe7d8f87f5b0d0592a7dbdf4a14acd8827ccddb2072e13bcf2cbb48311a4f70132a77efb2781a73bcafccaf560d4d58971943adad3574db790

            • C:\Windows\SysWOW64\Kckbqpnj.exe

              Filesize

              340KB

              MD5

              42cc9350404d7d644c362f938702e621

              SHA1

              b9fddacf06141640f58f5ddc3442611a0ef611c0

              SHA256

              9ac57ca04de522f333ff9a5893bd6b12ceed9f88664dde4ec5b4f8ad3bfaa464

              SHA512

              0a15b6075c2ce684c1fae840847ac7f5c5473a5451b790e4ee2730f238a6c26f4019a291839d9e8458a3d835147fef04ed8bce21b111fd9a40561644b25cf2aa

            • C:\Windows\SysWOW64\Kdaldd32.exe

              Filesize

              340KB

              MD5

              eb7aa37eb24ccee462fc2b93ffcfec66

              SHA1

              c1683ee3df69770d1eb1e27aa9600506d4368ce0

              SHA256

              4de682f8aaca7979bede917d1ed294b176ccff04c562d2dfb8fa0ff21def3c7e

              SHA512

              dbb655026b63431f78a5b734c8d8d5603f1396d2eb66ab89c6aaa30b717e1fcd03a8e969f972bfbb6772e8bfea79afc537849c57ae3d14be5d491c21a1bc0650

            • C:\Windows\SysWOW64\Kgbefoji.exe

              Filesize

              340KB

              MD5

              6f40b656f971182c155cbcd09bf426da

              SHA1

              bf7335217154a190061ab8c536ff92758e4913f1

              SHA256

              a3c1b5a7f6add3dbe47a59945c8a01b7e7f1ab21633cbb911265807dc97039b6

              SHA512

              268b4a2f18cb964007d0eb3ff2da14e0843213b21167f394530b1b18f1f61fcc959ab0a902bc1cade2a5397a68b2195f31a3dcd2ce716e1e00ea9966861a72c9

            • C:\Windows\SysWOW64\Kgphpo32.exe

              Filesize

              340KB

              MD5

              7f1bb3f24609b81bc248e77e40e923ba

              SHA1

              b83abfb22e03ec6cf9530e2656a6d5d7ff9075fc

              SHA256

              f4faaa763a03c8be95adac910f39a372264f5f9499f8ec50086dae0a061d128b

              SHA512

              e230d2d9b90c341bdee02742b665ec054c37ac9639fabebd6e203e0725e62cd7a8830d3ece8ba188cee3deb127ad634cb6bce5275b05fce3b9f8f1de6083600d

            • C:\Windows\SysWOW64\Kipabjil.exe

              Filesize

              340KB

              MD5

              789daa46b4522f8d6ffabd0f8e743a61

              SHA1

              24d6ce82a9a31bd4d78ad54bc3b3018f7bee3d98

              SHA256

              1a902a2d2c99995d8373c2fd11cbb68b9e9dfd301c8a6245b59434fa50b8bf82

              SHA512

              15b77c91b83ba59624898ffe19637725a4347f7bdcc657e4ee9a78818b9e739bc4a282498ff0e6f8a9f214e9578baddfb33e67c61236f43b0c4deccdd92266c2

            • C:\Windows\SysWOW64\Kmjqmi32.exe

              Filesize

              340KB

              MD5

              65b78b7777bc595d0490eee3094e9955

              SHA1

              56212d9c95f3d0a176284855872514dc4964a3da

              SHA256

              72df07284b4d49993785de61c490eed5999adfb4ef5a3af1f49cf3f72f7cf6c9

              SHA512

              971e34917235ccebcd12fa4e5221ce5735d7742f4f6aa64321231f3175be45d20c63df7f726e135b718a71940fba32358b6ecbdc4328b353c6973ef3bed02a4b

            • C:\Windows\SysWOW64\Kmnjhioc.exe

              Filesize

              340KB

              MD5

              ecbbbc4cded8c9e309f6987ecf9b1bfd

              SHA1

              ecce310fdc3bfbf3d732421e9fc36ba83a54b9d3

              SHA256

              44684e44c70bd1002e814a96166bbd44bc45836fb10fe2f59b76274a7edcba34

              SHA512

              86d53a8931225166bd783e758b31fe5e4d5025dc27b51c398e4a78d71c38595722b797df77a02605741a87bc3f4904ea9ac3d2f10427d98b07763a377ec6e7ec

            • C:\Windows\SysWOW64\Kpccnefa.exe

              Filesize

              340KB

              MD5

              14cc10bd4b3b2a81f35c7a2a0c8afe9f

              SHA1

              0b5da0f9ce94b55b9f35c65d50121e56c0f7d3ca

              SHA256

              9a94d816105dcfb41b67acea4dabcaa2c764357c585f34e72d49ca446352da5c

              SHA512

              db8426270a944494a0839e3025b300650201f067343c28d8f3d722aac86356ccdfa211c3b154c2518cd13e477d01c139487b1c5bbd483f5cd8e59b9c47a9e29e

            • C:\Windows\SysWOW64\Kphmie32.exe

              Filesize

              340KB

              MD5

              03818bbbf82c41c5628719ce9936ff82

              SHA1

              d7e5eaef3af1bc0ecc3b24706dd52f8fd61a3d57

              SHA256

              a5ed1e47f8c691b357aec2c4ab8cbcd2c5e451a718aa7badee007e4fb07037bc

              SHA512

              e2961f5383aaf611e8252dfd9a0e259ca2449bfecb7381e31b5c42b2b9538db709d9264defcbd97bc8d871fcc2cbdda4fa5929606ac03af33e7d66ac049d4211

            • C:\Windows\SysWOW64\Kpmfddnf.exe

              Filesize

              340KB

              MD5

              41ab7f8165d1f5a897677f3d5d0905c4

              SHA1

              f54ac35001290804978beafe7c42f1d7d6b679db

              SHA256

              0ebf9815a6dfbeaadd263210fb8eda4100220efe80bc6486f419a41150f0f954

              SHA512

              ae42e36595de0c025cd0e5ad29eed46a181475559d3bb3cffa10683783512511f7e74cf18e9ecb56eaae7ae82efbd4d92a5e6755bf0b0f4ddae3f4e8f26c8c1f

            • C:\Windows\SysWOW64\Laalifad.exe

              Filesize

              340KB

              MD5

              44456f2f5a5d86b6cbd07d29fb6ace8f

              SHA1

              a8bf798cf30e456eb96b4f1ebad769a842b30880

              SHA256

              aa8996183aa85fe1483abba62f57e571b1e17b4dd59fa35bcd4925940e4b681a

              SHA512

              a7b2e3dbe177c874e1432711d9d38d5d465522e16f5bd6abb5e7f04411918336e4225de2d5f4da1d74abc45f4cc38af1c1878419af7825caebffc3af4d8c285f

            • C:\Windows\SysWOW64\Lcpllo32.exe

              Filesize

              340KB

              MD5

              d456b8c247731c8d68c5056fba8fe247

              SHA1

              a80f11f30414548fbf209daad4a743647175d585

              SHA256

              a6e1a839dde324e001a2a74a9778696cdd45747f4b8d18350d3998a85301b78a

              SHA512

              d96ac4dfdccbb4655a43d64a3b2eabb92f92d3ae0b3444fabcb4f3618b8875933e3aa879ab213121b7a0006aff0880d3c3f08f8039362fdd9465bf896002b06d

            • C:\Windows\SysWOW64\Ldaeka32.exe

              Filesize

              340KB

              MD5

              a48ea6317a8ae1877d9397be2f5e9094

              SHA1

              1c8e630b80efa9d0e4686a83c35735713b3b3acf

              SHA256

              793bc308905d8fda4f1fe6940b6f730d5685f05d1ffa800cef7c7b098675873e

              SHA512

              cbfd1dddc4b541c70ac31210411646fc4206b05bfa67adcc98ab6e03bb7e3819acb43e47bff9a4dace14ba1e166cafc3423adc2b896c036f5d1716b3c839553f

            • C:\Windows\SysWOW64\Ldohebqh.exe

              Filesize

              340KB

              MD5

              4b660e917aac24de451abb515ac4da93

              SHA1

              143b7f33e35f1262de2297bdda81696a6ade355f

              SHA256

              6ce5b36e4433b98411e7823248e3cbe41ed8855c7756dccaffa5e826775e43df

              SHA512

              7fcec06fca03b862c516220b83930c291e149e7b51d19a270b8e6988d8ceeb7b50dbd30625610a921282f7a3cc53e7c1b688300f4ea7f5bb84ea7de4913d3a22

            • C:\Windows\SysWOW64\Lgikfn32.exe

              Filesize

              340KB

              MD5

              99ebbbbf6234c081a1ffc8d577f0fa7f

              SHA1

              f88826ef2e54ad5a78a490416d6f980df7e89dd4

              SHA256

              7eae2cdc3542157200a111693a6bc261f22012f81147777b18ee43a882491189

              SHA512

              6dbb8c87e68f8b98f4928235275f33c7459496852d718fee5aedc9f518d1e35cd35875d0cf3a95b5d1c593f5c4c62def9ae75dc9e397b8cd2436f616d557449d

            • C:\Windows\SysWOW64\Lgneampk.exe

              Filesize

              340KB

              MD5

              e15ba60aed325dbacdc1d659bdbe2405

              SHA1

              d4dd75749122787e1b1ee21c307cdb6d84ddcaaa

              SHA256

              8cb4606fac5a97a05d71c844536f50d2336d1ff4b1fe3dc588bd4316a5421310

              SHA512

              d03291f1141a35366e3f5b77cf9e959c0a4586bfe6debb062953af9b4053908db36128d9314f7b10d1e916bd9a1c6fc254ce93bfcb04ec6e1ee5bae96e664ec1

            • C:\Windows\SysWOW64\Lgpagm32.exe

              Filesize

              340KB

              MD5

              e79f10c57bc708a23b566cc189006b81

              SHA1

              ad89a86f5a50baa37608657f1ff27bbab2536352

              SHA256

              7fe029acb53b142a23cf1dc9e844caa43cf03accc73d5c5b06f3cb46dcefc93e

              SHA512

              1f839ce22f74a221bfea6bfb49face1dda69289eb1bda2ef4b593cd0b69b044841cb111db3864d2d3d5de3a1ff4bff39039f5fef986fea0431c76b59c4086e5d

            • C:\Windows\SysWOW64\Liggbi32.exe

              Filesize

              340KB

              MD5

              f19d1c0908302a96cc5e1440902e8b4b

              SHA1

              d67c5ed0493c0c1b928ff2c38dde6eef4a92438b

              SHA256

              2f2eca32649c8264b7c53d7a10b1e7ece2b796391b9d87358b87100992ba1e86

              SHA512

              7ef9590ac3979879067b2d2e42b684ee8d3ebf91e17b79b200d85828a86d423f26ce2b32e3aad36318cf55b66771d1693d3befd2113c4050dbfeb537c183f9ca

            • C:\Windows\SysWOW64\Lkgdml32.exe

              Filesize

              340KB

              MD5

              071a15b5c35882f9a91922b825b2c68e

              SHA1

              9b40e2af65699af22b43ce476e9938c1b412e80c

              SHA256

              0349134c042ffa71012e241531f019ae7b147876385e40b7d579641b12934625

              SHA512

              ea6e7dfc5385e148cedddae777b14f0bd5bf81034ec5aa18f4356aefca640d819bb6c9f3956de21b4ad0d95c7a7dd13143ecdb72017152fbd4b0c451c6551e0f

            • C:\Windows\SysWOW64\Lmccchkn.exe

              Filesize

              340KB

              MD5

              dffb422d38eb232c946ae35b786368e2

              SHA1

              f8c0a1370fdeabf63c4945923ff2ece116a2192b

              SHA256

              68d315d76a22297debd3085a400eb7739999514219846d16ed95526c4c88bcd1

              SHA512

              4cab05ad2e0ea06d931e487469e0b574755718b9641b6b6a71c0bd121bd4f568f84dcbb218f322a1b9abb1d62ccd2bb051a1d7ccb5eab5c069dc3920ac1b7f79

            • C:\Windows\SysWOW64\Lmqgnhmp.exe

              Filesize

              340KB

              MD5

              98850536f60fb43d32b13a0138a9eff4

              SHA1

              260bc0e2551adba60cba42acbffea3dbcfd6b752

              SHA256

              f1adef14c3831072dab79a434ef68d585ce1841af6dce00cae21ee0e3cfe50fb

              SHA512

              db0e9a963f46e2b235ca608414e9de773f4b70bd2027ce716a802de5496e7b0d43c6a0f1a3502076f7161c5e80f5d3b6da99a9d0bef6389239c8cd2a45c552e4

            • C:\Windows\SysWOW64\Mdkhapfj.exe

              Filesize

              340KB

              MD5

              5ff9b5bae86037f4c2d8111355659719

              SHA1

              1ad9eff036f566b9aaf6340f1c8c771c4682dec2

              SHA256

              fad6343ae180828158a0fe4f139cc766848f180ebc18f1b0f7f74009ddd26470

              SHA512

              50dbb1fc37a62eb5ee21f5b9f1d9a36e8cd9bae67bf4bf3db01af274b3187bc81b23c188c3766b6dd47cec4486136122a3c94c72aa9950d9255ee35d54618ed4

            • C:\Windows\SysWOW64\Mkpgck32.exe

              Filesize

              340KB

              MD5

              c0d3464553a45748d31d0ea19b23f455

              SHA1

              82df271d54236ecfb043ebf8afa97f8b24d0bd40

              SHA256

              052f491be8a3e23d620a135d374e9bcc93c50d6049897a4b59676432f07440ea

              SHA512

              31c456cef847c97fe8c8995c6665313101feb7f4388f14d17f016aa4e47c04730b0c55658ef68d093def9bd145f08903a41f88ff78f051e65cdab2a5b3f540ba

            • C:\Windows\SysWOW64\Mpaifalo.exe

              Filesize

              340KB

              MD5

              d408b9a06e62963844b94a7e8360c6ed

              SHA1

              4cbf870d4e059b6e4f1e6eb2cba6fec1847e45f5

              SHA256

              588318d8c4028357d916bddefd75ea74a3db608eac7650555be597b3abf3d6f1

              SHA512

              56a140085fb9eaf91ef134fab3ec1dcb61735d2f816057caa065b5ef355dc63842e806734a092663698a96cc554aee2d61cdcb1901540929c8f9723db9b06e78

            • C:\Windows\SysWOW64\Ngcgcjnc.exe

              Filesize

              340KB

              MD5

              450adb06afc7c8e514cb433864df0305

              SHA1

              69e4daa86c5decc8afb5359abefd1265664144f1

              SHA256

              db6bd5b96dfd369f62498c73c419997acfbfe302029ab53abb5cd884376c1385

              SHA512

              1c6bbaaad6c2768b93666b354bce44ed866984fe3a41420efedd92100b1541bae86ac1cb1e037450c6eeae6899905274b40eabc288907a054cc778a499d9af1f

            • C:\Windows\SysWOW64\Nkqpjidj.exe

              Filesize

              340KB

              MD5

              4ac7fe76a149dd4fedfbc3123f3f0ca2

              SHA1

              4c6a821d130c9d7bfdc6082ad5d38212a55149fd

              SHA256

              c0731c5e2c30945da64ee736818f26b89bcf889c2a909b4892ab25f146a7ad15

              SHA512

              66ee2e3dd8bf7e25fa2438225a74447344dcb31025430c356d93dd14eab1005cbe85aad4c5465b24b5b2a5b42acb0a551f39669bc0a116fa9f65bb5435fd0237

            • C:\Windows\SysWOW64\Nnhfee32.exe

              Filesize

              340KB

              MD5

              b537dd5c11589b5b48988468e2099c3f

              SHA1

              c755fb73caee200f7abf2046ae63fa58eacad47f

              SHA256

              fd448dec3f7194157e115ab2dc5d0f6212f6425a418d9bc2c53c016b4a12bf4f

              SHA512

              6ef0b2ed91c80780218ea9c26d6342e16fe4ad6e7cb9dafc7d4758f61f18cadb2e82de2d7c09e85f5b1799fede8f17d6d3895d20e2a37ea68d4d82f6c7a9a984

            • C:\Windows\SysWOW64\Nqiogp32.exe

              Filesize

              340KB

              MD5

              37a54086c1b1f1da8d9adc75bad33363

              SHA1

              77129e4efb6903abbb9ee31f082477b498af9e2b

              SHA256

              2b827ee757265743ab563b75e6c6d084788429012b1de05cdf3e24caa94d64e8

              SHA512

              07de22198c2893a793d483734b7a62af8a814bf7e522fb14a372f764fcab4716f8bda8927bc9ce8c91cf84d96fb9a924ad16b4ad2cf19f8323cfc52caf900073

            • memory/436-518-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/436-509-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/464-189-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/536-495-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/544-205-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/684-526-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/684-419-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/804-305-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/828-177-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/912-347-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/912-532-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1008-431-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1008-524-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1012-89-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1040-160-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1100-363-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1244-522-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1244-449-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1348-297-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1412-323-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1428-69-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1440-157-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1480-401-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1480-528-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1508-269-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1524-97-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1728-516-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1728-515-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2036-254-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2092-8-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2116-299-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2176-417-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2240-525-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2240-429-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2260-169-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2324-389-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2324-529-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2336-73-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2348-105-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2512-27-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2608-531-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2608-353-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2616-40-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2668-467-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2832-261-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2884-238-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2920-517-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2920-503-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3020-230-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3064-241-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3084-316-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3128-530-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3128-371-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3160-121-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3212-117-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3332-275-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3452-461-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3452-521-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3468-136-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3480-129-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3600-213-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3616-519-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3616-485-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3644-478-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3676-267-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3688-387-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3740-534-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3740-333-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3880-81-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3936-53-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3940-381-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3948-345-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3968-5-0x0000000000431000-0x0000000000432000-memory.dmp

              Filesize

              4KB

            • memory/3968-0-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4004-145-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4016-448-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4088-411-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4088-527-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4224-19-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4240-459-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4256-523-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4256-437-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4340-479-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4340-520-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4592-285-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4596-502-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4616-399-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4696-41-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4720-197-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4792-217-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4928-291-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/5008-533-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/5008-339-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/5076-369-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/5092-317-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/5112-57-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB