Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 01:37

General

  • Target

    4dad7a9750eb1e6fb90e9ddb3c198980_NeikiAnalytics.exe

  • Size

    658KB

  • MD5

    4dad7a9750eb1e6fb90e9ddb3c198980

  • SHA1

    6248b08a893b79531d130443d9818c0bea3e2fcb

  • SHA256

    8f3c5cf887dc759aeb95d8623f82ea69a3df45e74eae357819572c7fb56103a5

  • SHA512

    961a6ecaa2f3d66c1c908c629033a5447ddf317aed5d894e88c8d6f7dfbd033beac8fe13a4ce6ad84bd9c73c05dbd27a08f19be768567492f5155c9558cab9ff

  • SSDEEP

    12288:Dg8vy6IveDVqvQ6IvTPh2kkkkK4kXkkkkkkkkl888888888888888888nusMH0QM:+q5hPPh2kkkkK4kXkkkkkkkkH

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dad7a9750eb1e6fb90e9ddb3c198980_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4dad7a9750eb1e6fb90e9ddb3c198980_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\SysWOW64\Jbmfoa32.exe
      C:\Windows\system32\Jbmfoa32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\Jdmcidam.exe
        C:\Windows\system32\Jdmcidam.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Windows\SysWOW64\Jkfkfohj.exe
          C:\Windows\system32\Jkfkfohj.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Windows\SysWOW64\Kaqcbi32.exe
            C:\Windows\system32\Kaqcbi32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Windows\SysWOW64\Kdopod32.exe
              C:\Windows\system32\Kdopod32.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:5020
              • C:\Windows\SysWOW64\Kgmlkp32.exe
                C:\Windows\system32\Kgmlkp32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1512
                • C:\Windows\SysWOW64\Kilhgk32.exe
                  C:\Windows\system32\Kilhgk32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:1176
                  • C:\Windows\SysWOW64\Kacphh32.exe
                    C:\Windows\system32\Kacphh32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1888
                    • C:\Windows\SysWOW64\Kdaldd32.exe
                      C:\Windows\system32\Kdaldd32.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2956
                      • C:\Windows\SysWOW64\Kgphpo32.exe
                        C:\Windows\system32\Kgphpo32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:4536
                        • C:\Windows\SysWOW64\Kkkdan32.exe
                          C:\Windows\system32\Kkkdan32.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:3944
                          • C:\Windows\SysWOW64\Kmjqmi32.exe
                            C:\Windows\system32\Kmjqmi32.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:2488
                            • C:\Windows\SysWOW64\Kaemnhla.exe
                              C:\Windows\system32\Kaemnhla.exe
                              14⤵
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:1864
                              • C:\Windows\SysWOW64\Kdcijcke.exe
                                C:\Windows\system32\Kdcijcke.exe
                                15⤵
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2740
                                • C:\Windows\SysWOW64\Kgbefoji.exe
                                  C:\Windows\system32\Kgbefoji.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:3888
                                  • C:\Windows\SysWOW64\Kknafn32.exe
                                    C:\Windows\system32\Kknafn32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2780
                                    • C:\Windows\SysWOW64\Kmlnbi32.exe
                                      C:\Windows\system32\Kmlnbi32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:1352
                                      • C:\Windows\SysWOW64\Kpjjod32.exe
                                        C:\Windows\system32\Kpjjod32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:384
                                        • C:\Windows\SysWOW64\Kdffocib.exe
                                          C:\Windows\system32\Kdffocib.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4404
                                          • C:\Windows\SysWOW64\Kgdbkohf.exe
                                            C:\Windows\system32\Kgdbkohf.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:536
                                            • C:\Windows\SysWOW64\Kibnhjgj.exe
                                              C:\Windows\system32\Kibnhjgj.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:4632
                                              • C:\Windows\SysWOW64\Kajfig32.exe
                                                C:\Windows\system32\Kajfig32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:4032
                                                • C:\Windows\SysWOW64\Kpmfddnf.exe
                                                  C:\Windows\system32\Kpmfddnf.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:1248
                                                  • C:\Windows\SysWOW64\Kckbqpnj.exe
                                                    C:\Windows\system32\Kckbqpnj.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    PID:4908
                                                    • C:\Windows\SysWOW64\Kgfoan32.exe
                                                      C:\Windows\system32\Kgfoan32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:1372
                                                      • C:\Windows\SysWOW64\Liekmj32.exe
                                                        C:\Windows\system32\Liekmj32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        PID:4604
                                                        • C:\Windows\SysWOW64\Lalcng32.exe
                                                          C:\Windows\system32\Lalcng32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          PID:3620
                                                          • C:\Windows\SysWOW64\Lpocjdld.exe
                                                            C:\Windows\system32\Lpocjdld.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            PID:2088
                                                            • C:\Windows\SysWOW64\Lcmofolg.exe
                                                              C:\Windows\system32\Lcmofolg.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              PID:2040
                                                              • C:\Windows\SysWOW64\Liggbi32.exe
                                                                C:\Windows\system32\Liggbi32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:5036
                                                                • C:\Windows\SysWOW64\Laopdgcg.exe
                                                                  C:\Windows\system32\Laopdgcg.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:768
                                                                  • C:\Windows\SysWOW64\Lcpllo32.exe
                                                                    C:\Windows\system32\Lcpllo32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:404
                                                                    • C:\Windows\SysWOW64\Lkgdml32.exe
                                                                      C:\Windows\system32\Lkgdml32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:552
                                                                      • C:\Windows\SysWOW64\Lijdhiaa.exe
                                                                        C:\Windows\system32\Lijdhiaa.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        PID:2476
                                                                        • C:\Windows\SysWOW64\Laalifad.exe
                                                                          C:\Windows\system32\Laalifad.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:5024
                                                                          • C:\Windows\SysWOW64\Ldohebqh.exe
                                                                            C:\Windows\system32\Ldohebqh.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:2728
                                                                            • C:\Windows\SysWOW64\Lgneampk.exe
                                                                              C:\Windows\system32\Lgneampk.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:1040
                                                                              • C:\Windows\SysWOW64\Lkiqbl32.exe
                                                                                C:\Windows\system32\Lkiqbl32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:4596
                                                                                • C:\Windows\SysWOW64\Lnhmng32.exe
                                                                                  C:\Windows\system32\Lnhmng32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:368
                                                                                  • C:\Windows\SysWOW64\Laciofpa.exe
                                                                                    C:\Windows\system32\Laciofpa.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1904
                                                                                    • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                                      C:\Windows\system32\Ldaeka32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      PID:804
                                                                                      • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                                        C:\Windows\system32\Lgpagm32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:2056
                                                                                        • C:\Windows\SysWOW64\Lklnhlfb.exe
                                                                                          C:\Windows\system32\Lklnhlfb.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:4296
                                                                                          • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                                                            C:\Windows\system32\Lnjjdgee.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:3204
                                                                                            • C:\Windows\SysWOW64\Laefdf32.exe
                                                                                              C:\Windows\system32\Laefdf32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:1496
                                                                                              • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                                                C:\Windows\system32\Lddbqa32.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                PID:1112
                                                                                                • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                                                  C:\Windows\system32\Lgbnmm32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  PID:1380
                                                                                                  • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                                                    C:\Windows\system32\Mjqjih32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:5088
                                                                                                    • C:\Windows\SysWOW64\Mciobn32.exe
                                                                                                      C:\Windows\system32\Mciobn32.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:2104
                                                                                                      • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                                        C:\Windows\system32\Mgekbljc.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:4984
                                                                                                        • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                                          C:\Windows\system32\Mjcgohig.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:4276
                                                                                                          • C:\Windows\SysWOW64\Mnocof32.exe
                                                                                                            C:\Windows\system32\Mnocof32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:2416
                                                                                                            • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                                              C:\Windows\system32\Mpmokb32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:4152
                                                                                                              • C:\Windows\SysWOW64\Mcklgm32.exe
                                                                                                                C:\Windows\system32\Mcklgm32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3276
                                                                                                                • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                                                  C:\Windows\system32\Mgghhlhq.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:2028
                                                                                                                  • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                                                                    C:\Windows\system32\Mjeddggd.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:1388
                                                                                                                    • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                                      C:\Windows\system32\Mnapdf32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies registry class
                                                                                                                      PID:1132
                                                                                                                      • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                                        C:\Windows\system32\Mpolqa32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:4256
                                                                                                                        • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                                          C:\Windows\system32\Mdkhapfj.exe
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:3236
                                                                                                                          • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                                            C:\Windows\system32\Mgidml32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:3096
                                                                                                                            • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                                              C:\Windows\system32\Mkepnjng.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4488
                                                                                                                              • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                                                                C:\Windows\system32\Mncmjfmk.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:1964
                                                                                                                                • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                                  C:\Windows\system32\Maohkd32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:556
                                                                                                                                  • C:\Windows\SysWOW64\Mdmegp32.exe
                                                                                                                                    C:\Windows\system32\Mdmegp32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:1536
                                                                                                                                    • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                                                      C:\Windows\system32\Mcpebmkb.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      PID:3964
                                                                                                                                      • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                                        C:\Windows\system32\Mkgmcjld.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:2980
                                                                                                                                        • C:\Windows\SysWOW64\Mjjmog32.exe
                                                                                                                                          C:\Windows\system32\Mjjmog32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4556
                                                                                                                                          • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                                                                            C:\Windows\system32\Maaepd32.exe
                                                                                                                                            69⤵
                                                                                                                                              PID:3380
                                                                                                                                              • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                                                C:\Windows\system32\Mpdelajl.exe
                                                                                                                                                70⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                PID:1020
                                                                                                                                                • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                                                                  C:\Windows\system32\Mcbahlip.exe
                                                                                                                                                  71⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:1852
                                                                                                                                                  • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                                                    C:\Windows\system32\Nkjjij32.exe
                                                                                                                                                    72⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:208
                                                                                                                                                    • C:\Windows\SysWOW64\Njljefql.exe
                                                                                                                                                      C:\Windows\system32\Njljefql.exe
                                                                                                                                                      73⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      PID:3728
                                                                                                                                                      • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                                                                        C:\Windows\system32\Nacbfdao.exe
                                                                                                                                                        74⤵
                                                                                                                                                          PID:1092
                                                                                                                                                          • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                                                                            C:\Windows\system32\Ndbnboqb.exe
                                                                                                                                                            75⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            PID:824
                                                                                                                                                            • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                                              C:\Windows\system32\Nceonl32.exe
                                                                                                                                                              76⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              PID:1892
                                                                                                                                                              • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                                                                C:\Windows\system32\Nklfoi32.exe
                                                                                                                                                                77⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                PID:4624
                                                                                                                                                                • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                                                                  C:\Windows\system32\Njogjfoj.exe
                                                                                                                                                                  78⤵
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:1500
                                                                                                                                                                  • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                                                    C:\Windows\system32\Nafokcol.exe
                                                                                                                                                                    79⤵
                                                                                                                                                                      PID:1728
                                                                                                                                                                      • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                                                                                        C:\Windows\system32\Nddkgonp.exe
                                                                                                                                                                        80⤵
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:1200
                                                                                                                                                                        • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                                                          C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                                                          81⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          PID:2716
                                                                                                                                                                          • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                                                            C:\Windows\system32\Njacpf32.exe
                                                                                                                                                                            82⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            PID:3136
                                                                                                                                                                            • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                                                                              C:\Windows\system32\Nbhkac32.exe
                                                                                                                                                                              83⤵
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:1924
                                                                                                                                                                              • C:\Windows\SysWOW64\Ndghmo32.exe
                                                                                                                                                                                C:\Windows\system32\Ndghmo32.exe
                                                                                                                                                                                84⤵
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:728
                                                                                                                                                                                • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                                                                  C:\Windows\system32\Ncihikcg.exe
                                                                                                                                                                                  85⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:1424
                                                                                                                                                                                  • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                                                                    C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                                                                    86⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:2580
                                                                                                                                                                                    • C:\Windows\SysWOW64\Nnolfdcn.exe
                                                                                                                                                                                      C:\Windows\system32\Nnolfdcn.exe
                                                                                                                                                                                      87⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      PID:2012
                                                                                                                                                                                      • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                                                        C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                                                        88⤵
                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        PID:3228
                                                                                                                                                                                        • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                                                          C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                                                          89⤵
                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                          PID:4568
                                                                                                                                                                                          • C:\Windows\SysWOW64\Nggqoj32.exe
                                                                                                                                                                                            C:\Windows\system32\Nggqoj32.exe
                                                                                                                                                                                            90⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5156
                                                                                                                                                                                            • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                                                              C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                                                              91⤵
                                                                                                                                                                                                PID:5192
                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 400
                                                                                                                                                                                                  92⤵
                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                  PID:5276
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5192 -ip 5192
            1⤵
              PID:5252

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Jbmfoa32.exe

              Filesize

              658KB

              MD5

              b70b19ecc2861b89ac26b1a007a6c8f8

              SHA1

              ae168c2dae02ba535f32eb7e6e375e7e4a6b2088

              SHA256

              c4f77aff73867f106fe40dc2c4dfe70521a48087bdfff5f1aab1ff799e132483

              SHA512

              29632e9d5420db914376835834f15636cc0941102bb760fb1aa51eb76ee4c6e97cacfab380a1e1f35b82c52380def0ef881f7b7a80d2e17e1c95b4f808df6dee

            • C:\Windows\SysWOW64\Jdmcidam.exe

              Filesize

              658KB

              MD5

              6868638848456a8be76c16c79a3bce18

              SHA1

              f84e8a9a02db53e46eae4d98df19c7b77ad43c10

              SHA256

              69af26d2d4caa14f0d6363db169529628b99c2b34c57beb2b2a1055cd0b63b82

              SHA512

              3ffe796b0a4d06dbcb4bcf2c85066ec5d3bdbed2aef21515d350b991072648c3123810f4d092080d46816eeea2b128e2c3a612d8852e60bb7da797142b4a4b5a

            • C:\Windows\SysWOW64\Jkfkfohj.exe

              Filesize

              658KB

              MD5

              ee923db7fb882f4ae66b8681b2e1b984

              SHA1

              ededaf6d05890444fa7da815d7a53b4634b4e7c5

              SHA256

              9b6bb3a551ba39cc69ce2f0a46e9fcfce9014fe6dd0f80c883ed374aaa26e5cf

              SHA512

              7a9480aa79918dcadd0e23481915a92eca5df76ecafc6d3a1f2381646388878f985a4186ac8690367c320e8f29ce87d8dfa7866c01fe976b39cfc78dad57d795

            • C:\Windows\SysWOW64\Kacphh32.exe

              Filesize

              658KB

              MD5

              18025166c38a971fd4ac3a40b81cdaf2

              SHA1

              d360fc4ff4a608bee925cb7f75a3f3c75ffbac6d

              SHA256

              03946eba7729c350bc74429dbfc1333a19ee9d234182f6d17ebbb5ca5e3a175b

              SHA512

              e5988fd9d169561d810ef444ec7128b7ef75acb28d798e5c3cc6b049fb421ce78175ca8a8afbf642d8641678b4889919901251e2dc9dffee1873363a0c220a74

            • C:\Windows\SysWOW64\Kaemnhla.exe

              Filesize

              658KB

              MD5

              340c9340e2f0a256ba40e474f5cff5ac

              SHA1

              eaf61faa5e11492f3c2946b2b0dff81fbc2c2760

              SHA256

              207dac93d785160141cde70af2c39c6da2d5aa120737e0461bfd4fc2fa3a206e

              SHA512

              56830b2353f4c6588addb68e2fba6875cfca8442dcf2e223cffc89e590ad0ec7c0f87f44b701b0cee206aa5d8b6e4e67556b98a73151f11eac8a111caddaf2f0

            • C:\Windows\SysWOW64\Kajfig32.exe

              Filesize

              658KB

              MD5

              9188b1a4a2bce6b460a4880b3ccb14e7

              SHA1

              bdb6ede9788307f1a9fc99c6c54b706e7dcca6c0

              SHA256

              ab892c267abe286bbb8a1c3f6a3b84a182da1554b9d1801a76c0971fd8c4b777

              SHA512

              b56ba3d05f0a3a654802002b3450ddba0927db54fed475e29dc674caa6b03a2d0fcc8b6ce60fa90d3d835d5a72a84b2be17bb1c60311c688872d6a34e27db09e

            • C:\Windows\SysWOW64\Kaqcbi32.exe

              Filesize

              658KB

              MD5

              555fca43e95da30e544d0a18dada62a9

              SHA1

              69cc51e3968938aa5ff5894b76fd7d69af6250bf

              SHA256

              ecccc232b47f5ad268d34b9a87f25d5bdb056b71e55c2e5f8048a3dcec7ce563

              SHA512

              0a32fffc9f87603c23613f0cdc6fb55f378a0e44c01a16c721be6ea0cca5e35528f4db77303f6cc03198c00faee2125b3ba15c229a55ae588f86576585caf56f

            • C:\Windows\SysWOW64\Kckbqpnj.exe

              Filesize

              658KB

              MD5

              941a8ae48c1b6ca782859ea2c6e360a5

              SHA1

              66e4dc9b3a3f604ed4afa451f49c20acc7476f64

              SHA256

              86d34cc282095ade3a15d73b10bb03d88da563b42c83b000658a51b692c5e2c3

              SHA512

              87301a04235ed3531c9f54d0c6194cacdcbd6213cd27a06a9f2bd9b85d3cc004e0e36eb1c4bf9cdd4a72d83c7702ebc7c9d542868f8e25138f0e987c4c4c2e16

            • C:\Windows\SysWOW64\Kdaldd32.exe

              Filesize

              658KB

              MD5

              1b9f6b14db1dbd8a2010e9806137be41

              SHA1

              8a764847e50fbfb625b455097cdb1703d3dc0e3f

              SHA256

              207e60aa399815b626c34325d8d213503f50f45f2f46968b419499f2e1b61634

              SHA512

              14571315f98ab3c7c48f86bfbc98738514b8f371701845106a2c550c5aec31f38736f40bd42bcabd89e708c6384e5cc3622c3f313c4129635be67703ea969b58

            • C:\Windows\SysWOW64\Kdcijcke.exe

              Filesize

              658KB

              MD5

              ae385903722d979ea0b488ee6c4977e0

              SHA1

              7513942c3bacc3c2aa6cbe78424e6a20df110a81

              SHA256

              193d15f7605e816bdbe0df0525ec2337eb262ffc0b6a956385c34ac4d6306d51

              SHA512

              7799e3735e9a83d0e9f89c030dc8b2c44b29399aa42584048a2c51a736d17d51015061b6e8306942e56b5b5a21d8dfa5f9a147d03499bbc48c88fdf3a925f35b

            • C:\Windows\SysWOW64\Kdffocib.exe

              Filesize

              658KB

              MD5

              cac1e2602dc17a7fc7eee7498678fabc

              SHA1

              8eb8564900dfda98fa0306152e33057fb18dbf7e

              SHA256

              38ab90023c7d9fe48e638fb5bd099d71302d1c6622e6ada9ecab9ec92e8f07d3

              SHA512

              a0331bd544e92e4008a6fe4212cc245e7bd4e75ed123304c5e153e34c590ff2d003f942aed54adcaa8b8558b62729554d7fe47f69a37b8144654585649402604

            • C:\Windows\SysWOW64\Kdopod32.exe

              Filesize

              658KB

              MD5

              75c776b9d8795df4efc19f3e0ccf6cb6

              SHA1

              86d85cb6025e124828ee299a50dacab1ee678a6a

              SHA256

              97b34ab3e0391e9c9b4bb599426f92d614ff728c28f3481824fb7835f7e0021c

              SHA512

              e11a519fec59ac4f6d13bc0d70a06e5fde8366cd7fefbb6223558293071cb44a5ba5f690bc622bc98399ba2117df7028e6daae5419fd4a4556c3015f1869d719

            • C:\Windows\SysWOW64\Kgbefoji.exe

              Filesize

              658KB

              MD5

              5a8ed94c10ab7c949a32d97549793f25

              SHA1

              5b0ec720b75d0285ff75a62f0758b2e3d9c8c0e3

              SHA256

              0bd61b51a5633a928f74e2adce6864bbbd6376eea3c34989e70613cb0e6c106a

              SHA512

              ff2e9cc8e4cf64ec6f0c2cac8ab3cdb43a05e8af90f140e6b980c6dc5d58e882d8481fa30f071abc7dc1f3a4e2dfcaf412f2e6b3cac2fa5294be9743c60d1871

            • C:\Windows\SysWOW64\Kgdbkohf.exe

              Filesize

              658KB

              MD5

              9d2169d2be60ab7a9db0735ab66afe56

              SHA1

              97220596094b63895c4d88dfbe3495517b4cffc1

              SHA256

              3896531cf9c97684420bca6cfa1b2090fe1e249be14ece93bdc0c3572fef7ab9

              SHA512

              95169953f92c620d35ccdd344413fc0d90bfd1ca294ab34142e6973c9548c498000cc7dea6df1b9b64b5f7d9f5ddc433c9bf49bd86cadc9e6636509b7841b886

            • C:\Windows\SysWOW64\Kgfoan32.exe

              Filesize

              658KB

              MD5

              7fc7a02262af422626196fb6a19590bd

              SHA1

              f9b19f386a109fc4363fd3fe6ae8091bfdb67677

              SHA256

              3210143836b10799cea657d163a9ca7dd62190cfa0839f9888a6873b5b0566ce

              SHA512

              7763002aced4251b4b949d6af736e93413fa71fe465b644478ac1a1de8cb72d242774ed897b0cee911ceae7dfc7855016615ce956f9afe3ea4c9c785f1365d1a

            • C:\Windows\SysWOW64\Kgmlkp32.exe

              Filesize

              658KB

              MD5

              fa2be731d62597a0dbb9b8a8a787dc34

              SHA1

              d9db76079316d5d61f547bc5ca1c62ca57433393

              SHA256

              2f3a5e794fcec70bf2576b74fb1ce313a6e94ed2ea82d80800d75a9bc900741c

              SHA512

              cf4eac0d8b78ff6af1e270da51d2a51c9a74aaab56f1888bc05d0b550596bf8d5bec15d6fd8e3d767e4562c8c929d853f60da0ee1256484c3c727f7453090c87

            • C:\Windows\SysWOW64\Kgphpo32.exe

              Filesize

              658KB

              MD5

              b9ddbeec4e5cd3b84e46343b1c9a6cca

              SHA1

              483a78b77ff3c0d174b1dc2d7e029001163713fe

              SHA256

              94b069e5eef848019475c2bed5880fb65eb1129ff7d263d81f6d7a4a97ebbb78

              SHA512

              e0bb8cdb0d20c6e74d2c9b53479db260f30049c5e6b31c828e4fe9ba335ee463fb590dbf5f86048beef755393d47e5986ef7dbb085c6d0a3d29778b311a66c37

            • C:\Windows\SysWOW64\Kibnhjgj.exe

              Filesize

              658KB

              MD5

              514082a08612667c193842d9ace148a6

              SHA1

              f4bb5940fe11d1d1b28546d1545cb3857d2e17b1

              SHA256

              6a687350d2edc5849c12aa868f0d48c84626eb05f7873d8a21cbfb7d3f7a4eca

              SHA512

              2b893545eae67b0f2498caf34c34242b10d474a0ff4f726046263f6ec273e345327c1bcf431f505bf496d0c9de5d6dcf5d722605017cd2f37a554e58db300553

            • C:\Windows\SysWOW64\Kilhgk32.exe

              Filesize

              658KB

              MD5

              fb8ae96c1659ce4c3f32fdce2d1c7c4d

              SHA1

              66339b115dc84ff0c37d29a1ef809172710a8d44

              SHA256

              e77ff0da0b8ddd5643b89a1445840c69e03bccc56a022a8d110f5cfdee42e9de

              SHA512

              4cb89dea131dc7f532499a4aa1bf323529127509d48648ad3dc0b4fdd8e1cf41a2d5c5f37176845aa0a23990467b0439bd57eb22cacf4ec61acc7e074d68a535

            • C:\Windows\SysWOW64\Kkkdan32.exe

              Filesize

              658KB

              MD5

              48a43b8d6f2175efc511b2e9e2149cef

              SHA1

              9fb9fa20664135a147d731a2ff969500283606ee

              SHA256

              1d58ac3a3c8bb6cfbeab11c68c48bdef11634fdbac9362d83f111bb626ca6a35

              SHA512

              3bb488d7d525e487d5fc54bf66699b87ff1dc16ed4c2df93e41ee2c6d47fcf8e1e84a549019c534185f4967837f446d28a95a406284dbcafec4e65c199b28c8d

            • C:\Windows\SysWOW64\Kknafn32.exe

              Filesize

              658KB

              MD5

              2f68387954b181a266f9b92d3815560e

              SHA1

              a27e16660eeb2943e924640be319c3c066a40082

              SHA256

              5a244aaf84171b91f6dada7af1f755f08c210b199f237a376c364865b11d3dd9

              SHA512

              033fa8a095c9796af012cca0426cb4628920523d50d914c3780cbbcaf44dc6d702df635500723aecbcb054dc803328d78685712681feb9c307586899a97d0b3d

            • C:\Windows\SysWOW64\Kmjqmi32.exe

              Filesize

              658KB

              MD5

              1b8765075add54be0ae2567169314cbd

              SHA1

              e809e079515a555223305f0c17bffa5f6b365222

              SHA256

              5f36c4640eec148dcfcfe5b3086fb7f91d44ca6e272386a2afa6d61df44ebffa

              SHA512

              8dd79d6f7412f492a3d3cc645378204ae872efb61e4bd42f8c817ffd2744e55640cd9627cee8e0a4e844259a79ba74e4825b2c9c90ef701feef46e48bf1d5169

            • C:\Windows\SysWOW64\Kmlnbi32.exe

              Filesize

              658KB

              MD5

              6e4ed27000ac5b4d05c97f957a9fb78c

              SHA1

              69441531e41e2a5ebaf8c09fe9c9201999f24d03

              SHA256

              395d8eca00486b0ccf262cf27e92c896c4e5d6cd341a0599f5602d24392a1110

              SHA512

              858bf369a32108873f71a44e7b68068cd98c7f883e32b32160cabddc3d6aea05d94cb2f79af2d97008021b1ca74e79ace7578d14e8055a1172ccd6d92f72640d

            • C:\Windows\SysWOW64\Kpjjod32.exe

              Filesize

              658KB

              MD5

              8c13a5574bc22acdb1f6aec33b784308

              SHA1

              1cf89c940518732d28409362d1ea1757ce8129d3

              SHA256

              aac4620d3ab5d7f2559feaded4a72126e770e05ec04309ce26e43c5d548060e9

              SHA512

              12a0bc4e243eac872103900d70831f073f3619a4be701281cd404ebf17193b4938dfed47df8d568003b33a88f10c3fbc76cc8b0227bf111801791c7db06aedb5

            • C:\Windows\SysWOW64\Kpmfddnf.exe

              Filesize

              658KB

              MD5

              88e6996700098158bacc1e315d1cc15d

              SHA1

              4ffe46f7f3aeefdeaaa8b90dff7a3331a5ffa519

              SHA256

              8c0a206a02e60636181f770413af3846208d22c4cf1529439590705560bf62df

              SHA512

              70aaeda645a90f9f38172782ec939fb56fb7563e7ba83e2696c535b10fd0fd4f9edbf9f10dc4f583d256191f2adedcc9a5e4bb031281854e77f7770d57c72449

            • C:\Windows\SysWOW64\Lalcng32.exe

              Filesize

              658KB

              MD5

              d6f76c6924b3e80b375d8dd18379aa68

              SHA1

              cb91813139b85a8244311f882298e73330f4ddd0

              SHA256

              201a29a4846ecf5bb8b1192c996be1e380eb3a5a578a6bf1c39b0d038255d86a

              SHA512

              445fe29d362633cd7de39e505ecabfd7150c52fed634f8956933fe128c04da93ebe4fe2b3d779e47ac49781d1f5837c6a1307441484adc184147d5c267fe715d

            • C:\Windows\SysWOW64\Laopdgcg.exe

              Filesize

              658KB

              MD5

              b68e59383aaf618046702be7f802a67e

              SHA1

              28eec44352b5729b2ee1859f1b1468169da07495

              SHA256

              bcff358c180fc69e7a693c3c0b1e90a210808dbcae8db45b9e85f2fc39f6a482

              SHA512

              cb445e6e418d712642da06c87c44bbf9fba6dd68a51fdd7a814685701dd458a07f3f5b7564bc794264ec68666f1807151424104ca977bde53c636bb44a4979b2

            • C:\Windows\SysWOW64\Lcmofolg.exe

              Filesize

              658KB

              MD5

              eb1ffda003e06b1e31203208fca01f8c

              SHA1

              05767843aba26b07f7fec386131dff5e8c95ca3d

              SHA256

              f3bf44cc618735a6fbdb487bd0b67b600a454146c9180bbcbf2265826d42182b

              SHA512

              a2088efc38e27eb2fa73196b065a76857d65bfede6999d932418d177b9ea6198e43f9c0e304777e8ae4ba7ec49b749434f305a610a2b2c4c4f6080afa843c8c4

            • C:\Windows\SysWOW64\Lcpllo32.exe

              Filesize

              658KB

              MD5

              5c417db20a35c21cb6c8ca4f38eff5a2

              SHA1

              7452b6b8fd5948d706b527d01d240b16854c4468

              SHA256

              f5444956e21dec31b57b461ed1f1afe32124559c51ef6def6b58e666abf57faf

              SHA512

              109b474726a49e73645e790c3e508eb0d97fbe0299052f11cea8f4c795bea1aa64842eb8ba4997afd45d22fc4b0baf5e5bc0c2a093db87e133b70e7100441512

            • C:\Windows\SysWOW64\Liekmj32.exe

              Filesize

              658KB

              MD5

              6fd528901427de4a3a3c9d07774e9684

              SHA1

              7fa05fcd108c736cc129f7fd40e45f459b0dc970

              SHA256

              ad3a811d7b4196e56ead4067edff1661cb446e48335864d2740136b9af0d8671

              SHA512

              16ec439be2b172962f172b06b2c00f6c9785e0a93336938dabdc9d80f1013d443766d63179cbbed76e3e7a6060cbd1d28bd3663df6193fda6a18e8c3fd3a161b

            • C:\Windows\SysWOW64\Liggbi32.exe

              Filesize

              658KB

              MD5

              db9dde9fb5b17826e77ab8eb9773a892

              SHA1

              dd8069d81e130944eab8012c975df04142cd5a7d

              SHA256

              2d7a543209edf6d42961a2a55b343d10040484e2682374199ef66e18d6a2cacd

              SHA512

              cbc1cbee936e687233efa064950e9e476717bfda408f6d5a53fd40346d37c08685cdf8aa6c399f73d7e57b98d0bdf751a64f5dadc2dd232c342702969b30097d

            • C:\Windows\SysWOW64\Lpocjdld.exe

              Filesize

              658KB

              MD5

              f442a86d50654e0176b874ee41c07a7c

              SHA1

              263319e4f36d7719f9a5ec4a0d0958ffc71392f7

              SHA256

              d60d6a86e60f1a571375a19dd737c23d063dcd65baa9303edc5615b3991dee99

              SHA512

              abe134ca8e5630db4202dbc653ae507ffa1c713bd9906ad92ae92766a7d784db838111a6ac8f6d67bc9669f046cc58e477cef2c8c5f6af51a79b759e296df54a

            • memory/208-586-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/368-554-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/384-533-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/404-547-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/536-535-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/552-548-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/556-578-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/576-693-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/576-25-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/728-598-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/768-546-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/804-556-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/824-589-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1020-584-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1040-552-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1092-588-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1112-561-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1132-572-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1176-522-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1200-594-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1248-538-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1284-699-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1284-5-0x0000000000431000-0x0000000000432000-memory.dmp

              Filesize

              4KB

            • memory/1284-0-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1352-532-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1372-540-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1380-562-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1388-571-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1420-9-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1420-697-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1424-599-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1496-560-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1500-592-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1512-521-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1536-579-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1728-593-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1852-585-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1864-528-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1888-523-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1892-590-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1904-555-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1924-597-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1964-577-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2012-601-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2028-570-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2040-544-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2056-557-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2060-695-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2060-17-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2088-543-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2104-564-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2416-567-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2476-549-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2488-527-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2580-600-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2716-595-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2728-551-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2740-529-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2780-531-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2956-524-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2980-581-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3096-575-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3136-596-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3204-559-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3228-602-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3236-574-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3276-569-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3380-583-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3620-542-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3728-587-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3888-530-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3932-44-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3944-526-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3964-580-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4032-537-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4152-568-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4256-573-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4276-566-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4296-558-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4404-534-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4488-576-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4536-525-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4556-582-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4568-603-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4596-553-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4604-541-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4624-591-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4632-536-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4908-539-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4984-565-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5020-45-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5024-550-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5036-545-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5088-563-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5156-604-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5192-605-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB