Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe
-
Size
520KB
-
MD5
c4a31f43f0351c8cf2f08eb81ba73ea0
-
SHA1
babefae1c2886f82e44bc7b0a6c996d7f22a6c2a
-
SHA256
c8ea86c6d9b6ea45c72301a4fd3d58fca12912d3c32e3b5b03f22ecb1d759883
-
SHA512
fa585c7e6735bdca878cbc040490726d94faeb2fb914576a35d3245b6595cbff0f0887645cd79364eb4681f6791b2133d94b907c1b7b3f6261ce0c9f2a06c19f
-
SSDEEP
6144:pIdodyF0wWFM6234lKm3mo8Yvi4KsLTFM6234lKm3r8SeNpgdyuH1lZfRo0V8Jc/:Fc03FB24lwR45FB24lJ87g7/VycgEH
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Glfmgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mcaipa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nijqcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcpnhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pcpnhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiccje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oifppdpd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqeioiam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glfmgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lhgkgijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mpeiie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbgeqmjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mbgeqmjp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmhbqbae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jidinqpb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lplfcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lplfcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmcpoedn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nijqcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oifppdpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Haodle32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhgkgijg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjlcjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkofga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjlcjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pcegclgp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcaipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nmcpoedn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nmhijd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oiccje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pmhbqbae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocnabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ocnabm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fqeioiam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkofga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hppeim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lpgmhg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpeiie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haodle32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hppeim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jidinqpb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpgmhg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmhijd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcegclgp.exe -
Executes dropped EXE 24 IoCs
pid Process 1816 Fqeioiam.exe 2840 Fkofga32.exe 3808 Glfmgp32.exe 3488 Haodle32.exe 208 Hppeim32.exe 3660 Jidinqpb.exe 1096 Lpgmhg32.exe 1688 Lplfcf32.exe 4944 Lhgkgijg.exe 3720 Mcaipa32.exe 4812 Mpeiie32.exe 2692 Mbgeqmjp.exe 4700 Njbgmjgl.exe 2804 Nmcpoedn.exe 536 Nijqcf32.exe 2088 Nmhijd32.exe 3684 Oiccje32.exe 4456 Oifppdpd.exe 4256 Ocnabm32.exe 3984 Pcpnhl32.exe 60 Pmhbqbae.exe 4992 Pjlcjf32.exe 1512 Pcegclgp.exe 2484 Pififb32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mpeiie32.exe Mcaipa32.exe File created C:\Windows\SysWOW64\Mbgeqmjp.exe Mpeiie32.exe File created C:\Windows\SysWOW64\Gejqna32.dll Oiccje32.exe File opened for modification C:\Windows\SysWOW64\Glfmgp32.exe Fkofga32.exe File opened for modification C:\Windows\SysWOW64\Lhgkgijg.exe Lplfcf32.exe File opened for modification C:\Windows\SysWOW64\Mbgeqmjp.exe Mpeiie32.exe File created C:\Windows\SysWOW64\Qckcba32.dll Ocnabm32.exe File created C:\Windows\SysWOW64\Pififb32.exe Pcegclgp.exe File opened for modification C:\Windows\SysWOW64\Lplfcf32.exe Lpgmhg32.exe File created C:\Windows\SysWOW64\Hjcakafa.dll Lpgmhg32.exe File created C:\Windows\SysWOW64\Gaaklfpn.dll Pcegclgp.exe File opened for modification C:\Windows\SysWOW64\Oiccje32.exe Nmhijd32.exe File created C:\Windows\SysWOW64\Odibfg32.dll Pcpnhl32.exe File created C:\Windows\SysWOW64\Kpqgeihg.dll Pmhbqbae.exe File created C:\Windows\SysWOW64\Pcegclgp.exe Pjlcjf32.exe File opened for modification C:\Windows\SysWOW64\Pcegclgp.exe Pjlcjf32.exe File created C:\Windows\SysWOW64\Nmcpoedn.exe Njbgmjgl.exe File opened for modification C:\Windows\SysWOW64\Nijqcf32.exe Nmcpoedn.exe File created C:\Windows\SysWOW64\Dlofiddl.dll Haodle32.exe File created C:\Windows\SysWOW64\Pnjiffif.dll Hppeim32.exe File created C:\Windows\SysWOW64\Njbgmjgl.exe Mbgeqmjp.exe File created C:\Windows\SysWOW64\Hppeim32.exe Haodle32.exe File opened for modification C:\Windows\SysWOW64\Hppeim32.exe Haodle32.exe File created C:\Windows\SysWOW64\Alapqh32.dll Mbgeqmjp.exe File created C:\Windows\SysWOW64\Nijqcf32.exe Nmcpoedn.exe File opened for modification C:\Windows\SysWOW64\Nmhijd32.exe Nijqcf32.exe File opened for modification C:\Windows\SysWOW64\Pcpnhl32.exe Ocnabm32.exe File created C:\Windows\SysWOW64\Mcaipa32.exe Lhgkgijg.exe File opened for modification C:\Windows\SysWOW64\Nmcpoedn.exe Njbgmjgl.exe File opened for modification C:\Windows\SysWOW64\Ocnabm32.exe Oifppdpd.exe File created C:\Windows\SysWOW64\Pjlcjf32.exe Pmhbqbae.exe File opened for modification C:\Windows\SysWOW64\Fqeioiam.exe c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Fkofga32.exe Fqeioiam.exe File created C:\Windows\SysWOW64\Lhgkgijg.exe Lplfcf32.exe File created C:\Windows\SysWOW64\Dpifjj32.dll Mcaipa32.exe File opened for modification C:\Windows\SysWOW64\Njbgmjgl.exe Mbgeqmjp.exe File created C:\Windows\SysWOW64\Nmhijd32.exe Nijqcf32.exe File created C:\Windows\SysWOW64\Oiccje32.exe Nmhijd32.exe File created C:\Windows\SysWOW64\Oifppdpd.exe Oiccje32.exe File created C:\Windows\SysWOW64\Pmhbqbae.exe Pcpnhl32.exe File created C:\Windows\SysWOW64\Bepjbf32.dll Njbgmjgl.exe File created C:\Windows\SysWOW64\Jclnjo32.dll Nijqcf32.exe File created C:\Windows\SysWOW64\Jidinqpb.exe Hppeim32.exe File created C:\Windows\SysWOW64\Mjliff32.dll Jidinqpb.exe File created C:\Windows\SysWOW64\Lplfcf32.exe Lpgmhg32.exe File created C:\Windows\SysWOW64\Nmdkcj32.dll Lplfcf32.exe File created C:\Windows\SysWOW64\Khlaie32.dll Lhgkgijg.exe File created C:\Windows\SysWOW64\Llgdkbfj.dll Nmcpoedn.exe File created C:\Windows\SysWOW64\Fefmmcgh.dll Nmhijd32.exe File opened for modification C:\Windows\SysWOW64\Oifppdpd.exe Oiccje32.exe File opened for modification C:\Windows\SysWOW64\Pjlcjf32.exe Pmhbqbae.exe File created C:\Windows\SysWOW64\Fqeioiam.exe c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Ojehbail.dll Fqeioiam.exe File opened for modification C:\Windows\SysWOW64\Mcaipa32.exe Lhgkgijg.exe File created C:\Windows\SysWOW64\Mpeiie32.exe Mcaipa32.exe File created C:\Windows\SysWOW64\Pcpnhl32.exe Ocnabm32.exe File created C:\Windows\SysWOW64\Onnnbnbp.dll Pjlcjf32.exe File created C:\Windows\SysWOW64\Cidcnbjk.dll c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Fkofga32.exe Fqeioiam.exe File created C:\Windows\SysWOW64\Kihgqfld.dll Fkofga32.exe File opened for modification C:\Windows\SysWOW64\Lpgmhg32.exe Jidinqpb.exe File created C:\Windows\SysWOW64\Glfmgp32.exe Fkofga32.exe File created C:\Windows\SysWOW64\Mldjbclh.dll Glfmgp32.exe File opened for modification C:\Windows\SysWOW64\Jidinqpb.exe Hppeim32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5084 2484 WerFault.exe 115 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llgdkbfj.dll" Nmcpoedn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oiccje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odibfg32.dll" Pcpnhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcpnhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaaklfpn.dll" Pcegclgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jidinqpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jidinqpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mcaipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hppeim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mpeiie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nmcpoedn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nijqcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lplfcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cidcnbjk.dll" c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bepjbf32.dll" Njbgmjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkofga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pmhbqbae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nmhijd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pmhbqbae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnjiffif.dll" Hppeim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjliff32.dll" Jidinqpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mcaipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Glfmgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lhgkgijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lhgkgijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fefmmcgh.dll" Nmhijd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmdkcj32.dll" Lplfcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khlaie32.dll" Lhgkgijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpikki32.dll" Oifppdpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nmhijd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gejqna32.dll" Oiccje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oiccje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjcakafa.dll" Lpgmhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lpgmhg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mbgeqmjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pjlcjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pcegclgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fqeioiam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkofga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kihgqfld.dll" Fkofga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pcpnhl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hppeim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alapqh32.dll" Mbgeqmjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mbgeqmjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mpeiie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nmcpoedn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oifppdpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onnnbnbp.dll" Pjlcjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojehbail.dll" Fqeioiam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Glfmgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Haodle32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oifppdpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ocnabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mldjbclh.dll" Glfmgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpbgeaba.dll" Mpeiie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jclnjo32.dll" Nijqcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcegclgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fqeioiam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlofiddl.dll" Haodle32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1816 2384 c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe 92 PID 2384 wrote to memory of 1816 2384 c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe 92 PID 2384 wrote to memory of 1816 2384 c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe 92 PID 1816 wrote to memory of 2840 1816 Fqeioiam.exe 93 PID 1816 wrote to memory of 2840 1816 Fqeioiam.exe 93 PID 1816 wrote to memory of 2840 1816 Fqeioiam.exe 93 PID 2840 wrote to memory of 3808 2840 Fkofga32.exe 94 PID 2840 wrote to memory of 3808 2840 Fkofga32.exe 94 PID 2840 wrote to memory of 3808 2840 Fkofga32.exe 94 PID 3808 wrote to memory of 3488 3808 Glfmgp32.exe 95 PID 3808 wrote to memory of 3488 3808 Glfmgp32.exe 95 PID 3808 wrote to memory of 3488 3808 Glfmgp32.exe 95 PID 3488 wrote to memory of 208 3488 Haodle32.exe 96 PID 3488 wrote to memory of 208 3488 Haodle32.exe 96 PID 3488 wrote to memory of 208 3488 Haodle32.exe 96 PID 208 wrote to memory of 3660 208 Hppeim32.exe 97 PID 208 wrote to memory of 3660 208 Hppeim32.exe 97 PID 208 wrote to memory of 3660 208 Hppeim32.exe 97 PID 3660 wrote to memory of 1096 3660 Jidinqpb.exe 98 PID 3660 wrote to memory of 1096 3660 Jidinqpb.exe 98 PID 3660 wrote to memory of 1096 3660 Jidinqpb.exe 98 PID 1096 wrote to memory of 1688 1096 Lpgmhg32.exe 99 PID 1096 wrote to memory of 1688 1096 Lpgmhg32.exe 99 PID 1096 wrote to memory of 1688 1096 Lpgmhg32.exe 99 PID 1688 wrote to memory of 4944 1688 Lplfcf32.exe 100 PID 1688 wrote to memory of 4944 1688 Lplfcf32.exe 100 PID 1688 wrote to memory of 4944 1688 Lplfcf32.exe 100 PID 4944 wrote to memory of 3720 4944 Lhgkgijg.exe 101 PID 4944 wrote to memory of 3720 4944 Lhgkgijg.exe 101 PID 4944 wrote to memory of 3720 4944 Lhgkgijg.exe 101 PID 3720 wrote to memory of 4812 3720 Mcaipa32.exe 102 PID 3720 wrote to memory of 4812 3720 Mcaipa32.exe 102 PID 3720 wrote to memory of 4812 3720 Mcaipa32.exe 102 PID 4812 wrote to memory of 2692 4812 Mpeiie32.exe 103 PID 4812 wrote to memory of 2692 4812 Mpeiie32.exe 103 PID 4812 wrote to memory of 2692 4812 Mpeiie32.exe 103 PID 2692 wrote to memory of 4700 2692 Mbgeqmjp.exe 104 PID 2692 wrote to memory of 4700 2692 Mbgeqmjp.exe 104 PID 2692 wrote to memory of 4700 2692 Mbgeqmjp.exe 104 PID 4700 wrote to memory of 2804 4700 Njbgmjgl.exe 105 PID 4700 wrote to memory of 2804 4700 Njbgmjgl.exe 105 PID 4700 wrote to memory of 2804 4700 Njbgmjgl.exe 105 PID 2804 wrote to memory of 536 2804 Nmcpoedn.exe 106 PID 2804 wrote to memory of 536 2804 Nmcpoedn.exe 106 PID 2804 wrote to memory of 536 2804 Nmcpoedn.exe 106 PID 536 wrote to memory of 2088 536 Nijqcf32.exe 107 PID 536 wrote to memory of 2088 536 Nijqcf32.exe 107 PID 536 wrote to memory of 2088 536 Nijqcf32.exe 107 PID 2088 wrote to memory of 3684 2088 Nmhijd32.exe 108 PID 2088 wrote to memory of 3684 2088 Nmhijd32.exe 108 PID 2088 wrote to memory of 3684 2088 Nmhijd32.exe 108 PID 3684 wrote to memory of 4456 3684 Oiccje32.exe 109 PID 3684 wrote to memory of 4456 3684 Oiccje32.exe 109 PID 3684 wrote to memory of 4456 3684 Oiccje32.exe 109 PID 4456 wrote to memory of 4256 4456 Oifppdpd.exe 110 PID 4456 wrote to memory of 4256 4456 Oifppdpd.exe 110 PID 4456 wrote to memory of 4256 4456 Oifppdpd.exe 110 PID 4256 wrote to memory of 3984 4256 Ocnabm32.exe 111 PID 4256 wrote to memory of 3984 4256 Ocnabm32.exe 111 PID 4256 wrote to memory of 3984 4256 Ocnabm32.exe 111 PID 3984 wrote to memory of 60 3984 Pcpnhl32.exe 112 PID 3984 wrote to memory of 60 3984 Pcpnhl32.exe 112 PID 3984 wrote to memory of 60 3984 Pcpnhl32.exe 112 PID 60 wrote to memory of 4992 60 Pmhbqbae.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c4a31f43f0351c8cf2f08eb81ba73ea0_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\Fqeioiam.exeC:\Windows\system32\Fqeioiam.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Fkofga32.exeC:\Windows\system32\Fkofga32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Glfmgp32.exeC:\Windows\system32\Glfmgp32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\Haodle32.exeC:\Windows\system32\Haodle32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\Hppeim32.exeC:\Windows\system32\Hppeim32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Jidinqpb.exeC:\Windows\system32\Jidinqpb.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\Lpgmhg32.exeC:\Windows\system32\Lpgmhg32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\Lplfcf32.exeC:\Windows\system32\Lplfcf32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\Lhgkgijg.exeC:\Windows\system32\Lhgkgijg.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\Mcaipa32.exeC:\Windows\system32\Mcaipa32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\Mpeiie32.exeC:\Windows\system32\Mpeiie32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Mbgeqmjp.exeC:\Windows\system32\Mbgeqmjp.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Njbgmjgl.exeC:\Windows\system32\Njbgmjgl.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\Nmcpoedn.exeC:\Windows\system32\Nmcpoedn.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Nijqcf32.exeC:\Windows\system32\Nijqcf32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\Nmhijd32.exeC:\Windows\system32\Nmhijd32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Oiccje32.exeC:\Windows\system32\Oiccje32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\Oifppdpd.exeC:\Windows\system32\Oifppdpd.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Ocnabm32.exeC:\Windows\system32\Ocnabm32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\Pcpnhl32.exeC:\Windows\system32\Pcpnhl32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\Pmhbqbae.exeC:\Windows\system32\Pmhbqbae.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\Pjlcjf32.exeC:\Windows\system32\Pjlcjf32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4992 -
C:\Windows\SysWOW64\Pcegclgp.exeC:\Windows\system32\Pcegclgp.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1512 -
C:\Windows\SysWOW64\Pififb32.exeC:\Windows\system32\Pififb32.exe25⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 22026⤵
- Program crash
PID:5084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2484 -ip 24841⤵PID:392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4168 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD553b67a6d7c0469ecb4a93127de28f8bf
SHA15a80a8a8a3d19b763075bde232afd9ff35765032
SHA256bd4b82feb2683c50ccee4764b872f8680b67317dd095539472545b6fc0b297f8
SHA5125dd5c4b3708c110cc5d7eeeea846206dc47f2574d48878b46a415d038e57ecef557d657c632f391d3c3de5d3562de5227aa47a3b9b82d11a4b5721f480e652df
-
Filesize
520KB
MD559ef0baf3984a6e3d0ff72bdb586123a
SHA153cf2537b41df36ea4af0d73a2e01e1f7b6dcdb5
SHA256215b446ca8b8fd8ef97287d45e2996aee64147eb7d6b4083bc57d2a9ded83b38
SHA512401609b42874360f884b244e43bc1ed2aba40da9ea7d66c278c93709cba6c59cc47d63dd5eb0a64bf04062ac0b0a338f8dcc0cdf2cbfc6ba6c8d8d6103f34c33
-
Filesize
520KB
MD5836b703244f1cb48a71f35134b2bc0dd
SHA167e90fc7a8937fbbbf3c795c0854a98c5d935a48
SHA256c15070700cf87f749dd943e88424ae1a91e8a02e09c8c4b49e44be658e91245a
SHA512c795320a9d2316257209e0ca2f5c162436d2c3c19f7c9a14833d41a7dd879cfc3e6c3c8304cdc54700295a6cb093f5811e36ff9c973e661955592f2e69a13e13
-
Filesize
520KB
MD5025b996869e5c2341c4ff1a9863a2df6
SHA19da0c31920a21052733252471b46da0e062089f1
SHA25673298d6d9eb81b46dcc5479750feb77cfa524b8668b9973001041a78e5656f7c
SHA512cae8cb406dfd62f87a409764460615d8d03cfe4a734063916fa9248abe94e2050e0f09417cef0c9271208f079c3ce30117fc850752bd9d0023e0bb8144f800cb
-
Filesize
520KB
MD5a0f2cb45c645a09b9529066549a0197f
SHA161cbf3cef9e99b050a5e0ec6ec5d6c9cc2612380
SHA256673e2c548b32165f285fe963569352d2822f736bcf7d3c075ba96a5e2dcaa091
SHA5128293951635673638464c1ef5d9edce3caa1731c921a66653a20734d0bcd73386964e0145a4d67df25b659bbaf92dc6ece9f52d7885234009249f611716dce934
-
Filesize
520KB
MD5d1293c53deb028972c82276946594e5f
SHA17a0be1b53433c366dbcfe324d7ba0a063c468244
SHA2561924cb135f842b44a3647795302f40780f1417cb610adc08908e059fd5129e27
SHA51268c4cde79292dad02377cfd5cf78ef43e3dff1cd48c94abcb70d5db47c1c6f30bb70156887042a36a0cef92b0923ae1513dfa5d8891323dbf255ce31e8cc87fa
-
Filesize
520KB
MD561619697c7e7a79d785aa43967c40d47
SHA1a56aa55b9de346704a8432e609c0cb4274b9599b
SHA256f8b279c09be45f1c198fb7178ece1a948e716ff29ecd39fe293a7b0870524d62
SHA512e24784c54851cdf2effb73b1ddf407bb2ae44437d87f109c91825286efc121e0ece9a882a71da08ece7ea4602ed38fb3bd7712b470e1175d06cefd724725303c
-
Filesize
520KB
MD54c094675e2e2be080e189e27fae0e16e
SHA1186d6a71b0ea1c7a4c10697307d4d3a26bfbf4b2
SHA256994aa3318d3b38129999f329118832858b321710972ff20eda6f0b8c3f989361
SHA51268a94472d9b636ed546718950d63bed21a9dc9d86b6e5ac2b93a41ac5da4a7ddee6979edd7a04b3acc23fe42a66903fd6b423888709d1cb95b7590299615a43a
-
Filesize
520KB
MD527d577f52f5e52517114895093ebd076
SHA18b528180013f8df07bb5dfe92cd0955376bb9423
SHA256a3a2fcfb789d82c9a4c43e59b5526e26cc3a2163c6c49d4a072bfa8867546567
SHA51212368180fe20ff67a72ccf202ba06e80ab6d8df418aafe5303d6ba1367e4e53e2c4c395e4d4e5ae9390e8050e40ec0385089a6ac25f3a3b8d37730126887bb9e
-
Filesize
520KB
MD5a5c59eab289fdc7767928120b8630cb7
SHA195650e3a49b7813ff28251baed293de9512b6298
SHA256340a5f8c760d38e4e0e43f5134633a13e5daaedadafe6218e4c903c9ab7aa6d6
SHA51215caadbc4fc1f59daf00ab17ba344c510dc744b926cbf04a1a0f6899a43412c8bf644ee78f72b2c8db060546d003098b351aa84fa9908b69dc5586c2efe42ce7
-
Filesize
520KB
MD5a669c7636dd6444973acfdaa18f042bc
SHA1525188e7f7991c36eba8638ec90166fa017a6538
SHA2569ed4992ac755e2795238979d33f25e1c04ebd783f6dc89166ce1c1aaae227b86
SHA512cdc82976859abc595369c9efe3927a2e351d4c8dfaa550a62243a8349639f8ed70fff752eb3b031af9895e13d89f116179d249cb2f201b1b4e8027bdadbf397b
-
Filesize
520KB
MD5f8fe3ae33ffc80832f92f5e064097fdb
SHA15deb6a6efd45060ca3dc441fe06f64172da0a842
SHA25614abc428bbcfd84c808edfbd32cbc1ecc3696187850692728c6f861ede530b92
SHA512240ca2f3c6dd75c42148440915a6121ab7bfc43e2f387be211b9fbfe12b4f3cbd11cf52c9cd7570466a7e8705a7c1315473d55e1ae56416c5937c169a6b756d0
-
Filesize
520KB
MD5d4349e1c0581f081393bee344e3858d3
SHA1a12a434b20dff86c5cc9c2f5e1c56b1b9b0171ab
SHA256027a007756f0f930efd73614efb29d0e3680ca05e0932b46f8bafa9deb84be31
SHA512e03279490027334f08ff71c225ecfedbf44e73b57fb4885c44f4b75577445ef7ccffaf11a59489cfb872c933e258c527b8ce04c90a01effa34e1cc10d1216611
-
Filesize
520KB
MD500abded1f4a19d1a4e0226b4fe26a515
SHA14fba10e04e41c056084c08b245235d10162b9533
SHA25697a6b95f83543091c9efff61cfa76ee8eb45777fae4c60171eebf640dd84576e
SHA5123b6e44d694eee50831a60853956463f53acc64d998e2c034b4c4c35e8e2c22e710de21f970cdb94b41e8c9169194ee849387257571de46d69a60790a6e550a93
-
Filesize
520KB
MD5787202c129e90ae639a69775bac3499d
SHA1db70f8a52f38d234d690c770421437cfaa436ab2
SHA25636cde7abe4a26d3f8344940aee09489a0694265617ad96d03dd0c866fad3b89c
SHA512d5e6f47434b63ff8a11480ae927b2f79c9f2e6764f7fa79841d90e35a33abba274648f8c9087e5e328e334fcad2279148b1f700426698d452424547e84dd00b5
-
Filesize
520KB
MD5f61222b464e47ed4c81e3ffddfbc7dd4
SHA1f948d2112a59c2f1a11dfc46a90f93cd4295954f
SHA256d2ea05ca95ff8e54d8586d3ab2a46865be78faf2d966147f40bd73274b6bc64d
SHA512b506b470ac14e89a3f8e01eedac06f3d8879a0465f6c3c2da2a9321cbd7edcc8b17b9b0fd804882d5b51f7920cf89bb71f71611d3c9eee10a4de3cd572f69719
-
Filesize
520KB
MD5adaf75096fede98e006718ecef6357f0
SHA1c23c5394cc80a15b03577735a8e47ff36763e485
SHA256b859afa2a8265118dbddf287897b8ed923ef675b0d6247b9d15cb8d24645704f
SHA5128a1e2de43d5304037c710fea4ebbcd92b99d5293b84089799bb74ff6c51466801fc83ddc4264e1eb253f4296d9bb2a6080bff652e2be381a3b1b61aa4927650e
-
Filesize
520KB
MD5160c1a35054d34c177340e27ad3cd4b1
SHA16997445c71be8c03ab82c268256b8db1f23f4ef0
SHA2562f8540a058383ac2ed989be78cfbd4403e44a3ee4d5e3d48654c684e6db0713b
SHA512353bdae6681e39038924b2685e2a649eb3abd69b5ecd8bd3c9bad675257028ce8a2254ce96aad5752c4e27a4d12434b8bc99ad00acbe75fceaf0f00555509a87
-
Filesize
520KB
MD5c7adbe3ba5fb25fb9b63c67ff21de3e2
SHA118f6988fe7ce389e21e561f6b84622d69c69b926
SHA256e5093771e3fcf7d6cd4e382accece0f71777785b40ef55e80cfdf5e3916f4c8c
SHA51205d6bc7fa50e0adf52171908076ddb1701f43a0d073da7033cc4cec19dd8dfb65814ae5c68b05c7ce4977292f616341eacb2c24c793712daa327b0e93b8f4659
-
Filesize
520KB
MD54a65454a8b4f28325a555d2db3ae9e9e
SHA1b8e5188c1e20f45a1c5150883508d0e1c8c96410
SHA256fb94411f602f23fb2b1c86b29ddb7ff8e65d77957690cfbbd0ac366ad44c6f0a
SHA51218133361cdd58f5b2c06d4c82a78ea4e44dab51add60ec85bff2c369a20e0df4763552dae0cfdaaa6fb1dcf032f3dfd0e01dc2d369a9b33a840108f652909c11
-
Filesize
520KB
MD58da5dc5e848ad91e2aacf4c86a949143
SHA1a8c8ee820bd54885f7fd8175c93e831c7f920384
SHA2569dc3454bbd5d8e1edaab10aef96c34bc162a0a11eb07fa5cafc73762d1a3a673
SHA51260d24aa77111fa56f3748dad3fae2b3b5fe7afe97125450115ea7bdec84b9f7ade4761cef32e771553466bb9e970f59c2baa423599f171e911a836587804b033
-
Filesize
520KB
MD5b54c444880e75509e5c0554c37a9ea54
SHA1ad7fade8c9fb23040284ee5bf18402a02b68efa4
SHA2560fc58d1d6d05fd75ed7b3fa29682eaf8a8ec4cc85b31cedcd8a51d37fed19ab0
SHA512f6c5dda75da59ed5f94b5a50dd5d940eb1ca3c556936d544b0743efbf338555f68a75daa750f3acafab34b3a57bc4a0f6f4195900e30bc4e801fc17e2f3a5a2d
-
Filesize
520KB
MD5b93085dd1bde3a0ae7faa46fafeb6774
SHA12b4354aba44d92200b929a3a1e7ddd91a5727f50
SHA2567aec6577da4f4fbfd15a796ea63cdc17ec7dd75f7bae500af060a22da5584693
SHA512115833b36ec4d2b60716921d06ed3026762c3cff08da83c602535619c7f46936c2dc3a0629bda3b2030fd8d0d02b48010007f566c1b25d9b488e7159d3e57168
-
Filesize
520KB
MD58585b26c1402f38710ca84cd802f30c7
SHA1fca242683924953f8f58e9ed92ea5ee2e836f70c
SHA25656a9805d34a5808215e298f370873fcb7228c6a18cd4e08602860d1e6f738855
SHA512b827849566ca6e9b8053f27074e6e82eb3f9e30c7ca427a00f73b4e209de07be8e698305658fa496797c2792e4d1d68014446bf436d82e4b52bff27ea08bdf75
-
Filesize
520KB
MD50895e6d214f7c594fad085525e8349ea
SHA168e9126d2a6a3d874c7f54e686f6e8f7505b7916
SHA2567cf3eaec9fe3921f90532a2b72ad2b8467a3aa03d9b41e2492f81aae1ade3fc2
SHA51220330262ddc9eb8b5294e85465f2e3a376fbffcf448e4316febeff0c4f861eeb65a2cf0daa7a2d85b53643d958c7a2d9273296deac8c5fbf17cd6a903ef3fb31
-
Filesize
520KB
MD5d7595af9d5d5294ddd357f3685bccf48
SHA1639c10ef2a846d7830cc39bde8c8b6628e99310e
SHA256a07a801a570ad1ea70350c3f5603d5568ed21f1661ff03390efd6e00d407dc94
SHA512b698c6c7de9198168613cc26e76ee6b861cc1ea605a06f0ef33f1e5940232ce70310f25fae1073370882c358a41ffa2c03b8e423e3306ce08cad4f382938f254
-
Filesize
520KB
MD52a87c68a69bbd9b745042e4f0ad4b052
SHA1ede1aab89152f35080283138df4e4fcab1f797c8
SHA25696bf3317bb71a3ab327b772ca8f284c81e5e2ce5b6d530dd64a1c17eb23bad6f
SHA51281e05c9268d6deb9b6e90ae05c7395175ddadda7ced886891f1b5ec2db2af5ed77b97fc7b306543b8e3024f628e33ee271ae614e6eb27d6a685a84f2e2865f48
-
Filesize
520KB
MD55ebef159cd13846a52581fbb4677aea2
SHA1c29afaa062a50d3f8cbad875703e1ee4eb75933a
SHA2568b39c962ac5786f52fbffb34f58373bc72f6b7b6c23bfebf28a060ccda713fca
SHA5120efd800a34a4d3d416cb7e2c350a71e0eb653bf224b5cf621695c72bfaf1f5336e9ba070c442dbe25fe0a69b77e8ebbdbc9601be36559d458119781d8e642733