Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 00:40
Static task
static1
Behavioral task
behavioral1
Sample
37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe
-
Size
163KB
-
MD5
37531f1427fd1ca04ba0fdb019b7c060
-
SHA1
c8c15f79996d9f591ab79695f0bb93db1057c593
-
SHA256
23e660244272a1428b7591bed1c32c7abc634b8bdb8257a0de60a9f9aa03f6d7
-
SHA512
a12cba7ca80390b7042af8facc696c920e0c1477b5299291f9fddb069f2a5ce675a09694cd23825aea776b8d436b4fd4f97b789ceb2f4bf04495a02088fea518
-
SSDEEP
1536:PqetPtynIP/iDpkfa5riS9F9Iq25dYPzwlProNVU4qNVUrk/9QbfBr+7GwKrPAsf:HdtyI3iDpkfqrimIkMltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ncnofeof.exeKofkbk32.exeMfnoqc32.exeAagkhd32.exeNgndaccj.exeOjfcdnjc.exeQpeahb32.exe37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exeKegpifod.exeLlodgnja.exeApmhiq32.exeBdmmeo32.exeJniood32.exePhfcipoo.exeBhkfkmmg.exeOjomcopk.exePhcgcqab.exeAdcjop32.exeKjgeedch.exeLfbped32.exeDhphmj32.exeBphgeo32.exeCgifbhid.exeLggejg32.exeMqkiok32.exeQfkqjmdg.exeOabhfg32.exeAgimkk32.exeCpmapodj.exeCaageq32.exePpjbmc32.exeMgphpe32.exeOmpfej32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncnofeof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kofkbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfnoqc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aagkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncnofeof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngndaccj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngndaccj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojfcdnjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qpeahb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kegpifod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llodgnja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apmhiq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdmmeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jniood32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llodgnja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phfcipoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhkfkmmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojomcopk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phcgcqab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phfcipoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adcjop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apmhiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhkfkmmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjgeedch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfbped32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhphmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bphgeo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgifbhid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhphmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lggejg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqkiok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfbped32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfkqjmdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpeahb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdmmeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgifbhid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjgeedch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kofkbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oabhfg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agimkk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kegpifod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpmapodj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caageq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lggejg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqkiok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjbmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adcjop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aagkhd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpmapodj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfnoqc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojomcopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppjbmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfkqjmdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caageq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgphpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojfcdnjc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oabhfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phcgcqab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgphpe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ompfej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agimkk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bphgeo32.exe -
Executes dropped EXE 33 IoCs
Processes:
Jniood32.exeKegpifod.exeKjgeedch.exeKofkbk32.exeLfbped32.exeLlodgnja.exeLggejg32.exeMfnoqc32.exeMgphpe32.exeMqkiok32.exeNcnofeof.exeNgndaccj.exeOjomcopk.exeOmpfej32.exeOjfcdnjc.exeOabhfg32.exePpjbmc32.exePhcgcqab.exePhfcipoo.exeQfkqjmdg.exeQpeahb32.exeAdcjop32.exeAagkhd32.exeApmhiq32.exeAgimkk32.exeBdmmeo32.exeBhkfkmmg.exeBphgeo32.exeCpmapodj.exeCgifbhid.exeCaageq32.exeDhphmj32.exeDkqaoe32.exepid process 4944 Jniood32.exe 4016 Kegpifod.exe 404 Kjgeedch.exe 2724 Kofkbk32.exe 32 Lfbped32.exe 880 Llodgnja.exe 2904 Lggejg32.exe 1016 Mfnoqc32.exe 1432 Mgphpe32.exe 2884 Mqkiok32.exe 3088 Ncnofeof.exe 4304 Ngndaccj.exe 1708 Ojomcopk.exe 2124 Ompfej32.exe 5100 Ojfcdnjc.exe 2356 Oabhfg32.exe 2728 Ppjbmc32.exe 4604 Phcgcqab.exe 2348 Phfcipoo.exe 4040 Qfkqjmdg.exe 4496 Qpeahb32.exe 5056 Adcjop32.exe 1784 Aagkhd32.exe 2916 Apmhiq32.exe 4348 Agimkk32.exe 2400 Bdmmeo32.exe 2416 Bhkfkmmg.exe 3220 Bphgeo32.exe 2448 Cpmapodj.exe 4020 Cgifbhid.exe 2132 Caageq32.exe 4640 Dhphmj32.exe 2168 Dkqaoe32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ncnofeof.exeBhkfkmmg.exeCgifbhid.exeDhphmj32.exeJniood32.exeKegpifod.exeAgimkk32.exeLlodgnja.exeAagkhd32.exeKofkbk32.exeKjgeedch.exeLggejg32.exeMqkiok32.exeBphgeo32.exePhfcipoo.exeAdcjop32.exeLfbped32.exeMfnoqc32.exe37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exeCpmapodj.exeOjomcopk.exeOabhfg32.exeApmhiq32.exeOjfcdnjc.exePhcgcqab.exeQfkqjmdg.exeCaageq32.exeQpeahb32.exeBdmmeo32.exePpjbmc32.exeOmpfej32.exeMgphpe32.exeNgndaccj.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ngndaccj.exe Ncnofeof.exe File opened for modification C:\Windows\SysWOW64\Bphgeo32.exe Bhkfkmmg.exe File opened for modification C:\Windows\SysWOW64\Caageq32.exe Cgifbhid.exe File opened for modification C:\Windows\SysWOW64\Dkqaoe32.exe Dhphmj32.exe File created C:\Windows\SysWOW64\Fmggcl32.dll Jniood32.exe File created C:\Windows\SysWOW64\Aablof32.dll Kegpifod.exe File opened for modification C:\Windows\SysWOW64\Bdmmeo32.exe Agimkk32.exe File opened for modification C:\Windows\SysWOW64\Lggejg32.exe Llodgnja.exe File opened for modification C:\Windows\SysWOW64\Apmhiq32.exe Aagkhd32.exe File created C:\Windows\SysWOW64\Ipgijcij.dll Kofkbk32.exe File created C:\Windows\SysWOW64\Kofkbk32.exe Kjgeedch.exe File created C:\Windows\SysWOW64\Mfnoqc32.exe Lggejg32.exe File created C:\Windows\SysWOW64\Ncnofeof.exe Mqkiok32.exe File opened for modification C:\Windows\SysWOW64\Lfbped32.exe Kofkbk32.exe File created C:\Windows\SysWOW64\Ebcmfjll.dll Lggejg32.exe File created C:\Windows\SysWOW64\Eehnaq32.dll Bphgeo32.exe File created C:\Windows\SysWOW64\Hhblffgn.dll Phfcipoo.exe File opened for modification C:\Windows\SysWOW64\Aagkhd32.exe Adcjop32.exe File created C:\Windows\SysWOW64\Llodgnja.exe Lfbped32.exe File created C:\Windows\SysWOW64\Lggejg32.exe Llodgnja.exe File created C:\Windows\SysWOW64\Difebl32.dll Mfnoqc32.exe File opened for modification C:\Windows\SysWOW64\Jniood32.exe 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Cgifbhid.exe Cpmapodj.exe File opened for modification C:\Windows\SysWOW64\Ompfej32.exe Ojomcopk.exe File created C:\Windows\SysWOW64\Apmhiq32.exe Aagkhd32.exe File created C:\Windows\SysWOW64\Jponoqjl.dll Oabhfg32.exe File created C:\Windows\SysWOW64\Agimkk32.exe Apmhiq32.exe File created C:\Windows\SysWOW64\Oabhfg32.exe Ojfcdnjc.exe File created C:\Windows\SysWOW64\Phfcipoo.exe Phcgcqab.exe File created C:\Windows\SysWOW64\Bphgeo32.exe Bhkfkmmg.exe File created C:\Windows\SysWOW64\Liabph32.dll Lfbped32.exe File created C:\Windows\SysWOW64\Ppjbmc32.exe Oabhfg32.exe File created C:\Windows\SysWOW64\Qpeahb32.exe Qfkqjmdg.exe File created C:\Windows\SysWOW64\Mgphpe32.exe Mfnoqc32.exe File created C:\Windows\SysWOW64\Dhphmj32.exe Caageq32.exe File opened for modification C:\Windows\SysWOW64\Mfnoqc32.exe Lggejg32.exe File opened for modification C:\Windows\SysWOW64\Oabhfg32.exe Ojfcdnjc.exe File opened for modification C:\Windows\SysWOW64\Qfkqjmdg.exe Phfcipoo.exe File created C:\Windows\SysWOW64\Hehhjm32.dll Phcgcqab.exe File opened for modification C:\Windows\SysWOW64\Adcjop32.exe Qpeahb32.exe File created C:\Windows\SysWOW64\Kegpifod.exe Jniood32.exe File created C:\Windows\SysWOW64\Adfnba32.dll Ncnofeof.exe File created C:\Windows\SysWOW64\Cnffoibg.dll Ojfcdnjc.exe File created C:\Windows\SysWOW64\Bdmmeo32.exe Agimkk32.exe File opened for modification C:\Windows\SysWOW64\Bhkfkmmg.exe Bdmmeo32.exe File created C:\Windows\SysWOW64\Okhbek32.dll Cpmapodj.exe File created C:\Windows\SysWOW64\Ekppjn32.dll Caageq32.exe File opened for modification C:\Windows\SysWOW64\Phfcipoo.exe Phcgcqab.exe File created C:\Windows\SysWOW64\Mfgomdnj.dll Qpeahb32.exe File created C:\Windows\SysWOW64\Gjecbd32.dll Bhkfkmmg.exe File created C:\Windows\SysWOW64\Kbmimp32.dll Llodgnja.exe File opened for modification C:\Windows\SysWOW64\Phcgcqab.exe Ppjbmc32.exe File created C:\Windows\SysWOW64\Pmpockdl.dll Adcjop32.exe File created C:\Windows\SysWOW64\Cgifbhid.exe Cpmapodj.exe File created C:\Windows\SysWOW64\Lbpflbpa.dll Ojomcopk.exe File created C:\Windows\SysWOW64\Nphihiif.dll Ompfej32.exe File created C:\Windows\SysWOW64\Qfkqjmdg.exe Phfcipoo.exe File opened for modification C:\Windows\SysWOW64\Dhphmj32.exe Caageq32.exe File opened for modification C:\Windows\SysWOW64\Kofkbk32.exe Kjgeedch.exe File created C:\Windows\SysWOW64\Cfiedd32.dll Kjgeedch.exe File opened for modification C:\Windows\SysWOW64\Agimkk32.exe Apmhiq32.exe File created C:\Windows\SysWOW64\Mqkiok32.exe Mgphpe32.exe File opened for modification C:\Windows\SysWOW64\Ojomcopk.exe Ngndaccj.exe File created C:\Windows\SysWOW64\Ompfej32.exe Ojomcopk.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4056 2168 WerFault.exe Dkqaoe32.exe -
Modifies registry class 64 IoCs
Processes:
Qpeahb32.exeMgphpe32.exeCpmapodj.exeAgimkk32.exeBphgeo32.exePhcgcqab.exePhfcipoo.exeAagkhd32.exe37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exeApmhiq32.exeCgifbhid.exeKofkbk32.exeMfnoqc32.exeOabhfg32.exeDhphmj32.exeQfkqjmdg.exeJniood32.exeNcnofeof.exePpjbmc32.exeLlodgnja.exeOjfcdnjc.exeOjomcopk.exeKegpifod.exeKjgeedch.exeLfbped32.exeNgndaccj.exeLggejg32.exeCaageq32.exeOmpfej32.exeMqkiok32.exeBdmmeo32.exeBhkfkmmg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qpeahb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfgomdnj.dll" Qpeahb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qpeahb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgphpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpmapodj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgphpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifaohg32.dll" Agimkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bphgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phcgcqab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phfcipoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgeaknci.dll" Aagkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apmhiq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bphgeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgifbhid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kofkbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfnoqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eemnff32.dll" 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oabhfg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhphmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipgijcij.dll" Kofkbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qfkqjmdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jniood32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adfnba32.dll" Ncnofeof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmephjke.dll" Ppjbmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcdibc32.dll" Cgifbhid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llodgnja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnffoibg.dll" Ojfcdnjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppjbmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojomcopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okhbek32.dll" Cpmapodj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgifbhid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhphmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aablof32.dll" Kegpifod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfiedd32.dll" Kjgeedch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfbped32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aepjgm32.dll" Ngndaccj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppjbmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kegpifod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kegpifod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lggejg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojfcdnjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jponoqjl.dll" Oabhfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjgeedch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlcdqdie.dll" Qfkqjmdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caageq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncnofeof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nphihiif.dll" Ompfej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hehhjm32.dll" Phcgcqab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llodgnja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phcgcqab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iocbnhog.dll" Mgphpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqkiok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdmmeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfnoqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aagkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdmmeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekppjn32.dll" Caageq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjecbd32.dll" Bhkfkmmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agimkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eehnaq32.dll" Bphgeo32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exeJniood32.exeKegpifod.exeKjgeedch.exeKofkbk32.exeLfbped32.exeLlodgnja.exeLggejg32.exeMfnoqc32.exeMgphpe32.exeMqkiok32.exeNcnofeof.exeNgndaccj.exeOjomcopk.exeOmpfej32.exeOjfcdnjc.exeOabhfg32.exePpjbmc32.exePhcgcqab.exePhfcipoo.exeQfkqjmdg.exeQpeahb32.exedescription pid process target process PID 3176 wrote to memory of 4944 3176 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Jniood32.exe PID 3176 wrote to memory of 4944 3176 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Jniood32.exe PID 3176 wrote to memory of 4944 3176 37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe Jniood32.exe PID 4944 wrote to memory of 4016 4944 Jniood32.exe Kegpifod.exe PID 4944 wrote to memory of 4016 4944 Jniood32.exe Kegpifod.exe PID 4944 wrote to memory of 4016 4944 Jniood32.exe Kegpifod.exe PID 4016 wrote to memory of 404 4016 Kegpifod.exe Kjgeedch.exe PID 4016 wrote to memory of 404 4016 Kegpifod.exe Kjgeedch.exe PID 4016 wrote to memory of 404 4016 Kegpifod.exe Kjgeedch.exe PID 404 wrote to memory of 2724 404 Kjgeedch.exe Kofkbk32.exe PID 404 wrote to memory of 2724 404 Kjgeedch.exe Kofkbk32.exe PID 404 wrote to memory of 2724 404 Kjgeedch.exe Kofkbk32.exe PID 2724 wrote to memory of 32 2724 Kofkbk32.exe Lfbped32.exe PID 2724 wrote to memory of 32 2724 Kofkbk32.exe Lfbped32.exe PID 2724 wrote to memory of 32 2724 Kofkbk32.exe Lfbped32.exe PID 32 wrote to memory of 880 32 Lfbped32.exe Llodgnja.exe PID 32 wrote to memory of 880 32 Lfbped32.exe Llodgnja.exe PID 32 wrote to memory of 880 32 Lfbped32.exe Llodgnja.exe PID 880 wrote to memory of 2904 880 Llodgnja.exe Lggejg32.exe PID 880 wrote to memory of 2904 880 Llodgnja.exe Lggejg32.exe PID 880 wrote to memory of 2904 880 Llodgnja.exe Lggejg32.exe PID 2904 wrote to memory of 1016 2904 Lggejg32.exe Mfnoqc32.exe PID 2904 wrote to memory of 1016 2904 Lggejg32.exe Mfnoqc32.exe PID 2904 wrote to memory of 1016 2904 Lggejg32.exe Mfnoqc32.exe PID 1016 wrote to memory of 1432 1016 Mfnoqc32.exe Mgphpe32.exe PID 1016 wrote to memory of 1432 1016 Mfnoqc32.exe Mgphpe32.exe PID 1016 wrote to memory of 1432 1016 Mfnoqc32.exe Mgphpe32.exe PID 1432 wrote to memory of 2884 1432 Mgphpe32.exe Mqkiok32.exe PID 1432 wrote to memory of 2884 1432 Mgphpe32.exe Mqkiok32.exe PID 1432 wrote to memory of 2884 1432 Mgphpe32.exe Mqkiok32.exe PID 2884 wrote to memory of 3088 2884 Mqkiok32.exe Ncnofeof.exe PID 2884 wrote to memory of 3088 2884 Mqkiok32.exe Ncnofeof.exe PID 2884 wrote to memory of 3088 2884 Mqkiok32.exe Ncnofeof.exe PID 3088 wrote to memory of 4304 3088 Ncnofeof.exe Ngndaccj.exe PID 3088 wrote to memory of 4304 3088 Ncnofeof.exe Ngndaccj.exe PID 3088 wrote to memory of 4304 3088 Ncnofeof.exe Ngndaccj.exe PID 4304 wrote to memory of 1708 4304 Ngndaccj.exe Ojomcopk.exe PID 4304 wrote to memory of 1708 4304 Ngndaccj.exe Ojomcopk.exe PID 4304 wrote to memory of 1708 4304 Ngndaccj.exe Ojomcopk.exe PID 1708 wrote to memory of 2124 1708 Ojomcopk.exe Ompfej32.exe PID 1708 wrote to memory of 2124 1708 Ojomcopk.exe Ompfej32.exe PID 1708 wrote to memory of 2124 1708 Ojomcopk.exe Ompfej32.exe PID 2124 wrote to memory of 5100 2124 Ompfej32.exe Ojfcdnjc.exe PID 2124 wrote to memory of 5100 2124 Ompfej32.exe Ojfcdnjc.exe PID 2124 wrote to memory of 5100 2124 Ompfej32.exe Ojfcdnjc.exe PID 5100 wrote to memory of 2356 5100 Ojfcdnjc.exe Oabhfg32.exe PID 5100 wrote to memory of 2356 5100 Ojfcdnjc.exe Oabhfg32.exe PID 5100 wrote to memory of 2356 5100 Ojfcdnjc.exe Oabhfg32.exe PID 2356 wrote to memory of 2728 2356 Oabhfg32.exe Ppjbmc32.exe PID 2356 wrote to memory of 2728 2356 Oabhfg32.exe Ppjbmc32.exe PID 2356 wrote to memory of 2728 2356 Oabhfg32.exe Ppjbmc32.exe PID 2728 wrote to memory of 4604 2728 Ppjbmc32.exe Phcgcqab.exe PID 2728 wrote to memory of 4604 2728 Ppjbmc32.exe Phcgcqab.exe PID 2728 wrote to memory of 4604 2728 Ppjbmc32.exe Phcgcqab.exe PID 4604 wrote to memory of 2348 4604 Phcgcqab.exe Phfcipoo.exe PID 4604 wrote to memory of 2348 4604 Phcgcqab.exe Phfcipoo.exe PID 4604 wrote to memory of 2348 4604 Phcgcqab.exe Phfcipoo.exe PID 2348 wrote to memory of 4040 2348 Phfcipoo.exe Qfkqjmdg.exe PID 2348 wrote to memory of 4040 2348 Phfcipoo.exe Qfkqjmdg.exe PID 2348 wrote to memory of 4040 2348 Phfcipoo.exe Qfkqjmdg.exe PID 4040 wrote to memory of 4496 4040 Qfkqjmdg.exe Qpeahb32.exe PID 4040 wrote to memory of 4496 4040 Qfkqjmdg.exe Qpeahb32.exe PID 4040 wrote to memory of 4496 4040 Qfkqjmdg.exe Qpeahb32.exe PID 4496 wrote to memory of 5056 4496 Qpeahb32.exe Adcjop32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\37531f1427fd1ca04ba0fdb019b7c060_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jniood32.exeC:\Windows\system32\Jniood32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kegpifod.exeC:\Windows\system32\Kegpifod.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kjgeedch.exeC:\Windows\system32\Kjgeedch.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kofkbk32.exeC:\Windows\system32\Kofkbk32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lfbped32.exeC:\Windows\system32\Lfbped32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Llodgnja.exeC:\Windows\system32\Llodgnja.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lggejg32.exeC:\Windows\system32\Lggejg32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mfnoqc32.exeC:\Windows\system32\Mfnoqc32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mgphpe32.exeC:\Windows\system32\Mgphpe32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mqkiok32.exeC:\Windows\system32\Mqkiok32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ncnofeof.exeC:\Windows\system32\Ncnofeof.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ngndaccj.exeC:\Windows\system32\Ngndaccj.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ojomcopk.exeC:\Windows\system32\Ojomcopk.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ompfej32.exeC:\Windows\system32\Ompfej32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ojfcdnjc.exeC:\Windows\system32\Ojfcdnjc.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oabhfg32.exeC:\Windows\system32\Oabhfg32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ppjbmc32.exeC:\Windows\system32\Ppjbmc32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Phcgcqab.exeC:\Windows\system32\Phcgcqab.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Phfcipoo.exeC:\Windows\system32\Phfcipoo.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qfkqjmdg.exeC:\Windows\system32\Qfkqjmdg.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qpeahb32.exeC:\Windows\system32\Qpeahb32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Adcjop32.exeC:\Windows\system32\Adcjop32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Aagkhd32.exeC:\Windows\system32\Aagkhd32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Apmhiq32.exeC:\Windows\system32\Apmhiq32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Agimkk32.exeC:\Windows\system32\Agimkk32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bdmmeo32.exeC:\Windows\system32\Bdmmeo32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bhkfkmmg.exeC:\Windows\system32\Bhkfkmmg.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bphgeo32.exeC:\Windows\system32\Bphgeo32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Cpmapodj.exeC:\Windows\system32\Cpmapodj.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Cgifbhid.exeC:\Windows\system32\Cgifbhid.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Caageq32.exeC:\Windows\system32\Caageq32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Dhphmj32.exeC:\Windows\system32\Dhphmj32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Dkqaoe32.exeC:\Windows\system32\Dkqaoe32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 40035⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 124 -p 2168 -ip 21681⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3744 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Aagkhd32.exeFilesize
163KB
MD51e9ce22b33473cc4b8856889f3354dc8
SHA18e0269e4be719a08847add5504d6fb978a85ca6b
SHA25632c70271a8b5e7f604d31c29719010dc3fd4192824bacb7dfe269505a023ceac
SHA512c45f3b29a75281f05ff436740537d60570e524c46645962cf4883751b85cb79a18292aaced255f7c228e0ea23db336781d0cecb05edbdad40d6e65008e8f502e
-
C:\Windows\SysWOW64\Adcjop32.exeFilesize
163KB
MD529724dd2e1b03076aeffd95226dc1ead
SHA133477a9d60ba21622c33baab45d48af259d97bbd
SHA256281795cdf7bec73056165a45d35a8d2ad1ce4e982e0857bc695ac60062f024df
SHA5126bc9c37035c03858b6f6cac1a614524fe79fab2d353cece4740e19436da9ffc20c0a05f909bbe2283eebbacee373265d4f031f637e93c75b347c578e8baeaca4
-
C:\Windows\SysWOW64\Agimkk32.exeFilesize
163KB
MD50175fabddf42227b235129281360389f
SHA132a7a9719c43fd1669a689c41e8304933861141b
SHA2568ead895f2f4f113ba4014108b434de7c96434c52c279bef0c631441d432c3868
SHA512510a60148e194ac3314dc346e6b4931fd82953f6835371aad0ccf76dcb009c48b9d645ecdb9b8a3459a13e093813f4bf20f5cea2e7d7d3be4019ae1d9cdd8757
-
C:\Windows\SysWOW64\Apmhiq32.exeFilesize
163KB
MD5aeb468513c31939f3e46b1f8cc77c404
SHA15cb3370db66e7cc3d203c8781e41a0c83a0da829
SHA256c4b58f1cf645a80a5ebfa6a4eee2a2351a58da111d074e9432941070e24e7a49
SHA5121c3f61b9280454500589c730db8d93d48414d7912572978538878af907e1a547098fc0b9bd3f83867c487e3a62b6832abd394fb2f450cfce280cad527fd19ddf
-
C:\Windows\SysWOW64\Bdmmeo32.exeFilesize
163KB
MD5ce889e86769a824a05effc58dbe17123
SHA18977bda2418d2aeb2cdda4826dfd8b687cf91fa0
SHA256e25fa9cc23de5b83583997dd655cd96ef5378547b3b9f06e2a968c467fdc30a5
SHA5122abf358e23a1bf6858333b9dba3abe4e4e81daf31c2dbac969fbb5c32794030bb4e8ef60eb27ab88353c6b782cb98be3438f1c8cb4b1f4a04eaacfda14ce0bd2
-
C:\Windows\SysWOW64\Bhkfkmmg.exeFilesize
163KB
MD54e157e3bee84a3261e64db0c8d1dd2a7
SHA104db357d99f987040c80a7c71fd49dfdfc3d935c
SHA256a46d6f6f4da648c31afb108ef48ecd577c32561811d6f83907b0ac80984b1033
SHA512484e4897a4833d98f95b6488135d107f69b46b1432c50981272bf04d961d9b6aa971839e9b5ff2b8f00f80bf4f40aeda147da65c122671b2276784dbcd1e2b22
-
C:\Windows\SysWOW64\Bphgeo32.exeFilesize
163KB
MD56bf452212e09d98ef0d8594976b6912c
SHA1eb94cf9d8b988e5710be2264f13e15036bbd4c1b
SHA256abe1b4e0212b1a37883408ebe574deb2bca055dc65709144a2f5e3665f16b952
SHA51245d4e5572a634e720baea477512ed72c641a73ae7a237653646c799fe87185c49126622d510cee9679e5e7b939d934806e15174ff1953e7892516379e8924faf
-
C:\Windows\SysWOW64\Caageq32.exeFilesize
163KB
MD58ba2a4f7548554bc4b1a889a03c1f390
SHA154671d58a567e247d43256bc657893f96d48209c
SHA25688441ac4f92ebc761404eecb61591dcfb7904eb89976409c7befd7791308c8f9
SHA5128898be261f914f2d995cccd84afeeb9850d91e47602a7919b1217df462cd441542d342b016d54c940e70bbc9ead8b5e7a2a4f8cfea9748535c4752c75a80cad9
-
C:\Windows\SysWOW64\Cgifbhid.exeFilesize
163KB
MD56cccf81dd4eec17aefe79dc89831fce6
SHA1d6c37c1f60b4e83cc456c79c00a4e588c6a232b2
SHA256b54e5879b6c0d18fd4a3a79476c5ebbfb32f388d93bf52d73bb752750bdcc831
SHA5129a7c128d8d7a494e7caa0d8611ec5e8f421ff2eeab37338cc4c02498f09c790f7178eee9058c8a6fb71da0a3ac3b29dd54efb8d2700fbf6c2a5a1eb9bea758c6
-
C:\Windows\SysWOW64\Cpmapodj.exeFilesize
163KB
MD5471e6f8614a4bc93611d9b0fab194660
SHA13b0ec92d46945697993d96257aad9079a4bdb5ea
SHA2567a47fffd0eb8dceb0077592c450434c698fcd7d3de88e81b440e68c988148e85
SHA512739f7ad2bb110f58421d96767175e8802ab5c377f1fbd69fb8adaeae16ef186c41313dc0d412f38246d5155e25a65f5c7c3889921772069f3123607137d63cd5
-
C:\Windows\SysWOW64\Dhphmj32.exeFilesize
163KB
MD5c2bf37555da2cccd78b9e8f970531ac4
SHA1d8a7dfb0a846e6882158b59d752ebafcf4038cfc
SHA256948a7dc386d4f267f616d22bc650b4eb37322c871a7e9074c9bfe74728d45025
SHA512d7a0f139550864bc82bc1bbb00aaa597cf4fc01d640deba1d7b4382438cd1a9c1032951d3e1c3701f7f0d40e05ffc60c68a450872b61bb009b5fc448c1185309
-
C:\Windows\SysWOW64\Jniood32.exeFilesize
163KB
MD52e0efb17ea84d274acc5581b5568aa7a
SHA1459388c0c51ce5ab39e7dc2a72dab8f157780608
SHA2566b89682610d8e6bb0b3714f7fd9db7828c2d05e1ab595193f9a0b54c5fa56332
SHA512a21e28a6bb1b38f578c38c336c6190cdc3e8a46741bc3fc584bc8df4303fa7004074a7e7ecc5086c2015ad73fb0e96ae49da03879cf35cf0037fc8731c86b1d7
-
C:\Windows\SysWOW64\Kegpifod.exeFilesize
163KB
MD5c9b64111593ff5eaf059e7358bb0ccbb
SHA1b830c309f4a09dc6066bed18334690d780b5c0db
SHA25618bb5d0d97ccf08d6b341bb0449015bf3eec37a0074dc5085c1f237ad8d2ac06
SHA5122b3c475a2e45a5a93cbf8dc5ec258f383ffab5af246232d5273614e4add5a0238efe6c9e3cf5cc2291fbc65926222bbd50bc189cc53a96758d001c6858a35ae8
-
C:\Windows\SysWOW64\Kjgeedch.exeFilesize
64KB
MD5d9ac596b3634aa8b16ad2824bcb270fc
SHA1a19005579a62826815d1d1ed4d1bc7f9c8c10c7e
SHA256e43a7c5c2092bc0d6521f82084c8433cf7b8fea964b785e1015e6de53b3805a3
SHA51281558907da848174f5ab03976321baeb97dd917c02b4165723bcb435d2518d75c915fd0215ee70863a010068595241be77215d42309647f5aec06fc6dfbd6af7
-
C:\Windows\SysWOW64\Kjgeedch.exeFilesize
163KB
MD5572757ec7576a9e112a5c3ffb0fde2ef
SHA17691e309771995319421808c0884195c95ead2f7
SHA2569db554b48d881943cda1dc97ab5ba8096240168a7d6bfc933059271967003076
SHA5120416c08b5df1e2c61ae9a86ae539f6fd9d68c2b034512a211fc7fc5f9ab8762968b5b75abc05eecb569d6d015eba4062c2b1222ae4bd3e34506b265800675b81
-
C:\Windows\SysWOW64\Kofkbk32.exeFilesize
163KB
MD531c77b84682d651ac9c9ab964e65602b
SHA1ce9409b2b65789f06d39d93a7235f6204eb060e7
SHA2567b817982dc2b36919937cd60f1e8b407b3d983a152a376cc8d80a4d27fd7f07a
SHA512f8e2c3459633f600679e41e6d2f3ff48c37b3afd2fb097c8ba9d7185da0efe7369cde759e677762dbd0fac24630bc43d3243ec8212ef5146ff35995442995f71
-
C:\Windows\SysWOW64\Lfbped32.exeFilesize
163KB
MD5e3f1502ef372bc42ca7b7709d6d05e51
SHA1ae370b859637a84eb1fd003f69f75a5997092b09
SHA256e0cb2da5b924e99fafc309622c72f6f46867108ca59663b8758900f106e32acf
SHA512b7001d3d58edabe95d361c1315706e826d057038d06a56f7535ddb75640ba67e9686af1d66d6c1a409b58a2ce7db80741333fca0ae3a42fece6339dca30e96b8
-
C:\Windows\SysWOW64\Lggejg32.exeFilesize
163KB
MD598e8faab66b03f64d2fe3c759a285a5c
SHA16c0ce8258d0303bf8ab82257e135752efefdacc8
SHA256b3ac1ca54c0dc636024cec4dc7f32b7a341d741b7a7adf4cb662d2463beb6a28
SHA5121aea47e6684367b24d1ed145c1f73bdedb095927435ac0c123ed2a9854d39422cf67bcd1b5c4bfaf34f27d0b873ea3579690208abb7e3b8c699e84956f3a1822
-
C:\Windows\SysWOW64\Llodgnja.exeFilesize
163KB
MD57bcb9c8b99ffad4d2632f0307b5934be
SHA14c2276913bc1ff9a4ebb657d4e2fa16b3f7dee64
SHA25641f40a10b329a606082ab50b1d7bddbb0a0270d81c60d346c9d06830245bbfe8
SHA51211b6cf2b38f3e30404d51b03d353bea34642817b22e76b561c4198e71130cea65fa261e0a8dcbc63b75466c584882320f08bf14dc759793fd5ba54920686b65c
-
C:\Windows\SysWOW64\Mfnoqc32.exeFilesize
163KB
MD5fafa988d54b9d9e6d7da644a1b25a824
SHA14ec326546a78352a2e765f4917ffbede881335ad
SHA256099a9f76a6d539fd0335ac5dba460d217ad68d584a8eb624dfef17de3cbb0d28
SHA512d0ec17daa238db01415838b4bcf77b3ab777364b3256f128153e1a3f46d8ef9b5ec0fc5b6839392f5f8f7fb1efa5c6f54e7bfcc79e9825e72f5fb13c95d3d603
-
C:\Windows\SysWOW64\Mgphpe32.exeFilesize
163KB
MD5b555a6a1846b8801f18ba15501454deb
SHA10a6669111421b8d171920ff9848300a91c8fab13
SHA2569a3c8f49a17dbeee503f7fdcc8696d8ff8217b070610e1bce523e046e959f361
SHA5126844aa4e1b1d58cac60a96f791edd45e228fc7ae067a4e3f591a649921e359a8320d91137dd902d34c023be3608a7e9d2df898c8f4f779f2b0af30c5acc7f2c6
-
C:\Windows\SysWOW64\Mqkiok32.exeFilesize
163KB
MD56e07ba17d90198364606162a36f068d4
SHA142d2ea10b2dab5e26556a9bbf46eca4eeffafb5e
SHA2561e80ec8dc6b530fb6235ce33715c52c3fb0fe5aaea306bb744d721ea8d76375f
SHA51224605aa22f0d4c663ec846d63b515cd951d0d2b28a7972dfa5fe2d5f3d601d1124fde738230651e8babd1d53b42a7ad59d16843cc7f8d86ce266e6857847dec7
-
C:\Windows\SysWOW64\Ncnofeof.exeFilesize
163KB
MD52cd3325b1c9ac4cb7549035b63786166
SHA1503f50f8d7603beb6aede37b0a5f147a9ca99bec
SHA256512f8778765844975c134702ad93671265d6c014d446da848d0a854a181304d5
SHA512d54a0c529ef6b006bd0542c53471d11f1780cc802e97712e7ee9f6876aef2021a536b65239b1c9d907be473e55feafc574924ca848f10f4438b3736a050c1af6
-
C:\Windows\SysWOW64\Ngndaccj.exeFilesize
163KB
MD531992000aac1dbd6c44bc7bc5289ac56
SHA1a039f53c55624d48ff420ad339d02885cab373e6
SHA256f2c8b6ac8f3ef34bb6a80cb863ae1b4aa472b7f000c88de3a5f19941e52d76e5
SHA512b57fcf297c2a62f360208668f8a18a65f857400c1fb8a495613631264aab16a7cfb4fb2bacd51949be0a71870640e15b6f67859c6107805359b6f0d812aac3b1
-
C:\Windows\SysWOW64\Oabhfg32.exeFilesize
163KB
MD579c093c46c2388278d5fd75db87b3de6
SHA1e1320b025d2aaed0fc0fd182c951b25f55ed29e3
SHA2569f1b9a72b90a9433f5d605eedafe48cd958a2fc37c2f8ad0c73ff6ccd9e7a2c3
SHA512f3e16d936e989e8c8c8e6f11941d924fc24ce10ebae2a597ed5cd73008817ea212007e9d6f314040c7881352d3cab0db03b3b3f7b0658d29c37f8439cf5d5936
-
C:\Windows\SysWOW64\Ojfcdnjc.exeFilesize
163KB
MD5b2fc5f1c46f2d5dd903f21ff83ebb7a0
SHA1352893cb7167f8e6b6daa43d3fe46d115b619dc1
SHA2566b04ee75421e734189dc43efcbbf1e721c9a710aefc4f46b89bd570d3f2932f2
SHA51285f3f45b336d09b4de175207371c12a00a997acb5ceb1f2daa80f274f7643071f9ffcb60940abec85d1eb25a50cd77e80566fa4e3a15b61009193ae6040aec74
-
C:\Windows\SysWOW64\Ojomcopk.exeFilesize
163KB
MD541d3542b18d662841bd083af7cbf056f
SHA17989b7ceb9bf9281069585c978d3528249758cc6
SHA2564a1c2cf4434625570b84c7194e27e4daf72320a9b76f655bd15137220a8d69bd
SHA512b174f82702ce4a78a7b2bcae4c37af9fdb2f50c91152771a0c2fa153005dc683e4aa59e5a566acd22b5c5cd7bd73a52457d7c47c5c8865bcc61157d74faa9030
-
C:\Windows\SysWOW64\Ompfej32.exeFilesize
163KB
MD53d1ee23f412c47fea2e7563355110f54
SHA1fbae44c9c0489e6a657773856be6f8a93177b4a1
SHA256421f0262cdaf60af62d5d657730846f7fd9c6191cdc6403506f85ea890e347ba
SHA512573a562eadbada5c106731877dfe3bc7ec0fee767c39f3e92975fba15d69affbca14160896238ce6a116a965f00262be0842ab7adf57b0d064689693a817accd
-
C:\Windows\SysWOW64\Phcgcqab.exeFilesize
163KB
MD56923dfd67434ccb4d6c70f9f80089a59
SHA1217a77eb6f5402ab1d1f298fef4ad0e839755217
SHA256e486d3a3a2e62d82032f374fe808832d0b9d6bfb9e04d0f20659e78fd62908b1
SHA5124cece493317fcfc8b9f0ad14135907ea1019e5ec413448598852551729435fc4fd1bad4429bcec5cc28fffe439a3078c0363ed1ee139694a9fc310790fed6839
-
C:\Windows\SysWOW64\Phfcipoo.exeFilesize
163KB
MD529defcba2de0e37d95b7690acca91081
SHA191bbb78619e3183f41c194aa18542fd958092746
SHA256be20ed4569b424c48f5b5deffefe7a142003dea419f8a8265af8466c3f21024e
SHA512ed18a646952964226d4a89d6048145f850b100c1181a8a189c896dae11214f2c0540c1d551a23293f0c86f019ea5e61375e701d0444c740905d42712607d9c18
-
C:\Windows\SysWOW64\Ppjbmc32.exeFilesize
163KB
MD5a2a0ee18f2475e1adea5e39a3c73459e
SHA171244d2b07d5edb8df4eae7557f69908947efbb2
SHA2568fb6529b17561d172dbcdff04c93dd3e3137b6078ca5d7477d1172a77a346b2a
SHA51273ed26499101e83f1a30a672c90dd29ca2ea8424dccb1fa044ede2f54f782f7a5e34ae414735514692c86c373900b28800e2a686f00b651bca9bf1b2f2d5d5d5
-
C:\Windows\SysWOW64\Qfkqjmdg.exeFilesize
163KB
MD51bfa5fc85f2632ddf8ee69b8170a0a9e
SHA14160d536c45e43928ead6b3e22945734ef43cf7c
SHA2561fefbefa2930ebd96f76818fc42f98f59e0ebd81a5f42748879b6a234de12966
SHA5123a8b869a9f604cf53dc34d4948958e3c7e91eedc442af7d9ef642b2db07ad9906699d16a036417549a64824763ff042429d0d259691c3c4334939805cc2f09d6
-
C:\Windows\SysWOW64\Qpeahb32.exeFilesize
163KB
MD546e1119548f8dc0301107970bde1a7a5
SHA13613aac161256064dbe145b99dbcfac12747534f
SHA2566b7b2506c50580c403a6a0e64b6a05b404c4944268150e071f768ee6f4ab6722
SHA51277df3687ec2ca9aff15bf6825f5375bffb9a28517650249fae1c78ec77f3e42980b73b591074241b377169447f19ed1a4b9d1cf987ddaa5ac581398d2e0ed142
-
memory/32-40-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/32-327-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/404-24-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/404-331-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/880-325-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/880-48-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1016-64-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1016-321-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1432-73-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1432-319-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1708-311-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1708-104-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1784-185-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1784-291-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2124-309-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2124-113-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2132-275-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2132-248-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2168-271-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2168-263-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2348-153-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2348-299-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2356-128-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2356-305-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2400-208-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2400-286-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2416-216-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2416-283-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2448-232-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2448-282-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2724-329-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2724-32-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2728-303-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2728-137-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2884-317-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2884-80-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2904-323-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2904-57-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2916-289-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2916-192-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3088-315-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3088-89-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3176-337-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3176-0-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3176-1-0x0000000000432000-0x0000000000433000-memory.dmpFilesize
4KB
-
memory/3220-224-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/3220-280-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4016-16-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4016-333-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4020-277-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4020-240-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4040-160-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4040-297-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4304-97-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4304-313-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4348-201-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4348-288-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4496-295-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4496-168-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4604-301-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4604-145-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4640-273-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4640-256-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4944-8-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/4944-335-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5056-293-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5056-177-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5100-307-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/5100-121-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB