Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe
-
Size
63KB
-
MD5
593676fa9e86e2baefcab6c33797eca0
-
SHA1
9da38f64f0186e581eccaa27b739aa1a40f445b0
-
SHA256
4c54fc3a6fc6be212b8fed13a9d961e8170405affb4f1d451d0d1c2af144892b
-
SHA512
83be788ba011bb7c4ba6ed9dccb3113e26f1972f0586bc670a66610bd5b5992d52dcbc64a25c49a08fff32876f7d478801b246526a7129b41a3fedd6d2b89caf
-
SSDEEP
1536:frC3+G8wNlKI+xxZHFF17gNrFIJfakVZ04DX6fl:GewNsIAhFbZVZ0MK9
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jdhine32.exeKgdbkohf.exeMcpebmkb.exeNbhkac32.exeJpjqhgol.exeIpegmg32.exeJdmcidam.exeLkdggmlj.exeMjhqjg32.exeImihfl32.exeNnolfdcn.exeJjpeepnb.exeMjeddggd.exeNklfoi32.exeNqiogp32.exeNcldnkae.exeIcljbg32.exeJdjfcecp.exeKilhgk32.exeLaalifad.exeMjjmog32.exeIbjqcd32.exeHjhfnccl.exeIjdeiaio.exeIpckgh32.exeNkqpjidj.exeHpbaqj32.exeJfffjqdf.exeKgmlkp32.exeNnmopdep.exeHfofbd32.exeJaedgjjd.exeJdcpcf32.exeJiikak32.exeIcjmmg32.exeKphmie32.exeLgbnmm32.exeMnocof32.exeMdiklqhm.exeHmioonpn.exeKacphh32.exeMglack32.exeLcbiao32.exeMaohkd32.exeMcbahlip.exeIikopmkd.exeNacbfdao.exeHmklen32.exeLaefdf32.exeMcnhmm32.exeImpepm32.exeJmbklj32.exeJidbflcj.exeKbfiep32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdhine32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgdbkohf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcpebmkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpjqhgol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipegmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdmcidam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkdggmlj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjhqjg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imihfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgdbkohf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjpeepnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjeddggd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nklfoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqiogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icljbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdjfcecp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kilhgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjjmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibjqcd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqiogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjhfnccl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijdeiaio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipckgh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkqpjidj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpbaqj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfffjqdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgmlkp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnmopdep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfofbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaedgjjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdcpcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jiikak32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icjmmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kphmie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnocof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdiklqhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmioonpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kacphh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mglack32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcbiao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maohkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjjmog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpbaqj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iikopmkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nacbfdao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmklen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laefdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcnhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcbahlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Impepm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmbklj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jidbflcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jidbflcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiikak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbfiep32.exe -
Executes dropped EXE 64 IoCs
Processes:
Hpbaqj32.exeHbanme32.exeHjhfnccl.exeHabnjm32.exeHpenfjad.exeHfofbd32.exeHmioonpn.exeHbeghene.exeHjmoibog.exeHmklen32.exeHcedaheh.exeHfcpncdk.exeHmmhjm32.exeIpldfi32.exeIbjqcd32.exeIjaida32.exeImpepm32.exeIcjmmg32.exeIjdeiaio.exeIannfk32.exeIcljbg32.exeIfjfnb32.exeImdnklfp.exeIpckgh32.exeIikopmkd.exeIpegmg32.exeIfopiajn.exeImihfl32.exeJaedgjjd.exeJdcpcf32.exeJjmhppqd.exeJmkdlkph.exeJpjqhgol.exeJjpeepnb.exeJaimbj32.exeJdhine32.exeJfffjqdf.exeJidbflcj.exeJaljgidl.exeJdjfcecp.exeJkdnpo32.exeJmbklj32.exeJdmcidam.exeJfkoeppq.exeJiikak32.exeKdopod32.exeKgmlkp32.exeKilhgk32.exeKacphh32.exeKbdmpqcb.exeKgphpo32.exeKinemkko.exeKphmie32.exeKbfiep32.exeKipabjil.exeKagichjo.exeKdffocib.exeKgdbkohf.exeKkpnlm32.exeKmnjhioc.exeKdhbec32.exeKgfoan32.exeLmqgnhmp.exeLpocjdld.exepid process 3052 Hpbaqj32.exe 1260 Hbanme32.exe 3956 Hjhfnccl.exe 3372 Habnjm32.exe 2396 Hpenfjad.exe 3652 Hfofbd32.exe 5000 Hmioonpn.exe 2912 Hbeghene.exe 1816 Hjmoibog.exe 3076 Hmklen32.exe 2408 Hcedaheh.exe 4436 Hfcpncdk.exe 2328 Hmmhjm32.exe 1108 Ipldfi32.exe 4696 Ibjqcd32.exe 4676 Ijaida32.exe 1048 Impepm32.exe 4872 Icjmmg32.exe 3456 Ijdeiaio.exe 1268 Iannfk32.exe 2924 Icljbg32.exe 1072 Ifjfnb32.exe 3908 Imdnklfp.exe 1628 Ipckgh32.exe 1556 Iikopmkd.exe 3228 Ipegmg32.exe 1916 Ifopiajn.exe 1852 Imihfl32.exe 1400 Jaedgjjd.exe 2708 Jdcpcf32.exe 316 Jjmhppqd.exe 4316 Jmkdlkph.exe 1604 Jpjqhgol.exe 912 Jjpeepnb.exe 1372 Jaimbj32.exe 4716 Jdhine32.exe 5084 Jfffjqdf.exe 3832 Jidbflcj.exe 408 Jaljgidl.exe 3644 Jdjfcecp.exe 2988 Jkdnpo32.exe 872 Jmbklj32.exe 3304 Jdmcidam.exe 3216 Jfkoeppq.exe 3020 Jiikak32.exe 2680 Kdopod32.exe 1236 Kgmlkp32.exe 2384 Kilhgk32.exe 5076 Kacphh32.exe 3508 Kbdmpqcb.exe 2668 Kgphpo32.exe 4240 Kinemkko.exe 3968 Kphmie32.exe 4444 Kbfiep32.exe 1308 Kipabjil.exe 4260 Kagichjo.exe 4636 Kdffocib.exe 4612 Kgdbkohf.exe 4376 Kkpnlm32.exe 2820 Kmnjhioc.exe 4780 Kdhbec32.exe 2604 Kgfoan32.exe 5036 Lmqgnhmp.exe 3328 Lpocjdld.exe -
Drops file in System32 directory 64 IoCs
Processes:
Hfcpncdk.exeJfkoeppq.exeMjjmog32.exeNbhkac32.exeIcjmmg32.exeJkdnpo32.exeJjmhppqd.exeMnapdf32.exeMaaepd32.exeNdghmo32.exeHabnjm32.exeHjmoibog.exeHmmhjm32.exeJidbflcj.exeMciobn32.exeNqiogp32.exeHpenfjad.exeHbeghene.exeIjdeiaio.exeKacphh32.exeLkdggmlj.exeNkqpjidj.exeHmklen32.exeKbfiep32.exeKdffocib.exeMjqjih32.exeNcldnkae.exeKgphpo32.exeKgfoan32.exeLmqgnhmp.exeLpocjdld.exeLaalifad.exeLgbnmm32.exeMkpgck32.exeMdpalp32.exeNgcgcjnc.exeJfffjqdf.exeKkpnlm32.exeNklfoi32.exeJdmcidam.exeNbkhfc32.exeIpckgh32.exeJjpeepnb.exeLaefdf32.exeMgnnhk32.exeHmioonpn.exeJdhine32.exeMaohkd32.exeNnjbke32.exeKilhgk32.exeLilanioo.exeIpegmg32.exedescription ioc process File created C:\Windows\SysWOW64\Hmmhjm32.exe Hfcpncdk.exe File opened for modification C:\Windows\SysWOW64\Jiikak32.exe Jfkoeppq.exe File created C:\Windows\SysWOW64\Maaepd32.exe Mjjmog32.exe File created C:\Windows\SysWOW64\Bdknoa32.dll Nbhkac32.exe File created C:\Windows\SysWOW64\Ijdeiaio.exe Icjmmg32.exe File created C:\Windows\SysWOW64\Jmbklj32.exe Jkdnpo32.exe File created C:\Windows\SysWOW64\Qnoaog32.dll Jjmhppqd.exe File created C:\Windows\SysWOW64\Dgcifj32.dll Mnapdf32.exe File created C:\Windows\SysWOW64\Mdpalp32.exe Maaepd32.exe File opened for modification C:\Windows\SysWOW64\Mdpalp32.exe Maaepd32.exe File created C:\Windows\SysWOW64\Ncihikcg.exe Ndghmo32.exe File created C:\Windows\SysWOW64\Kijjfe32.dll Habnjm32.exe File created C:\Windows\SysWOW64\Hmklen32.exe Hjmoibog.exe File created C:\Windows\SysWOW64\Bekppcpp.dll Hmmhjm32.exe File opened for modification C:\Windows\SysWOW64\Jaljgidl.exe Jidbflcj.exe File opened for modification C:\Windows\SysWOW64\Mkpgck32.exe Mciobn32.exe File opened for modification C:\Windows\SysWOW64\Nddkgonp.exe Nqiogp32.exe File created C:\Windows\SysWOW64\Dnplgc32.dll Hpenfjad.exe File opened for modification C:\Windows\SysWOW64\Hjmoibog.exe Hbeghene.exe File created C:\Windows\SysWOW64\Kbmebabl.dll Ijdeiaio.exe File created C:\Windows\SysWOW64\Ojmmkpmf.dll Kacphh32.exe File opened for modification C:\Windows\SysWOW64\Lmccchkn.exe Lkdggmlj.exe File opened for modification C:\Windows\SysWOW64\Nnolfdcn.exe Nkqpjidj.exe File opened for modification C:\Windows\SysWOW64\Hcedaheh.exe Hmklen32.exe File created C:\Windows\SysWOW64\Iannfk32.exe Ijdeiaio.exe File created C:\Windows\SysWOW64\Kbmfdgkm.dll Kbfiep32.exe File created C:\Windows\SysWOW64\Kgdbkohf.exe Kdffocib.exe File opened for modification C:\Windows\SysWOW64\Mahbje32.exe Mjqjih32.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ncldnkae.exe File opened for modification C:\Windows\SysWOW64\Kinemkko.exe Kgphpo32.exe File created C:\Windows\SysWOW64\Bdiihjon.dll Kgphpo32.exe File opened for modification C:\Windows\SysWOW64\Lmqgnhmp.exe Kgfoan32.exe File opened for modification C:\Windows\SysWOW64\Lpocjdld.exe Lmqgnhmp.exe File created C:\Windows\SysWOW64\Offdjb32.dll Lpocjdld.exe File created C:\Windows\SysWOW64\Lcbiao32.exe Laalifad.exe File created C:\Windows\SysWOW64\Jmkdlkph.exe Jjmhppqd.exe File created C:\Windows\SysWOW64\Mjqjih32.exe Lgbnmm32.exe File created C:\Windows\SysWOW64\Mkpgck32.exe Mciobn32.exe File created C:\Windows\SysWOW64\Mnocof32.exe Mkpgck32.exe File opened for modification C:\Windows\SysWOW64\Mcbahlip.exe Mdpalp32.exe File created C:\Windows\SysWOW64\Jkeang32.dll Ngcgcjnc.exe File opened for modification C:\Windows\SysWOW64\Jidbflcj.exe Jfffjqdf.exe File created C:\Windows\SysWOW64\Cpjljp32.dll Jkdnpo32.exe File opened for modification C:\Windows\SysWOW64\Kmnjhioc.exe Kkpnlm32.exe File created C:\Windows\SysWOW64\Ibhblqpo.dll Mjqjih32.exe File created C:\Windows\SysWOW64\Nnjbke32.exe Nklfoi32.exe File created C:\Windows\SysWOW64\Mfpoqooh.dll Jdmcidam.exe File opened for modification C:\Windows\SysWOW64\Mnocof32.exe Mkpgck32.exe File created C:\Windows\SysWOW64\Nqmhbpba.exe Nbkhfc32.exe File created C:\Windows\SysWOW64\Lihoogdd.dll Ipckgh32.exe File created C:\Windows\SysWOW64\Jaimbj32.exe Jjpeepnb.exe File created C:\Windows\SysWOW64\Lddbqa32.exe Laefdf32.exe File opened for modification C:\Windows\SysWOW64\Njljefql.exe Mgnnhk32.exe File created C:\Windows\SysWOW64\Hbeghene.exe Hmioonpn.exe File opened for modification C:\Windows\SysWOW64\Ipldfi32.exe Hmmhjm32.exe File created C:\Windows\SysWOW64\Olmeac32.dll Jdhine32.exe File opened for modification C:\Windows\SysWOW64\Mcpebmkb.exe Maohkd32.exe File created C:\Windows\SysWOW64\Pponmema.dll Nnjbke32.exe File opened for modification C:\Windows\SysWOW64\Jaimbj32.exe Jjpeepnb.exe File created C:\Windows\SysWOW64\Kacphh32.exe Kilhgk32.exe File created C:\Windows\SysWOW64\Eeandl32.dll Lilanioo.exe File created C:\Windows\SysWOW64\Mahbje32.exe Mjqjih32.exe File created C:\Windows\SysWOW64\Ipmack32.dll Ipegmg32.exe File opened for modification C:\Windows\SysWOW64\Jmbklj32.exe Jkdnpo32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5528 5300 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
Nnolfdcn.exeJidbflcj.exeKipabjil.exeMaaepd32.exeIpckgh32.exeJaedgjjd.exeLmqgnhmp.exeNnjbke32.exeHmklen32.exeKgmlkp32.exeLddbqa32.exeLijdhiaa.exeLaalifad.exeJdjfcecp.exeKdhbec32.exeKgfoan32.exeJdhine32.exeKgphpo32.exeKagichjo.exeLmccchkn.exeHcedaheh.exeIfjfnb32.exeIpegmg32.exeLaefdf32.exeMdiklqhm.exeMcpebmkb.exeNbkhfc32.exeHmioonpn.exeMjqjih32.exeMkpgck32.exeLkiqbl32.exeMglack32.exeMgnnhk32.exeNnhfee32.exeHabnjm32.exeHfcpncdk.exeKdopod32.exeKinemkko.exeNklfoi32.exeNkqpjidj.exeNcldnkae.exe593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exeJiikak32.exeLcpllo32.exeMcklgm32.exeMnapdf32.exeJjmhppqd.exeJfkoeppq.exeLcmofolg.exeNddkgonp.exeIcljbg32.exeJmkdlkph.exeMnocof32.exeKbfiep32.exeKkpnlm32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jidbflcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kipabjil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhpdhp32.dll" Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lihoogdd.dll" Ipckgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgiacnii.dll" Jaedgjjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmqgnhmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnjbke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmklen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkdeek32.dll" Kgmlkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lijdhiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lidmdfdo.dll" Laalifad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmklen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdjfcecp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdhbec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgfoan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdhine32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kagichjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmccchkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlmpolji.dll" Hcedaheh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekmihm32.dll" Ifjfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipmack32.dll" Ipegmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jaedgjjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Laefdf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdiklqhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaehlf32.dll" Mcpebmkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbkhfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmioonpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibhblqpo.dll" Mjqjih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkpgck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkiqbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcbibebo.dll" Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Legdcg32.dll" Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Habnjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hfcpncdk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdopod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kinemkko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmalco32.dll" Nklfoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkqpjidj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ipegmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jiikak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcpllo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcklgm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnapdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pponmema.dll" Nnjbke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifjfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjmhppqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfkoeppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgejif32.dll" Lcmofolg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaqnkb32.dll" Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndninjfg.dll" Jmkdlkph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ockcknah.dll" Mnocof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbmfdgkm.dll" Kbfiep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkpnlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkiqbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epmjjbbj.dll" Mdiklqhm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exeHpbaqj32.exeHbanme32.exeHjhfnccl.exeHabnjm32.exeHpenfjad.exeHfofbd32.exeHmioonpn.exeHbeghene.exeHjmoibog.exeHmklen32.exeHcedaheh.exeHfcpncdk.exeHmmhjm32.exeIpldfi32.exeIbjqcd32.exeIjaida32.exeImpepm32.exeIcjmmg32.exeIjdeiaio.exeIannfk32.exeIcljbg32.exedescription pid process target process PID 5092 wrote to memory of 3052 5092 593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe Hpbaqj32.exe PID 5092 wrote to memory of 3052 5092 593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe Hpbaqj32.exe PID 5092 wrote to memory of 3052 5092 593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe Hpbaqj32.exe PID 3052 wrote to memory of 1260 3052 Hpbaqj32.exe Hbanme32.exe PID 3052 wrote to memory of 1260 3052 Hpbaqj32.exe Hbanme32.exe PID 3052 wrote to memory of 1260 3052 Hpbaqj32.exe Hbanme32.exe PID 1260 wrote to memory of 3956 1260 Hbanme32.exe Hjhfnccl.exe PID 1260 wrote to memory of 3956 1260 Hbanme32.exe Hjhfnccl.exe PID 1260 wrote to memory of 3956 1260 Hbanme32.exe Hjhfnccl.exe PID 3956 wrote to memory of 3372 3956 Hjhfnccl.exe Habnjm32.exe PID 3956 wrote to memory of 3372 3956 Hjhfnccl.exe Habnjm32.exe PID 3956 wrote to memory of 3372 3956 Hjhfnccl.exe Habnjm32.exe PID 3372 wrote to memory of 2396 3372 Habnjm32.exe Hpenfjad.exe PID 3372 wrote to memory of 2396 3372 Habnjm32.exe Hpenfjad.exe PID 3372 wrote to memory of 2396 3372 Habnjm32.exe Hpenfjad.exe PID 2396 wrote to memory of 3652 2396 Hpenfjad.exe Hfofbd32.exe PID 2396 wrote to memory of 3652 2396 Hpenfjad.exe Hfofbd32.exe PID 2396 wrote to memory of 3652 2396 Hpenfjad.exe Hfofbd32.exe PID 3652 wrote to memory of 5000 3652 Hfofbd32.exe Hmioonpn.exe PID 3652 wrote to memory of 5000 3652 Hfofbd32.exe Hmioonpn.exe PID 3652 wrote to memory of 5000 3652 Hfofbd32.exe Hmioonpn.exe PID 5000 wrote to memory of 2912 5000 Hmioonpn.exe Hbeghene.exe PID 5000 wrote to memory of 2912 5000 Hmioonpn.exe Hbeghene.exe PID 5000 wrote to memory of 2912 5000 Hmioonpn.exe Hbeghene.exe PID 2912 wrote to memory of 1816 2912 Hbeghene.exe Hjmoibog.exe PID 2912 wrote to memory of 1816 2912 Hbeghene.exe Hjmoibog.exe PID 2912 wrote to memory of 1816 2912 Hbeghene.exe Hjmoibog.exe PID 1816 wrote to memory of 3076 1816 Hjmoibog.exe Hmklen32.exe PID 1816 wrote to memory of 3076 1816 Hjmoibog.exe Hmklen32.exe PID 1816 wrote to memory of 3076 1816 Hjmoibog.exe Hmklen32.exe PID 3076 wrote to memory of 2408 3076 Hmklen32.exe Hcedaheh.exe PID 3076 wrote to memory of 2408 3076 Hmklen32.exe Hcedaheh.exe PID 3076 wrote to memory of 2408 3076 Hmklen32.exe Hcedaheh.exe PID 2408 wrote to memory of 4436 2408 Hcedaheh.exe Hfcpncdk.exe PID 2408 wrote to memory of 4436 2408 Hcedaheh.exe Hfcpncdk.exe PID 2408 wrote to memory of 4436 2408 Hcedaheh.exe Hfcpncdk.exe PID 4436 wrote to memory of 2328 4436 Hfcpncdk.exe Hmmhjm32.exe PID 4436 wrote to memory of 2328 4436 Hfcpncdk.exe Hmmhjm32.exe PID 4436 wrote to memory of 2328 4436 Hfcpncdk.exe Hmmhjm32.exe PID 2328 wrote to memory of 1108 2328 Hmmhjm32.exe Ipldfi32.exe PID 2328 wrote to memory of 1108 2328 Hmmhjm32.exe Ipldfi32.exe PID 2328 wrote to memory of 1108 2328 Hmmhjm32.exe Ipldfi32.exe PID 1108 wrote to memory of 4696 1108 Ipldfi32.exe Ibjqcd32.exe PID 1108 wrote to memory of 4696 1108 Ipldfi32.exe Ibjqcd32.exe PID 1108 wrote to memory of 4696 1108 Ipldfi32.exe Ibjqcd32.exe PID 4696 wrote to memory of 4676 4696 Ibjqcd32.exe Ijaida32.exe PID 4696 wrote to memory of 4676 4696 Ibjqcd32.exe Ijaida32.exe PID 4696 wrote to memory of 4676 4696 Ibjqcd32.exe Ijaida32.exe PID 4676 wrote to memory of 1048 4676 Ijaida32.exe Impepm32.exe PID 4676 wrote to memory of 1048 4676 Ijaida32.exe Impepm32.exe PID 4676 wrote to memory of 1048 4676 Ijaida32.exe Impepm32.exe PID 1048 wrote to memory of 4872 1048 Impepm32.exe Icjmmg32.exe PID 1048 wrote to memory of 4872 1048 Impepm32.exe Icjmmg32.exe PID 1048 wrote to memory of 4872 1048 Impepm32.exe Icjmmg32.exe PID 4872 wrote to memory of 3456 4872 Icjmmg32.exe Ijdeiaio.exe PID 4872 wrote to memory of 3456 4872 Icjmmg32.exe Ijdeiaio.exe PID 4872 wrote to memory of 3456 4872 Icjmmg32.exe Ijdeiaio.exe PID 3456 wrote to memory of 1268 3456 Ijdeiaio.exe Iannfk32.exe PID 3456 wrote to memory of 1268 3456 Ijdeiaio.exe Iannfk32.exe PID 3456 wrote to memory of 1268 3456 Ijdeiaio.exe Iannfk32.exe PID 1268 wrote to memory of 2924 1268 Iannfk32.exe Icljbg32.exe PID 1268 wrote to memory of 2924 1268 Iannfk32.exe Icljbg32.exe PID 1268 wrote to memory of 2924 1268 Iannfk32.exe Icljbg32.exe PID 2924 wrote to memory of 1072 2924 Icljbg32.exe Ifjfnb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\593676fa9e86e2baefcab6c33797eca0_NeikiAnalytics.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hpbaqj32.exeC:\Windows\system32\Hpbaqj32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hbanme32.exeC:\Windows\system32\Hbanme32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hjhfnccl.exeC:\Windows\system32\Hjhfnccl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Habnjm32.exeC:\Windows\system32\Habnjm32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hpenfjad.exeC:\Windows\system32\Hpenfjad.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hfofbd32.exeC:\Windows\system32\Hfofbd32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hmioonpn.exeC:\Windows\system32\Hmioonpn.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hbeghene.exeC:\Windows\system32\Hbeghene.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hjmoibog.exeC:\Windows\system32\Hjmoibog.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hmklen32.exeC:\Windows\system32\Hmklen32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hcedaheh.exeC:\Windows\system32\Hcedaheh.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hfcpncdk.exeC:\Windows\system32\Hfcpncdk.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hmmhjm32.exeC:\Windows\system32\Hmmhjm32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ipldfi32.exeC:\Windows\system32\Ipldfi32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ibjqcd32.exeC:\Windows\system32\Ibjqcd32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ijaida32.exeC:\Windows\system32\Ijaida32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Impepm32.exeC:\Windows\system32\Impepm32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Icjmmg32.exeC:\Windows\system32\Icjmmg32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ijdeiaio.exeC:\Windows\system32\Ijdeiaio.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iannfk32.exeC:\Windows\system32\Iannfk32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Icljbg32.exeC:\Windows\system32\Icljbg32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe23⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Iikopmkd.exeC:\Windows\system32\Iikopmkd.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ipegmg32.exeC:\Windows\system32\Ipegmg32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ifopiajn.exeC:\Windows\system32\Ifopiajn.exe28⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Imihfl32.exeC:\Windows\system32\Imihfl32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jjmhppqd.exeC:\Windows\system32\Jjmhppqd.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jmkdlkph.exeC:\Windows\system32\Jmkdlkph.exe33⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jjpeepnb.exeC:\Windows\system32\Jjpeepnb.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jaimbj32.exeC:\Windows\system32\Jaimbj32.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jdhine32.exeC:\Windows\system32\Jdhine32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jfffjqdf.exeC:\Windows\system32\Jfffjqdf.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jaljgidl.exeC:\Windows\system32\Jaljgidl.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jdjfcecp.exeC:\Windows\system32\Jdjfcecp.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jkdnpo32.exeC:\Windows\system32\Jkdnpo32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jmbklj32.exeC:\Windows\system32\Jmbklj32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jdmcidam.exeC:\Windows\system32\Jdmcidam.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jiikak32.exeC:\Windows\system32\Jiikak32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kdopod32.exeC:\Windows\system32\Kdopod32.exe47⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kacphh32.exeC:\Windows\system32\Kacphh32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kbdmpqcb.exeC:\Windows\system32\Kbdmpqcb.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kinemkko.exeC:\Windows\system32\Kinemkko.exe53⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kbfiep32.exeC:\Windows\system32\Kbfiep32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kipabjil.exeC:\Windows\system32\Kipabjil.exe56⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe57⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kdhbec32.exeC:\Windows\system32\Kdhbec32.exe62⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kgfoan32.exeC:\Windows\system32\Kgfoan32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lcmofolg.exeC:\Windows\system32\Lcmofolg.exe66⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lkdggmlj.exeC:\Windows\system32\Lkdggmlj.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe68⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe69⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe70⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Laalifad.exeC:\Windows\system32\Laalifad.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lcbiao32.exeC:\Windows\system32\Lcbiao32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe73⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe74⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe75⤵
-
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe77⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lgbnmm32.exeC:\Windows\system32\Lgbnmm32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mjqjih32.exeC:\Windows\system32\Mjqjih32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe80⤵
-
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe81⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe82⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe85⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe87⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mcpebmkb.exeC:\Windows\system32\Mcpebmkb.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Mjjmog32.exeC:\Windows\system32\Mjjmog32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe94⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe95⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe97⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe98⤵
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe99⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nklfoi32.exeC:\Windows\system32\Nklfoi32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe102⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe104⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ngcgcjnc.exeC:\Windows\system32\Ngcgcjnc.exe105⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe106⤵
-
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe109⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe110⤵
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe113⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe114⤵
-
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe116⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5300 -s 408117⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5300 -ip 53001⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Habnjm32.exeFilesize
63KB
MD54802a931eddb73eafc6972a401262d14
SHA1f22cfe6ce1f71ead12af99975e8492971a5be147
SHA256e8eee2c07e909976c5ed971995adf90e0f9cde68e13a17a0b44a3d92a1ce7733
SHA512a110cea8ebefab6b45325ab29ba6163d151ccdaf081d2dbf5d34ec46065f6af0aab532723595b51083459843ddb4f16055ef511304257c50b74c4b267f22026e
-
C:\Windows\SysWOW64\Hbanme32.exeFilesize
63KB
MD589c03a160f384d8f3edb1800896c410e
SHA1ba1d9c9c15dcce2a4df8269c1f99028a3064440f
SHA2567d8f27e55a864d2db32865d6a7c61e0af89d88866148eb8d0d1136e9953bfe1d
SHA512f415633f04215ba8d6356b4ded556a967d07c2676bae7d98a521d07eff9bbeae6d0f8bf7f5820b0c49d48c082a7493bc344257492a14446c8ca6ead233de79f7
-
C:\Windows\SysWOW64\Hbeghene.exeFilesize
63KB
MD5236273b77cd64882744a0a1854855439
SHA15b655afc4b785dddb70da4cbabafd0700de7def1
SHA25673dec85b8a97fb66b332b251aaf415d47df0fc1d8a1968e779e0c5772de9a80b
SHA512d6b270709a60e98985fa24ebd41043cc422af4cb6fd122ec5ec9b6f6c22ff17b995235a14dedff4c35787c9a49b32370f3e6a68231fef41a3d1976aaafa3e2c3
-
C:\Windows\SysWOW64\Hcedaheh.exeFilesize
63KB
MD5e2b2e4c315ca2b5fa62fa2552d0ca3bf
SHA174a9b007cd360752cef2b9228055d0a84a2d9a22
SHA2566206728bff4d6b45e65e6307a4634cb4e8765129a65449097d0dbf642e4123e4
SHA512918934bc50382be42a5ec65709b68ddc23974d611541e0131f76fd8bd4f77b410004ff3c0a2aba74b47aecbb5043178b103b1c2932264fa8e69bf4f596c4dfe8
-
C:\Windows\SysWOW64\Hfcpncdk.exeFilesize
63KB
MD58a22cc50fa0b31a5105197cdbe5d66bf
SHA1e8aea201642cfef4a85b473fdc403da297280112
SHA2565e93ec3af2871edd65d0540759e034596e2bd9facde507a88dd1c4c7933c7e22
SHA512d240f406b977383161702745eaae88ce1847ac0c1c5fdd55c568e9ba1cc34e000f1f39f51c9f7166e75a2787096167cf504a18ba9eb3fe4c680dbd7f6aa2881e
-
C:\Windows\SysWOW64\Hfofbd32.exeFilesize
63KB
MD5bb2013c7a8afa1bec6bab99a52800946
SHA15d5f96157c97db5481747edbed024bd86849d56d
SHA2566ad7f627ce3584a0d34a812d04e1f281203b53c1ac1151356c5942b7fe04e537
SHA512a4ff17c7a6e9ec7fb73bcba2a7d87bcfa4556a21e52deee20bbb9b314ba644466c821cac27579c6ccae21d20fd2103dcb520de8309376cc378e429715a488109
-
C:\Windows\SysWOW64\Hjhfnccl.exeFilesize
63KB
MD5da5a4a04512fef0065f81fb0a4c84862
SHA1347045aef10723ad70f610751e204ff88ec4e351
SHA256f516e31ecdca9fc96b4b7dc0bc64a57e4c71a5bf1e2eea78f2fb6b2bce5a0318
SHA512de9a179b8e0a647395f5c27007ff98cffd0a065dbcdd0b2fa146505bf693c4dcaddff72af423446e1bffc44eefd07dec58d4e1721ff934b30f703fac381fa9ec
-
C:\Windows\SysWOW64\Hjmoibog.exeFilesize
63KB
MD5b12d3eacec14dc3839934fd1e4564b67
SHA14468526509b43735b869dd764d8567eff2b4d82e
SHA256a073957024d1e9a73bff8fcb8f6a1d6dee26d5923f555de7ba6c9f9a666047cd
SHA5124882b67bba13cf6a2ba11c6860fca5bc692281f993799269653954b70270e102db313129d68290af399eb22cab75faad8d0010c7db98f8fd01ef0ddd9cf4d562
-
C:\Windows\SysWOW64\Hmioonpn.exeFilesize
63KB
MD56a612811ceb912ce6a3761ebf406109a
SHA15bf401298e394a2dec7532442f4520a2c42424ec
SHA25607c17874477908d87c0bd65aee835495c08e7a095d3a55769ffa6565f110f58d
SHA512e239b0f775b39c413f7b1ec2a77658bedea4fe5d7fd9e0a4da3183b66acef1c19d28a385ef3e546ff698ae2034f79d0aef081da51e713c31292210f04933ced7
-
C:\Windows\SysWOW64\Hmklen32.exeFilesize
63KB
MD5295893f810679579889a683d12bc5844
SHA191cf9d1a04531f89faead31bf0d396e5898bdbd4
SHA256cc449b9fc40d9b4e15e52409e9dde0205e1f82635cb6b2201de3059eb0a37c21
SHA5122b44c3b9a28c2f2ff449e6c6e05f78ee865e392ef22a8b480d21b595c577aa47796766975d7219ae4d0a8e0cab2de6ba10f47a16b61115b9d3c080f79ea2087c
-
C:\Windows\SysWOW64\Hmmhjm32.exeFilesize
63KB
MD5f195fa945744416a36f0bd01a622e7b4
SHA1ac19e221d23ee7b8c6d1c2570ad99ebd3d383795
SHA2562d563b271c7ea0636dbac9089bc59b4dd134a74f2febd33d1fc049ad53809c67
SHA512d25081b27a0382c230b483fa26fe4b023ea046634f1b5da2c3d0d36c257b6c15f1280bbedd21024c5912058897dac5c0aa9315f3274d80494519ee348a2d1c60
-
C:\Windows\SysWOW64\Hmmhjm32.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\SysWOW64\Hpbaqj32.exeFilesize
63KB
MD56b952e8a565f4f530029c182f8090a7f
SHA1ed136e32811cb04cf57b89ffe02ff7e99292cde6
SHA2567c43c880c3e200e288bc6a05cb1dab60a32a23b51369a65430e41e9baad80d8d
SHA51262e1045d0aedc282344ca2661962738b5977aeed8336c837fb51f56bf354b0d81aa9c4c60bf897e63a1458fe30a26405a1996614c6cb12451b1eac3cc23890be
-
C:\Windows\SysWOW64\Hpenfjad.exeFilesize
63KB
MD598818dfe063fddedb3e7a531f1c187fe
SHA128b190a6f0f87f981dab1f772a34700a1fff31e8
SHA2567fcbd2d95cb9c20212c28c64e552c31ca6c8164e6c9eb5821ee6aee199194d7d
SHA512009a8b457e3684371b41b46b212096b3b7ae10d298c4c2517ae77749c181b1cda92f197aaf54dfd0ef0edbc2fda39c7f633af3ea316f0ec4d93bc391b8cb214c
-
C:\Windows\SysWOW64\Iannfk32.exeFilesize
63KB
MD533aa4af3909393d890d37238ceb41f2d
SHA1aeb0c986acd66400e2b6402128a7343df82c37a0
SHA256e9d646c855aece02a15c31e7d74f3f5ef86352b904f1b3fc1dc4e5cc901699d6
SHA512061251a89b9ff0c671b441c9fce3d55b39556b76cbc55db9c55ed913e578e281bb875d783e430828380f625942d92dce186bbf0ed086a3b12c2fab2a09feca51
-
C:\Windows\SysWOW64\Ibjqcd32.exeFilesize
63KB
MD5a4a152a19f7f1e9fb613ff81ccfdb62c
SHA17ba8dbcc362cec3fb2551ca1112ab3f40b6238be
SHA256d68f4f4d76d8b6c68e56324c4aacb77a89086b1825469bd5c4458e4997a5f656
SHA5123438d70c0796de4826df041205c3a555f57ac2307d2c0f7683f83b9c7a6759d7637be2bdcb55a2843694044d2c86b6c64dcde3081a063cd40d9e8cc6c7669743
-
C:\Windows\SysWOW64\Icjmmg32.exeFilesize
63KB
MD50852dfe65590ebaca23f23bac8ce605c
SHA18ba0ce516495bd8e62f942eaffda02564abfaf2f
SHA256c690da4d68b0a5bd8c8876e31c16cd0001f20d211a964d7e5dec3b29a29fb7af
SHA512ee8f05ec4c3260ca9f509eac822d77e85e9ca1bef91a2c6cae6bf5cecb8b7fb8c470568c325933b6c6e38f19b11305e8d352d38610d8de035712b25a79e2a444
-
C:\Windows\SysWOW64\Icljbg32.exeFilesize
63KB
MD5b5a89e0d7ee346c7ec2b5412f5f24005
SHA137a7481fa01e2f7a431c707d774f0513fd125e47
SHA256e86d2b465ec215e385fae7c15491bcd73cce2c342ca35cdcce2088803975da8d
SHA512907b8a4cedbd7809d8a74ec567fa52a3c70fc6bd767d126ed495c6b95eb2c99b920ecb853c3ab35dc6f6c8794d0f0e94beeab0b6c6956eca8436b0d6845b173a
-
C:\Windows\SysWOW64\Ifjfnb32.exeFilesize
63KB
MD5ba6d65b685314616455f1c3bce1af9e9
SHA1d2424bcf7cf8df43f8fcbc73d3e1c97ac2590d9c
SHA256a78dc4cf59f8cdfc8078a74f217e800c2079937dcff4f1613d7d6b932b3af5b0
SHA512c0f1ed3762016e70169d955fb38a60ceef56061f5ea71a69e70ace39797622699344d2f295bb4a32d6307a4f64b9099efad31a678f2873a3bc17a7fe905f7f62
-
C:\Windows\SysWOW64\Ifopiajn.exeFilesize
63KB
MD5ac45cfa500c9ba1bbef862cfc5a2d8ec
SHA137817624916f422b20079804552a8ede2df48e44
SHA25617970b20525565598872837701dc42f0492fe9b6780cbe6b77443058cd291bb8
SHA512ba045b8a9845e3bbc5674ee60df01f432df5d3b4465173ef8f1357da4644d944b38edc4a2faca59c1c62d95105cef6c9230ca38ba3234c481a48eddb8a5e0026
-
C:\Windows\SysWOW64\Iikopmkd.exeFilesize
63KB
MD55ec9a3a3401909f6876906b92f6f1387
SHA1afaa9feb9676b3a0c4f39a893dc12b94c80a276d
SHA25689d87a727e65f28b01719a9f6f0d159c1933cd0b4b0a9a2ad6cfde926350ec7e
SHA512374d6c2e994b979d8d48c89b87866f78919de0eae8a6e3adcb32f9ed18215aacf74bd2fd4d37594487eabb700268eb3acafb99bdea8b3012ff58c5881fea5bc3
-
C:\Windows\SysWOW64\Ijaida32.exeFilesize
63KB
MD53e43c5f466d6f9188e946ddd9d77c3d2
SHA15fe2edb6d6b56734797e205eebdf9d98b98824f0
SHA256533e76596362f72fd06ed6ed606d8386a05834d46930be19c3c3a3f7027d1885
SHA512aaafc42924ea2fa17138f25198ac091e9b274b1b1cd0eaa4eaa93ea6510376938afd2150bf21c990d51747e97a48dfcce9c6c9a3af8d0d81940848f0e131151b
-
C:\Windows\SysWOW64\Ijdeiaio.exeFilesize
63KB
MD5b72d4238f63d331307e6ea810ebba6cf
SHA1b9e5a65c6cca7a052bc6d517cf5dedc85e6cc170
SHA256f04b9dcc69b5a23e3de52dabe984ffe211e65de759fc07cde302e23b0fc677e0
SHA51278ac3543ce4f1a222c8dd1b83dccf4bbd6e15409015b9808bb2e80b29a1e4964743fa2133cb9e758bf1e4f486b341ec70c8e5ceef12a317d6bad5efb5e6fe04a
-
C:\Windows\SysWOW64\Imdnklfp.exeFilesize
63KB
MD576361f2b9eac96c5c43866d0fc086bf1
SHA1a32434f5f2bbf67666c9b666fbabcc67f92baa57
SHA256b7aa13218ad9af8afd0e301c57d903cfedf399852ac5900f53754aae267e960a
SHA51268ad2db697a9efbec03a2eff1b149b29cc4217025184b28338fdf36ad06374a05208c8844bac6cdbb55f09495ce8c4558ae21d5b4512c0fc989d1594cf8b9d64
-
C:\Windows\SysWOW64\Imihfl32.exeFilesize
63KB
MD5e0e81891e5a2d6bc827abc3a8dd4379b
SHA167ee2e65f7d2e5d2c890f48df5da471494fad663
SHA256058a15583954a0f5ea6765a6fe08931ddd25be8f094a1309887ca34c7c4c6fc7
SHA5120c261898c54917afa63995cecb26589a1e67e2650a65cf7246687ebec0fbd0435cc1b8e72e5c4bf42da00e8620cd4814d30730cd10dda26a14291fa18722222b
-
C:\Windows\SysWOW64\Impepm32.exeFilesize
63KB
MD5533ee82eaa0fbdbd13604cc2fefd9df7
SHA196d13ebd200b656dc8ae384f458d8dc6b296a656
SHA2566c6e790a397658eff5104f525668ac6457ec92fab7d9a120100fb2b501dc8ed1
SHA5120a7225c0de789a76e76df74057a5fd2e70e28f297dfa9b237f30b2066acf6750c1a5a488a34215623482f7cab42b1503a5ac06825eec7f665f80e7b0e4a19f47
-
C:\Windows\SysWOW64\Ipckgh32.exeFilesize
63KB
MD5b832fd3627d5b62ed9bc47107536bc47
SHA1b0517c9d9ab0bdbbfd1bb5a0ead6abbb579d1c8a
SHA25665bbf335c36707fbf019ce40c9beabe7db3ac1e8f46023203af17914ea70ab95
SHA512c68a9d1069530e20bf017a929962d5af8f4179c1652649432cfb68d3825252a6aabcf5724bf3576e2867d96b12418bc4742dea5161d8f89cff3df944a8a478fe
-
C:\Windows\SysWOW64\Ipegmg32.exeFilesize
63KB
MD5c24f1a8631f098559827b24bf939960e
SHA1a4068381a69d3c50284ef799cb916ef7997a7587
SHA256884b9e88fdd5ef3dadc41a6d1037bd0a24d135a96b9b8ce0ed49bef998180f63
SHA512ee0cd232375d0e44a2947ee4e101259e9a9b62a0f8dc5496d02d7f2a5fe32561c2015260cfcb4b9dd734fc7bca221163de71a5c8630040097bb401de5fc62e9f
-
C:\Windows\SysWOW64\Ipldfi32.exeFilesize
63KB
MD512ff0f6f4acc6c44e3c63d7998df410e
SHA1251e0fd21b3c05cbb8ebdb960e4c1b93a00cdbd5
SHA256245804cc2791d4860ecf83731a33caf399597342622f5f7e7983ae2ad5ac60fe
SHA512a326674c6f48571e8aab63caf716ba7eb54e84d393243ddea3f0dea543d9bd69bf096e2bdc0f7558015b69fa4872af011987eeb34304c1e20e3daa6df8b2b149
-
C:\Windows\SysWOW64\Jaedgjjd.exeFilesize
63KB
MD5da226059a5e848a475a8560fadef6b05
SHA1e989f13a498014dc805e916f90d4185894a8832d
SHA256918502bda0cc7eb5991855eeaae0f387e9f76c8306f10c7e62a00b872568bc30
SHA512e1a8b54611c60f41eb95c70f0c60262a43d55a39db0344a79df225a88a33c3bdeaa6ca9f641935433e0f8bb2bd6d78fa918dffeda5ea4f9329662952152bdfef
-
C:\Windows\SysWOW64\Jdcpcf32.exeFilesize
63KB
MD5d1f70f747b988c10832ca5de8ab86acb
SHA18b6b2301626b5c8fa1770e9242189a9ae69a5947
SHA25695df5a92d828a7ba50a065f6d2dcb8ab365a1bfca60d8c5edcf547b052c36814
SHA512d204ddfe384a213e9d77e9a600b68bd8c2e16e86d5c843f7ca460cf1091fbaa846e76a54b55a0c8dd567ab830b2148fdca86ae11df2b5262ebedb2eff405f25f
-
C:\Windows\SysWOW64\Jjmhppqd.exeFilesize
63KB
MD5e3c748290aa922189a5284ae87762680
SHA155302b1c59aefca4b55b93890ce6cdba97d10915
SHA256eaa1c907e5b7f536c65a5bd9b1f2d57f110eab430aa0c0c0e4006c3aaf047389
SHA5126321ac332aa23b94064ef25fe498f66e80e73e6ea57c9f618279aadc787d8e0aa2d062be4c9527f8f8654291f968f0ec313c0a68c56a941cf03dc1886b708c1c
-
C:\Windows\SysWOW64\Jmkdlkph.exeFilesize
63KB
MD537979edb343e108d565d1068972d926a
SHA1423d5b0ea07b845cb0234694e3b0fa56d3da6d62
SHA256a98a0bb882039e5327900425c22f1032551c7550cacfb2d695df65560594c907
SHA5125a72b1836301b4812c57c96fe2fc0da1b4e4b51ac6ad3435aa2c96eefd8ebf27e1c80a9350773ebf6bff2beecc56920ff2e84467abb0ef00f6443d8a91f01021
-
C:\Windows\SysWOW64\Laefdf32.exeFilesize
63KB
MD5f4b78872a00d53f70de239d4335e0a87
SHA16f364c2a7d4579740cc9ea46f357eb573cbc625c
SHA25674d69debe1c10d8f9184c0c2039c1250c8f2f1cf432df7adfad9ebc65de8fad4
SHA512474a411a7ce0822d39e0cda5e8cf4ee14427f357ea88141d7b2078edb436d75dd366065c9a67172162fb7e3a19ff25fb8ff3e7ab41988b7589ec9d06d0068638
-
C:\Windows\SysWOW64\Nbhkac32.exeFilesize
63KB
MD5593c24a0cd8df9e956225c72d108d16d
SHA14f9c23ff679b531fbae7c9ed4fb2409250c887d7
SHA2560595bb3898b0f16ebce4230fbcef3401a8aed7148ce6df72e0e7c45a3cb60ef0
SHA5128201da6cbf8ae41f9114d19a91ac438e5964972584a4a65eb073d80a630140edd6c9dd6fef716bec1d04ffb219c2d23b5c5e670f1d522ba9637b6c70612ed60c
-
memory/316-254-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/408-299-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/872-317-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/884-464-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/912-269-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/916-586-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1048-137-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1072-176-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1108-113-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1236-351-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1260-559-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1260-21-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1268-165-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1308-395-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1372-279-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1400-233-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1556-201-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1604-263-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1628-193-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1816-73-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1852-229-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1916-217-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2268-583-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2328-104-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2384-358-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2396-45-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2408-88-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2432-455-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2444-503-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2604-864-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2604-437-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2668-371-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2680-341-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2708-240-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2820-425-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2820-866-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2832-526-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2912-65-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2912-599-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2924-169-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2972-509-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2988-311-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3020-335-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3052-8-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3052-552-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3068-573-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3076-81-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3120-560-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3216-329-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3228-209-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3272-520-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3304-323-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3328-454-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3372-37-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3456-158-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3508-369-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3644-305-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3652-585-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3652-49-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3680-467-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3704-497-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3704-846-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3760-545-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3832-293-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3856-558-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3900-479-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3908-185-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3944-593-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3956-566-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3956-24-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3968-383-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/3980-531-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4092-537-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4240-377-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4260-871-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4260-401-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4300-567-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4316-262-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4336-491-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4376-423-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4420-473-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4436-97-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4444-389-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4612-413-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4612-868-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4636-411-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4644-546-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4676-128-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4696-127-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4716-281-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4780-435-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4832-489-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/4872-145-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5000-57-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5000-592-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5036-443-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5076-359-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5084-287-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5092-0-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5092-543-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5092-5-0x0000000000432000-0x0000000000433000-memory.dmpFilesize
4KB
-
memory/5172-818-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5216-817-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5516-807-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5600-805-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB