Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 01:17
Behavioral task
behavioral1
Sample
470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe
-
Size
94KB
-
MD5
470e385450fad61c7c33f81152ce7980
-
SHA1
8c7be2c7288ea256ae9e37a4a54c0457724f88f9
-
SHA256
24cd5e5480958b2e157b637c9eaba48a610e89a9266febf8b37daa545f6cfec4
-
SHA512
26d42e334d1b42d13e55a6a19b2d9b157d9886563f74066220c54066c83b091ad059d8591b3a0a57e2230724cdaa40a912ea293af260eeed2691070e5d443d4f
-
SSDEEP
1536:v/7Ipaoj/mPiPUe+SWmQuL1kwe2LKaIZTJ+7LhkiB0MPiKeEAgv:nkrD9f+tsOSKaMU7uihJ5v
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ldmlpbbj.exeLaefdf32.exeMamleegg.exeMpaifalo.exeMgnnhk32.exeJidbflcj.exeKmegbjgn.exeKgbefoji.exeNkqpjidj.exeNnolfdcn.exeJpaghf32.exeNnhfee32.exe470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exeKgphpo32.exeKpjjod32.exeNcldnkae.exeJigollag.exeMjqjih32.exeMjeddggd.exeMkepnjng.exeNnmopdep.exeKmgdgjek.exeLalcng32.exeLgikfn32.exeNqfbaq32.exeKbapjafe.exeNafokcol.exeMdfofakp.exeKpmfddnf.exeKkihknfg.exeKkpnlm32.exeKmnjhioc.exeLkgdml32.exeJfkoeppq.exeMajopeii.exeMaohkd32.exeJdjfcecp.exeLiekmj32.exeLpfijcfl.exeNdbnboqb.exeLnepih32.exeLjnnch32.exeMcklgm32.exeMjcgohig.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldmlpbbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laefdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mamleegg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpaifalo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpaifalo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jidbflcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmegbjgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgbefoji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkqpjidj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpaghf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgphpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpjjod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjqjih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjeddggd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnmopdep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jigollag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmgdgjek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lalcng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgikfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnolfdcn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nafokcol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdfofakp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpmfddnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkihknfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkpnlm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmnjhioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkgdml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfkoeppq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Majopeii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmgdgjek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maohkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdjfcecp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liekmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncldnkae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpfijcfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndbnboqb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnepih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpaghf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljnnch32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jidbflcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcklgm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkqpjidj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgikfn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liekmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lalcng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjcgohig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjeddggd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpmfddnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgbefoji.exe -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Jidbflcj.exe family_berbew C:\Windows\SysWOW64\Jdjfcecp.exe family_berbew C:\Windows\SysWOW64\Jigollag.exe family_berbew C:\Windows\SysWOW64\Jpaghf32.exe family_berbew C:\Windows\SysWOW64\Jfkoeppq.exe family_berbew C:\Windows\SysWOW64\Jkfkfohj.exe family_berbew C:\Windows\SysWOW64\Kmegbjgn.exe family_berbew C:\Windows\SysWOW64\Kbapjafe.exe family_berbew C:\Windows\SysWOW64\Kkihknfg.exe family_berbew C:\Windows\SysWOW64\Kmgdgjek.exe family_berbew C:\Windows\SysWOW64\Kgphpo32.exe family_berbew C:\Windows\SysWOW64\Kmjqmi32.exe family_berbew C:\Windows\SysWOW64\Kdcijcke.exe family_berbew C:\Windows\SysWOW64\Kgbefoji.exe family_berbew C:\Windows\SysWOW64\Kpjjod32.exe family_berbew C:\Windows\SysWOW64\Kkpnlm32.exe family_berbew C:\Windows\SysWOW64\Kmnjhioc.exe family_berbew C:\Windows\SysWOW64\Kpmfddnf.exe family_berbew C:\Windows\SysWOW64\Liekmj32.exe family_berbew C:\Windows\SysWOW64\Lalcng32.exe family_berbew C:\Windows\SysWOW64\Lgikfn32.exe family_berbew C:\Windows\SysWOW64\Laopdgcg.exe family_berbew C:\Windows\SysWOW64\Ldmlpbbj.exe family_berbew C:\Windows\SysWOW64\Lkgdml32.exe family_berbew C:\Windows\SysWOW64\Lnepih32.exe family_berbew C:\Windows\SysWOW64\Ldohebqh.exe family_berbew C:\Windows\SysWOW64\Lpfijcfl.exe family_berbew C:\Windows\SysWOW64\Ljnnch32.exe family_berbew C:\Windows\SysWOW64\Laefdf32.exe family_berbew C:\Windows\SysWOW64\Lgbnmm32.exe family_berbew C:\Windows\SysWOW64\Mjqjih32.exe family_berbew C:\Windows\SysWOW64\Mdfofakp.exe family_berbew -
Executes dropped EXE 55 IoCs
Processes:
Jidbflcj.exeJdjfcecp.exeJigollag.exeJpaghf32.exeJfkoeppq.exeJkfkfohj.exeKmegbjgn.exeKbapjafe.exeKkihknfg.exeKmgdgjek.exeKgphpo32.exeKmjqmi32.exeKdcijcke.exeKgbefoji.exeKpjjod32.exeKkpnlm32.exeKmnjhioc.exeKpmfddnf.exeLiekmj32.exeLalcng32.exeLgikfn32.exeLaopdgcg.exeLdmlpbbj.exeLkgdml32.exeLnepih32.exeLdohebqh.exeLpfijcfl.exeLjnnch32.exeLaefdf32.exeLgbnmm32.exeMjqjih32.exeMdfofakp.exeMjcgohig.exeMajopeii.exeMcklgm32.exeMjeddggd.exeMamleegg.exeMgidml32.exeMkepnjng.exeMaohkd32.exeMpaifalo.exeMkgmcjld.exeMpdelajl.exeMgnnhk32.exeNnhfee32.exeNqfbaq32.exeNdbnboqb.exeNklfoi32.exeNafokcol.exeNnmopdep.exeNbhkac32.exeNkqpjidj.exeNnolfdcn.exeNcldnkae.exeNkcmohbg.exepid process 4720 Jidbflcj.exe 4848 Jdjfcecp.exe 1140 Jigollag.exe 596 Jpaghf32.exe 2400 Jfkoeppq.exe 1888 Jkfkfohj.exe 3372 Kmegbjgn.exe 1944 Kbapjafe.exe 4960 Kkihknfg.exe 3860 Kmgdgjek.exe 2084 Kgphpo32.exe 4468 Kmjqmi32.exe 2172 Kdcijcke.exe 1924 Kgbefoji.exe 4180 Kpjjod32.exe 4328 Kkpnlm32.exe 3480 Kmnjhioc.exe 4112 Kpmfddnf.exe 1288 Liekmj32.exe 848 Lalcng32.exe 3708 Lgikfn32.exe 3304 Laopdgcg.exe 3828 Ldmlpbbj.exe 4336 Lkgdml32.exe 2820 Lnepih32.exe 4416 Ldohebqh.exe 4316 Lpfijcfl.exe 2176 Ljnnch32.exe 232 Laefdf32.exe 4856 Lgbnmm32.exe 1752 Mjqjih32.exe 744 Mdfofakp.exe 1880 Mjcgohig.exe 388 Majopeii.exe 3228 Mcklgm32.exe 1824 Mjeddggd.exe 3696 Mamleegg.exe 4460 Mgidml32.exe 3460 Mkepnjng.exe 2280 Maohkd32.exe 3856 Mpaifalo.exe 2056 Mkgmcjld.exe 1876 Mpdelajl.exe 2256 Mgnnhk32.exe 856 Nnhfee32.exe 4884 Nqfbaq32.exe 4464 Ndbnboqb.exe 1788 Nklfoi32.exe 4836 Nafokcol.exe 4376 Nnmopdep.exe 3628 Nbhkac32.exe 2812 Nkqpjidj.exe 4948 Nnolfdcn.exe 5024 Ncldnkae.exe 1976 Nkcmohbg.exe -
Drops file in System32 directory 64 IoCs
Processes:
Jidbflcj.exeKgphpo32.exeLnepih32.exeKbapjafe.exeMamleegg.exeNqfbaq32.exeNafokcol.exeNnmopdep.exeJfkoeppq.exeJkfkfohj.exeKmegbjgn.exeLdmlpbbj.exeLaefdf32.exeMgnnhk32.exeKpmfddnf.exeLgikfn32.exeKdcijcke.exe470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exeKkihknfg.exeKmjqmi32.exeMdfofakp.exeMaohkd32.exeLgbnmm32.exeMajopeii.exeLjnnch32.exeMcklgm32.exeMpdelajl.exeLalcng32.exeNnhfee32.exeNcldnkae.exeMjqjih32.exeMkgmcjld.exeLpfijcfl.exeNklfoi32.exeKmgdgjek.exeKkpnlm32.exeNdbnboqb.exeJdjfcecp.exedescription ioc process File created C:\Windows\SysWOW64\Jdjfcecp.exe Jidbflcj.exe File opened for modification C:\Windows\SysWOW64\Kmjqmi32.exe Kgphpo32.exe File opened for modification C:\Windows\SysWOW64\Ldohebqh.exe Lnepih32.exe File opened for modification C:\Windows\SysWOW64\Kkihknfg.exe Kbapjafe.exe File opened for modification C:\Windows\SysWOW64\Mgidml32.exe Mamleegg.exe File created C:\Windows\SysWOW64\Dihcoe32.dll Nqfbaq32.exe File created C:\Windows\SysWOW64\Cgfgaq32.dll Nafokcol.exe File created C:\Windows\SysWOW64\Nbhkac32.exe Nnmopdep.exe File created C:\Windows\SysWOW64\Jkfkfohj.exe Jfkoeppq.exe File created C:\Windows\SysWOW64\Iljnde32.dll Jkfkfohj.exe File created C:\Windows\SysWOW64\Kbapjafe.exe Kmegbjgn.exe File opened for modification C:\Windows\SysWOW64\Lkgdml32.exe Ldmlpbbj.exe File created C:\Windows\SysWOW64\Lgbnmm32.exe Laefdf32.exe File opened for modification C:\Windows\SysWOW64\Nnhfee32.exe Mgnnhk32.exe File created C:\Windows\SysWOW64\Ajgblndm.dll Kgphpo32.exe File created C:\Windows\SysWOW64\Imppcc32.dll Kpmfddnf.exe File created C:\Windows\SysWOW64\Pellipfm.dll Lgikfn32.exe File opened for modification C:\Windows\SysWOW64\Kgbefoji.exe Kdcijcke.exe File opened for modification C:\Windows\SysWOW64\Nbhkac32.exe Nnmopdep.exe File created C:\Windows\SysWOW64\Jidbflcj.exe 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Ehifigof.dll Jidbflcj.exe File opened for modification C:\Windows\SysWOW64\Kmgdgjek.exe Kkihknfg.exe File opened for modification C:\Windows\SysWOW64\Kdcijcke.exe Kmjqmi32.exe File created C:\Windows\SysWOW64\Ocbakl32.dll Mdfofakp.exe File created C:\Windows\SysWOW64\Mpaifalo.exe Maohkd32.exe File created C:\Windows\SysWOW64\Mjqjih32.exe Lgbnmm32.exe File opened for modification C:\Windows\SysWOW64\Mjqjih32.exe Lgbnmm32.exe File created C:\Windows\SysWOW64\Mcklgm32.exe Majopeii.exe File created C:\Windows\SysWOW64\Enbofg32.dll Kbapjafe.exe File created C:\Windows\SysWOW64\Liekmj32.exe Kpmfddnf.exe File created C:\Windows\SysWOW64\Dngdgf32.dll Ldmlpbbj.exe File created C:\Windows\SysWOW64\Laefdf32.exe Ljnnch32.exe File created C:\Windows\SysWOW64\Mjeddggd.exe Mcklgm32.exe File created C:\Windows\SysWOW64\Cnacjn32.dll Mamleegg.exe File opened for modification C:\Windows\SysWOW64\Mgnnhk32.exe Mpdelajl.exe File created C:\Windows\SysWOW64\Nnhfee32.exe Mgnnhk32.exe File created C:\Windows\SysWOW64\Milgab32.dll Kdcijcke.exe File opened for modification C:\Windows\SysWOW64\Liekmj32.exe Kpmfddnf.exe File opened for modification C:\Windows\SysWOW64\Lgikfn32.exe Lalcng32.exe File created C:\Windows\SysWOW64\Epmjjbbj.dll Majopeii.exe File opened for modification C:\Windows\SysWOW64\Nqfbaq32.exe Nnhfee32.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Kkihknfg.exe Kbapjafe.exe File created C:\Windows\SysWOW64\Lgikfn32.exe Lalcng32.exe File opened for modification C:\Windows\SysWOW64\Mdfofakp.exe Mjqjih32.exe File created C:\Windows\SysWOW64\Gbbkdl32.dll Mkgmcjld.exe File created C:\Windows\SysWOW64\Hlmobp32.dll Mgnnhk32.exe File created C:\Windows\SysWOW64\Npckna32.dll Nnhfee32.exe File opened for modification C:\Windows\SysWOW64\Nnmopdep.exe Nafokcol.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ncldnkae.exe File opened for modification C:\Windows\SysWOW64\Ljnnch32.exe Lpfijcfl.exe File created C:\Windows\SysWOW64\Ebaqkk32.dll Ljnnch32.exe File opened for modification C:\Windows\SysWOW64\Mcklgm32.exe Majopeii.exe File opened for modification C:\Windows\SysWOW64\Nafokcol.exe Nklfoi32.exe File opened for modification C:\Windows\SysWOW64\Kgphpo32.exe Kmgdgjek.exe File opened for modification C:\Windows\SysWOW64\Mjcgohig.exe Mdfofakp.exe File created C:\Windows\SysWOW64\Mgidml32.exe Mamleegg.exe File opened for modification C:\Windows\SysWOW64\Kmegbjgn.exe Jkfkfohj.exe File created C:\Windows\SysWOW64\Oimhnoch.dll Kkpnlm32.exe File opened for modification C:\Windows\SysWOW64\Laefdf32.exe Ljnnch32.exe File created C:\Windows\SysWOW64\Nklfoi32.exe Ndbnboqb.exe File created C:\Windows\SysWOW64\Honcnp32.dll 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Jigollag.exe Jdjfcecp.exe File opened for modification C:\Windows\SysWOW64\Jigollag.exe Jdjfcecp.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2216 1976 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
Kpmfddnf.exeLgbnmm32.exeKkpnlm32.exeKkihknfg.exeLalcng32.exeMjeddggd.exeMgnnhk32.exeNafokcol.exe470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exeLgikfn32.exeMaohkd32.exeNnmopdep.exeNbhkac32.exeNnolfdcn.exeLnepih32.exeLaefdf32.exeMkgmcjld.exeNnhfee32.exeNklfoi32.exeKpjjod32.exeMajopeii.exeNdbnboqb.exeJfkoeppq.exeKmegbjgn.exeKbapjafe.exeKgbefoji.exeMcklgm32.exeMamleegg.exeKdcijcke.exeJdjfcecp.exeMpdelajl.exeJpaghf32.exeKmgdgjek.exeKmnjhioc.exeMjqjih32.exeMgidml32.exeJigollag.exeMdfofakp.exeMpaifalo.exeNqfbaq32.exeKgphpo32.exeLaopdgcg.exeLdohebqh.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imppcc32.dll" Kpmfddnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkpnlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkihknfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lalcng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjeddggd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nafokcol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgikfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maohkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnmopdep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnolfdcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnepih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Laefdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkgmcjld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnhfee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcoegc32.dll" Nklfoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpjjod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Majopeii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndbnboqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eilljncf.dll" Jfkoeppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmegbjgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbapjafe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgbefoji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpjjod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lppbjjia.dll" Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjblifaf.dll" Mcklgm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mamleegg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfkoeppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdcijcke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggpfjejo.dll" Jdjfcecp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epmjjbbj.dll" Majopeii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpdelajl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnhfee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpaghf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqncfneo.dll" Kkihknfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmgdgjek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmnjhioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flfmin32.dll" Mjqjih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgidml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nilhco32.dll" Jigollag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpmfddnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgidml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekipni32.dll" Mpaifalo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpdelajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nklfoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpaghf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqbmje32.dll" Laopdgcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldohebqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldohebqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnacjn32.dll" Mamleegg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbapjafe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkgmcjld.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exeJidbflcj.exeJdjfcecp.exeJigollag.exeJpaghf32.exeJfkoeppq.exeJkfkfohj.exeKmegbjgn.exeKbapjafe.exeKkihknfg.exeKmgdgjek.exeKgphpo32.exeKmjqmi32.exeKdcijcke.exeKgbefoji.exeKpjjod32.exeKkpnlm32.exeKmnjhioc.exeKpmfddnf.exeLiekmj32.exeLalcng32.exeLgikfn32.exedescription pid process target process PID 3408 wrote to memory of 4720 3408 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Jidbflcj.exe PID 3408 wrote to memory of 4720 3408 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Jidbflcj.exe PID 3408 wrote to memory of 4720 3408 470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe Jidbflcj.exe PID 4720 wrote to memory of 4848 4720 Jidbflcj.exe Jdjfcecp.exe PID 4720 wrote to memory of 4848 4720 Jidbflcj.exe Jdjfcecp.exe PID 4720 wrote to memory of 4848 4720 Jidbflcj.exe Jdjfcecp.exe PID 4848 wrote to memory of 1140 4848 Jdjfcecp.exe Jigollag.exe PID 4848 wrote to memory of 1140 4848 Jdjfcecp.exe Jigollag.exe PID 4848 wrote to memory of 1140 4848 Jdjfcecp.exe Jigollag.exe PID 1140 wrote to memory of 596 1140 Jigollag.exe Jpaghf32.exe PID 1140 wrote to memory of 596 1140 Jigollag.exe Jpaghf32.exe PID 1140 wrote to memory of 596 1140 Jigollag.exe Jpaghf32.exe PID 596 wrote to memory of 2400 596 Jpaghf32.exe Jfkoeppq.exe PID 596 wrote to memory of 2400 596 Jpaghf32.exe Jfkoeppq.exe PID 596 wrote to memory of 2400 596 Jpaghf32.exe Jfkoeppq.exe PID 2400 wrote to memory of 1888 2400 Jfkoeppq.exe Jkfkfohj.exe PID 2400 wrote to memory of 1888 2400 Jfkoeppq.exe Jkfkfohj.exe PID 2400 wrote to memory of 1888 2400 Jfkoeppq.exe Jkfkfohj.exe PID 1888 wrote to memory of 3372 1888 Jkfkfohj.exe Kmegbjgn.exe PID 1888 wrote to memory of 3372 1888 Jkfkfohj.exe Kmegbjgn.exe PID 1888 wrote to memory of 3372 1888 Jkfkfohj.exe Kmegbjgn.exe PID 3372 wrote to memory of 1944 3372 Kmegbjgn.exe Kbapjafe.exe PID 3372 wrote to memory of 1944 3372 Kmegbjgn.exe Kbapjafe.exe PID 3372 wrote to memory of 1944 3372 Kmegbjgn.exe Kbapjafe.exe PID 1944 wrote to memory of 4960 1944 Kbapjafe.exe Kkihknfg.exe PID 1944 wrote to memory of 4960 1944 Kbapjafe.exe Kkihknfg.exe PID 1944 wrote to memory of 4960 1944 Kbapjafe.exe Kkihknfg.exe PID 4960 wrote to memory of 3860 4960 Kkihknfg.exe Kmgdgjek.exe PID 4960 wrote to memory of 3860 4960 Kkihknfg.exe Kmgdgjek.exe PID 4960 wrote to memory of 3860 4960 Kkihknfg.exe Kmgdgjek.exe PID 3860 wrote to memory of 2084 3860 Kmgdgjek.exe Kgphpo32.exe PID 3860 wrote to memory of 2084 3860 Kmgdgjek.exe Kgphpo32.exe PID 3860 wrote to memory of 2084 3860 Kmgdgjek.exe Kgphpo32.exe PID 2084 wrote to memory of 4468 2084 Kgphpo32.exe Kmjqmi32.exe PID 2084 wrote to memory of 4468 2084 Kgphpo32.exe Kmjqmi32.exe PID 2084 wrote to memory of 4468 2084 Kgphpo32.exe Kmjqmi32.exe PID 4468 wrote to memory of 2172 4468 Kmjqmi32.exe Kdcijcke.exe PID 4468 wrote to memory of 2172 4468 Kmjqmi32.exe Kdcijcke.exe PID 4468 wrote to memory of 2172 4468 Kmjqmi32.exe Kdcijcke.exe PID 2172 wrote to memory of 1924 2172 Kdcijcke.exe Kgbefoji.exe PID 2172 wrote to memory of 1924 2172 Kdcijcke.exe Kgbefoji.exe PID 2172 wrote to memory of 1924 2172 Kdcijcke.exe Kgbefoji.exe PID 1924 wrote to memory of 4180 1924 Kgbefoji.exe Kpjjod32.exe PID 1924 wrote to memory of 4180 1924 Kgbefoji.exe Kpjjod32.exe PID 1924 wrote to memory of 4180 1924 Kgbefoji.exe Kpjjod32.exe PID 4180 wrote to memory of 4328 4180 Kpjjod32.exe Kkpnlm32.exe PID 4180 wrote to memory of 4328 4180 Kpjjod32.exe Kkpnlm32.exe PID 4180 wrote to memory of 4328 4180 Kpjjod32.exe Kkpnlm32.exe PID 4328 wrote to memory of 3480 4328 Kkpnlm32.exe Kmnjhioc.exe PID 4328 wrote to memory of 3480 4328 Kkpnlm32.exe Kmnjhioc.exe PID 4328 wrote to memory of 3480 4328 Kkpnlm32.exe Kmnjhioc.exe PID 3480 wrote to memory of 4112 3480 Kmnjhioc.exe Kpmfddnf.exe PID 3480 wrote to memory of 4112 3480 Kmnjhioc.exe Kpmfddnf.exe PID 3480 wrote to memory of 4112 3480 Kmnjhioc.exe Kpmfddnf.exe PID 4112 wrote to memory of 1288 4112 Kpmfddnf.exe Liekmj32.exe PID 4112 wrote to memory of 1288 4112 Kpmfddnf.exe Liekmj32.exe PID 4112 wrote to memory of 1288 4112 Kpmfddnf.exe Liekmj32.exe PID 1288 wrote to memory of 848 1288 Liekmj32.exe Lalcng32.exe PID 1288 wrote to memory of 848 1288 Liekmj32.exe Lalcng32.exe PID 1288 wrote to memory of 848 1288 Liekmj32.exe Lalcng32.exe PID 848 wrote to memory of 3708 848 Lalcng32.exe Lgikfn32.exe PID 848 wrote to memory of 3708 848 Lalcng32.exe Lgikfn32.exe PID 848 wrote to memory of 3708 848 Lalcng32.exe Lgikfn32.exe PID 3708 wrote to memory of 3304 3708 Lgikfn32.exe Laopdgcg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\470e385450fad61c7c33f81152ce7980_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jdjfcecp.exeC:\Windows\system32\Jdjfcecp.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jigollag.exeC:\Windows\system32\Jigollag.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jkfkfohj.exeC:\Windows\system32\Jkfkfohj.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kmegbjgn.exeC:\Windows\system32\Kmegbjgn.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kmgdgjek.exeC:\Windows\system32\Kmgdgjek.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kmjqmi32.exeC:\Windows\system32\Kmjqmi32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lalcng32.exeC:\Windows\system32\Lalcng32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Laopdgcg.exeC:\Windows\system32\Laopdgcg.exe23⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ldmlpbbj.exeC:\Windows\system32\Ldmlpbbj.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lkgdml32.exeC:\Windows\system32\Lkgdml32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe27⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Lgbnmm32.exeC:\Windows\system32\Lgbnmm32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mjqjih32.exeC:\Windows\system32\Mjqjih32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe39⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nklfoi32.exeC:\Windows\system32\Nklfoi32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nafokcol.exeC:\Windows\system32\Nafokcol.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe52⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 40457⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1976 -ip 19761⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Jdjfcecp.exeFilesize
94KB
MD54bc358cbef235bf605fc1cda216bc03c
SHA1eec32499c997210bef78e789feccd40bc547de0f
SHA25603e04188e349ad2ccda69fd38263cacd6bff3443441d582a23bf1a87fc7144b1
SHA5124bdb53674ae46343bbe6dd412304600e15337b4321283b1ccd727034bbe53f440ffec6337070e18f8b795d2c2268396661612fd5c8beeedfca6b1b8f99a8d566
-
C:\Windows\SysWOW64\Jfkoeppq.exeFilesize
94KB
MD57819757153da9f3c1795004eceb2ba71
SHA1970071696cbbf3a951debf3664debfe5c4cd8b3b
SHA2568ebdc52e690101d939e700cf8d9bf88db00516894351543203110870446fff7a
SHA512b43086512931b11011502d5765d7c84a73db37d541ffcea7a7914904ba236588df0d6dc0c9b4ec6a2678fc6b55004ce20c17f7fc8043e8efd229f2ba2f235d27
-
C:\Windows\SysWOW64\Jidbflcj.exeFilesize
94KB
MD541ba19c3a667caf302d9923e9327672c
SHA177787ab2a7dd63f723ef213daf4b209ff6db2fbe
SHA2561f36d82c576fc23f90f301a741300644d451b697aca802ca6182a5468dece47a
SHA512935b672e88b565e686b33496165432e50dc5535b76df594440555ef4d8c3e9d705f8e6e04742967be718c76916abfcc2239ca09fb59c8314f4cc18ff5f175eaf
-
C:\Windows\SysWOW64\Jigollag.exeFilesize
94KB
MD5f4c5e46a0c8c584eb87d78268df6ed75
SHA155a01cd11124d9488982c0d876cedf694861e796
SHA256ae4940c7d341aa7667eec52c8de82b43967ec5c145bb3d6c1528d50030cdfeee
SHA512322a8e74243d866e10cec26e0e3913be3398043f8005cadf0570b402c1a4b09467cdfd3f1d9cfd1bc52d27179cf1b9b00bf37023e869a5415876107f8d1eb2e6
-
C:\Windows\SysWOW64\Jkfkfohj.exeFilesize
94KB
MD522d9b2254fe3303a145b6dd34f5d5781
SHA1516bc7f0a72a469958632266f6bee416694bae5d
SHA2569fd27a5377e91b7c06387adbb6df9354ac9de36f4db3796737ced82f272dea85
SHA512d72608765eb514470bef3899ed14dfcfabf1396369b565bd7f915792f288c3cb53ad7c74a6fffe7833634c4861a1d06e91255edd82dc986f384dc7e7d9a6d784
-
C:\Windows\SysWOW64\Jpaghf32.exeFilesize
94KB
MD512c3aabe514c0fc1e94542d0823ab955
SHA132738d79e88f6699bdc4dc8b1b039fff71ea74e2
SHA256421cfdcf47d8b4b19ca9566c93125acda08dc3472f2ba96897d0575d338a55a0
SHA5126165332c6f7ee3ba283c2dface263deef281efd7f45642fbdc05538e2d2dae328ec86a3493d4a9a798fe42360df54a15f67530457f49f8afd47625e664fc185b
-
C:\Windows\SysWOW64\Kbapjafe.exeFilesize
94KB
MD537fd14ddd07dd5112bf2a8886f420c23
SHA1a2267993f1234e694631c67a5af23f4c02b29508
SHA2565e43d1ddc347c18520a228051cb7ea0c9bc75cd71d93b889a5e84d7b18dab04e
SHA512f0908c0b0bef2cd10e77ae7bb1901d6fb97f4a79b9c9b03632fbcb5f130da03713deb189bb6dcba3eaeaba0c32a4da886a7f654a81689802415691d5ed71ed0a
-
C:\Windows\SysWOW64\Kdcijcke.exeFilesize
94KB
MD53fdf02552db58da451af1c082f497e1f
SHA10782eaca333f6e4156f07e47c1183275ff81d024
SHA2562e84c4ea2533caf97937f6343bd0d324588b5270b08cd940ccd8c9f5fa4b836e
SHA51291fc1db52876d312526f632f007f37572ca0a8ac69abfb00c7412b0df4b6c13d6f857892c5431fc42731eb2b67b1bc0f58804486f6b7b29f7d3d6f03bb79c250
-
C:\Windows\SysWOW64\Kgbefoji.exeFilesize
94KB
MD580f0d10b9c39995fcb5837257cc790b0
SHA17c989e231198b896207fc0d8ae6a2c857f8c1a0b
SHA256ecf5d7aac2465d28eae951871c731ff424ac5dfc4d124106497ba7d4335193e8
SHA512ba37458f23da2daf12cba9858ee33cee5ead0e26945b2d7e0044a8fd44b451a57ab8c2be6e7766b3399f157098c71c8a33eaff136bb832743548f3694a8b72f7
-
C:\Windows\SysWOW64\Kgphpo32.exeFilesize
94KB
MD505f159dda5e8a4fc03b1133fa1e96a49
SHA1697d3fa296bbd6c78c4f86730989149155b7a128
SHA256b95ecc1f990e6915431e7a34589f6d341182dae34a8c8a692f2a6b6d6c536cd0
SHA5122785039f18d29bbfd9b7db345b7e4d61950ebe07cc7ba7094dcb51fac9dd4de83304cb7522260313f74ed6aa423c4d84aacd15fa78f02fd0b0c343bd2abeb4f7
-
C:\Windows\SysWOW64\Kkihknfg.exeFilesize
94KB
MD5384a856c0607c27c412c37143e6c6194
SHA1ccc1adfffd1c765bccc94a3a299821646ffa0fd0
SHA25655a482ffbcda3aeb7322474d495be5530f0f81cdc9ff4e5e08e071cbd0822bb1
SHA5120efbf84371cc97c69f1720b663932a564e05036cf7607b4a5a1c7512bf64c5f31a411b311ce923c9dd1f5a0f8335bfc8a204a8b1bb147098ce407acccfb0c348
-
C:\Windows\SysWOW64\Kkpnlm32.exeFilesize
94KB
MD500e75fd7c1010b68c473927525e19a75
SHA11207d3d2327edb660d2d3d4b1d2ab671c37b1a08
SHA25634215b97c39ac3d7c48f15563fc0bfce6d8d3b2d1bceed84d85f28fe618defa1
SHA512f2127805cc4ebf8c3636ec408837d077e051e037afe0ebc756a9f8d04595c1d733022c873fdcd2f6a54b79864c16f9cfca7e59cce93bd07ac594d0aa9abac598
-
C:\Windows\SysWOW64\Kmegbjgn.exeFilesize
94KB
MD543a6c3f2805b05349618d2574226ccfb
SHA14c9c2b4c47668f35df73edd216246c6353f875d1
SHA25614758bcafe40281beb2197cf3c2d835921eb7b2982350f18c69020d05cb15586
SHA512a5fd0349bc6223e004a3d9dd2093240f4418b7a01cb59808c06848bdff6ca187990d6b77974bf1375aa4f3a8a54a99124458d8288ace1a196a0acbe05fe6b06d
-
C:\Windows\SysWOW64\Kmgdgjek.exeFilesize
94KB
MD5e18615e888bd267bd3b09a865d80e7fe
SHA11805bcd8fc8d0770481a323045ee970d5ae9d2f5
SHA256605aa100535d13aa3580305e38d8c9ded8bba997b571e7446d616c744e2d4b99
SHA51255f2ed9e33ea75c7c0094659c0679344073422d97c8d5b18b92fd4a3a564cdf35182ddd0eb7b8f186e9057167d5a9489676b41555a489a00d93e2c01073969bc
-
C:\Windows\SysWOW64\Kmjqmi32.exeFilesize
94KB
MD561301b936e081a9f472a27868d37220a
SHA106681383915b13226b0804151a38dafc525076a9
SHA2561e0f79f23ac9d745a8e9712ba9836c18194207bc2d184a47e73b196f06db8d42
SHA512be9ee10fb16aa5e1e5ad7f7af0d8e464d9e4a38aa7c0a1fe84ca619e425199cb6e5a6baf122837f1d502e04e96beb0bc69565b365abbf89a1183a9effd186dab
-
C:\Windows\SysWOW64\Kmnjhioc.exeFilesize
94KB
MD52b97831c7d620b744986b5f515037201
SHA1a414f07a577b14538f865df53aa797bf29d02750
SHA2569b19ed73676ccec495d22f2b08d0c9d6b25023664c468e7e3339660c1515e7a5
SHA51231f18fd4564636792ef7c13765721bbf63d79876acb72a140568f0e1a037d51f4ef372a7f150dbc94d9570b9e16e5f09fdaffbf9633ad9d36594804ed2f5f621
-
C:\Windows\SysWOW64\Kpjjod32.exeFilesize
94KB
MD57e3187e5ee9028f760dd5fce508013b0
SHA179d39e0ab418f4ab40dcbf2b7846c227bf1de440
SHA256b7eefd2a98e100b8c3c9f8fceeb717de3f887abb083a7f8ef08da185ac77b7e6
SHA512398a49b04414ee2d02ac0eccbede3a3b053a6c3d5b5af40f8db3a1d5f0834ef421b826bdf105337fd51771da6b1630734417e781305c1986fe3a9742d60de239
-
C:\Windows\SysWOW64\Kpmfddnf.exeFilesize
94KB
MD50267412c1bf40ad4e111d2fb6954a0a9
SHA192db9007c9b638d766cb4b4e4705a1d9c2ffb592
SHA256dc31370689a29b386c860443e0dc39a10f373756b1f299856710f9e1ed9b4b01
SHA51236cf48f21288ff9535f99c583fc93c9ea6c2bf99be05bdab8689161b125de6c6ea8a9c2fe27a258b53a602cf4c7ac8055e8edc0ddb2f034466778e8b52c7258c
-
C:\Windows\SysWOW64\Laefdf32.exeFilesize
94KB
MD51c48ffe808f40b53dd122593af8a4185
SHA16c82872967e75d56193274e0824e120f1f0c3220
SHA2562a2aaa8c5dfb8a331ca8c6d808f3ca143088818378fec30e4020c3a663e9f725
SHA5122198ab2af3fbdda49c61076ca7fd99c39b05021ad32049fc7b87f16dad2da1daa1901742e3fac76c331d7394e47c66aa868291364c51497124db8008a7340df7
-
C:\Windows\SysWOW64\Lalcng32.exeFilesize
94KB
MD504536f8fa4f84674ce37b5cf8f9f53a4
SHA1f568179dd86538a15c7af2ba0e6e0305dcc7b076
SHA25620072ee2d349b216ec486860b4e023bfaa742a9c336ede639289b7b4286e2d5d
SHA51287f5d0f20c2c4e7ca16555d0f09a826ef081047c76954af2fa6cc52eb5b692db83650163a4f5424ede8034ab762304d758b541657e9b24812723be1e48c231f6
-
C:\Windows\SysWOW64\Laopdgcg.exeFilesize
94KB
MD58cdaffee73a4ecae7fa3991975ab12e4
SHA14433ab2bd45c70d852278c4036f5bc12a67c047d
SHA256089306382a316895ce36746552f165b7e461c8ab7cc1a77de94f31cdca6ddee4
SHA512e530f5a09af35e8356511693f33c7e64cfd6016043422c093cbf80e6c61370a7ef50476adbaf96799bf01a7a5edbb79788a91ce52e91b2d286c49e3e14b36e0d
-
C:\Windows\SysWOW64\Ldmlpbbj.exeFilesize
94KB
MD58c0657dacd345cdd503b9a1c4ace62ea
SHA1b77eb34a9ca0b75872f1f74306d9dd3cc9174d5c
SHA25625d19db6153e85a1083eed1cc8a144b8337bd4f9530581baa74733ca69490763
SHA512013508fc55843f873e44b490ef88a529c3d5354fd31352cadbb9849872915a7418d4a47c66d80c8f81391c43a6d25d159bfb242a4f8d62a4aeb53a2066304866
-
C:\Windows\SysWOW64\Ldohebqh.exeFilesize
94KB
MD5daa7c745433fa96e082ddd976873ad32
SHA1ab55e09b903ebbdcba4136b2566e911ae38bb5b7
SHA256eaf096e4af7e1be46098da319d0e40a3f86689d4fb746edf35fbdf7a968d0baa
SHA512bfc88e4896dad5a0beef1ec9d5f76db94b22889cf000b431a90500a1d6122c221d3c7cceebd2b906751552b8ea358a67b4aefc55dc57d1d9be8430b454d3b408
-
C:\Windows\SysWOW64\Lgbnmm32.exeFilesize
94KB
MD5a55475659552e2d47bd8f0db5d813da5
SHA19c3b6678e397f526ad64e8b4a0c70bfec7784f4e
SHA2560f316a7e641a084c2c3d08255a2a9f13b4f4c3267a5b802a7451a751e5087203
SHA512ebab5d5a4202bf1fbd5559d0b1dc69564acdab8c5558d1e5c0e750e9af277e3e5b3d4458e67924b87324a964256d4fbb2f53861db0cddf8c3f98c557f242bd74
-
C:\Windows\SysWOW64\Lgikfn32.exeFilesize
94KB
MD514e46016f1b0e004cfc19484cc334cae
SHA10155537e07861b7088ca27bdf439c90794ea7962
SHA2562b71f962acf277acf50266977b9ca46c6573260c4860080fa7f077c1bab74277
SHA5122bf1e014e27afd348131bfa728f67eeedd35c05791831275f4cc568b52d0d0ef0350c4f9124fd7a8a7871955c9bfab6dfe08b3483a24aa37610ee050409d6949
-
C:\Windows\SysWOW64\Liekmj32.exeFilesize
94KB
MD5bc0c887b1923ce41d42c90aec4a86bda
SHA14dd77ed5a58b83889cc053c74595e453fd36a1cd
SHA256e61780144807e9cdd30b70cbe43d0293e0a1ac43487c48e0a1e47789f43895b8
SHA51296faabf2d5eb25f3576765a4765054519781a7303610ab3f457295b85e8316bd88871b2405e0c18f43dc123e4fc7ec72ed18d581a998a25333c8711449b9a913
-
C:\Windows\SysWOW64\Ljnnch32.exeFilesize
94KB
MD5d5f2743a7856e5e863c019caaddd4a76
SHA1dfb558b7377df3d7f3c59973dee99b05061ee39b
SHA256c0b767be3cb37bf69c4d6e64bce82ad0544f0c219831c1d0bcc3e198cdda7fa1
SHA5127b19bde26fbb83a01017747f78ac371e2666ae0023aa8c6e7a1a3a0dc861ba443b10627f6ace9e14993f9d1d66ba3647ee83b5f7fa68767dbef0ef05dc547146
-
C:\Windows\SysWOW64\Lkgdml32.exeFilesize
94KB
MD5ee1260de5d303de6c5855d7fc38eae2a
SHA1dac6bd01c0f14df0389000359f5630937282b92c
SHA25694a4c2f28505652e94ba155d8d015aeb9fcf6002bc69a99bcbbcf9c05dc4db48
SHA5128c26ccd73bb40260ce0c229c8d2ac8119d8166e78cde536c756d6b9b000cf382d666f19007492af7d6a7a99c0e50f0b62187659041f3c31e82c3beed4cbb2f8e
-
C:\Windows\SysWOW64\Lnepih32.exeFilesize
94KB
MD59dc015ddfe0a317d4546bcb9043177b9
SHA1774e8b0f2125ea1af9274d6510cdb48b0b07d744
SHA256af73d6331f9c87a8191eef9b503cd27da82cee656fdbcce62fb7c04fbe2e4bca
SHA512399ec6fd51146597522b54fa6df8449da5cbc377acf527c17d7daca19ba4fb472f2c0f48547183390d2272572f0f36f792087c56bfc69815b3ec7f28e856bb35
-
C:\Windows\SysWOW64\Lpfijcfl.exeFilesize
94KB
MD531ff570de390683282fd3b923fd0ed37
SHA1e4a0d9df8458d1f8fb85cad4b5cac95a09b8526c
SHA256c3190c074f5b085a30006848716cd29197b56aaad51585e58b47ee0f3cc7344d
SHA512681addb90080f2aab3853a09eafd3366920e0f8653531ba8d12c2ac5264424e07ad6ce52351a0b4b302f1c592b1bb966f7b0eeee5a89af8ae802cb0211c1c23e
-
C:\Windows\SysWOW64\Mdfofakp.exeFilesize
94KB
MD56ff3e85cd51ea71bf57e48910e12ef7b
SHA1a6eeb63f3a9cc732ebc3bf3a4ff0becc683cd36e
SHA2568fabafdfcd0463535fb5d95ecdcbd49c38949aaa7b4c216366e9604020ced082
SHA5120ea9944d9b519fe626f6b294c84fc3d59e55e498821adfb081ec92521b126d76cb193ecb8321748440170b3cb38bd016c8f493b8d58054cd1321d454aa9bd14b
-
C:\Windows\SysWOW64\Mjqjih32.exeFilesize
94KB
MD5df6670cd516c5e674fa112d091dc5ac6
SHA1a28acb374bbc0e2084339b5cb1ef4bf4a503c72f
SHA256a047dd7a3b14abbb04cc3a21780fe6645b385e772eb3db923cc487da46831498
SHA5124a2d73e639a438fcca9973ecd45d4787f003699469aac3ab126af1f6c9f0bf6f5ceffd4a9485aa1263bcbcd9bc5a11eb10473211f71feca698f2758579af0b98
-
memory/232-249-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/232-321-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/388-292-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/596-116-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/596-32-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/744-274-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/744-342-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/848-174-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/856-362-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/856-428-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1140-108-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1140-25-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1288-165-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1752-339-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1752-265-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1788-386-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1824-305-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1876-353-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1876-414-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1880-286-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1888-53-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1924-118-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1924-210-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1944-65-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1944-150-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1976-430-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1976-429-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2056-407-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2056-343-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2084-178-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2084-91-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2172-196-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2172-109-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2176-241-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2176-318-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2256-421-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2256-355-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2280-398-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2280-332-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2400-46-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2812-409-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2812-433-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2820-220-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3228-361-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3228-294-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3304-273-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3304-188-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3372-142-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3372-56-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3408-73-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3408-0-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3408-5-0x0000000000431000-0x0000000000432000-memory.dmpFilesize
4KB
-
memory/3460-387-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3460-322-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3480-143-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3480-231-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3628-401-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3628-434-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3696-378-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3696-308-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3708-179-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3708-264-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3828-197-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3828-285-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3856-341-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3860-82-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3860-173-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4112-151-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4112-239-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4180-219-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4180-126-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4316-307-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4316-232-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4328-138-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4336-211-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4376-399-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4416-222-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4416-304-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4460-319-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4464-379-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4468-187-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4468-100-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4720-8-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4720-90-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4836-388-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4848-98-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4848-16-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4856-331-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4856-257-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4884-372-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4948-415-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4948-432-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4960-74-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4960-164-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/5024-422-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/5024-431-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB