Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 21:15

General

  • Target

    0453bff7515d0f1c4936ccc7457ff6f03e109def2023f5e88c56db7f3e00a22f_NeikiAnalytics.exe

  • Size

    96KB

  • MD5

    217348ae85027174b97573b6d90a2c40

  • SHA1

    cbb141c2cba15e7abfcbd0e0192842330365b7f9

  • SHA256

    0453bff7515d0f1c4936ccc7457ff6f03e109def2023f5e88c56db7f3e00a22f

  • SHA512

    27d880266959627b1d4d2287123782d80fd10ad95db8da26bd78a005c84a49b9824edc710338d9fd001a91f6846cb8921e680b64f9d188a52e42b7828322353a

  • SSDEEP

    1536:bsLx75s0OyGeqm6/TFOzmOOm4fMpSsbcoXlxzzM2tH74S7V+5pUMv84WMRw8Dkqq:bE5/LGeqNOzjOQSqTVtMib4Sp+7H7wWO

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0453bff7515d0f1c4936ccc7457ff6f03e109def2023f5e88c56db7f3e00a22f_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0453bff7515d0f1c4936ccc7457ff6f03e109def2023f5e88c56db7f3e00a22f_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\Kmjqmi32.exe
      C:\Windows\system32\Kmjqmi32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\Kphmie32.exe
        C:\Windows\system32\Kphmie32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\SysWOW64\Kbfiep32.exe
          C:\Windows\system32\Kbfiep32.exe
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\Kgbefoji.exe
            C:\Windows\system32\Kgbefoji.exe
            5⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4160
            • C:\Windows\SysWOW64\Kknafn32.exe
              C:\Windows\system32\Kknafn32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4172
              • C:\Windows\SysWOW64\Kmlnbi32.exe
                C:\Windows\system32\Kmlnbi32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2996
                • C:\Windows\SysWOW64\Kagichjo.exe
                  C:\Windows\system32\Kagichjo.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:2656
                  • C:\Windows\SysWOW64\Kpjjod32.exe
                    C:\Windows\system32\Kpjjod32.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4864
                    • C:\Windows\SysWOW64\Kcifkp32.exe
                      C:\Windows\system32\Kcifkp32.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3376
                      • C:\Windows\SysWOW64\Kgdbkohf.exe
                        C:\Windows\system32\Kgdbkohf.exe
                        11⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:5096
                        • C:\Windows\SysWOW64\Kibnhjgj.exe
                          C:\Windows\system32\Kibnhjgj.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1500
                          • C:\Windows\SysWOW64\Kmnjhioc.exe
                            C:\Windows\system32\Kmnjhioc.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2116
                            • C:\Windows\SysWOW64\Kajfig32.exe
                              C:\Windows\system32\Kajfig32.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of WriteProcessMemory
                              PID:4844
                              • C:\Windows\SysWOW64\Kpmfddnf.exe
                                C:\Windows\system32\Kpmfddnf.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:1892
                                • C:\Windows\SysWOW64\Kckbqpnj.exe
                                  C:\Windows\system32\Kckbqpnj.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:2288
                                  • C:\Windows\SysWOW64\Kgfoan32.exe
                                    C:\Windows\system32\Kgfoan32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of WriteProcessMemory
                                    PID:3152
                                    • C:\Windows\SysWOW64\Liekmj32.exe
                                      C:\Windows\system32\Liekmj32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:1436
                                      • C:\Windows\SysWOW64\Lmqgnhmp.exe
                                        C:\Windows\system32\Lmqgnhmp.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:2440
                                        • C:\Windows\SysWOW64\Lalcng32.exe
                                          C:\Windows\system32\Lalcng32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4856
                                          • C:\Windows\SysWOW64\Ldkojb32.exe
                                            C:\Windows\system32\Ldkojb32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:1460
                                            • C:\Windows\SysWOW64\Lcmofolg.exe
                                              C:\Windows\system32\Lcmofolg.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:3972
                                              • C:\Windows\SysWOW64\Lkdggmlj.exe
                                                C:\Windows\system32\Lkdggmlj.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:1816
                                                • C:\Windows\SysWOW64\Liggbi32.exe
                                                  C:\Windows\system32\Liggbi32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:3916
                                                  • C:\Windows\SysWOW64\Laopdgcg.exe
                                                    C:\Windows\system32\Laopdgcg.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    PID:948
                                                    • C:\Windows\SysWOW64\Lpappc32.exe
                                                      C:\Windows\system32\Lpappc32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:408
                                                      • C:\Windows\SysWOW64\Lcpllo32.exe
                                                        C:\Windows\system32\Lcpllo32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:1236
                                                        • C:\Windows\SysWOW64\Lkgdml32.exe
                                                          C:\Windows\system32\Lkgdml32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          PID:4440
                                                          • C:\Windows\SysWOW64\Lijdhiaa.exe
                                                            C:\Windows\system32\Lijdhiaa.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            PID:2732
                                                            • C:\Windows\SysWOW64\Laalifad.exe
                                                              C:\Windows\system32\Laalifad.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              PID:336
                                                              • C:\Windows\SysWOW64\Lpcmec32.exe
                                                                C:\Windows\system32\Lpcmec32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:3244
                                                                • C:\Windows\SysWOW64\Lcbiao32.exe
                                                                  C:\Windows\system32\Lcbiao32.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:2456
                                                                  • C:\Windows\SysWOW64\Lgneampk.exe
                                                                    C:\Windows\system32\Lgneampk.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:4876
                                                                    • C:\Windows\SysWOW64\Lkiqbl32.exe
                                                                      C:\Windows\system32\Lkiqbl32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:972
                                                                      • C:\Windows\SysWOW64\Lnhmng32.exe
                                                                        C:\Windows\system32\Lnhmng32.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:4436
                                                                        • C:\Windows\SysWOW64\Laciofpa.exe
                                                                          C:\Windows\system32\Laciofpa.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:3348
                                                                          • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                            C:\Windows\system32\Ldaeka32.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:5064
                                                                            • C:\Windows\SysWOW64\Lcdegnep.exe
                                                                              C:\Windows\system32\Lcdegnep.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              PID:4528
                                                                              • C:\Windows\SysWOW64\Lklnhlfb.exe
                                                                                C:\Windows\system32\Lklnhlfb.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:3860
                                                                                • C:\Windows\SysWOW64\Ljnnch32.exe
                                                                                  C:\Windows\system32\Ljnnch32.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:2296
                                                                                  • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                                                    C:\Windows\system32\Lnjjdgee.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    PID:4368
                                                                                    • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                                      C:\Windows\system32\Lddbqa32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:848
                                                                                      • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                                        C:\Windows\system32\Mjqjih32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        PID:4300
                                                                                        • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                          C:\Windows\system32\Mnlfigcc.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          PID:212
                                                                                          • C:\Windows\SysWOW64\Mahbje32.exe
                                                                                            C:\Windows\system32\Mahbje32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            PID:3760
                                                                                            • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                                              C:\Windows\system32\Mpkbebbf.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:4728
                                                                                              • C:\Windows\SysWOW64\Mciobn32.exe
                                                                                                C:\Windows\system32\Mciobn32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:216
                                                                                                • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                                  C:\Windows\system32\Mgekbljc.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4324
                                                                                                  • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                                    C:\Windows\system32\Mkpgck32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:2720
                                                                                                    • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                                      C:\Windows\system32\Mjcgohig.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:540
                                                                                                      • C:\Windows\SysWOW64\Majopeii.exe
                                                                                                        C:\Windows\system32\Majopeii.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:2236
                                                                                                        • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                                          C:\Windows\system32\Mpmokb32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:4552
                                                                                                          • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                                            C:\Windows\system32\Mdiklqhm.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:1220
                                                                                                            • C:\Windows\SysWOW64\Mcklgm32.exe
                                                                                                              C:\Windows\system32\Mcklgm32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:1548
                                                                                                              • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                                                C:\Windows\system32\Mgghhlhq.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:2160
                                                                                                                • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                                  C:\Windows\system32\Mkbchk32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4696
                                                                                                                  • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                                    C:\Windows\system32\Mnapdf32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:1560
                                                                                                                    • C:\Windows\SysWOW64\Mamleegg.exe
                                                                                                                      C:\Windows\system32\Mamleegg.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:2104
                                                                                                                      • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                                        C:\Windows\system32\Mdkhapfj.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:4976
                                                                                                                        • C:\Windows\SysWOW64\Mcnhmm32.exe
                                                                                                                          C:\Windows\system32\Mcnhmm32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:2396
                                                                                                                          • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                                            C:\Windows\system32\Mgidml32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1360
                                                                                                                            • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                                              C:\Windows\system32\Mjhqjg32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:1472
                                                                                                                              • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                                                                C:\Windows\system32\Mncmjfmk.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3640
                                                                                                                                • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                                  C:\Windows\system32\Maohkd32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:1844
                                                                                                                                  • C:\Windows\SysWOW64\Mdmegp32.exe
                                                                                                                                    C:\Windows\system32\Mdmegp32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:4216
                                                                                                                                    • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                                                      C:\Windows\system32\Mcpebmkb.exe
                                                                                                                                      66⤵
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4332
                                                                                                                                      • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                                        C:\Windows\system32\Mkgmcjld.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:3048
                                                                                                                                        • C:\Windows\SysWOW64\Mjjmog32.exe
                                                                                                                                          C:\Windows\system32\Mjjmog32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          PID:1928
                                                                                                                                          • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                                            C:\Windows\system32\Mnfipekh.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:4828
                                                                                                                                            • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                                              C:\Windows\system32\Mpdelajl.exe
                                                                                                                                              70⤵
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:628
                                                                                                                                              • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                                                                C:\Windows\system32\Mdpalp32.exe
                                                                                                                                                71⤵
                                                                                                                                                  PID:828
                                                                                                                                                  • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                                                                    C:\Windows\system32\Mgnnhk32.exe
                                                                                                                                                    72⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:4232
                                                                                                                                                    • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                                                      C:\Windows\system32\Nkjjij32.exe
                                                                                                                                                      73⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:3444
                                                                                                                                                      • C:\Windows\SysWOW64\Njljefql.exe
                                                                                                                                                        C:\Windows\system32\Njljefql.exe
                                                                                                                                                        74⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        PID:4280
                                                                                                                                                        • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                                                                          C:\Windows\system32\Nacbfdao.exe
                                                                                                                                                          75⤵
                                                                                                                                                            PID:1988
                                                                                                                                                            • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                                                              C:\Windows\system32\Nqfbaq32.exe
                                                                                                                                                              76⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:1208
                                                                                                                                                              • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                                                                                C:\Windows\system32\Ndbnboqb.exe
                                                                                                                                                                77⤵
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:440
                                                                                                                                                                • C:\Windows\SysWOW64\Ngpjnkpf.exe
                                                                                                                                                                  C:\Windows\system32\Ngpjnkpf.exe
                                                                                                                                                                  78⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:2020
                                                                                                                                                                  • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                                                                    C:\Windows\system32\Nklfoi32.exe
                                                                                                                                                                    79⤵
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:2096
                                                                                                                                                                    • C:\Windows\SysWOW64\Nnjbke32.exe
                                                                                                                                                                      C:\Windows\system32\Nnjbke32.exe
                                                                                                                                                                      80⤵
                                                                                                                                                                        PID:3828
                                                                                                                                                                        • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                                                          C:\Windows\system32\Nafokcol.exe
                                                                                                                                                                          81⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:3588
                                                                                                                                                                          • C:\Windows\SysWOW64\Nqiogp32.exe
                                                                                                                                                                            C:\Windows\system32\Nqiogp32.exe
                                                                                                                                                                            82⤵
                                                                                                                                                                              PID:3892
                                                                                                                                                                              • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                                                                                C:\Windows\system32\Ncgkcl32.exe
                                                                                                                                                                                83⤵
                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:800
                                                                                                                                                                                • C:\Windows\SysWOW64\Nkncdifl.exe
                                                                                                                                                                                  C:\Windows\system32\Nkncdifl.exe
                                                                                                                                                                                  84⤵
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:4024
                                                                                                                                                                                  • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                                                                                    C:\Windows\system32\Nnmopdep.exe
                                                                                                                                                                                    85⤵
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:1612
                                                                                                                                                                                    • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                                                                                      C:\Windows\system32\Nbhkac32.exe
                                                                                                                                                                                      86⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:4612
                                                                                                                                                                                      • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                                                                        C:\Windows\system32\Ncihikcg.exe
                                                                                                                                                                                        87⤵
                                                                                                                                                                                          PID:3668
                                                                                                                                                                                          • C:\Windows\SysWOW64\Ngedij32.exe
                                                                                                                                                                                            C:\Windows\system32\Ngedij32.exe
                                                                                                                                                                                            88⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5004
                                                                                                                                                                                            • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                                                                              C:\Windows\system32\Njcpee32.exe
                                                                                                                                                                                              89⤵
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:3404
                                                                                                                                                                                              • C:\Windows\SysWOW64\Nnolfdcn.exe
                                                                                                                                                                                                C:\Windows\system32\Nnolfdcn.exe
                                                                                                                                                                                                90⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:4476
                                                                                                                                                                                                • C:\Windows\SysWOW64\Nqmhbpba.exe
                                                                                                                                                                                                  C:\Windows\system32\Nqmhbpba.exe
                                                                                                                                                                                                  91⤵
                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:1544
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                                                                    C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                                                                    92⤵
                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                    PID:1508
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                                                                                      C:\Windows\system32\Ncldnkae.exe
                                                                                                                                                                                                      93⤵
                                                                                                                                                                                                        PID:4492
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Nggqoj32.exe
                                                                                                                                                                                                          C:\Windows\system32\Nggqoj32.exe
                                                                                                                                                                                                          94⤵
                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          PID:2404
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                                                                            C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                                                                            95⤵
                                                                                                                                                                                                              PID:4004
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 412
                                                                                                                                                                                                                96⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:4236
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4004 -ip 4004
                  1⤵
                    PID:3012

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Windows\SysWOW64\Ihaoimoh.dll

                    Filesize

                    7KB

                    MD5

                    8a444c641b065a7547ee9a1b6abe2eef

                    SHA1

                    457163e90ce0bf1bdee827ce9cfaabf5a4437560

                    SHA256

                    5fd00e771a9ed557499d6af2fd265ba47cd1c75a5cd575d5e9789b90c55a8c4c

                    SHA512

                    d2bcba8e9ad191687820e496b873498af66d5546963469a166057bb9cb267317f67f8f9e944aab285bf40d5fc8219e1aac51403c4b1084afaaec07ea7a2601cf

                  • C:\Windows\SysWOW64\Kagichjo.exe

                    Filesize

                    96KB

                    MD5

                    bce00fdfb3d5e546b6436a356478b07e

                    SHA1

                    77079d00d9b04779adedd37edf6edfb5a17a6583

                    SHA256

                    b279451d8b3c0d3ac3a705f7a77ecf13441018e99ce6ab31421711997b526799

                    SHA512

                    b4ef689492c899fad99ceeb1b2202fee4acfdc5afba06ab57c3bc9695df5d5566f1b27af80d1e1804427ba4528d7ac549e7dc88025f807f01157696f52d94278

                  • C:\Windows\SysWOW64\Kajfig32.exe

                    Filesize

                    96KB

                    MD5

                    2462271c3cb938af51978b2c0d14993b

                    SHA1

                    a11334d6108b7115b6d52be27e71c76be280015e

                    SHA256

                    0cfc5045cd9211cecce4e4159ccd7519f1deef764a1278a205f32566a75946f9

                    SHA512

                    c2377bc3826cc2a3b6d2e933542e18b95038ac693a3a6d4fb740ad91901eb4abf907ab0c6d6db1da1529a85ed207303e59ae51c466dfc4dfd87919128254d8b7

                  • C:\Windows\SysWOW64\Kbfiep32.exe

                    Filesize

                    96KB

                    MD5

                    566522f2a1e6f3d5447c619995133227

                    SHA1

                    4d8fa9b12312b38d221f4100d221f9d51e5209db

                    SHA256

                    6a011245a47df2e1a13556d3c84a8a17f5df3e48437cb4f3cdc424d64184ccd5

                    SHA512

                    d8f9b063cd69f804a7e53d8257810749e7d1d4c280c7286e17b468b254cfec78e314484a7e94822d225cc49f060f8bfa0d2a419fe17722fd0b935f3a380300b9

                  • C:\Windows\SysWOW64\Kcifkp32.exe

                    Filesize

                    96KB

                    MD5

                    f13d05355eab98a8698a6ccfd14cc364

                    SHA1

                    6f6b09daaf639577c4c28cd0c63ae3d4fd425519

                    SHA256

                    169ab387c4b7e514406d864d2e235e10da8c0ea536e5bf35f97c6be55b053787

                    SHA512

                    a77d18d30cc6d0de21e9346c5b09385777bd89af4376dcbdc84c4bea0a209207912081df4fff040c04a921a569527d4da76b375273d16bc1b9efae69da8bb766

                  • C:\Windows\SysWOW64\Kckbqpnj.exe

                    Filesize

                    96KB

                    MD5

                    9f7119ffc9f85ec57d126226d2d1c668

                    SHA1

                    9a346bbfc987f066187e57f9a26de0514edbddd5

                    SHA256

                    c7f8cc3f021569738348985db3b794edee8a9a7828eadaea5fa2b206589e48bb

                    SHA512

                    ae75e9c9e4118d6ab705035b516c59b2052f9e36c3d79ec34ef07503607ca7935013bfc7fe8b6a05e434d9481c196c31f8a8bc96a048065ca6d208a3280af0f9

                  • C:\Windows\SysWOW64\Kgbefoji.exe

                    Filesize

                    96KB

                    MD5

                    e2c68cf74fa7a73f7035cdd2c0294bdc

                    SHA1

                    bc41e73001cb5037745d07f14ae522ff71dc5dfa

                    SHA256

                    1f0d127cbf5897163426f9c12c23f5e803391ecfdbec6e69a74cd4e394add9e0

                    SHA512

                    81123af8a53bef6e30f086d2c54edf7b3d0bca8f886459ce4c04d7674bacbc7f7957ffdb0deb7a1da91aa91a0e1c1c2dd257b814413b17d9b4cf6e2bc2af067f

                  • C:\Windows\SysWOW64\Kgdbkohf.exe

                    Filesize

                    96KB

                    MD5

                    1352c8b9a299f44b76313c21e741edaa

                    SHA1

                    b94d23a80d55b31720ad48f54562d70039b2eb9e

                    SHA256

                    0bd1cb68eb455576405c1c00571ddf49515b5bd281993f572d6f1490983d8fe5

                    SHA512

                    9cf37d5c0d837ad59e8c135d6625df71da5a07c4dcec48df3579db57dabb126322500d936724911e7bcce7dfd4caddc470e2526e118a75a069bafe10e4581f69

                  • C:\Windows\SysWOW64\Kgfoan32.exe

                    Filesize

                    96KB

                    MD5

                    4b0745ec220be28b328517d0b4c3870f

                    SHA1

                    974c3588fcfcd3f080f30da62edc8dccb412518f

                    SHA256

                    998d4ff5c99a37e64a4f090f1b90949dda23d39f756ddc1872b00d36399991b4

                    SHA512

                    d9a6c78b26c48260e334a19af3b368bccaaedfe60147ae1173caef76666c432a257862a255ba6b874f9fb66fe7d819764e2596c0e409467dfbc7e9a3e1e1bfe0

                  • C:\Windows\SysWOW64\Kibnhjgj.exe

                    Filesize

                    96KB

                    MD5

                    a031f5f0f0b063d3ddccfebd6d4f98c6

                    SHA1

                    309d4432d3906c7837a629e4d3183a01cf2ab682

                    SHA256

                    195c80c7bd67d6a653afccc63ff5207a5bb8da396ea2ee67ef45bbf10367a79c

                    SHA512

                    99e24cb0d3614daac6cdf0feec5ceccf42e6ae78dddbf7a73e81ad76a9272f2f4c2c4189b4f12239f4015a2418db49bff6d4eb9bdb1e9224057b6d12313ae346

                  • C:\Windows\SysWOW64\Kknafn32.exe

                    Filesize

                    96KB

                    MD5

                    8764cb18b8409963542e664579b8fd4b

                    SHA1

                    154fb81e17bf3a382158b93cb3d89f93a68aad45

                    SHA256

                    42b57f1df6802d4f8922a49d0219ff14bd0e2d050d1f98507e520f850dc48123

                    SHA512

                    69a1a372cec93b82af816e22104f3f75038ebb2a511f2b57f300405d38ce8dfd81a9b0eefd5313c325493356a33c38cb60ee990d67e5d775c656a66fdc94c977

                  • C:\Windows\SysWOW64\Kmjqmi32.exe

                    Filesize

                    96KB

                    MD5

                    50c36b09f6de13d41000884e87bf1ad0

                    SHA1

                    dfd591472f6ea0458dcf3205c90ef8fb0ed28bd7

                    SHA256

                    0c5b3023c60341960241faf89bd56d370f3a8d106aa2b5c30949bcd68f427b10

                    SHA512

                    dd3dd35f8b2eb8a945ea8e00f5e4b536f8c5496011285d3a46807ee0f0cdf0790a0382b1cb92304d349c552a79242723695b9d971c0be8ec58335d77e8dd6a37

                  • C:\Windows\SysWOW64\Kmlnbi32.exe

                    Filesize

                    96KB

                    MD5

                    c1db54514016141530bb9d086242b5a5

                    SHA1

                    96e18592955ee2f98c37d0bebe7d9e531895b18d

                    SHA256

                    c7653a04271cf4269dfd9b77741b2191181daf83e34a2b56ff1892d77597221e

                    SHA512

                    52352a11890c406b83540ad91357562e9f062d66f81f4a394d148f854b85406028fbfa29d9dba9a8242e6d8679bce3cb2653f5b4261aadf49b31557bbeaa33c5

                  • C:\Windows\SysWOW64\Kmnjhioc.exe

                    Filesize

                    96KB

                    MD5

                    0d3426021cd19a4def2bf9772411b9b6

                    SHA1

                    6aa4b0691994bb29ec3fb99cc5d579ac200ed39c

                    SHA256

                    ce093ebc405d2bc6d03b5490dadaa3c893723c099e87a8d2fe531f0df59e082c

                    SHA512

                    2e9a2e15c01af3a1ebda420481f256e7ad19d304e2bb0cd4a5a752b75db6a5eee73a075aa96ff7cd4172aa58382c8984e95fe06761c31901dd3ca201549ecd52

                  • C:\Windows\SysWOW64\Kphmie32.exe

                    Filesize

                    96KB

                    MD5

                    5db3fc07aaeab6d7e2bc2e0af60a03ac

                    SHA1

                    2d90f758eb91679dd604693e6d0671f11eda8ec1

                    SHA256

                    4b63622b760d1bfe013023c97095293bfcd623a073ee42082a42aa890cf65d20

                    SHA512

                    8e9bde743684d497bbe3e147d1f0a107e801e29f617321fa21ae9359ffa5526628893f0f8128c9906244e7c620eabe4b477334fbb6bfa96eb915f1b6b7e5124a

                  • C:\Windows\SysWOW64\Kpjjod32.exe

                    Filesize

                    96KB

                    MD5

                    4a9caebd46e962d9fdceb74be5a6f9d7

                    SHA1

                    8af481d1702a5befb058d19ace90bc5b3d1120fb

                    SHA256

                    5575246e93605032feca0801f9efce1ac997e64fb129f9418cef192323bc3a0c

                    SHA512

                    ad55d7cd074164cca9cb4b68a09bcc6590eb4838a4cd5be9f440f9fe55eb00f158fa8cac71f35e96e47db6d0f28df569bd9a99550d9788cb16494b18f0fc284a

                  • C:\Windows\SysWOW64\Kpmfddnf.exe

                    Filesize

                    96KB

                    MD5

                    863a8a30ed6c44980f0259863835b092

                    SHA1

                    60ab637105520a444048a304e1004e6ce4ad1fae

                    SHA256

                    e2d467220cd8b09346b22b9dadc548e65bcd04a57354cd82c9b5ebea63a70ba6

                    SHA512

                    209541a7acb28c4dde565375a1ba6fb6c4a6e362debba1195130ddf1a18187b16ecc433eb027c7a7a507649d4bfc25018f9a6272d71d4c43e96bc7eef4028f47

                  • C:\Windows\SysWOW64\Laalifad.exe

                    Filesize

                    96KB

                    MD5

                    4de7b8ffddbdfa58f7dfdc543d9517d1

                    SHA1

                    03fc8c21307eb4a53d88aeb880adb681f9470b8c

                    SHA256

                    f7ee8b98be827828c8f290afaba8199b147f7a1765d43774715fa4cfd2a65909

                    SHA512

                    a7d8af295b5d8467bece7ce067d32591ae190b5047427c59420ed3af0f7956b2092bb05a10876da9382dca0ce935011a8a4ab69458a5871cddb9ad36b8fe3525

                  • C:\Windows\SysWOW64\Lalcng32.exe

                    Filesize

                    96KB

                    MD5

                    c75455c5e8673df1c646facc79db4305

                    SHA1

                    4a8eaf1a16136e954a828f84cbd522b4754ebe55

                    SHA256

                    7911e4b2f4294d138d60e67550f4bac37c757b32c413fc9cbd04dedbcd070a50

                    SHA512

                    3a386a8b04c993ad337185abe00870e08fa9c6ee94f3f88d7cf67bd8e2afefe4873fd761133bd185a78bab5c1d68370656cb6098a7623a6e00772d4b05f7b2db

                  • C:\Windows\SysWOW64\Laopdgcg.exe

                    Filesize

                    96KB

                    MD5

                    4cb4cefa22bf4aa964d8f1e2a07a0605

                    SHA1

                    a30651bdb9802016b5ac3a8bb8504b5f4ce4df01

                    SHA256

                    18c37f1c6f3002925d461b247e9133404dc255dd93e069cdc010b5fbe7f0cd70

                    SHA512

                    62bce106595d493fb48ebcc8631a728082519c14b39334c7542ece7edef74fbfab2e10f6c09143f44e6a044c6eef015b695c64806b35163568c5d2e7392ed89d

                  • C:\Windows\SysWOW64\Lcbiao32.exe

                    Filesize

                    96KB

                    MD5

                    4339fee2c16fb47d818fa21787de3181

                    SHA1

                    633b1bf0cc3dbd581e38c42b5d3f4d95a8fb8c3e

                    SHA256

                    210df672200b5926e98a87b0f339e2a914fb08dc45667572e077f8544cc5682f

                    SHA512

                    2bcac64f59942859f510e1d8616b6208f20ab9ad1334cb8be77a2156e5662702027e8bbc9279c273ded0b8cf4ca5c02fdd5a2d3908b6510b0a42a37b7aa0b5c1

                  • C:\Windows\SysWOW64\Lcmofolg.exe

                    Filesize

                    96KB

                    MD5

                    3280a7d0920ccc28a5dd8b76b4487416

                    SHA1

                    482ab38dbfffbf274e90180df850a7b9ead58fe6

                    SHA256

                    37ea99b15b730875d27a5ab7ba53d25f5d390c9b8db7ee5eb357ef1c8e1f5fc5

                    SHA512

                    2379d7e3408dcf3be044bce5b86ca43033b9f04a5b3f57ba07aec4c2be70a80ea7b7e2ff8c51a3457ca163e4939b65aeb97e7cf40295a9b4a25ba8e3db195142

                  • C:\Windows\SysWOW64\Lcpllo32.exe

                    Filesize

                    96KB

                    MD5

                    cdf26a57e04b47dd21fc46b912bc4259

                    SHA1

                    a9584e1d5eae2ba2e279d18671abb857c2e9c4f7

                    SHA256

                    bf40c9d79d7b66dd012a19ae0c9352b429980a1d8e374de531a0af81a9ea4012

                    SHA512

                    cc87780281d8c7f0300345fe96b758c9ae0815b549a5d67e97bd4d0e94bbc9755f9c17ee7b72610ea169564d427f99dc1e03338f2a31c057893129748bd1bfdb

                  • C:\Windows\SysWOW64\Ldkojb32.exe

                    Filesize

                    96KB

                    MD5

                    1fb65ada91d86db9ed5c7f3e1050e376

                    SHA1

                    2388114faa2bcda26a00e3bccea620f70b690347

                    SHA256

                    adcc983e1508ce9305a9ee163a6d5e1cc5136d543ff31a214692f22729a93f8f

                    SHA512

                    83953bc2f721abe7b9f7225f720e3a8af2004c6cf7376477126bd571692618925b24d01f1e526bce3c37fd2de8bb39367a58bc486e65ffa26cab2b5922f37c11

                  • C:\Windows\SysWOW64\Ldkojb32.exe

                    Filesize

                    96KB

                    MD5

                    e0646814e9901073c4f472ff95b129be

                    SHA1

                    04d45233d99322978626b699829a4787e01df3f9

                    SHA256

                    451d118bd0f7a1db4f74fb9b8959b9896086f188097f5036ee280e8664d31ece

                    SHA512

                    0b359747b1932a054b72a9f3b510ee409a921571d91cfe3a9b3de4ea9aa6407666334604dde861165bf416b0e8cc6230f09e30db35b54065d97a9d736cef24e4

                  • C:\Windows\SysWOW64\Lgneampk.exe

                    Filesize

                    96KB

                    MD5

                    f6b042bbebe2dafdafc021842917f0cb

                    SHA1

                    0964cb229ee19389b3a45e4054b4885a1f053971

                    SHA256

                    26a39c2b05359b937414b4ed089c4936f1b2124f82a5133963c3bb1e26a8e46d

                    SHA512

                    8ed1f42c44e6f0fec96814bc4c20df9a5b3971ce6411a509a5fb599c82d3898c5004e3b20eec2f24d3bba17c995f40bca52da4bff55eeaf474f8e7bf2fb8a1f1

                  • C:\Windows\SysWOW64\Lgneampk.exe

                    Filesize

                    96KB

                    MD5

                    bd30786cb331a5a7b3b2914db06ff869

                    SHA1

                    e75cb09fdd5b03936cbdc663608709ce041aa373

                    SHA256

                    671261a97dc811bc0c47a37b70f56cb3696e16e2e8c9ce04bec1e76e6118b2e0

                    SHA512

                    440c1c84cf4588f2594e226cb6cd78bfb3ef6b177b5b62b4248939630f21765105102278bf94c974d624754e9d17aa2efdc74c4dfaf5ac2c70f16cd119269749

                  • C:\Windows\SysWOW64\Liekmj32.exe

                    Filesize

                    96KB

                    MD5

                    94d99e7bad294007aca5bf1591cf81de

                    SHA1

                    05614a8a598a4e84df608fa5612c0c7fef3dd6e7

                    SHA256

                    721e30c09451d21d9186067ba2b862e6e5f4e2de428dd2f17a0817a41bcfb6fb

                    SHA512

                    0decfe32de4de03f7b6c53738d2e9e1ae60a522bce56853b36c1b35eded7c107eda437f9230960319e14d474ad895bd19b233cf3b70c21e9895ded8161c61465

                  • C:\Windows\SysWOW64\Liggbi32.exe

                    Filesize

                    96KB

                    MD5

                    4605424570465e9ee0cb479eef00ed45

                    SHA1

                    b1744ab3ea1847d64a8302ee5e6bf05e26e8f796

                    SHA256

                    54f7d66042d75b381cd6bd36e1eddd99f0758b39a16b357afa830a0b332a0ed7

                    SHA512

                    ea3afc1771fe5f1629cb2e7722b351847e27da05dd53c8aaf8fd81c4b5f3172ed7f5d23b98f3381e5dd489bf97dace821002fba61d1ac809fada119eea7dc38e

                  • C:\Windows\SysWOW64\Lijdhiaa.exe

                    Filesize

                    96KB

                    MD5

                    f0d14586f131265dee60ce904452e87b

                    SHA1

                    a8d0e67da97e53d4257ef23200a5662b5724e4e0

                    SHA256

                    9779b3f9c33989a8a06a50b6591dbdbb4039e2d3ab93834983a504e7a01e8e99

                    SHA512

                    0813350e3bb3a8f0372c7a96fdce409c1f26fc15a20feab8b96befcc3dd1ad0919b09cec2ee56ba9c8f158bc99fefd10b51cb5a6c156c4b6cd0436af281d3ef9

                  • C:\Windows\SysWOW64\Ljnnch32.exe

                    Filesize

                    96KB

                    MD5

                    992e6f4b94048871924fb401a853c0a7

                    SHA1

                    3e4dc49a6023f745a86fb8fe22e7fb975dd8daa5

                    SHA256

                    17336243da7671f4dffb294e6681ce4c36dddf07c893e09097d4ce0c72d7d004

                    SHA512

                    ad9367a848074bac74b8c87e9ed29bb4e37cf3a149ec7a6b1efdb02884bda8cac8fcef8508dacff5873c415dc6c3568aac53efe479e9b4cca16df5d5a231c2b0

                  • C:\Windows\SysWOW64\Lkdggmlj.exe

                    Filesize

                    96KB

                    MD5

                    9a0eb5f2552729f36797edfa8d0d5cb6

                    SHA1

                    1338c3ceec75c7b56c41ae04b5567980313b6d99

                    SHA256

                    f00cced1c361fa803f01fdb58a2cb6875021f736a59383887eaaac648b7af96e

                    SHA512

                    1000f34bec9c8a4065fe5863838443b93b626a1809f92da1762a02d987e61243aca66cc1e69171854258696e3a622c5f7a392d8fbe80a66f303c190c40195c61

                  • C:\Windows\SysWOW64\Lkdggmlj.exe

                    Filesize

                    96KB

                    MD5

                    7ab7264a7a14a48a14208256c9f74f3c

                    SHA1

                    68f2431087938e7404567204792967415b2ae333

                    SHA256

                    6e6bf8c9d849ba89b5f6d4c9112d29de0b26dbfbd4ccda53ae0bb14bf7651618

                    SHA512

                    df8abc99b06463bf9345237af2a89f74917c1924e9ba8b1e1d13453720b2e7b32b855746335ca3434c4ff69263f8efd031728e5fa1e44c17e2ebf9acbb1fd883

                  • C:\Windows\SysWOW64\Lkgdml32.exe

                    Filesize

                    96KB

                    MD5

                    5cdeb7cfaf3f3e6c885b7d9a069c9eae

                    SHA1

                    adbc4c86184301ff5d7214643dc1859444049b06

                    SHA256

                    a28a3e88a6bb68043d00ae40f05df4d3234a75f197cd1168a6f7ea1941681347

                    SHA512

                    9a9d45629e84d314b344a0da16584bf3d9218a90631361ff03fe269c4925e8c06a0c485aed1c94047556fd893ea49784dc282272c5758ee604a9d063a36ae0ee

                  • C:\Windows\SysWOW64\Lkgdml32.exe

                    Filesize

                    96KB

                    MD5

                    61f0827c8e8e5b1f091fb8991c031888

                    SHA1

                    e21bd78434dc40d6f305a321a4f1f4e66a55b740

                    SHA256

                    27f14840c29750b35ced2701f1fad4dc3a82e873bac91ef6bedb557663a4fe2c

                    SHA512

                    4d3e3ac5c2083e4e2377a14be5188d85dcf66aa2a313f0af8d9de32f738da1f7852a2b6bf284f67dc44d5592b5cce3065ebf1e71308d0fdb8d434ce38b9c3af3

                  • C:\Windows\SysWOW64\Lmqgnhmp.exe

                    Filesize

                    96KB

                    MD5

                    a0929947dc3953fefd93f3f22e91b5d3

                    SHA1

                    04b6aea5029f7c275f83bf45f03fb43141ed2943

                    SHA256

                    b5acd5cfb945d93fd8394e1d5c0bd5a638be8e70dac5e9a4111a2e7be96bde15

                    SHA512

                    82d5f43a725a4ba4c5aa76c2c53f75a356a5e302b7c935ce0a6e26bd5ff01aade9020cd4eb4b8c8b371aa2ebab4226e90b0484fb25ee97dae909ccd2123053fc

                  • C:\Windows\SysWOW64\Lpappc32.exe

                    Filesize

                    96KB

                    MD5

                    afb45862306b116819f55c8035fd93dc

                    SHA1

                    b552bcc93e2aad0b60b28b24ae0cc24d6f9dfe6e

                    SHA256

                    39ed163bb6df3c8634024f50784f461fee1422a88b749b4b4707e1ea8a2afb75

                    SHA512

                    202eb0e33f2b186f33ae0003e4dab6f6bbb2d724fb174c7dfe45287cce5b812b910237a8968b70e8ae970aa84be279d82f200ad9619d1b1471c98bbae55b4852

                  • C:\Windows\SysWOW64\Lpcmec32.exe

                    Filesize

                    96KB

                    MD5

                    c9420e3a39fa4476414a25b94b2b8701

                    SHA1

                    15d5a08a63f4c4f9f0348d4fdd1e5a4800f55ae2

                    SHA256

                    166ab527c936c73c03e9dae039e7ca9f2a785f441b57e94a7114cd3c083de43e

                    SHA512

                    b2ab76ae37ec499960cf8c841fd1a900a709148edcd4f6897b8c527dd804b2570c31edb56d7cc511be051684d96a6ad3019153ed075ecd181c0142afdece95a1

                  • C:\Windows\SysWOW64\Mciobn32.exe

                    Filesize

                    96KB

                    MD5

                    9c59ea74993b886154cf94c7630becb5

                    SHA1

                    0e4c72d47cbecb44aeb55098ffd317000a4e6906

                    SHA256

                    ad70c20db8871f2abe6a71066d4b2b6041a925602b5af37ed52a93aef81f1d4e

                    SHA512

                    f959a6dbdd84265fff68098b525f2856a4eb7d5d4856886a2a9c08fe90a9545168f1bab5677f0b65a3953991bf4f93ae0b7c2fd8b7b22d2ea6df181553fbb5c7

                  • C:\Windows\SysWOW64\Mcklgm32.exe

                    Filesize

                    96KB

                    MD5

                    85c9abf64c03e9d9d7d8b2ecbf03611c

                    SHA1

                    215ec62f3f0548f9fae5f01f8f8cbe31de596271

                    SHA256

                    64269eedc4c7c8abb5ef979c7aaf215d7281686d7405893d4c2acd859623b9bb

                    SHA512

                    151bc907353f30751c0892f2bd735a0ff5d8637e3b994b88b2afaaa65d2624cb3bb2bd02d2a72beb4abb6574fe4782221058add7e5d922537b1cc1ac1be361dd

                  • C:\Windows\SysWOW64\Mcnhmm32.exe

                    Filesize

                    96KB

                    MD5

                    e9e0a31fa3d7af67b635595dd16adb65

                    SHA1

                    f95d7aa893be45584c0d185fdf72c4fcfe4df34c

                    SHA256

                    71336693f2977ea6f66a8656df365234e2af616afac830c8e82663f71414d9d4

                    SHA512

                    943c69805f11d55a56545766708d53a6a57336338f9776a8235769e5d37f387b3dd4b3a5cdacc08877687b27cf5d9169f05f78e0d39699c8a0568531abe34b42

                  • C:\Windows\SysWOW64\Mjhqjg32.exe

                    Filesize

                    96KB

                    MD5

                    0d9861e771ac224ebd7349c7b7e08074

                    SHA1

                    9de5e74515c3c30981beb5cd6cf478eeb05920a4

                    SHA256

                    45d465fd05ffad34d0820d51dba81049aaafe43d7a69ee01f157f07bcf6b0b61

                    SHA512

                    97b3e1b79f8f79ede26c6ead6f15a774fa47b2a4ed607aa79f9fa139a57f81daffcaa3bb4f06c4bc54d2b63437bf2ea79d6007c7fac12b61a8634499eb63fbac

                  • C:\Windows\SysWOW64\Mkpgck32.exe

                    Filesize

                    96KB

                    MD5

                    cddd5a662d2121cfa77de1eb2ac3b8bd

                    SHA1

                    88f699d02b01daa93529060a876408ef5761ae78

                    SHA256

                    44397f4c3514ad06542a6235fc49898f0d066b464582d9d507f38fb5d4be789e

                    SHA512

                    ad243a35014fda355511064e7ab80deec94765c48fb596310394585e36ddb8072cbf4f33555947d6759d9d36fdff5aa452e2f22f92a348fa56d42a1b50d4d9b1

                  • C:\Windows\SysWOW64\Ndbnboqb.exe

                    Filesize

                    96KB

                    MD5

                    e4b96539df32e5f0b717b47e4a4b4215

                    SHA1

                    8fc041a5b53dee98f3aefb8d5a5a3dd19f711f8a

                    SHA256

                    da36df0362ef989588d1fc728ad6d417e1acd0c71bc8a05da15e470c448a7cc7

                    SHA512

                    f2204b92fa265e51aec1a7ae9f093b10b90075b5586ddc54b715960c5ef4490b375d6693fd3fe0f8dd07730f98e69ee30047120659be7c561271328fde6cb0a3

                  • C:\Windows\SysWOW64\Nkncdifl.exe

                    Filesize

                    96KB

                    MD5

                    bc1c433bba66efea1cc1975e59dc2481

                    SHA1

                    eb12f0292c70fa852f60d181f5e2693fa6c06309

                    SHA256

                    ed43363018dd783e5c3739a6c06360c561c03735af75fb583515761de93ae93f

                    SHA512

                    baaf8772e9195f085d96b1b82eb024eae46d9f67273b6f19c38063fb88c9eb5adc55ddacd9cbf9253c0155d5f9731a4db182aea407b2a58bdda4c7f775519e1d

                  • memory/212-322-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/216-340-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/336-232-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/408-202-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/440-524-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/540-362-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/628-483-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/800-559-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/828-484-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/848-310-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/920-16-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/920-558-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/948-192-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/972-262-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1208-514-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1220-376-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1236-208-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1360-424-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1436-136-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1460-164-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1472-430-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1500-88-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1548-387-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1560-405-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1612-572-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1816-175-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1844-442-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1892-112-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1928-471-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/1988-508-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2020-526-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2096-532-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2104-406-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2116-95-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2160-388-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2236-368-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2288-119-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2296-302-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2396-423-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2440-148-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2456-248-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2656-60-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2656-599-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2720-352-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2732-224-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2996-48-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2996-592-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3040-550-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3040-0-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3048-460-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3152-128-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3244-244-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3348-274-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3376-72-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3444-496-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3588-549-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3640-440-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3668-591-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3760-332-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3828-538-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3860-292-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3892-551-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3916-186-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3928-571-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3928-24-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/3972-168-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4024-565-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4160-31-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4160-578-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4172-589-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4172-41-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4216-453-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4232-490-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4280-506-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4300-317-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4324-351-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4332-454-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4368-304-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4436-268-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4440-216-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4528-286-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4552-374-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4612-579-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4696-394-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4728-334-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4828-472-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4844-108-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4856-152-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4864-64-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4876-260-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4976-412-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4996-557-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/4996-12-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5004-593-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5064-280-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5096-82-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB