Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 10:15

General

  • Target

    7b568d31401a187f4868f5cc16635e2b474e987d0012bc89b18acc81c3398ef4_NeikiAnalytics.exe

  • Size

    465KB

  • MD5

    5d48a8224deec6276e6f153e153a5990

  • SHA1

    04f5c2693ab05f20766abf5a72dafe286154a8c0

  • SHA256

    7b568d31401a187f4868f5cc16635e2b474e987d0012bc89b18acc81c3398ef4

  • SHA512

    37eec01fd7c1a4af7566d977d24ac13d2f14bf9e4732883cdbcdd7da24bb93a883c3dc4b5b2f81ae47d5e1e9fa57932b876a9124508571e151a00306a4b1655f

  • SSDEEP

    6144:hYTeslu3njPX9ZAkvntd4ljd3rKzwN8Jlljd3njPX9ZAk3fs:hYojP9ZtVkjpKXjtjP9Zt0

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b568d31401a187f4868f5cc16635e2b474e987d0012bc89b18acc81c3398ef4_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7b568d31401a187f4868f5cc16635e2b474e987d0012bc89b18acc81c3398ef4_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\Kbfiep32.exe
      C:\Windows\system32\Kbfiep32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Windows\SysWOW64\Kmlnbi32.exe
        C:\Windows\system32\Kmlnbi32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\SysWOW64\Kpjjod32.exe
          C:\Windows\system32\Kpjjod32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\Kdffocib.exe
            C:\Windows\system32\Kdffocib.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4160
            • C:\Windows\SysWOW64\Kgdbkohf.exe
              C:\Windows\system32\Kgdbkohf.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4728
              • C:\Windows\SysWOW64\Kkpnlm32.exe
                C:\Windows\system32\Kkpnlm32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1628
                • C:\Windows\SysWOW64\Kibnhjgj.exe
                  C:\Windows\system32\Kibnhjgj.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4404
                  • C:\Windows\SysWOW64\Kajfig32.exe
                    C:\Windows\system32\Kajfig32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3160
                    • C:\Windows\SysWOW64\Kdhbec32.exe
                      C:\Windows\system32\Kdhbec32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:656
                      • C:\Windows\SysWOW64\Kckbqpnj.exe
                        C:\Windows\system32\Kckbqpnj.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:4956
                        • C:\Windows\SysWOW64\Kgfoan32.exe
                          C:\Windows\system32\Kgfoan32.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:3892
                          • C:\Windows\SysWOW64\Kkbkamnl.exe
                            C:\Windows\system32\Kkbkamnl.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:2160
                            • C:\Windows\SysWOW64\Lmqgnhmp.exe
                              C:\Windows\system32\Lmqgnhmp.exe
                              14⤵
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:3256
                              • C:\Windows\SysWOW64\Lalcng32.exe
                                C:\Windows\system32\Lalcng32.exe
                                15⤵
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:3216
                                • C:\Windows\SysWOW64\Ldkojb32.exe
                                  C:\Windows\system32\Ldkojb32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:1892
                                  • C:\Windows\SysWOW64\Lcmofolg.exe
                                    C:\Windows\system32\Lcmofolg.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:4816
                                    • C:\Windows\SysWOW64\Lgikfn32.exe
                                      C:\Windows\system32\Lgikfn32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:1220
                                      • C:\Windows\SysWOW64\Liggbi32.exe
                                        C:\Windows\system32\Liggbi32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:3412
                                        • C:\Windows\SysWOW64\Lmccchkn.exe
                                          C:\Windows\system32\Lmccchkn.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:1548
                                          • C:\Windows\SysWOW64\Lpappc32.exe
                                            C:\Windows\system32\Lpappc32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:4944
                                            • C:\Windows\SysWOW64\Ldmlpbbj.exe
                                              C:\Windows\system32\Ldmlpbbj.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Suspicious use of WriteProcessMemory
                                              PID:3744
                                              • C:\Windows\SysWOW64\Lcpllo32.exe
                                                C:\Windows\system32\Lcpllo32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:1560
                                                • C:\Windows\SysWOW64\Lkgdml32.exe
                                                  C:\Windows\system32\Lkgdml32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:3644
                                                  • C:\Windows\SysWOW64\Lijdhiaa.exe
                                                    C:\Windows\system32\Lijdhiaa.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:1816
                                                    • C:\Windows\SysWOW64\Lnepih32.exe
                                                      C:\Windows\system32\Lnepih32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:5084
                                                      • C:\Windows\SysWOW64\Laalifad.exe
                                                        C:\Windows\system32\Laalifad.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:1888
                                                        • C:\Windows\SysWOW64\Lcbiao32.exe
                                                          C:\Windows\system32\Lcbiao32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          PID:4548
                                                          • C:\Windows\SysWOW64\Lkiqbl32.exe
                                                            C:\Windows\system32\Lkiqbl32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            PID:412
                                                            • C:\Windows\SysWOW64\Lilanioo.exe
                                                              C:\Windows\system32\Lilanioo.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              PID:3148
                                                              • C:\Windows\SysWOW64\Lnhmng32.exe
                                                                C:\Windows\system32\Lnhmng32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:4232
                                                                • C:\Windows\SysWOW64\Laciofpa.exe
                                                                  C:\Windows\system32\Laciofpa.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:2204
                                                                  • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                    C:\Windows\system32\Ldaeka32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:1336
                                                                    • C:\Windows\SysWOW64\Lcdegnep.exe
                                                                      C:\Windows\system32\Lcdegnep.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:1048
                                                                      • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                        C:\Windows\system32\Lgpagm32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        PID:2456
                                                                        • C:\Windows\SysWOW64\Lklnhlfb.exe
                                                                          C:\Windows\system32\Lklnhlfb.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:4644
                                                                          • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                                            C:\Windows\system32\Lnjjdgee.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            PID:4988
                                                                            • C:\Windows\SysWOW64\Laefdf32.exe
                                                                              C:\Windows\system32\Laefdf32.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              PID:2192
                                                                              • C:\Windows\SysWOW64\Lphfpbdi.exe
                                                                                C:\Windows\system32\Lphfpbdi.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:4436
                                                                                • C:\Windows\SysWOW64\Lcgblncm.exe
                                                                                  C:\Windows\system32\Lcgblncm.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:1696
                                                                                  • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                                    C:\Windows\system32\Lgbnmm32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    PID:624
                                                                                    • C:\Windows\SysWOW64\Lknjmkdo.exe
                                                                                      C:\Windows\system32\Lknjmkdo.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:3944
                                                                                      • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                                        C:\Windows\system32\Mjqjih32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:3756
                                                                                        • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                          C:\Windows\system32\Mnlfigcc.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:1664
                                                                                          • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                                            C:\Windows\system32\Mpkbebbf.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:4564
                                                                                            • C:\Windows\SysWOW64\Mdfofakp.exe
                                                                                              C:\Windows\system32\Mdfofakp.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:4972
                                                                                              • C:\Windows\SysWOW64\Mciobn32.exe
                                                                                                C:\Windows\system32\Mciobn32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Modifies registry class
                                                                                                PID:3868
                                                                                                • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                                  C:\Windows\system32\Mgekbljc.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:4300
                                                                                                  • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                                    C:\Windows\system32\Mkpgck32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:872
                                                                                                    • C:\Windows\SysWOW64\Mnocof32.exe
                                                                                                      C:\Windows\system32\Mnocof32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:3856
                                                                                                      • C:\Windows\SysWOW64\Majopeii.exe
                                                                                                        C:\Windows\system32\Majopeii.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        PID:3012
                                                                                                        • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                                          C:\Windows\system32\Mpmokb32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          PID:3980
                                                                                                          • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                                            C:\Windows\system32\Mdiklqhm.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:208
                                                                                                            • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                                              C:\Windows\system32\Mgghhlhq.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1676
                                                                                                              • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                                C:\Windows\system32\Mkbchk32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:4164
                                                                                                                • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                                                                  C:\Windows\system32\Mjeddggd.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3900
                                                                                                                  • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                                    C:\Windows\system32\Mnapdf32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:3384
                                                                                                                    • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                                      C:\Windows\system32\Mpolqa32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:2324
                                                                                                                      • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                                        C:\Windows\system32\Mdkhapfj.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:3248
                                                                                                                        • C:\Windows\SysWOW64\Mcnhmm32.exe
                                                                                                                          C:\Windows\system32\Mcnhmm32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:4024
                                                                                                                          • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                                            C:\Windows\system32\Mgidml32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1848
                                                                                                                            • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                                              C:\Windows\system32\Mkepnjng.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:2380
                                                                                                                              • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                                                                C:\Windows\system32\Mncmjfmk.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:2104
                                                                                                                                • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                                  C:\Windows\system32\Maohkd32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:800
                                                                                                                                  • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                                                    C:\Windows\system32\Mpaifalo.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:4884
                                                                                                                                    • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                                                      C:\Windows\system32\Mcpebmkb.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4040
                                                                                                                                      • C:\Windows\SysWOW64\Mglack32.exe
                                                                                                                                        C:\Windows\system32\Mglack32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        PID:1092
                                                                                                                                        • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                                          C:\Windows\system32\Mkgmcjld.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4904
                                                                                                                                          • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                                            C:\Windows\system32\Mnfipekh.exe
                                                                                                                                            69⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:4236
                                                                                                                                            • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                                                                              C:\Windows\system32\Maaepd32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              PID:4652
                                                                                                                                              • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                                                C:\Windows\system32\Mpdelajl.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                PID:4924
                                                                                                                                                • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                                                                  C:\Windows\system32\Mcbahlip.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:2028
                                                                                                                                                  • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                                                                    C:\Windows\system32\Mgnnhk32.exe
                                                                                                                                                    73⤵
                                                                                                                                                      PID:4088
                                                                                                                                                      • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                                                        C:\Windows\system32\Nkjjij32.exe
                                                                                                                                                        74⤵
                                                                                                                                                          PID:1764
                                                                                                                                                          • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                                                            C:\Windows\system32\Nnhfee32.exe
                                                                                                                                                            75⤵
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:3896
                                                                                                                                                            • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                                                                              C:\Windows\system32\Nacbfdao.exe
                                                                                                                                                              76⤵
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:2916
                                                                                                                                                              • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                                                                                C:\Windows\system32\Ndbnboqb.exe
                                                                                                                                                                77⤵
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:4448
                                                                                                                                                                • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                                                  C:\Windows\system32\Nceonl32.exe
                                                                                                                                                                  78⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  PID:1160
                                                                                                                                                                  • C:\Windows\SysWOW64\Ngpjnkpf.exe
                                                                                                                                                                    C:\Windows\system32\Ngpjnkpf.exe
                                                                                                                                                                    79⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    PID:4288
                                                                                                                                                                    • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                                                                      C:\Windows\system32\Nklfoi32.exe
                                                                                                                                                                      80⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      PID:4116
                                                                                                                                                                      • C:\Windows\SysWOW64\Nnjbke32.exe
                                                                                                                                                                        C:\Windows\system32\Nnjbke32.exe
                                                                                                                                                                        81⤵
                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                        PID:1300
                                                                                                                                                                        • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                                                          C:\Windows\system32\Nafokcol.exe
                                                                                                                                                                          82⤵
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          PID:4260
                                                                                                                                                                          • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                                                                                            C:\Windows\system32\Nddkgonp.exe
                                                                                                                                                                            83⤵
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:4348
                                                                                                                                                                            • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                                                                              C:\Windows\system32\Ncgkcl32.exe
                                                                                                                                                                              84⤵
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              PID:4080
                                                                                                                                                                              • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                                                                C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                                                                85⤵
                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:1460
                                                                                                                                                                                • C:\Windows\SysWOW64\Nkncdifl.exe
                                                                                                                                                                                  C:\Windows\system32\Nkncdifl.exe
                                                                                                                                                                                  86⤵
                                                                                                                                                                                    PID:2044
                                                                                                                                                                                    • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                                                                                      C:\Windows\system32\Nqklmpdd.exe
                                                                                                                                                                                      87⤵
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      PID:948
                                                                                                                                                                                      • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                                                                        C:\Windows\system32\Ncihikcg.exe
                                                                                                                                                                                        88⤵
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        PID:3420
                                                                                                                                                                                        • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                                                                          C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                                                                          89⤵
                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:1376
                                                                                                                                                                                          • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                                                                            C:\Windows\system32\Njcpee32.exe
                                                                                                                                                                                            90⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            PID:3504
                                                                                                                                                                                            • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                                                              C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                                                              91⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              PID:2692
                                                                                                                                                                                              • C:\Windows\SysWOW64\Nqmhbpba.exe
                                                                                                                                                                                                C:\Windows\system32\Nqmhbpba.exe
                                                                                                                                                                                                92⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:3812
                                                                                                                                                                                                • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                                                                  C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                                                                  93⤵
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:4368
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                                                                    C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                      PID:4616
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 408
                                                                                                                                                                                                        95⤵
                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                        PID:1964
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4616 -ip 4616
            1⤵
              PID:1280

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Kajfig32.exe

              Filesize

              465KB

              MD5

              86cc8c1fd42e668c626e43a268ca1992

              SHA1

              c64f6586a827c052798445965baf6d04df25d46b

              SHA256

              892626d2fd5d7d9db11575f0161c4d69facbd324af2aa05e10663fb84dce8ee7

              SHA512

              906cc29261e218c4d6fc5dc03ee84a1f857141a5802d95abc5709049146964161d995108dba47253add8183672a1f473cdf684dde2652bfbf5bf4d7705acb1bc

            • C:\Windows\SysWOW64\Kbfiep32.exe

              Filesize

              465KB

              MD5

              dc7250685bf00a8e46dba9ebdbb88937

              SHA1

              0ea69468cd83759f2bb19e4adc0e9976377b29a2

              SHA256

              71b48c2843cba60a939849f92861e4c89ac134be44946f7ebf60c85f5cd8d2a9

              SHA512

              f0fc913058fb2591386805aa222d65b988455c79c16c6d36ad2f6d285b4f97d2149ada515fe08f915760839111a562d47277006c1f0cf4d4149841209eb06287

            • C:\Windows\SysWOW64\Kckbqpnj.exe

              Filesize

              465KB

              MD5

              ab0ecaf1d90787ad96e9bb68727dadca

              SHA1

              8adfa74d916918e10b7a6735e3e6251ec1d54944

              SHA256

              602b53b442b3030cbf9470ebf0d6fa30aec5b5dbdc156fd9cab13e1f6d7adf7e

              SHA512

              5f52f6acafc5ed9c4763be13ea532be291aec0c66919f6fe718a1126982f15b108ed04e4808302f0e4f06e2902f0a266a74726c75738c314f701bc53778d9a3d

            • C:\Windows\SysWOW64\Kdffocib.exe

              Filesize

              465KB

              MD5

              79352cb5ba0f759a2a3ae993b233a9a1

              SHA1

              b97dacc00f0e88cbeb8de052bfd6d5ebfd184dc8

              SHA256

              54156d6f8c5750f263d26a916fa09d6c635d7f386204a5c30ed665156759df88

              SHA512

              b6476304f819bc010ac508301d85bd161b4d8af633397b54938eeffedba98aa879de7658cffc6a77cd96bc463ae4af6b9abce7eade7cfb85643504e6ec6c1142

            • C:\Windows\SysWOW64\Kdhbec32.exe

              Filesize

              465KB

              MD5

              2c2bda7f1919f686da29faa7c7bde001

              SHA1

              3d02a7a0d983269e0d90a809a2f488da4f37b551

              SHA256

              63049533ab3aed74c9a1121694705dabfdfc49a677caef235c6ef0b217867ae5

              SHA512

              359bb31021e5dccb37783f6f923e8b9fcd2733d53b476b7f0eb82820a057f643361856ee385b0d83dee797cdd4d324af8a455a3cb985a1b549d8528e2036e497

            • C:\Windows\SysWOW64\Kgdbkohf.exe

              Filesize

              465KB

              MD5

              9f13d4ae3870955aa4aa85a6379b8177

              SHA1

              a04f5dd89761f22b426462d752d403d0b2631c93

              SHA256

              41f44105194de844b308abf1f121ce98a0251ecc19c9df194f907c95f480cfd1

              SHA512

              6b153683aaf2243e8333d86df6c956b57d2284e3a3d3e55149c0063834e1612563ebc706e861d61fabb9bfbb7922a2f9cfa4b31512309467a6b1fcabeb5f7885

            • C:\Windows\SysWOW64\Kgfoan32.exe

              Filesize

              465KB

              MD5

              38811f30114304e0258c970dc90d6421

              SHA1

              4d5bd3e8788e3381105a407190aa28195ee42066

              SHA256

              8fb369214c689b1a3441ca0a026d11b1809ea80f63d909487d112b6250955cd8

              SHA512

              c7105bdbc6d613e1d3a24ff9f7e0c1a9d9679fdbfb6eec51cd2cc85b7c940bc73102c09180c44e8ce8c258846f084570ebec20432a21266a95ecff38f0ea21ce

            • C:\Windows\SysWOW64\Kibnhjgj.exe

              Filesize

              465KB

              MD5

              0e88254d0efd6b9e69f05a057a5e6bc1

              SHA1

              96aeedf5bc50eba390c0b6aaca5ddd05649e3d0c

              SHA256

              57a0a032b1b7c9f9fada5f08db29be2a569739d1071ce19bb553a6f594c8e3c3

              SHA512

              f0c4902900cbe5381adf69b345a0c7725c49c93bc976128cb8ce97f5f3d2229d9f9ac9682eb7d994b55225aea6c0e8ecf3194dc72aa76841440310e59b143044

            • C:\Windows\SysWOW64\Kkbkamnl.exe

              Filesize

              465KB

              MD5

              e2e414e85d376c2e71259a586fd4d87b

              SHA1

              8a45befeb5378a616e8412e6c85fb2ef3b33b8c3

              SHA256

              365170e999656d5467ef12db33a540a3f21c13ff58436c02f882991d9804941f

              SHA512

              e2281f21fa82e8f967196c31730d58d8c759b903d711b97930dc724d30a338088c450d6cd7d656587c4a465409fe69cb5903ba482f89a6e02fc771812569ce82

            • C:\Windows\SysWOW64\Kkpnlm32.exe

              Filesize

              465KB

              MD5

              1754e162f235f5e843a9bcc1c353e465

              SHA1

              aad0b0029b93d34080f12a423ec72425edff23f7

              SHA256

              3ff1883b9969528a087be43c096e6d2e585519d4a9f393842982a01ff55231cd

              SHA512

              bb8eae0abfdb5bcdec1bf3fc49873984d5101277c9f837a5c9e3bc63e1c3317a9010879f683f947f1290461ded8377c4dba780df68911c0a5fc9b20cb13fa6db

            • C:\Windows\SysWOW64\Kmlnbi32.exe

              Filesize

              465KB

              MD5

              8ea666f5acd9c78bc92c40b1e6fd8cfb

              SHA1

              cd3fd98cae4c1d53cb713bff37415caec5f16155

              SHA256

              159ad984c8912cc7f41ec176331000437bbd2a0f1b16a02d6c31a007a287302e

              SHA512

              29bc204f38d0997bc613af89ab6784e470341ba1744814528c38440bc87f9a95b791e770e2a51ddc550052094bc3ffcda3d789dca22546d157301ae9fd930096

            • C:\Windows\SysWOW64\Kpjjod32.exe

              Filesize

              465KB

              MD5

              804de9e91b315cda9330c47b7324cccd

              SHA1

              f2d0a8f9917beddd8a4549eb1ee2067a3e098447

              SHA256

              85403f8b883de3d89362a8d8cafda2f954675a26833e88e5fbcf7f2916c0cdcb

              SHA512

              c732d2245d6a9307dbb417e194a4a73cfb6a594173e00e88b2aac4836a5dcbdf4c9f218ddfc55569e7dbae394cb9eb11af32825f23c9e4f45904f9f32c946df1

            • C:\Windows\SysWOW64\Laalifad.exe

              Filesize

              465KB

              MD5

              436217d75d97cb77088d8a0150eb2d59

              SHA1

              01fee92f31c174590bd10ae6a5adabddb3d1dd42

              SHA256

              4ad4e5acc4d20350268c5b65adc1bef683a8d04bdd0ada93aa602dc76140fcb3

              SHA512

              a94922808194ee2eba851f9f15a332871875985ffcbe64eb821a8f314b98c1c1547fb3d4a2da72cc153e8a5088b61f80e6d9adc7c15854dc77c59ec2f46c9bf5

            • C:\Windows\SysWOW64\Laciofpa.exe

              Filesize

              465KB

              MD5

              8f2f7fa6e331585f99db30d0e9a1dce4

              SHA1

              a4d0d95ac55c560d45b4a5b71f85af7d3884731a

              SHA256

              acba0de1af53c8b935273e913aede1e44bd1856eb16262bc131898cd7f389844

              SHA512

              37b3da4690bfc78715dde307ccf6eae0ac2c8987ead8e79ce02f4f4056f0f6c181eab6f834661342a9898ad78f24060904c80f341b9d2625b39847756a1a323a

            • C:\Windows\SysWOW64\Lalcng32.exe

              Filesize

              465KB

              MD5

              c02767e137ada299339a55d62b6c4544

              SHA1

              e345fe871df07685857f8c703e91fb0474ed0d72

              SHA256

              48200c398fe3e33f98f91af11c06c1b5527e4189dd3103957c639dc8b723021d

              SHA512

              4ab708dff060a7d302253e760a803c99a668d51a767690bed4958caf886fecfd3999611dc74cf8e5cef475aaf92f2519dd1056600bf4894d600f6139b1d0b90a

            • C:\Windows\SysWOW64\Lcbiao32.exe

              Filesize

              465KB

              MD5

              4ecd95c6d56f8f610a33b4f7c381ce77

              SHA1

              b43f431a790916c630207978e6f6d9cbeb44501a

              SHA256

              95d9eb5c0a47c29b510783812b0f701d0436a49982baf601e6407a1f0817aff7

              SHA512

              47c728fbd00a6c0c58c50a9d0d7a590f91c46754e6e36b86406f3a14f1a82c724ba39d8c93f92d9d83fdaed90e98055487fbc522676b99772c187907021cdbe0

            • C:\Windows\SysWOW64\Lcmofolg.exe

              Filesize

              465KB

              MD5

              0fcaaaae66180b336de49fe7fa500cec

              SHA1

              8551b975d4e42c78abaf9428e32e40179460b855

              SHA256

              b2fd0b3ab97b53d53ede0994caeafbbd30ff700185ee6010f155df5be2516127

              SHA512

              bf3ebde2559f9a4000fd1eb790985b1c487dcc0f7f9c5d2fa18e6e9ae818a9fc3097ae22c8f6f542e2d814d84ce236f9a4e66563d9a8651e8da33eb642c0d090

            • C:\Windows\SysWOW64\Lcpllo32.exe

              Filesize

              465KB

              MD5

              d4a76c9b3edb4c7d8840999e14ff3b66

              SHA1

              d47d532c1754a244e5748887903f430dfd95fa9b

              SHA256

              dbd409b2f87ad6d64892c6b7abe8b8df30086cd31d3d53a42982492e12e28358

              SHA512

              ba0519b67e2e8750def5f38d98bda81a861c4af4c0cbf341da4efc1c4209cc2ee9c5c684f1453a316e0db22f35f7a51dec1484ec618d5eefea103bdab9a62447

            • C:\Windows\SysWOW64\Ldaeka32.exe

              Filesize

              465KB

              MD5

              c7d94a5ba40a48e4e266060b5deceb17

              SHA1

              bd735eb7c2c21ac6f13f38847855f512c6d3087d

              SHA256

              1a2c216313a93afdc84ac454131cc6cab80f6f182b022a9f6fbefdfbef5860fe

              SHA512

              c717954768ad124cb1495fa075503189b5ab6b47dcbbd60cfebf2b963e271852825553a8ec4684010ef87fb52dc557833451a53f208ada7edd02ad46a2ac0d3e

            • C:\Windows\SysWOW64\Ldkojb32.exe

              Filesize

              465KB

              MD5

              72000639d61341b5b8a9a25524bf4174

              SHA1

              702e2d3b4a013a0923667511f3e018e4b65c5d04

              SHA256

              b2fa91eae561a1b40299831eda4b8473acaf844ff659401dca99cffa584142e1

              SHA512

              b9ffd4acd14c08d288feae0ab66fa5111e50823cef13f5d58dbdd88d82fe7aa872638e923851797ded90879d17462238e3d62583fded39e2c91782769ddf1153

            • C:\Windows\SysWOW64\Ldmlpbbj.exe

              Filesize

              465KB

              MD5

              fb6fbaa86134500e451c5898ab9c239b

              SHA1

              219e54a15e0e42acbec68a605c1f4e13e9416db3

              SHA256

              0f05552fcf057eecabe48502e27622897ab002ca0e4995db2e4fb207030d13a0

              SHA512

              0980a4bb4e6b31b15290c52cbc5caa6c3314a124764bea90289bfbd3c8228e3aacef4bc7d0dc591c1fae586a81c25f582ab06e558cf6c70a5b919e47e4713181

            • C:\Windows\SysWOW64\Lgikfn32.exe

              Filesize

              465KB

              MD5

              a5b05add0370ca4bb326de0d844d7943

              SHA1

              92a1314e0f4b7f181925c68f61a4dd4bc2c14c18

              SHA256

              e8c6f8c444f58b9e708f0bb9240db17854421057d25132da575aa860fa8d48b1

              SHA512

              28ad73ce6e40b3472c86b16e13c0bbcaef830b942c93146f422d8526ba826d6a78a6e27f9eee01414caa1bcc3d57857105306c359803d1344bf5a4f98a09e0d0

            • C:\Windows\SysWOW64\Liggbi32.exe

              Filesize

              465KB

              MD5

              93f6e688a2a703d6a7ec7d1df978604a

              SHA1

              8e9d3c2cde20c71e4e7da5fe0392b05144e493b5

              SHA256

              86902e64a5d52d0c3397375dcc4742c72ac6813b813a8eeaac7f1e3480d4c2b0

              SHA512

              4208f7a6ea93b2539e14836405640cc4906014c47a12e70263ff4f09f6474e3cbb89ac14f86a8942806226fd0bd4f2560d6911c578bf991c19a2d85e46bf3e98

            • C:\Windows\SysWOW64\Lijdhiaa.exe

              Filesize

              465KB

              MD5

              8f47307589d4218f2a867da64400e4a2

              SHA1

              f43910b2c0382b034d7179dd09520616511949e8

              SHA256

              a773f115e83ad8863a9875636e508e8ded4fc19c13b93f160696c4791ac66b6c

              SHA512

              d290d0eb1f08bf567193869adcea83bd0b46c9241c30441ccbc5be13398f3ffc1aebba008cd035e675a3e1607d4f34a65d895c873f89cbfa72e32d3e4f1df8d7

            • C:\Windows\SysWOW64\Lilanioo.exe

              Filesize

              465KB

              MD5

              bb454ea1958f4692eec7cbd786d29697

              SHA1

              3337245f3afb34455e873db2179a4fe4166bc8e3

              SHA256

              c3609062d45a54ac6c2e9e373d5eb08ae6219b288a6ac6ef7199928cc77ca4f1

              SHA512

              f7285fb27e86f1cae98626026212ed15e77bb5a8fc806d42c067e2810cdc62551fcb2c0e9c09d0a5661f9fc789e95c5a628db0e3203f89ec57a04aa9a3a1fd53

            • C:\Windows\SysWOW64\Lkgdml32.exe

              Filesize

              465KB

              MD5

              dfe9bfdc9ec6b783916f36a2340a3921

              SHA1

              ecf6852ee66343018eb43aced47e396131251c44

              SHA256

              3910d0598497cf750a9564cf29a5d3899947998c6334ed05f4e9e1d963704e4b

              SHA512

              882923a6e820b1e71940cfb8cf78c92bd4654c857d54a673da82985de183f447f6963ae805da208e3c1dfa0852323181e8e250995c6ebc9eea6b5ae8a96e0231

            • C:\Windows\SysWOW64\Lkiqbl32.exe

              Filesize

              465KB

              MD5

              392358064c86278a81e11ab58285f3bb

              SHA1

              d03be4526e4630a3b12a398f2ddc8c9987012338

              SHA256

              52d8a75968c76babc46ac0770bc87123806f4723efd37539f71b0790343546b9

              SHA512

              8d6d369cdbf48a452bcee8ee57fe61c98771dcacbd07bb2f3af98e8d311f606681f410623d52dee2506d7c1b6e8423a2e4cac033fb5ce2135223af50442c46af

            • C:\Windows\SysWOW64\Lmccchkn.exe

              Filesize

              465KB

              MD5

              a02ecdec087b4d3cf5e550e801dd0114

              SHA1

              7a0c2ba714512834e37d1926e1cbee06033a36f0

              SHA256

              41ed2caa0028a25e44fba52eab0277f73d3ee01c467c3c47c527a487018f27ee

              SHA512

              d8a967aec867546380dd68e8d8e03198263645e4e91ca685b0935552b9a83b0cbd9a6d6cf8190cee9ef83e54c913edb05147519ba4f472c49d1f5f68ebcfc37d

            • C:\Windows\SysWOW64\Lmqgnhmp.exe

              Filesize

              465KB

              MD5

              cb2b28a978af6836b63162d1060c57bc

              SHA1

              b74b14061ee81570be6c8971ea074c941c9991ec

              SHA256

              76936fb24fedac4bfc0d40d1d4115697ea00e5c73a5e582cdd3b3f3a2c09bbd9

              SHA512

              ebf7eb86216dae1244bcc4e88dca2ac87d0aaf98f2034a3271a09823e75007d2b7ca6121fff405f03adb0de372aac77ca5eba6077b53125584c1551b891dde66

            • C:\Windows\SysWOW64\Lnepih32.exe

              Filesize

              465KB

              MD5

              015a3b89d930a39fdf6f1c226e317c64

              SHA1

              88cfe2fbbd107aa57ddbd7c1c6a46b8f65110ecb

              SHA256

              b4b9a10466b66a824747a66f3807bb553ec0a34407a2df9b5053a065e41badcf

              SHA512

              906eb0a911d7b941ec717cc3d5c7a5de78be0dae1e2788738a67d1796fc98e8ae58f19ea63f7a396f85999e00a3f244ab758bae9cc7fe3414178805b483ae1fc

            • C:\Windows\SysWOW64\Lnhmng32.exe

              Filesize

              465KB

              MD5

              a7d6d2e2d6d4d163278e26d5b4a777c7

              SHA1

              9668a3d3450917946affb21b30dc4dc53bdc36ac

              SHA256

              9c7591c1aef44eab6fc97953e05afc454f04700829d726d83bf160feb8ccf26e

              SHA512

              a75da3a3749918d2cd6438135ee6a84f44d9c76baa86720a87576e6d6e89872fd831f55f4f142d2d8fee90f4fe14d30429f5a9921167c3aead59a20718706ad9

            • C:\Windows\SysWOW64\Lpappc32.exe

              Filesize

              465KB

              MD5

              5a321725dd38be80c6d8f6bb077457f9

              SHA1

              c9e433d48b929b7d4a0b0143b434850df4d58b22

              SHA256

              18ebec4a4e096151d9eb19a55149730fa570ef391b8142fa906dff5b654a3920

              SHA512

              a7c685402239e04224b76177c9448f08e8ce190f22131572609f7742fe4ed414164ae1dc5b4b116ab5992c30c8f5a21b3796f075abaa8655a4aba49515853c03

            • memory/208-661-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/208-560-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/212-13-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/656-535-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/800-569-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/800-639-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/872-669-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/948-593-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/948-574-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1092-633-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1160-611-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1220-546-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1300-605-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1376-589-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1460-597-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1548-549-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1560-552-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1628-531-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1676-561-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1676-659-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1764-619-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1816-554-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1848-567-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1848-645-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1888-556-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/1892-544-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2028-623-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2044-595-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2104-641-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2160-541-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2324-564-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2324-651-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2380-568-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2380-643-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2692-585-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/2916-615-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3012-665-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3016-0-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3016-5-0x0000000000431000-0x0000000000432000-memory.dmp

              Filesize

              4KB

            • memory/3160-533-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3216-543-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3248-565-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3248-649-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3256-542-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3384-653-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3412-547-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3420-591-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3504-575-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3504-587-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3644-553-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3744-551-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3756-557-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3812-581-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3856-667-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3868-558-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3892-540-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3896-617-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3900-563-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3900-655-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3928-36-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/3980-663-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4024-647-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4024-566-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4040-635-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4080-599-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4088-621-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4088-572-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4116-573-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4116-607-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4160-37-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4164-562-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4164-657-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4236-629-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4260-603-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4288-609-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4300-559-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4300-671-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4348-601-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4368-583-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4368-576-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4404-532-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4448-613-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4504-22-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4616-577-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4616-582-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4652-627-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4728-530-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4816-545-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4884-637-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4884-570-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4904-631-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4924-571-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4924-625-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4944-550-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4956-539-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/5084-555-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB