Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe
-
Size
163KB
-
MD5
ab546cc4b51ffb2c213bea7a64439140
-
SHA1
2a56612258ffdc8cf28b430423123f306280ebd3
-
SHA256
1e70357f5dc9cdf75a19bc27e711652dee9713b7f189aa1fed85165952b59217
-
SHA512
bb03bec5e4424afedcf8647717178ab3f4b72be71fd99f64b707aef0d1b0d080db43144574b065c1139682bca9867d4ea39675b09b8895fe401fa06540980084
-
SSDEEP
1536:PKFhyOTx5fxHPqVU4ToY0+et3mylProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:s4gvOoY0rcyltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Bplhhc32.exePikqcl32.exeElolco32.exeIgneda32.exeDpihbjmg.exeFpcdof32.exeAofemaog.exeKgdpni32.exeMqdcnl32.exePnmopk32.exeDbbdip32.exePkigbfja.exeOefamoma.exeBadanigc.exeLpdefc32.exeFlodilma.exeLkhbko32.exeMijofaje.exeQoocnpag.exeFlcfnn32.exeIgpkok32.exePjkmomfn.exeNagiji32.exeHifaic32.exeGhcjedcj.exeEdplhjhi.exeQefkcl32.exeAooolbep.exeCdbfab32.exeEilfldoi.exeIecmhlhb.exeHnjaonij.exeCfgace32.exeJlbejloe.exeEphlnn32.exeCnpibh32.exeIefedcmk.exeOclkgccf.exeIencmm32.exeJnedgq32.exeQpmmfbfl.exeEfhjjcpo.exeOmnqhbap.exeHcjmhk32.exeBkphhgfc.exeLkbmih32.exeCpqlfa32.exeEjnbdp32.exeLkmkfncf.exeDnajppda.exeDoccpcja.exeOpjgidfa.exeNpipnjmm.exeEkkkoj32.exeHqddqj32.exeOhhfknjf.exeDcqmpa32.exeOmkmhlpf.exeFckaeioa.exeEqpfknbj.exeHmginjki.exeJdkdbgpd.exeDlkplk32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bplhhc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pikqcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elolco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igneda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpihbjmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpcdof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aofemaog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgdpni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqdcnl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnmopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbbdip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkigbfja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oefamoma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Badanigc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpdefc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flodilma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkhbko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mijofaje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qoocnpag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flcfnn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igpkok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjkmomfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nagiji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hifaic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghcjedcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igpkok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edplhjhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qefkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aooolbep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdbfab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eilfldoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iecmhlhb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnjaonij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfgace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlbejloe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ephlnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnpibh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iefedcmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oclkgccf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iencmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnedgq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpmmfbfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efhjjcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omnqhbap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcjmhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkphhgfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkbmih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpqlfa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejnbdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkmkfncf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnajppda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doccpcja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opjgidfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npipnjmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekkkoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqddqj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohhfknjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcqmpa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omkmhlpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fckaeioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqpfknbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmginjki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdkdbgpd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlkplk32.exe -
Executes dropped EXE 64 IoCs
Processes:
Anclbkbp.exeBdpaeehj.exeBlgifbil.exeBadanigc.exeBohbhmfm.exeBdgged32.exeCkclhn32.exeClchbqoo.exeChiigadc.exeChlflabp.exeCdbfab32.exeDnmhpg32.exeDnpdegjp.exeDooaoj32.exeDoaneiop.exeDngjff32.exeEkkkoj32.exeEkaapi32.exeEmanjldl.exeFihnomjp.exeFijkdmhn.exeFmhdkknd.exeFbelcblk.exeFlmqlg32.exeFiaael32.exeGpnfge32.exeGbnoiqdq.exeGnepna32.exeGoglcahb.exeHedafk32.exeHpiecd32.exeHplbickp.exeHmpcbhji.exeHekgfj32.exeHfjdqmng.exeIebngial.exeIllfdc32.exeIgfclkdj.exeJmbhoeid.exeJenmcggo.exeJcanll32.exeJljbeali.exeJinboekc.exeJokkgl32.exeJgbchj32.exeKgdpni32.exeKnqepc32.exeKcmmhj32.exeKncaec32.exeKjjbjd32.exeKlhnfo32.exeKjlopc32.exeLcdciiec.exeLlmhaold.exeLjqhkckn.exeLomqcjie.exeLckiihok.exeLmdnbn32.exeLflbkcll.exeMfnoqc32.exeMqdcnl32.exeNagiji32.exeOgekbb32.exeOclkgccf.exepid process 1824 Anclbkbp.exe 3280 Bdpaeehj.exe 4900 Blgifbil.exe 1292 Badanigc.exe 1736 Bohbhmfm.exe 1604 Bdgged32.exe 4192 Ckclhn32.exe 3156 Clchbqoo.exe 3340 Chiigadc.exe 3344 Chlflabp.exe 1720 Cdbfab32.exe 2708 Dnmhpg32.exe 4432 Dnpdegjp.exe 4124 Dooaoj32.exe 3972 Doaneiop.exe 2248 Dngjff32.exe 2560 Ekkkoj32.exe 4884 Ekaapi32.exe 1568 Emanjldl.exe 3888 Fihnomjp.exe 3724 Fijkdmhn.exe 1140 Fmhdkknd.exe 2008 Fbelcblk.exe 380 Flmqlg32.exe 3444 Fiaael32.exe 4392 Gpnfge32.exe 4104 Gbnoiqdq.exe 228 Gnepna32.exe 4496 Goglcahb.exe 2020 Hedafk32.exe 3312 Hpiecd32.exe 1592 Hplbickp.exe 2736 Hmpcbhji.exe 4028 Hekgfj32.exe 1436 Hfjdqmng.exe 3140 Iebngial.exe 2456 Illfdc32.exe 772 Igfclkdj.exe 4956 Jmbhoeid.exe 4508 Jenmcggo.exe 4380 Jcanll32.exe 3264 Jljbeali.exe 2964 Jinboekc.exe 5008 Jokkgl32.exe 3336 Jgbchj32.exe 2376 Kgdpni32.exe 976 Knqepc32.exe 1392 Kcmmhj32.exe 4828 Kncaec32.exe 3252 Kjjbjd32.exe 220 Klhnfo32.exe 3208 Kjlopc32.exe 872 Lcdciiec.exe 1980 Llmhaold.exe 2496 Ljqhkckn.exe 3692 Lomqcjie.exe 1676 Lckiihok.exe 3620 Lmdnbn32.exe 2572 Lflbkcll.exe 2816 Mfnoqc32.exe 780 Mqdcnl32.exe 1740 Nagiji32.exe 448 Ogekbb32.exe 1252 Oclkgccf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ddcogo32.exeCjflblll.exeJejbhk32.exeOnakco32.exePbfjjlgc.exeEbokodfc.exeAnffje32.exeDlicflic.exeHhpheo32.exeMomqblgj.exeJhdcmf32.exeKjlopc32.exeKehojiej.exeKgcqlh32.exeNgklppei.exePnjgog32.exeGiddddad.exeOmdnbd32.exeCcfcpm32.exeDkpjdo32.exeBikeni32.exeJaefne32.exePndhhnda.exeIoppho32.exeEeddfe32.exeJcoioabf.exeIjfkpnji.exeFpnfbi32.exeNieggill.exeBnclamqe.exeOclkgccf.exeQacameaj.exeEgpnooan.exeGqpapacd.exeMapgfk32.exeCehdib32.exeFkbkoo32.exeObafjk32.exeIkbfbdgf.exeMkfnlmkl.exeJenmcggo.exeGaloohke.exeIloajfml.exeGipbck32.exeJhejgl32.exePmeoqlpl.exeJjfdfl32.exeCppelkeb.exeDlbfmjqi.exeLpelqj32.exeCbdhgaid.exeIllfdc32.exeJokkgl32.exeDnajppda.exeFnfmbmbi.exeNbdkhe32.exeOpmcod32.exeEglbhnkp.exeDncnnd32.exeHaeadi32.exeEjcaidlp.exeHhimhobl.exedescription ioc process File created C:\Windows\SysWOW64\Jgfdkj32.dll Ddcogo32.exe File created C:\Windows\SysWOW64\Ddkpoelb.exe Cjflblll.exe File opened for modification C:\Windows\SysWOW64\Jldkeeig.exe Jejbhk32.exe File opened for modification C:\Windows\SysWOW64\Ofhcdlgg.exe Onakco32.exe File created C:\Windows\SysWOW64\Hpqkcc32.dll Pbfjjlgc.exe File created C:\Windows\SysWOW64\Elgohj32.exe Ebokodfc.exe File opened for modification C:\Windows\SysWOW64\Ahkkhnpg.exe Anffje32.exe File opened for modification C:\Windows\SysWOW64\Dbckcf32.exe Dlicflic.exe File created C:\Windows\SysWOW64\Hhbdko32.exe Hhpheo32.exe File created C:\Windows\SysWOW64\Mfgiof32.exe Momqblgj.exe File opened for modification C:\Windows\SysWOW64\Jnalem32.exe Jhdcmf32.exe File created C:\Windows\SysWOW64\Lcdciiec.exe Kjlopc32.exe File created C:\Windows\SysWOW64\Llfgke32.dll Kehojiej.exe File opened for modification C:\Windows\SysWOW64\Kakednfj.exe Kgcqlh32.exe File created C:\Windows\SysWOW64\Ogmiepcf.exe Ngklppei.exe File created C:\Windows\SysWOW64\Pnlcdg32.exe Pnjgog32.exe File created C:\Windows\SysWOW64\Hifaic32.exe Giddddad.exe File created C:\Windows\SysWOW64\Obafjk32.exe Omdnbd32.exe File created C:\Windows\SysWOW64\Cpjdiadb.exe Ccfcpm32.exe File created C:\Windows\SysWOW64\Dajbaika.exe Dkpjdo32.exe File created C:\Windows\SysWOW64\Ibnoch32.dll Bikeni32.exe File created C:\Windows\SysWOW64\Khonkogj.exe Jaefne32.exe File opened for modification C:\Windows\SysWOW64\Pdnpeh32.exe Pndhhnda.exe File created C:\Windows\SysWOW64\Dlhmea32.dll Ioppho32.exe File opened for modification C:\Windows\SysWOW64\Elolco32.exe Eeddfe32.exe File created C:\Windows\SysWOW64\Jndmlj32.exe Jcoioabf.exe File created C:\Windows\SysWOW64\Mgeengon.dll Ijfkpnji.exe File opened for modification C:\Windows\SysWOW64\Fclohg32.exe Fpnfbi32.exe File created C:\Windows\SysWOW64\Okfpid32.exe Nieggill.exe File opened for modification C:\Windows\SysWOW64\Bglpjb32.exe Bnclamqe.exe File created C:\Windows\SysWOW64\Opclldhj.exe Oclkgccf.exe File opened for modification C:\Windows\SysWOW64\Aphnnafb.exe Qacameaj.exe File created C:\Windows\SysWOW64\Binfdh32.dll Egpnooan.exe File created C:\Windows\SysWOW64\Gkefmjcj.exe Gqpapacd.exe File created C:\Windows\SysWOW64\Miklkm32.exe Mapgfk32.exe File created C:\Windows\SysWOW64\Aijdpd32.dll Cehdib32.exe File opened for modification C:\Windows\SysWOW64\Fhflhcfa.exe Fkbkoo32.exe File created C:\Windows\SysWOW64\Omgjhc32.exe Obafjk32.exe File opened for modification C:\Windows\SysWOW64\Ioqohb32.exe Ikbfbdgf.exe File created C:\Windows\SysWOW64\Mijofaje.exe Mkfnlmkl.exe File created C:\Windows\SysWOW64\Adfonlkp.dll Jenmcggo.exe File created C:\Windows\SysWOW64\Gkdpbpih.exe Galoohke.exe File created C:\Windows\SysWOW64\Jaljbmkd.exe Iloajfml.exe File opened for modification C:\Windows\SysWOW64\Gegchl32.exe Gipbck32.exe File opened for modification C:\Windows\SysWOW64\Jfikaqme.exe Jhejgl32.exe File opened for modification C:\Windows\SysWOW64\Kopcbo32.exe Kehojiej.exe File created C:\Windows\SysWOW64\Pfncia32.exe Pmeoqlpl.exe File opened for modification C:\Windows\SysWOW64\Japmcfcc.exe Jjfdfl32.exe File created C:\Windows\SysWOW64\Cfjnhe32.exe Cppelkeb.exe File opened for modification C:\Windows\SysWOW64\Efhjjcpo.exe Dlbfmjqi.exe File created C:\Windows\SysWOW64\Ljjpnb32.exe Lpelqj32.exe File created C:\Windows\SysWOW64\Ehlolk32.dll Cbdhgaid.exe File created C:\Windows\SysWOW64\Igfclkdj.exe Illfdc32.exe File opened for modification C:\Windows\SysWOW64\Jgbchj32.exe Jokkgl32.exe File created C:\Windows\SysWOW64\Dqbcbkab.exe Dnajppda.exe File created C:\Windows\SysWOW64\Filapfbo.exe Fnfmbmbi.exe File created C:\Windows\SysWOW64\Oohkai32.exe Nbdkhe32.exe File created C:\Windows\SysWOW64\Lfloio32.dll Opmcod32.exe File opened for modification C:\Windows\SysWOW64\Eaegqc32.exe Eglbhnkp.exe File opened for modification C:\Windows\SysWOW64\Mijofaje.exe Mkfnlmkl.exe File created C:\Windows\SysWOW64\Fhklgafl.dll Dncnnd32.exe File opened for modification C:\Windows\SysWOW64\Ipjoee32.exe Haeadi32.exe File created C:\Windows\SysWOW64\Adedjl32.dll Ejcaidlp.exe File created C:\Windows\SysWOW64\Pkpbai32.dll Hhimhobl.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5576 3056 WerFault.exe Okfpid32.exe -
Modifies registry class 64 IoCs
Processes:
Ghpooanf.exeAcgacegg.exeGqpapacd.exePpdjpcng.exeGlmhdm32.exeBfnnmg32.exeFibfbm32.exeEnoddi32.exePnmopk32.exeEegqldqg.exeDeagoa32.exeDagajlal.exeJloibkhh.exeKklbop32.exeBhpofl32.exePdeffgff.exeKajfdk32.exeDeejpjgc.exeLlmbqdfb.exeMnbnchlb.exeEjcaidlp.exeNieggill.exeDcffnbee.exeHejjanpm.exeOojalb32.exeQlnfkgho.exeEdplhjhi.exeGnanioad.exeApngjd32.exeIjmapm32.exeNncoaq32.exePpafpm32.exeDgcihgaj.exeHnbeeiji.exeNiqnli32.exeCehdib32.exeJcnbekok.exeNnabladg.exeLoqjlg32.exeEmanjldl.exeHkjohi32.exeIgneda32.exeEegpkcbd.exeAghdco32.exeEcpomiok.exeJjnaaa32.exeAeffgkkp.exeEflocepa.exeFplimi32.exeKpnjah32.exeJhfbog32.exeEjglcq32.exeMfjlolpp.exeNicjaino.exeFnhbmgmk.exeLjijci32.exeDoaneiop.exePgoigcip.exeFoakpc32.exeEangjkkd.exeKjjbjd32.exeHkcbnh32.exeJgbhdkml.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghpooanf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beoeaj32.dll" Acgacegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gqpapacd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppdjpcng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnamkncf.dll" Glmhdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfnnmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fibfbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enoddi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgjimp32.dll" Pnmopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eegqldqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deagoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dagajlal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhmchd32.dll" Jloibkhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kklbop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhpofl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdeffgff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kajfdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deejpjgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llmbqdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnbnchlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adedjl32.dll" Ejcaidlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nieggill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdedgjno.dll" Dcffnbee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hejjanpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbfjfc32.dll" Oojalb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqbmhb32.dll" Qlnfkgho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpahkbdh.dll" Edplhjhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gnanioad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apngjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Didhmpdm.dll" Ijmapm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nncoaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppafpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcknij32.dll" Dgcihgaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnbeeiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Niqnli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cehdib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcnbekok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnabladg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Loqjlg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emanjldl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkjohi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igneda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eegpkcbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aghdco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecpomiok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khecje32.dll" Jjnaaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aeffgkkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lecipbeq.dll" Igneda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eflocepa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fplimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inmdohhp.dll" Kpnjah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldnemdgd.dll" Jhfbog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejglcq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikinag32.dll" Mfjlolpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nicjaino.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnhbmgmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljijci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Doaneiop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joabhd32.dll" Pgoigcip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Foakpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eangjkkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjjbjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bblnengb.dll" Hkcbnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgbhdkml.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exeAnclbkbp.exeBdpaeehj.exeBlgifbil.exeBadanigc.exeBohbhmfm.exeBdgged32.exeCkclhn32.exeClchbqoo.exeChiigadc.exeChlflabp.exeCdbfab32.exeDnmhpg32.exeDnpdegjp.exeDooaoj32.exeDoaneiop.exeDngjff32.exeEkkkoj32.exeEkaapi32.exeEmanjldl.exeFihnomjp.exeFijkdmhn.exedescription pid process target process PID 4780 wrote to memory of 1824 4780 ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe Anclbkbp.exe PID 4780 wrote to memory of 1824 4780 ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe Anclbkbp.exe PID 4780 wrote to memory of 1824 4780 ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe Anclbkbp.exe PID 1824 wrote to memory of 3280 1824 Anclbkbp.exe Bdpaeehj.exe PID 1824 wrote to memory of 3280 1824 Anclbkbp.exe Bdpaeehj.exe PID 1824 wrote to memory of 3280 1824 Anclbkbp.exe Bdpaeehj.exe PID 3280 wrote to memory of 4900 3280 Bdpaeehj.exe Blgifbil.exe PID 3280 wrote to memory of 4900 3280 Bdpaeehj.exe Blgifbil.exe PID 3280 wrote to memory of 4900 3280 Bdpaeehj.exe Blgifbil.exe PID 4900 wrote to memory of 1292 4900 Blgifbil.exe Badanigc.exe PID 4900 wrote to memory of 1292 4900 Blgifbil.exe Badanigc.exe PID 4900 wrote to memory of 1292 4900 Blgifbil.exe Badanigc.exe PID 1292 wrote to memory of 1736 1292 Badanigc.exe Bohbhmfm.exe PID 1292 wrote to memory of 1736 1292 Badanigc.exe Bohbhmfm.exe PID 1292 wrote to memory of 1736 1292 Badanigc.exe Bohbhmfm.exe PID 1736 wrote to memory of 1604 1736 Bohbhmfm.exe Bdgged32.exe PID 1736 wrote to memory of 1604 1736 Bohbhmfm.exe Bdgged32.exe PID 1736 wrote to memory of 1604 1736 Bohbhmfm.exe Bdgged32.exe PID 1604 wrote to memory of 4192 1604 Bdgged32.exe Ckclhn32.exe PID 1604 wrote to memory of 4192 1604 Bdgged32.exe Ckclhn32.exe PID 1604 wrote to memory of 4192 1604 Bdgged32.exe Ckclhn32.exe PID 4192 wrote to memory of 3156 4192 Ckclhn32.exe Clchbqoo.exe PID 4192 wrote to memory of 3156 4192 Ckclhn32.exe Clchbqoo.exe PID 4192 wrote to memory of 3156 4192 Ckclhn32.exe Clchbqoo.exe PID 3156 wrote to memory of 3340 3156 Clchbqoo.exe Chiigadc.exe PID 3156 wrote to memory of 3340 3156 Clchbqoo.exe Chiigadc.exe PID 3156 wrote to memory of 3340 3156 Clchbqoo.exe Chiigadc.exe PID 3340 wrote to memory of 3344 3340 Chiigadc.exe Chlflabp.exe PID 3340 wrote to memory of 3344 3340 Chiigadc.exe Chlflabp.exe PID 3340 wrote to memory of 3344 3340 Chiigadc.exe Chlflabp.exe PID 3344 wrote to memory of 1720 3344 Chlflabp.exe Cdbfab32.exe PID 3344 wrote to memory of 1720 3344 Chlflabp.exe Cdbfab32.exe PID 3344 wrote to memory of 1720 3344 Chlflabp.exe Cdbfab32.exe PID 1720 wrote to memory of 2708 1720 Cdbfab32.exe Dnmhpg32.exe PID 1720 wrote to memory of 2708 1720 Cdbfab32.exe Dnmhpg32.exe PID 1720 wrote to memory of 2708 1720 Cdbfab32.exe Dnmhpg32.exe PID 2708 wrote to memory of 4432 2708 Dnmhpg32.exe Dnpdegjp.exe PID 2708 wrote to memory of 4432 2708 Dnmhpg32.exe Dnpdegjp.exe PID 2708 wrote to memory of 4432 2708 Dnmhpg32.exe Dnpdegjp.exe PID 4432 wrote to memory of 4124 4432 Dnpdegjp.exe Dooaoj32.exe PID 4432 wrote to memory of 4124 4432 Dnpdegjp.exe Dooaoj32.exe PID 4432 wrote to memory of 4124 4432 Dnpdegjp.exe Dooaoj32.exe PID 4124 wrote to memory of 3972 4124 Dooaoj32.exe Doaneiop.exe PID 4124 wrote to memory of 3972 4124 Dooaoj32.exe Doaneiop.exe PID 4124 wrote to memory of 3972 4124 Dooaoj32.exe Doaneiop.exe PID 3972 wrote to memory of 2248 3972 Doaneiop.exe Dngjff32.exe PID 3972 wrote to memory of 2248 3972 Doaneiop.exe Dngjff32.exe PID 3972 wrote to memory of 2248 3972 Doaneiop.exe Dngjff32.exe PID 2248 wrote to memory of 2560 2248 Dngjff32.exe Ekkkoj32.exe PID 2248 wrote to memory of 2560 2248 Dngjff32.exe Ekkkoj32.exe PID 2248 wrote to memory of 2560 2248 Dngjff32.exe Ekkkoj32.exe PID 2560 wrote to memory of 4884 2560 Ekkkoj32.exe Ekaapi32.exe PID 2560 wrote to memory of 4884 2560 Ekkkoj32.exe Ekaapi32.exe PID 2560 wrote to memory of 4884 2560 Ekkkoj32.exe Ekaapi32.exe PID 4884 wrote to memory of 1568 4884 Ekaapi32.exe Emanjldl.exe PID 4884 wrote to memory of 1568 4884 Ekaapi32.exe Emanjldl.exe PID 4884 wrote to memory of 1568 4884 Ekaapi32.exe Emanjldl.exe PID 1568 wrote to memory of 3888 1568 Emanjldl.exe Fihnomjp.exe PID 1568 wrote to memory of 3888 1568 Emanjldl.exe Fihnomjp.exe PID 1568 wrote to memory of 3888 1568 Emanjldl.exe Fihnomjp.exe PID 3888 wrote to memory of 3724 3888 Fihnomjp.exe Fijkdmhn.exe PID 3888 wrote to memory of 3724 3888 Fihnomjp.exe Fijkdmhn.exe PID 3888 wrote to memory of 3724 3888 Fihnomjp.exe Fijkdmhn.exe PID 3724 wrote to memory of 1140 3724 Fijkdmhn.exe Fmhdkknd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ab546cc4b51ffb2c213bea7a64439140_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\Anclbkbp.exeC:\Windows\system32\Anclbkbp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Bdpaeehj.exeC:\Windows\system32\Bdpaeehj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\Blgifbil.exeC:\Windows\system32\Blgifbil.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Badanigc.exeC:\Windows\system32\Badanigc.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\Bohbhmfm.exeC:\Windows\system32\Bohbhmfm.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\Bdgged32.exeC:\Windows\system32\Bdgged32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\Ckclhn32.exeC:\Windows\system32\Ckclhn32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Clchbqoo.exeC:\Windows\system32\Clchbqoo.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\Chiigadc.exeC:\Windows\system32\Chiigadc.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\Chlflabp.exeC:\Windows\system32\Chlflabp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\Cdbfab32.exeC:\Windows\system32\Cdbfab32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\Dnmhpg32.exeC:\Windows\system32\Dnmhpg32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Dnpdegjp.exeC:\Windows\system32\Dnpdegjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\Dooaoj32.exeC:\Windows\system32\Dooaoj32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\Doaneiop.exeC:\Windows\system32\Doaneiop.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\Dngjff32.exeC:\Windows\system32\Dngjff32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\Ekkkoj32.exeC:\Windows\system32\Ekkkoj32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Ekaapi32.exeC:\Windows\system32\Ekaapi32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\Emanjldl.exeC:\Windows\system32\Emanjldl.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\Fihnomjp.exeC:\Windows\system32\Fihnomjp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\Fijkdmhn.exeC:\Windows\system32\Fijkdmhn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\Fmhdkknd.exeC:\Windows\system32\Fmhdkknd.exe23⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\Fbelcblk.exeC:\Windows\system32\Fbelcblk.exe24⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\Flmqlg32.exeC:\Windows\system32\Flmqlg32.exe25⤵
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\Fiaael32.exeC:\Windows\system32\Fiaael32.exe26⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\Gpnfge32.exeC:\Windows\system32\Gpnfge32.exe27⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Gbnoiqdq.exeC:\Windows\system32\Gbnoiqdq.exe28⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\Gnepna32.exeC:\Windows\system32\Gnepna32.exe29⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\Goglcahb.exeC:\Windows\system32\Goglcahb.exe30⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\Hedafk32.exeC:\Windows\system32\Hedafk32.exe31⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Hpiecd32.exeC:\Windows\system32\Hpiecd32.exe32⤵
- Executes dropped EXE
PID:3312 -
C:\Windows\SysWOW64\Hplbickp.exeC:\Windows\system32\Hplbickp.exe33⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\Hmpcbhji.exeC:\Windows\system32\Hmpcbhji.exe34⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\Hekgfj32.exeC:\Windows\system32\Hekgfj32.exe35⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\Hfjdqmng.exeC:\Windows\system32\Hfjdqmng.exe36⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\Iebngial.exeC:\Windows\system32\Iebngial.exe37⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\Illfdc32.exeC:\Windows\system32\Illfdc32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\Igfclkdj.exeC:\Windows\system32\Igfclkdj.exe39⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\Jmbhoeid.exeC:\Windows\system32\Jmbhoeid.exe40⤵
- Executes dropped EXE
PID:4956 -
C:\Windows\SysWOW64\Jenmcggo.exeC:\Windows\system32\Jenmcggo.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4508 -
C:\Windows\SysWOW64\Jcanll32.exeC:\Windows\system32\Jcanll32.exe42⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\Jljbeali.exeC:\Windows\system32\Jljbeali.exe43⤵
- Executes dropped EXE
PID:3264 -
C:\Windows\SysWOW64\Jinboekc.exeC:\Windows\system32\Jinboekc.exe44⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\Jokkgl32.exeC:\Windows\system32\Jokkgl32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5008 -
C:\Windows\SysWOW64\Jgbchj32.exeC:\Windows\system32\Jgbchj32.exe46⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\SysWOW64\Kgdpni32.exeC:\Windows\system32\Kgdpni32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\Kpmdfonj.exeC:\Windows\system32\Kpmdfonj.exe48⤵PID:496
-
C:\Windows\SysWOW64\Knqepc32.exeC:\Windows\system32\Knqepc32.exe49⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Kcmmhj32.exeC:\Windows\system32\Kcmmhj32.exe50⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Kncaec32.exeC:\Windows\system32\Kncaec32.exe51⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\Kjjbjd32.exeC:\Windows\system32\Kjjbjd32.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\Klhnfo32.exeC:\Windows\system32\Klhnfo32.exe53⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Kjlopc32.exeC:\Windows\system32\Kjlopc32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3208 -
C:\Windows\SysWOW64\Lcdciiec.exeC:\Windows\system32\Lcdciiec.exe55⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\Llmhaold.exeC:\Windows\system32\Llmhaold.exe56⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\Ljqhkckn.exeC:\Windows\system32\Ljqhkckn.exe57⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\Lomqcjie.exeC:\Windows\system32\Lomqcjie.exe58⤵
- Executes dropped EXE
PID:3692 -
C:\Windows\SysWOW64\Lckiihok.exeC:\Windows\system32\Lckiihok.exe59⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\Lmdnbn32.exeC:\Windows\system32\Lmdnbn32.exe60⤵
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\Lflbkcll.exeC:\Windows\system32\Lflbkcll.exe61⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\Mfnoqc32.exeC:\Windows\system32\Mfnoqc32.exe62⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\Mqdcnl32.exeC:\Windows\system32\Mqdcnl32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\Nagiji32.exeC:\Windows\system32\Nagiji32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Ogekbb32.exeC:\Windows\system32\Ogekbb32.exe65⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\Oclkgccf.exeC:\Windows\system32\Oclkgccf.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1252 -
C:\Windows\SysWOW64\Opclldhj.exeC:\Windows\system32\Opclldhj.exe67⤵PID:2536
-
C:\Windows\SysWOW64\Opeiadfg.exeC:\Windows\system32\Opeiadfg.exe68⤵PID:4592
-
C:\Windows\SysWOW64\Pjkmomfn.exeC:\Windows\system32\Pjkmomfn.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3964 -
C:\Windows\SysWOW64\Pjmjdm32.exeC:\Windows\system32\Pjmjdm32.exe70⤵PID:208
-
C:\Windows\SysWOW64\Phajna32.exeC:\Windows\system32\Phajna32.exe71⤵PID:3820
-
C:\Windows\SysWOW64\Pplobcpp.exeC:\Windows\system32\Pplobcpp.exe72⤵PID:844
-
C:\Windows\SysWOW64\Pnmopk32.exeC:\Windows\system32\Pnmopk32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3948 -
C:\Windows\SysWOW64\Pnplfj32.exeC:\Windows\system32\Pnplfj32.exe74⤵PID:5032
-
C:\Windows\SysWOW64\Qobhkjdi.exeC:\Windows\system32\Qobhkjdi.exe75⤵PID:2404
-
C:\Windows\SysWOW64\Qfmmplad.exeC:\Windows\system32\Qfmmplad.exe76⤵PID:5068
-
C:\Windows\SysWOW64\Qacameaj.exeC:\Windows\system32\Qacameaj.exe77⤵
- Drops file in System32 directory
PID:4904 -
C:\Windows\SysWOW64\Aphnnafb.exeC:\Windows\system32\Aphnnafb.exe78⤵PID:1352
-
C:\Windows\SysWOW64\Amnlme32.exeC:\Windows\system32\Amnlme32.exe79⤵PID:2956
-
C:\Windows\SysWOW64\Aonhghjl.exeC:\Windows\system32\Aonhghjl.exe80⤵PID:4620
-
C:\Windows\SysWOW64\Aaoaic32.exeC:\Windows\system32\Aaoaic32.exe81⤵PID:5100
-
C:\Windows\SysWOW64\Bobabg32.exeC:\Windows\system32\Bobabg32.exe82⤵PID:4560
-
C:\Windows\SysWOW64\Bgnffj32.exeC:\Windows\system32\Bgnffj32.exe83⤵PID:5128
-
C:\Windows\SysWOW64\Bhmbqm32.exeC:\Windows\system32\Bhmbqm32.exe84⤵PID:5172
-
C:\Windows\SysWOW64\Bmjkic32.exeC:\Windows\system32\Bmjkic32.exe85⤵PID:5216
-
C:\Windows\SysWOW64\Bhpofl32.exeC:\Windows\system32\Bhpofl32.exe86⤵
- Modifies registry class
PID:5260 -
C:\Windows\SysWOW64\Bkphhgfc.exeC:\Windows\system32\Bkphhgfc.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5304 -
C:\Windows\SysWOW64\Bajqda32.exeC:\Windows\system32\Bajqda32.exe88⤵PID:5352
-
C:\Windows\SysWOW64\Cnaaib32.exeC:\Windows\system32\Cnaaib32.exe89⤵PID:5400
-
C:\Windows\SysWOW64\Coqncejg.exeC:\Windows\system32\Coqncejg.exe90⤵PID:5460
-
C:\Windows\SysWOW64\Chiblk32.exeC:\Windows\system32\Chiblk32.exe91⤵PID:5528
-
C:\Windows\SysWOW64\Caageq32.exeC:\Windows\system32\Caageq32.exe92⤵PID:5572
-
C:\Windows\SysWOW64\Chnlgjlb.exeC:\Windows\system32\Chnlgjlb.exe93⤵PID:5620
-
C:\Windows\SysWOW64\Dgcihgaj.exeC:\Windows\system32\Dgcihgaj.exe94⤵
- Modifies registry class
PID:5664 -
C:\Windows\SysWOW64\Dgeenfog.exeC:\Windows\system32\Dgeenfog.exe95⤵PID:5716
-
C:\Windows\SysWOW64\Dhdbhifj.exeC:\Windows\system32\Dhdbhifj.exe96⤵PID:5764
-
C:\Windows\SysWOW64\Dnajppda.exeC:\Windows\system32\Dnajppda.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5808 -
C:\Windows\SysWOW64\Dqbcbkab.exeC:\Windows\system32\Dqbcbkab.exe98⤵PID:5856
-
C:\Windows\SysWOW64\Doccpcja.exeC:\Windows\system32\Doccpcja.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5916 -
C:\Windows\SysWOW64\Edplhjhi.exeC:\Windows\system32\Edplhjhi.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5956 -
C:\Windows\SysWOW64\Eqiibjlj.exeC:\Windows\system32\Eqiibjlj.exe101⤵PID:6000
-
C:\Windows\SysWOW64\Egened32.exeC:\Windows\system32\Egened32.exe102⤵PID:6048
-
C:\Windows\SysWOW64\Eghkjdoa.exeC:\Windows\system32\Eghkjdoa.exe103⤵PID:6104
-
C:\Windows\SysWOW64\Fbmohmoh.exeC:\Windows\system32\Fbmohmoh.exe104⤵PID:548
-
C:\Windows\SysWOW64\Fgjhpcmo.exeC:\Windows\system32\Fgjhpcmo.exe105⤵PID:5224
-
C:\Windows\SysWOW64\Fdnhih32.exeC:\Windows\system32\Fdnhih32.exe106⤵PID:5228
-
C:\Windows\SysWOW64\Fnfmbmbi.exeC:\Windows\system32\Fnfmbmbi.exe107⤵
- Drops file in System32 directory
PID:5360 -
C:\Windows\SysWOW64\Filapfbo.exeC:\Windows\system32\Filapfbo.exe108⤵PID:5456
-
C:\Windows\SysWOW64\Fbdehlip.exeC:\Windows\system32\Fbdehlip.exe109⤵PID:5516
-
C:\Windows\SysWOW64\Fnkfmm32.exeC:\Windows\system32\Fnkfmm32.exe110⤵PID:5600
-
C:\Windows\SysWOW64\Feenjgfq.exeC:\Windows\system32\Feenjgfq.exe111⤵PID:5660
-
C:\Windows\SysWOW64\Gokbgpeg.exeC:\Windows\system32\Gokbgpeg.exe112⤵PID:5756
-
C:\Windows\SysWOW64\Galoohke.exeC:\Windows\system32\Galoohke.exe113⤵
- Drops file in System32 directory
PID:5872 -
C:\Windows\SysWOW64\Gkdpbpih.exeC:\Windows\system32\Gkdpbpih.exe114⤵PID:5940
-
C:\Windows\SysWOW64\Ggkqgaol.exeC:\Windows\system32\Ggkqgaol.exe115⤵PID:6036
-
C:\Windows\SysWOW64\Gndick32.exeC:\Windows\system32\Gndick32.exe116⤵PID:6088
-
C:\Windows\SysWOW64\Ghojbq32.exeC:\Windows\system32\Ghojbq32.exe117⤵PID:5168
-
C:\Windows\SysWOW64\Hlblcn32.exeC:\Windows\system32\Hlblcn32.exe118⤵PID:5288
-
C:\Windows\SysWOW64\Hhimhobl.exeC:\Windows\system32\Hhimhobl.exe119⤵
- Drops file in System32 directory
PID:5424 -
C:\Windows\SysWOW64\Hnbeeiji.exeC:\Windows\system32\Hnbeeiji.exe120⤵
- Modifies registry class
PID:5556 -
C:\Windows\SysWOW64\Hemmac32.exeC:\Windows\system32\Hemmac32.exe121⤵PID:5740
-
C:\Windows\SysWOW64\Ibqnkh32.exeC:\Windows\system32\Ibqnkh32.exe122⤵PID:5900
-
C:\Windows\SysWOW64\Ihmfco32.exeC:\Windows\system32\Ihmfco32.exe123⤵PID:5996
-
C:\Windows\SysWOW64\Ieagmcmq.exeC:\Windows\system32\Ieagmcmq.exe124⤵PID:6084
-
C:\Windows\SysWOW64\Ieccbbkn.exeC:\Windows\system32\Ieccbbkn.exe125⤵PID:5236
-
C:\Windows\SysWOW64\Iamamcop.exeC:\Windows\system32\Iamamcop.exe126⤵PID:5448
-
C:\Windows\SysWOW64\Jlbejloe.exeC:\Windows\system32\Jlbejloe.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5604 -
C:\Windows\SysWOW64\Joqafgni.exeC:\Windows\system32\Joqafgni.exe128⤵PID:376
-
C:\Windows\SysWOW64\Jhplpl32.exeC:\Windows\system32\Jhplpl32.exe129⤵PID:5504
-
C:\Windows\SysWOW64\Jbepme32.exeC:\Windows\system32\Jbepme32.exe130⤵PID:5908
-
C:\Windows\SysWOW64\Khbiello.exeC:\Windows\system32\Khbiello.exe131⤵PID:5684
-
C:\Windows\SysWOW64\Keifdpif.exeC:\Windows\system32\Keifdpif.exe132⤵PID:5140
-
C:\Windows\SysWOW64\Kpnjah32.exeC:\Windows\system32\Kpnjah32.exe133⤵
- Modifies registry class
PID:6160 -
C:\Windows\SysWOW64\Kekbjo32.exeC:\Windows\system32\Kekbjo32.exe134⤵PID:6196
-
C:\Windows\SysWOW64\Kpqggh32.exeC:\Windows\system32\Kpqggh32.exe135⤵PID:6260
-
C:\Windows\SysWOW64\Nqoloc32.exeC:\Windows\system32\Nqoloc32.exe136⤵PID:6304
-
C:\Windows\SysWOW64\Oqmhqapg.exeC:\Windows\system32\Oqmhqapg.exe137⤵PID:6340
-
C:\Windows\SysWOW64\Obnehj32.exeC:\Windows\system32\Obnehj32.exe138⤵PID:6384
-
C:\Windows\SysWOW64\Omdieb32.exeC:\Windows\system32\Omdieb32.exe139⤵PID:6432
-
C:\Windows\SysWOW64\Ocnabm32.exeC:\Windows\system32\Ocnabm32.exe140⤵PID:6500
-
C:\Windows\SysWOW64\Bjfogbjb.exeC:\Windows\system32\Bjfogbjb.exe141⤵PID:6552
-
C:\Windows\SysWOW64\Bpcgpihi.exeC:\Windows\system32\Bpcgpihi.exe142⤵PID:6604
-
C:\Windows\SysWOW64\Bmggingc.exeC:\Windows\system32\Bmggingc.exe143⤵PID:6640
-
C:\Windows\SysWOW64\Bfolacnc.exeC:\Windows\system32\Bfolacnc.exe144⤵PID:6708
-
C:\Windows\SysWOW64\Baepolni.exeC:\Windows\system32\Baepolni.exe145⤵PID:6756
-
C:\Windows\SysWOW64\Bfaigclq.exeC:\Windows\system32\Bfaigclq.exe146⤵PID:6800
-
C:\Windows\SysWOW64\Bdeiqgkj.exeC:\Windows\system32\Bdeiqgkj.exe147⤵PID:6840
-
C:\Windows\SysWOW64\Cibain32.exeC:\Windows\system32\Cibain32.exe148⤵PID:6888
-
C:\Windows\SysWOW64\Cgfbbb32.exeC:\Windows\system32\Cgfbbb32.exe149⤵PID:6936
-
C:\Windows\SysWOW64\Cgiohbfi.exeC:\Windows\system32\Cgiohbfi.exe150⤵PID:6980
-
C:\Windows\SysWOW64\Cdmoafdb.exeC:\Windows\system32\Cdmoafdb.exe151⤵PID:7028
-
C:\Windows\SysWOW64\Cpcpfg32.exeC:\Windows\system32\Cpcpfg32.exe152⤵PID:7076
-
C:\Windows\SysWOW64\Cdaile32.exeC:\Windows\system32\Cdaile32.exe153⤵PID:7124
-
C:\Windows\SysWOW64\Dinael32.exeC:\Windows\system32\Dinael32.exe154⤵PID:6168
-
C:\Windows\SysWOW64\Dcffnbee.exeC:\Windows\system32\Dcffnbee.exe155⤵
- Modifies registry class
PID:6216 -
C:\Windows\SysWOW64\Dahfkimd.exeC:\Windows\system32\Dahfkimd.exe156⤵PID:6292
-
C:\Windows\SysWOW64\Dkpjdo32.exeC:\Windows\system32\Dkpjdo32.exe157⤵
- Drops file in System32 directory
PID:6400 -
C:\Windows\SysWOW64\Dajbaika.exeC:\Windows\system32\Dajbaika.exe158⤵PID:6560
-
C:\Windows\SysWOW64\Eaceghcg.exeC:\Windows\system32\Eaceghcg.exe159⤵PID:6588
-
C:\Windows\SysWOW64\Egpnooan.exeC:\Windows\system32\Egpnooan.exe160⤵
- Drops file in System32 directory
PID:6696 -
C:\Windows\SysWOW64\Enjfli32.exeC:\Windows\system32\Enjfli32.exe161⤵PID:6788
-
C:\Windows\SysWOW64\Egbken32.exeC:\Windows\system32\Egbken32.exe162⤵PID:6848
-
C:\Windows\SysWOW64\Edfknb32.exeC:\Windows\system32\Edfknb32.exe163⤵PID:6944
-
C:\Windows\SysWOW64\Enopghee.exeC:\Windows\system32\Enopghee.exe164⤵PID:7016
-
C:\Windows\SysWOW64\Fggdpnkf.exeC:\Windows\system32\Fggdpnkf.exe165⤵PID:7068
-
C:\Windows\SysWOW64\Fnalmh32.exeC:\Windows\system32\Fnalmh32.exe166⤵PID:7132
-
C:\Windows\SysWOW64\Fcneeo32.exeC:\Windows\system32\Fcneeo32.exe167⤵PID:6148
-
C:\Windows\SysWOW64\Fglnkm32.exeC:\Windows\system32\Fglnkm32.exe168⤵PID:6288
-
C:\Windows\SysWOW64\Fdpnda32.exeC:\Windows\system32\Fdpnda32.exe169⤵PID:6368
-
C:\Windows\SysWOW64\Fnhbmgmk.exeC:\Windows\system32\Fnhbmgmk.exe170⤵
- Modifies registry class
PID:6540 -
C:\Windows\SysWOW64\Fjocbhbo.exeC:\Windows\system32\Fjocbhbo.exe171⤵PID:6648
-
C:\Windows\SysWOW64\Gkcigjel.exeC:\Windows\system32\Gkcigjel.exe172⤵PID:6816
-
C:\Windows\SysWOW64\Gqpapacd.exeC:\Windows\system32\Gqpapacd.exe173⤵
- Drops file in System32 directory
- Modifies registry class
PID:6924 -
C:\Windows\SysWOW64\Gkefmjcj.exeC:\Windows\system32\Gkefmjcj.exe174⤵PID:7064
-
C:\Windows\SysWOW64\Gqbneq32.exeC:\Windows\system32\Gqbneq32.exe175⤵PID:7164
-
C:\Windows\SysWOW64\Gglfbkin.exeC:\Windows\system32\Gglfbkin.exe176⤵PID:3744
-
C:\Windows\SysWOW64\Gnfooe32.exeC:\Windows\system32\Gnfooe32.exe177⤵PID:6468
-
C:\Windows\SysWOW64\Hkjohi32.exeC:\Windows\system32\Hkjohi32.exe178⤵
- Modifies registry class
PID:6796 -
C:\Windows\SysWOW64\Hqghqpnl.exeC:\Windows\system32\Hqghqpnl.exe179⤵PID:6988
-
C:\Windows\SysWOW64\Hgapmj32.exeC:\Windows\system32\Hgapmj32.exe180⤵PID:7120
-
C:\Windows\SysWOW64\Heepfn32.exeC:\Windows\system32\Heepfn32.exe181⤵PID:212
-
C:\Windows\SysWOW64\Hnmeodjc.exeC:\Windows\system32\Hnmeodjc.exe182⤵PID:6868
-
C:\Windows\SysWOW64\Hcjmhk32.exeC:\Windows\system32\Hcjmhk32.exe183⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6268 -
C:\Windows\SysWOW64\Hjdedepg.exeC:\Windows\system32\Hjdedepg.exe184⤵PID:1096
-
C:\Windows\SysWOW64\Hejjanpm.exeC:\Windows\system32\Hejjanpm.exe185⤵
- Modifies registry class
PID:7216 -
C:\Windows\SysWOW64\Hkcbnh32.exeC:\Windows\system32\Hkcbnh32.exe186⤵
- Modifies registry class
PID:7260 -
C:\Windows\SysWOW64\Hnbnjc32.exeC:\Windows\system32\Hnbnjc32.exe187⤵PID:7300
-
C:\Windows\SysWOW64\Icogcjde.exeC:\Windows\system32\Icogcjde.exe188⤵PID:7336
-
C:\Windows\SysWOW64\Indkpcdk.exeC:\Windows\system32\Indkpcdk.exe189⤵PID:7368
-
C:\Windows\SysWOW64\Iencmm32.exeC:\Windows\system32\Iencmm32.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7420 -
C:\Windows\SysWOW64\Ilhkigcd.exeC:\Windows\system32\Ilhkigcd.exe191⤵PID:7456
-
C:\Windows\SysWOW64\Iccpniqp.exeC:\Windows\system32\Iccpniqp.exe192⤵PID:7496
-
C:\Windows\SysWOW64\Ijmhkchl.exeC:\Windows\system32\Ijmhkchl.exe193⤵PID:7532
-
C:\Windows\SysWOW64\Iecmhlhb.exeC:\Windows\system32\Iecmhlhb.exe194⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7576 -
C:\Windows\SysWOW64\Inkaqb32.exeC:\Windows\system32\Inkaqb32.exe195⤵PID:7612
-
C:\Windows\SysWOW64\Ieeimlep.exeC:\Windows\system32\Ieeimlep.exe196⤵PID:7656
-
C:\Windows\SysWOW64\Iloajfml.exeC:\Windows\system32\Iloajfml.exe197⤵
- Drops file in System32 directory
PID:7700 -
C:\Windows\SysWOW64\Jaljbmkd.exeC:\Windows\system32\Jaljbmkd.exe198⤵PID:7744
-
C:\Windows\SysWOW64\Jhfbog32.exeC:\Windows\system32\Jhfbog32.exe199⤵
- Modifies registry class
PID:7780 -
C:\Windows\SysWOW64\Jejbhk32.exeC:\Windows\system32\Jejbhk32.exe200⤵
- Drops file in System32 directory
PID:7820 -
C:\Windows\SysWOW64\Jldkeeig.exeC:\Windows\system32\Jldkeeig.exe201⤵PID:7856
-
C:\Windows\SysWOW64\Jaqcnl32.exeC:\Windows\system32\Jaqcnl32.exe202⤵PID:7896
-
C:\Windows\SysWOW64\Jhkljfok.exeC:\Windows\system32\Jhkljfok.exe203⤵PID:7932
-
C:\Windows\SysWOW64\Jnedgq32.exeC:\Windows\system32\Jnedgq32.exe204⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7968 -
C:\Windows\SysWOW64\Jhmhpfmi.exeC:\Windows\system32\Jhmhpfmi.exe205⤵PID:8008
-
C:\Windows\SysWOW64\Jddiegbm.exeC:\Windows\system32\Jddiegbm.exe206⤵PID:8048
-
C:\Windows\SysWOW64\Jjnaaa32.exeC:\Windows\system32\Jjnaaa32.exe207⤵
- Modifies registry class
PID:8084 -
C:\Windows\SysWOW64\Khabke32.exeC:\Windows\system32\Khabke32.exe208⤵PID:8124
-
C:\Windows\SysWOW64\Kajfdk32.exeC:\Windows\system32\Kajfdk32.exe209⤵
- Modifies registry class
PID:8164 -
C:\Windows\SysWOW64\Kehojiej.exeC:\Windows\system32\Kehojiej.exe210⤵
- Drops file in System32 directory
PID:7096 -
C:\Windows\SysWOW64\Kopcbo32.exeC:\Windows\system32\Kopcbo32.exe211⤵PID:7252
-
C:\Windows\SysWOW64\Kejloi32.exeC:\Windows\system32\Kejloi32.exe212⤵PID:7324
-
C:\Windows\SysWOW64\Klddlckd.exeC:\Windows\system32\Klddlckd.exe213⤵PID:7400
-
C:\Windows\SysWOW64\Kdpiqehp.exeC:\Windows\system32\Kdpiqehp.exe214⤵PID:7480
-
C:\Windows\SysWOW64\Loemnnhe.exeC:\Windows\system32\Loemnnhe.exe215⤵PID:7528
-
C:\Windows\SysWOW64\Llimgb32.exeC:\Windows\system32\Llimgb32.exe216⤵PID:7600
-
C:\Windows\SysWOW64\Logicn32.exeC:\Windows\system32\Logicn32.exe217⤵PID:7664
-
C:\Windows\SysWOW64\Lddble32.exeC:\Windows\system32\Lddble32.exe218⤵PID:7732
-
C:\Windows\SysWOW64\Lojfin32.exeC:\Windows\system32\Lojfin32.exe219⤵PID:7804
-
C:\Windows\SysWOW64\Ldfoad32.exeC:\Windows\system32\Ldfoad32.exe220⤵PID:7872
-
C:\Windows\SysWOW64\Lkqgno32.exeC:\Windows\system32\Lkqgno32.exe221⤵PID:6324
-
C:\Windows\SysWOW64\Lefkkg32.exeC:\Windows\system32\Lefkkg32.exe222⤵PID:7940
-
C:\Windows\SysWOW64\Lkcccn32.exeC:\Windows\system32\Lkcccn32.exe223⤵PID:8004
-
C:\Windows\SysWOW64\Mccokj32.exeC:\Windows\system32\Mccokj32.exe224⤵PID:8076
-
C:\Windows\SysWOW64\Nfknmd32.exeC:\Windows\system32\Nfknmd32.exe225⤵PID:8156
-
C:\Windows\SysWOW64\Nlefjnno.exeC:\Windows\system32\Nlefjnno.exe226⤵PID:7208
-
C:\Windows\SysWOW64\Nbbnbemf.exeC:\Windows\system32\Nbbnbemf.exe227⤵PID:7288
-
C:\Windows\SysWOW64\Nbdkhe32.exeC:\Windows\system32\Nbdkhe32.exe228⤵
- Drops file in System32 directory
PID:7444 -
C:\Windows\SysWOW64\Oohkai32.exeC:\Windows\system32\Oohkai32.exe229⤵PID:7608
-
C:\Windows\SysWOW64\Oloipmfd.exeC:\Windows\system32\Oloipmfd.exe230⤵PID:7724
-
C:\Windows\SysWOW64\Obkahddl.exeC:\Windows\system32\Obkahddl.exe231⤵PID:7884
-
C:\Windows\SysWOW64\Oheienli.exeC:\Windows\system32\Oheienli.exe232⤵PID:6524
-
C:\Windows\SysWOW64\Obnnnc32.exeC:\Windows\system32\Obnnnc32.exe233⤵PID:5968
-
C:\Windows\SysWOW64\Ohhfknjf.exeC:\Windows\system32\Ohhfknjf.exe234⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8072 -
C:\Windows\SysWOW64\Ooangh32.exeC:\Windows\system32\Ooangh32.exe235⤵PID:7624
-
C:\Windows\SysWOW64\Oflfdbip.exeC:\Windows\system32\Oflfdbip.exe236⤵PID:7280
-
C:\Windows\SysWOW64\Pmeoqlpl.exeC:\Windows\system32\Pmeoqlpl.exe237⤵
- Drops file in System32 directory
PID:7512 -
C:\Windows\SysWOW64\Pfncia32.exeC:\Windows\system32\Pfncia32.exe238⤵PID:7764
-
C:\Windows\SysWOW64\Pofhbgmn.exeC:\Windows\system32\Pofhbgmn.exe239⤵PID:6908
-
C:\Windows\SysWOW64\Peempn32.exeC:\Windows\system32\Peempn32.exe240⤵PID:8040
-
C:\Windows\SysWOW64\Pkoemhao.exeC:\Windows\system32\Pkoemhao.exe241⤵PID:7292
-
C:\Windows\SysWOW64\Pehjfm32.exeC:\Windows\system32\Pehjfm32.exe242⤵PID:8044