Analysis
-
max time kernel
156s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
572df452d5878875461e809e1c915330_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
572df452d5878875461e809e1c915330_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
572df452d5878875461e809e1c915330_NeikiAnalytics.exe
-
Size
85KB
-
MD5
572df452d5878875461e809e1c915330
-
SHA1
99916671aac8b9ce25c8e574cfec14cb103b11bf
-
SHA256
e91ba1b4d03d5966290b0b5d8854c33184035c9dac8077148221a2047f2b52d4
-
SHA512
d0909115d518f6d793b3376a8cce6d618eac1183f9c714c56169e3335453153429e8821843906bef36d183cd3ceddac7c6515e9fc9a79395447e7f3af0f5b046
-
SSDEEP
1536:lBbkd6xQa819BrCfZsoEuq6l2LHDBMQ262AjCsQ2PCZZrqOlNfVSLUK+:lBbkd6xQ/19BOBs+gH9MQH2qC7ZQOlzb
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Akjgdjoj.exeGhgeoq32.exeCcacjgfb.exeKemhpl32.exeKhknaa32.exeBiadoeib.exeJgjeppkp.exeOaeegjeb.exeAblahjhj.exeMacdgn32.exeBboffejp.exeDcphdqmj.exeGhpooanf.exeKkqepi32.exeKbbodj32.exeKoonge32.exeHhlnjpdi.exeLehaad32.exeObgccn32.exeJfgefg32.exeIlcjgm32.exeAmgekh32.exeNaaejj32.exeJbeinb32.exeKgfdfbhj.exeGgdbmoho.exeMdhkefnj.exeEfhlan32.exePhkaqqoi.exeFocakm32.exeJbmfig32.exeNgpcmj32.exePkqdhnom.exeNkebee32.exeMiqlpbap.exeHjeiai32.exeNhkief32.exeFpandm32.exeKahinkaf.exeOhkijc32.exeDjoohk32.exeCebllbcc.exeKapfiqoj.exeDkkcqj32.exeKkcfbj32.exeKpnepk32.exeNiiaae32.exeMbenfq32.exePdeffgff.exeAooolbep.exeObanqgkl.exeFanigb32.exePfdbpjmi.exeMmdlflki.exeOpjgidfa.exeOeahap32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akjgdjoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghgeoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccacjgfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kemhpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khknaa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biadoeib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgjeppkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oaeegjeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ablahjhj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Macdgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bboffejp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcphdqmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghpooanf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkqepi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbbodj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koonge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhlnjpdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lehaad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obgccn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfgefg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilcjgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amgekh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Naaejj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbeinb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgfdfbhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggdbmoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdhkefnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efhlan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phkaqqoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Focakm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbmfig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngpcmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkqdhnom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkebee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Miqlpbap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjeiai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhkief32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpandm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kahinkaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohkijc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djoohk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cebllbcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kapfiqoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkcfbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpnepk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niiaae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbenfq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdeffgff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aooolbep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obanqgkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fanigb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfdbpjmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmdlflki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opjgidfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeahap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad -
Executes dropped EXE 64 IoCs
Processes:
Jeocna32.exeKakmna32.exeKoonge32.exeKapfiqoj.exeKocgbend.exeKpccmhdg.exeLikhem32.exeLpgmhg32.exeLhcali32.exeLoofnccf.exeLjdkll32.exeMablfnne.exeNbebbk32.exePfojdh32.exePmkofa32.exePfepdg32.exePmbegqjk.exeQpbnhl32.exeAbcgjg32.exeAiplmq32.exeApnndj32.exeBboffejp.exeBmggingc.exeCalfpk32.exeCkidcpjl.exeDphiaffa.exeDjegekil.exeDcphdqmj.exeEcdbop32.exeEgegjn32.exeFnalmh32.exeFdmaoahm.exeFqfojblo.exeGcghkm32.exeGnohnffc.exeGqpapacd.exeGqbneq32.exeGnfooe32.exeHgcmbj32.exeHcjmhk32.exeHcljmj32.exeIapjgo32.exeIgmoih32.exeIbdplaho.exeJehfcl32.exeJnedgq32.exeJjkdlall.exeKahinkaf.exeKhdoqefq.exeKhfkfedn.exeKlgqabib.exeLacijjgi.exeLeabphmp.exeLbebilli.exeLlngbabj.exeLamlphoo.exeMkepineo.exeMdnebc32.exeMhknhabf.exeMadbagif.exeMhnjna32.exeMojopk32.exeNomlek32.exeNlqloo32.exepid process 2872 Jeocna32.exe 2876 Kakmna32.exe 660 Koonge32.exe 3364 Kapfiqoj.exe 220 Kocgbend.exe 2804 Kpccmhdg.exe 912 Likhem32.exe 2356 Lpgmhg32.exe 4328 Lhcali32.exe 1812 Loofnccf.exe 3148 Ljdkll32.exe 4556 Mablfnne.exe 5112 Nbebbk32.exe 1436 Pfojdh32.exe 2148 Pmkofa32.exe 3752 Pfepdg32.exe 3320 Pmbegqjk.exe 2900 Qpbnhl32.exe 3836 Abcgjg32.exe 2744 Aiplmq32.exe 3128 Apnndj32.exe 3232 Bboffejp.exe 4384 Bmggingc.exe 2752 Calfpk32.exe 3844 Ckidcpjl.exe 4072 Dphiaffa.exe 228 Djegekil.exe 4392 Dcphdqmj.exe 4468 Ecdbop32.exe 4948 Egegjn32.exe 2088 Fnalmh32.exe 4632 Fdmaoahm.exe 3520 Fqfojblo.exe 4076 Gcghkm32.exe 4744 Gnohnffc.exe 3796 Gqpapacd.exe 416 Gqbneq32.exe 904 Gnfooe32.exe 3580 Hgcmbj32.exe 2368 Hcjmhk32.exe 2548 Hcljmj32.exe 4652 Iapjgo32.exe 1092 Igmoih32.exe 5024 Ibdplaho.exe 4616 Jehfcl32.exe 448 Jnedgq32.exe 2408 Jjkdlall.exe 4232 Kahinkaf.exe 3720 Khdoqefq.exe 4492 Khfkfedn.exe 1420 Klgqabib.exe 4300 Lacijjgi.exe 1076 Leabphmp.exe 1288 Lbebilli.exe 3856 Llngbabj.exe 3064 Lamlphoo.exe 4748 Mkepineo.exe 4960 Mdnebc32.exe 1008 Mhknhabf.exe 4108 Madbagif.exe 4352 Mhnjna32.exe 1492 Mojopk32.exe 3680 Nomlek32.exe 3448 Nlqloo32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dlkiaece.exeApbngn32.exeJkaadebl.exeEaddcnad.exeNejkfj32.exeObanqgkl.exePnakaa32.exeEhfjkn32.exeMfejme32.exeIibaeb32.exePnplqn32.exeGlajeiml.exeKbkaiddd.exeLpghfi32.exeMgbnfb32.exeAemjjeek.exeHbknqeha.exeImonol32.exeOlcbfp32.exeJhlgpp32.exeJmnheggo.exeIaiddajo.exeEaabci32.exeEdgkif32.exeKbneij32.exeJehfcl32.exeFdmaoahm.exeBfabmmhe.exePlfipakk.exeFecmjq32.exeLaqhao32.exeKjfmminc.exeIcpecm32.exeNiblafgi.exeFqfojblo.exeKaqejcep.exeNdejcemn.exeGjlfkj32.exeIejlih32.exeDldlbgbb.exeKiodha32.exeCdoegcfl.exeMhjpceko.exeDhejij32.exeGeflne32.exeLfnfhg32.exeEahhcd32.exeBhgjcmfi.exeOampdkbj.exedescription ioc process File created C:\Windows\SysWOW64\Dlmegd32.exe Dlkiaece.exe File opened for modification C:\Windows\SysWOW64\Aogkhjii.exe Apbngn32.exe File created C:\Windows\SysWOW64\Jbmfig32.exe Jkaadebl.exe File created C:\Windows\SysWOW64\Eipigqop.exe Eaddcnad.exe File created C:\Windows\SysWOW64\Ingpgcmj.exe File opened for modification C:\Windows\SysWOW64\Clnopg32.exe File created C:\Windows\SysWOW64\Gibeidka.dll File created C:\Windows\SysWOW64\Oapllk32.exe Nejkfj32.exe File created C:\Windows\SysWOW64\Alpopnkk.dll Obanqgkl.exe File created C:\Windows\SysWOW64\Pflpfcbe.exe Pnakaa32.exe File created C:\Windows\SysWOW64\Lmincloj.dll Ehfjkn32.exe File created C:\Windows\SysWOW64\Bbpfddfp.dll Mfejme32.exe File created C:\Windows\SysWOW64\Iooimi32.exe Iibaeb32.exe File opened for modification C:\Windows\SysWOW64\Phhpic32.exe Pnplqn32.exe File opened for modification C:\Windows\SysWOW64\Hhhkjj32.exe Glajeiml.exe File created C:\Windows\SysWOW64\Jiejgm32.dll Kbkaiddd.exe File opened for modification C:\Windows\SysWOW64\Lfaqcclf.exe Lpghfi32.exe File created C:\Windows\SysWOW64\Mnlfclip.exe Mgbnfb32.exe File created C:\Windows\SysWOW64\Bddiik32.dll File created C:\Windows\SysWOW64\Bapbmd32.dll Aemjjeek.exe File opened for modification C:\Windows\SysWOW64\Hcpcehko.exe Hbknqeha.exe File created C:\Windows\SysWOW64\Ipmjkh32.exe Imonol32.exe File opened for modification C:\Windows\SysWOW64\Ogifci32.exe Olcbfp32.exe File created C:\Windows\SysWOW64\Jnhphg32.exe Jhlgpp32.exe File created C:\Windows\SysWOW64\Aemead32.dll File created C:\Windows\SysWOW64\Jkbhok32.exe Jmnheggo.exe File opened for modification C:\Windows\SysWOW64\Ijaimg32.exe Iaiddajo.exe File created C:\Windows\SysWOW64\Ejgcpn32.dll Eaabci32.exe File created C:\Windows\SysWOW64\Ohghhn32.dll File opened for modification C:\Windows\SysWOW64\Eaklcj32.exe Edgkif32.exe File opened for modification C:\Windows\SysWOW64\Khknaa32.exe Kbneij32.exe File opened for modification C:\Windows\SysWOW64\Jnedgq32.exe Jehfcl32.exe File created C:\Windows\SysWOW64\Fqfojblo.exe Fdmaoahm.exe File created C:\Windows\SysWOW64\Fkiecbnd.dll Bfabmmhe.exe File created C:\Windows\SysWOW64\Ddfbadcc.dll Plfipakk.exe File opened for modification C:\Windows\SysWOW64\Fkqebg32.exe Fecmjq32.exe File opened for modification C:\Windows\SysWOW64\Macdgn32.exe Laqhao32.exe File created C:\Windows\SysWOW64\Mkofokch.dll Kjfmminc.exe File created C:\Windows\SysWOW64\Iqdfmajd.exe Icpecm32.exe File opened for modification C:\Windows\SysWOW64\Nbjpjl32.exe Niblafgi.exe File opened for modification C:\Windows\SysWOW64\Iciaji32.exe File created C:\Windows\SysWOW64\Pqgpcnpb.dll Fqfojblo.exe File created C:\Windows\SysWOW64\Jihpdhgg.dll Kaqejcep.exe File created C:\Windows\SysWOW64\Nkpbpp32.exe Ndejcemn.exe File created C:\Windows\SysWOW64\Nkeado32.dll Gjlfkj32.exe File opened for modification C:\Windows\SysWOW64\Ighhed32.exe Iejlih32.exe File opened for modification C:\Windows\SysWOW64\Djelqo32.exe Dldlbgbb.exe File created C:\Windows\SysWOW64\Ihfecn32.dll File created C:\Windows\SysWOW64\Kgqdfi32.exe Kiodha32.exe File opened for modification C:\Windows\SysWOW64\Cjindm32.exe Cdoegcfl.exe File created C:\Windows\SysWOW64\Neklfoep.dll Eaddcnad.exe File opened for modification C:\Windows\SysWOW64\Cfcoblfb.exe Bfabmmhe.exe File created C:\Windows\SysWOW64\Mmghklif.exe Mhjpceko.exe File created C:\Windows\SysWOW64\Okjbimal.exe Obanqgkl.exe File opened for modification C:\Windows\SysWOW64\Diffabgj.exe Dhejij32.exe File created C:\Windows\SysWOW64\Qjglkmmh.dll File opened for modification C:\Windows\SysWOW64\Ojfcmc32.exe File created C:\Windows\SysWOW64\Glpdjpbj.exe Geflne32.exe File created C:\Windows\SysWOW64\Mikiin32.dll Lfnfhg32.exe File opened for modification C:\Windows\SysWOW64\Egdqkk32.exe Eahhcd32.exe File created C:\Windows\SysWOW64\Paifqemd.dll File created C:\Windows\SysWOW64\Ldicpljn.dll Fdmaoahm.exe File created C:\Windows\SysWOW64\Cakpih32.dll Bhgjcmfi.exe File created C:\Windows\SysWOW64\Okedmp32.exe Oampdkbj.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 9536 9276 -
Modifies registry class 64 IoCs
Processes:
Cefega32.exeAjlngk32.exeInhgaipf.exeMokdllim.exeKhplnn32.exeQbekgknb.exeHdicbkci.exePebfen32.exeMpoljg32.exeDkkcqj32.exeCgijnk32.exePofhbgmn.exeNmlhaa32.exeDjoohk32.exeAooolbep.exeBocoqj32.exeMhjpceko.exeNmpdgdmp.exeGhnibj32.exeQfgfpp32.exePdchakoo.exeLnkgbibj.exeHjcllilo.exeJkkjfa32.exeJnnpnl32.exeJnmglk32.exeDhfcae32.exeCiioaa32.exeHkhdjdgq.exeEbifha32.exeIkndpm32.exeFgjpfqpi.exeAfhoaahg.exeMngepb32.exeMdjjgggk.exeCdaigi32.exeIapjgo32.exeOaajoj32.exeNkjckkcg.exeBiaiqb32.exeFjeibc32.exeFggfghap.exeEnllgbcl.exeEahomk32.exeGbdgpfni.exeBqdbec32.exeBliajd32.exeMnlfclip.exeEhpjdepi.exePnakaa32.exeBeoimjce.exeKdgcne32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cefega32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajlngk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Inhgaipf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mokdllim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khplnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjefecei.dll" Qbekgknb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdicbkci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pebfen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpoljg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afaccndj.dll" Cgijnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogcho32.dll" Pofhbgmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohkmif32.dll" Nmlhaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djoohk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aooolbep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bocoqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhjpceko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjqojf32.dll" Nmpdgdmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghnibj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odpjml32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qfgfpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdchakoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbjklf32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnkgbibj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjcllilo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkkjfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnnpnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnmglk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmdcde32.dll" Dhfcae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciioaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkhdjdgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebifha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikndpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgjpfqpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljmnibhi.dll" Afhoaahg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mngepb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jieoac32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdjjgggk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdaigi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pebfen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iapjgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkbhnngc.dll" Oaajoj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkjckkcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biaiqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgkhkced.dll" Fjeibc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fggfghap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpipoahh.dll" Enllgbcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eahomk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbdgpfni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofqiil32.dll" Bqdbec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bliajd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpahpn32.dll" Mnlfclip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehpjdepi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Accqgi32.dll" Pnakaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beoimjce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdgcne32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
572df452d5878875461e809e1c915330_NeikiAnalytics.exeJeocna32.exeKakmna32.exeKoonge32.exeKapfiqoj.exeKocgbend.exeKpccmhdg.exeLikhem32.exeLpgmhg32.exeLhcali32.exeLoofnccf.exeLjdkll32.exeMablfnne.exeNbebbk32.exePfojdh32.exePmkofa32.exePfepdg32.exePmbegqjk.exeQpbnhl32.exeAbcgjg32.exeAiplmq32.exeApnndj32.exedescription pid process target process PID 1432 wrote to memory of 2872 1432 572df452d5878875461e809e1c915330_NeikiAnalytics.exe Jeocna32.exe PID 1432 wrote to memory of 2872 1432 572df452d5878875461e809e1c915330_NeikiAnalytics.exe Jeocna32.exe PID 1432 wrote to memory of 2872 1432 572df452d5878875461e809e1c915330_NeikiAnalytics.exe Jeocna32.exe PID 2872 wrote to memory of 2876 2872 Jeocna32.exe Kakmna32.exe PID 2872 wrote to memory of 2876 2872 Jeocna32.exe Kakmna32.exe PID 2872 wrote to memory of 2876 2872 Jeocna32.exe Kakmna32.exe PID 2876 wrote to memory of 660 2876 Kakmna32.exe Koonge32.exe PID 2876 wrote to memory of 660 2876 Kakmna32.exe Koonge32.exe PID 2876 wrote to memory of 660 2876 Kakmna32.exe Koonge32.exe PID 660 wrote to memory of 3364 660 Koonge32.exe Kapfiqoj.exe PID 660 wrote to memory of 3364 660 Koonge32.exe Kapfiqoj.exe PID 660 wrote to memory of 3364 660 Koonge32.exe Kapfiqoj.exe PID 3364 wrote to memory of 220 3364 Kapfiqoj.exe Kocgbend.exe PID 3364 wrote to memory of 220 3364 Kapfiqoj.exe Kocgbend.exe PID 3364 wrote to memory of 220 3364 Kapfiqoj.exe Kocgbend.exe PID 220 wrote to memory of 2804 220 Kocgbend.exe Kpccmhdg.exe PID 220 wrote to memory of 2804 220 Kocgbend.exe Kpccmhdg.exe PID 220 wrote to memory of 2804 220 Kocgbend.exe Kpccmhdg.exe PID 2804 wrote to memory of 912 2804 Kpccmhdg.exe Likhem32.exe PID 2804 wrote to memory of 912 2804 Kpccmhdg.exe Likhem32.exe PID 2804 wrote to memory of 912 2804 Kpccmhdg.exe Likhem32.exe PID 912 wrote to memory of 2356 912 Likhem32.exe Lpgmhg32.exe PID 912 wrote to memory of 2356 912 Likhem32.exe Lpgmhg32.exe PID 912 wrote to memory of 2356 912 Likhem32.exe Lpgmhg32.exe PID 2356 wrote to memory of 4328 2356 Lpgmhg32.exe Lhcali32.exe PID 2356 wrote to memory of 4328 2356 Lpgmhg32.exe Lhcali32.exe PID 2356 wrote to memory of 4328 2356 Lpgmhg32.exe Lhcali32.exe PID 4328 wrote to memory of 1812 4328 Lhcali32.exe Loofnccf.exe PID 4328 wrote to memory of 1812 4328 Lhcali32.exe Loofnccf.exe PID 4328 wrote to memory of 1812 4328 Lhcali32.exe Loofnccf.exe PID 1812 wrote to memory of 3148 1812 Loofnccf.exe Ljdkll32.exe PID 1812 wrote to memory of 3148 1812 Loofnccf.exe Ljdkll32.exe PID 1812 wrote to memory of 3148 1812 Loofnccf.exe Ljdkll32.exe PID 3148 wrote to memory of 4556 3148 Ljdkll32.exe Mablfnne.exe PID 3148 wrote to memory of 4556 3148 Ljdkll32.exe Mablfnne.exe PID 3148 wrote to memory of 4556 3148 Ljdkll32.exe Mablfnne.exe PID 4556 wrote to memory of 5112 4556 Mablfnne.exe Nbebbk32.exe PID 4556 wrote to memory of 5112 4556 Mablfnne.exe Nbebbk32.exe PID 4556 wrote to memory of 5112 4556 Mablfnne.exe Nbebbk32.exe PID 5112 wrote to memory of 1436 5112 Nbebbk32.exe Pfojdh32.exe PID 5112 wrote to memory of 1436 5112 Nbebbk32.exe Pfojdh32.exe PID 5112 wrote to memory of 1436 5112 Nbebbk32.exe Pfojdh32.exe PID 1436 wrote to memory of 2148 1436 Pfojdh32.exe Pmkofa32.exe PID 1436 wrote to memory of 2148 1436 Pfojdh32.exe Pmkofa32.exe PID 1436 wrote to memory of 2148 1436 Pfojdh32.exe Pmkofa32.exe PID 2148 wrote to memory of 3752 2148 Pmkofa32.exe Pfepdg32.exe PID 2148 wrote to memory of 3752 2148 Pmkofa32.exe Pfepdg32.exe PID 2148 wrote to memory of 3752 2148 Pmkofa32.exe Pfepdg32.exe PID 3752 wrote to memory of 3320 3752 Pfepdg32.exe Pmbegqjk.exe PID 3752 wrote to memory of 3320 3752 Pfepdg32.exe Pmbegqjk.exe PID 3752 wrote to memory of 3320 3752 Pfepdg32.exe Pmbegqjk.exe PID 3320 wrote to memory of 2900 3320 Pmbegqjk.exe Qpbnhl32.exe PID 3320 wrote to memory of 2900 3320 Pmbegqjk.exe Qpbnhl32.exe PID 3320 wrote to memory of 2900 3320 Pmbegqjk.exe Qpbnhl32.exe PID 2900 wrote to memory of 3836 2900 Qpbnhl32.exe Abcgjg32.exe PID 2900 wrote to memory of 3836 2900 Qpbnhl32.exe Abcgjg32.exe PID 2900 wrote to memory of 3836 2900 Qpbnhl32.exe Abcgjg32.exe PID 3836 wrote to memory of 2744 3836 Abcgjg32.exe Aiplmq32.exe PID 3836 wrote to memory of 2744 3836 Abcgjg32.exe Aiplmq32.exe PID 3836 wrote to memory of 2744 3836 Abcgjg32.exe Aiplmq32.exe PID 2744 wrote to memory of 3128 2744 Aiplmq32.exe Apnndj32.exe PID 2744 wrote to memory of 3128 2744 Aiplmq32.exe Apnndj32.exe PID 2744 wrote to memory of 3128 2744 Aiplmq32.exe Apnndj32.exe PID 3128 wrote to memory of 3232 3128 Apnndj32.exe Bboffejp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\572df452d5878875461e809e1c915330_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\572df452d5878875461e809e1c915330_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Jeocna32.exeC:\Windows\system32\Jeocna32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\Kakmna32.exeC:\Windows\system32\Kakmna32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\Koonge32.exeC:\Windows\system32\Koonge32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\Kapfiqoj.exeC:\Windows\system32\Kapfiqoj.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\Kocgbend.exeC:\Windows\system32\Kocgbend.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Kpccmhdg.exeC:\Windows\system32\Kpccmhdg.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Likhem32.exeC:\Windows\system32\Likhem32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\Lpgmhg32.exeC:\Windows\system32\Lpgmhg32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\Lhcali32.exeC:\Windows\system32\Lhcali32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\Loofnccf.exeC:\Windows\system32\Loofnccf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\Ljdkll32.exeC:\Windows\system32\Ljdkll32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\Mablfnne.exeC:\Windows\system32\Mablfnne.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\Nbebbk32.exeC:\Windows\system32\Nbebbk32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\Pfojdh32.exeC:\Windows\system32\Pfojdh32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Pmkofa32.exeC:\Windows\system32\Pmkofa32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\Pfepdg32.exeC:\Windows\system32\Pfepdg32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\Pmbegqjk.exeC:\Windows\system32\Pmbegqjk.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\Qpbnhl32.exeC:\Windows\system32\Qpbnhl32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Abcgjg32.exeC:\Windows\system32\Abcgjg32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\Aiplmq32.exeC:\Windows\system32\Aiplmq32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Apnndj32.exeC:\Windows\system32\Apnndj32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\Bboffejp.exeC:\Windows\system32\Bboffejp.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\Bmggingc.exeC:\Windows\system32\Bmggingc.exe24⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Bbdpad32.exeC:\Windows\system32\Bbdpad32.exe25⤵PID:4148
-
C:\Windows\SysWOW64\Calfpk32.exeC:\Windows\system32\Calfpk32.exe26⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\Ckidcpjl.exeC:\Windows\system32\Ckidcpjl.exe27⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\Dphiaffa.exeC:\Windows\system32\Dphiaffa.exe28⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\Djegekil.exeC:\Windows\system32\Djegekil.exe29⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\Dcphdqmj.exeC:\Windows\system32\Dcphdqmj.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Ecdbop32.exeC:\Windows\system32\Ecdbop32.exe31⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\Egegjn32.exeC:\Windows\system32\Egegjn32.exe32⤵
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\Fnalmh32.exeC:\Windows\system32\Fnalmh32.exe33⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\Fdmaoahm.exeC:\Windows\system32\Fdmaoahm.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4632 -
C:\Windows\SysWOW64\Fqfojblo.exeC:\Windows\system32\Fqfojblo.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3520 -
C:\Windows\SysWOW64\Gcghkm32.exeC:\Windows\system32\Gcghkm32.exe36⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\Gnohnffc.exeC:\Windows\system32\Gnohnffc.exe37⤵
- Executes dropped EXE
PID:4744 -
C:\Windows\SysWOW64\Gqpapacd.exeC:\Windows\system32\Gqpapacd.exe38⤵
- Executes dropped EXE
PID:3796 -
C:\Windows\SysWOW64\Gqbneq32.exeC:\Windows\system32\Gqbneq32.exe39⤵
- Executes dropped EXE
PID:416 -
C:\Windows\SysWOW64\Gnfooe32.exeC:\Windows\system32\Gnfooe32.exe40⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Hgcmbj32.exeC:\Windows\system32\Hgcmbj32.exe41⤵
- Executes dropped EXE
PID:3580 -
C:\Windows\SysWOW64\Hcjmhk32.exeC:\Windows\system32\Hcjmhk32.exe42⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Hcljmj32.exeC:\Windows\system32\Hcljmj32.exe43⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Iapjgo32.exeC:\Windows\system32\Iapjgo32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:4652 -
C:\Windows\SysWOW64\Igmoih32.exeC:\Windows\system32\Igmoih32.exe45⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Ibdplaho.exeC:\Windows\system32\Ibdplaho.exe46⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\Jehfcl32.exeC:\Windows\system32\Jehfcl32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4616 -
C:\Windows\SysWOW64\Jnedgq32.exeC:\Windows\system32\Jnedgq32.exe48⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\Jjkdlall.exeC:\Windows\system32\Jjkdlall.exe49⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\Kahinkaf.exeC:\Windows\system32\Kahinkaf.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4232 -
C:\Windows\SysWOW64\Khdoqefq.exeC:\Windows\system32\Khdoqefq.exe51⤵
- Executes dropped EXE
PID:3720 -
C:\Windows\SysWOW64\Khfkfedn.exeC:\Windows\system32\Khfkfedn.exe52⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\Klgqabib.exeC:\Windows\system32\Klgqabib.exe53⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\Lacijjgi.exeC:\Windows\system32\Lacijjgi.exe54⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Leabphmp.exeC:\Windows\system32\Leabphmp.exe55⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Lbebilli.exeC:\Windows\system32\Lbebilli.exe56⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\Llngbabj.exeC:\Windows\system32\Llngbabj.exe57⤵
- Executes dropped EXE
PID:3856 -
C:\Windows\SysWOW64\Lamlphoo.exeC:\Windows\system32\Lamlphoo.exe58⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Mkepineo.exeC:\Windows\system32\Mkepineo.exe59⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\Mdnebc32.exeC:\Windows\system32\Mdnebc32.exe60⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\Mhknhabf.exeC:\Windows\system32\Mhknhabf.exe61⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Madbagif.exeC:\Windows\system32\Madbagif.exe62⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\SysWOW64\Mhnjna32.exeC:\Windows\system32\Mhnjna32.exe63⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Mojopk32.exeC:\Windows\system32\Mojopk32.exe64⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Nomlek32.exeC:\Windows\system32\Nomlek32.exe65⤵
- Executes dropped EXE
PID:3680 -
C:\Windows\SysWOW64\Nlqloo32.exeC:\Windows\system32\Nlqloo32.exe66⤵
- Executes dropped EXE
PID:3448 -
C:\Windows\SysWOW64\Ncmaai32.exeC:\Windows\system32\Ncmaai32.exe67⤵PID:940
-
C:\Windows\SysWOW64\Nlefjnno.exeC:\Windows\system32\Nlefjnno.exe68⤵PID:4500
-
C:\Windows\SysWOW64\Nbbnbemf.exeC:\Windows\system32\Nbbnbemf.exe69⤵PID:2244
-
C:\Windows\SysWOW64\Nkjckkcg.exeC:\Windows\system32\Nkjckkcg.exe70⤵
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Nfpghccm.exeC:\Windows\system32\Nfpghccm.exe71⤵PID:4552
-
C:\Windows\SysWOW64\Oflfdbip.exeC:\Windows\system32\Oflfdbip.exe72⤵PID:3156
-
C:\Windows\SysWOW64\Pdqcenmg.exeC:\Windows\system32\Pdqcenmg.exe73⤵PID:2912
-
C:\Windows\SysWOW64\Pofhbgmn.exeC:\Windows\system32\Pofhbgmn.exe74⤵
- Modifies registry class
PID:984 -
C:\Windows\SysWOW64\Pmjhlklg.exeC:\Windows\system32\Pmjhlklg.exe75⤵PID:3400
-
C:\Windows\SysWOW64\Piaiqlak.exeC:\Windows\system32\Piaiqlak.exe76⤵PID:5136
-
C:\Windows\SysWOW64\Piceflpi.exeC:\Windows\system32\Piceflpi.exe77⤵PID:5184
-
C:\Windows\SysWOW64\Qfgfpp32.exeC:\Windows\system32\Qfgfpp32.exe78⤵
- Modifies registry class
PID:5224 -
C:\Windows\SysWOW64\Qckfid32.exeC:\Windows\system32\Qckfid32.exe79⤵PID:5292
-
C:\Windows\SysWOW64\Qpbgnecp.exeC:\Windows\system32\Qpbgnecp.exe80⤵PID:5364
-
C:\Windows\SysWOW64\Apddce32.exeC:\Windows\system32\Apddce32.exe81⤵PID:5408
-
C:\Windows\SysWOW64\Alkeifga.exeC:\Windows\system32\Alkeifga.exe82⤵PID:5456
-
C:\Windows\SysWOW64\Aioebj32.exeC:\Windows\system32\Aioebj32.exe83⤵PID:5500
-
C:\Windows\SysWOW64\Apngjd32.exeC:\Windows\system32\Apngjd32.exe84⤵PID:5548
-
C:\Windows\SysWOW64\Bifkcioc.exeC:\Windows\system32\Bifkcioc.exe85⤵PID:5592
-
C:\Windows\SysWOW64\Bemlhj32.exeC:\Windows\system32\Bemlhj32.exe86⤵PID:5636
-
C:\Windows\SysWOW64\Bpbpecen.exeC:\Windows\system32\Bpbpecen.exe87⤵PID:5696
-
C:\Windows\SysWOW64\Beoimjce.exeC:\Windows\system32\Beoimjce.exe88⤵
- Modifies registry class
PID:5736 -
C:\Windows\SysWOW64\Bliajd32.exeC:\Windows\system32\Bliajd32.exe89⤵
- Modifies registry class
PID:5784 -
C:\Windows\SysWOW64\Bimach32.exeC:\Windows\system32\Bimach32.exe90⤵PID:5836
-
C:\Windows\SysWOW64\Bfabmmhe.exeC:\Windows\system32\Bfabmmhe.exe91⤵
- Drops file in System32 directory
PID:5896 -
C:\Windows\SysWOW64\Cfcoblfb.exeC:\Windows\system32\Cfcoblfb.exe92⤵PID:5940
-
C:\Windows\SysWOW64\Cffkhl32.exeC:\Windows\system32\Cffkhl32.exe93⤵PID:5984
-
C:\Windows\SysWOW64\Cleqfb32.exeC:\Windows\system32\Cleqfb32.exe94⤵PID:6028
-
C:\Windows\SysWOW64\Cmdmpe32.exeC:\Windows\system32\Cmdmpe32.exe95⤵PID:6072
-
C:\Windows\SysWOW64\Cepadh32.exeC:\Windows\system32\Cepadh32.exe96⤵PID:6120
-
C:\Windows\SysWOW64\Dpgbgpbe.exeC:\Windows\system32\Dpgbgpbe.exe97⤵PID:5148
-
C:\Windows\SysWOW64\Dfakcj32.exeC:\Windows\system32\Dfakcj32.exe98⤵PID:5288
-
C:\Windows\SysWOW64\Didqkeeq.exeC:\Windows\system32\Didqkeeq.exe99⤵PID:5372
-
C:\Windows\SysWOW64\Elhfbp32.exeC:\Windows\system32\Elhfbp32.exe100⤵PID:5448
-
C:\Windows\SysWOW64\Eljchpnl.exeC:\Windows\system32\Eljchpnl.exe101⤵PID:5516
-
C:\Windows\SysWOW64\Ephlnn32.exeC:\Windows\system32\Ephlnn32.exe102⤵PID:5632
-
C:\Windows\SysWOW64\Egbdjhlp.exeC:\Windows\system32\Egbdjhlp.exe103⤵PID:5716
-
C:\Windows\SysWOW64\Enllgbcl.exeC:\Windows\system32\Enllgbcl.exe104⤵
- Modifies registry class
PID:5848 -
C:\Windows\SysWOW64\Eegqldqg.exeC:\Windows\system32\Eegqldqg.exe105⤵PID:5956
-
C:\Windows\SysWOW64\Flaiho32.exeC:\Windows\system32\Flaiho32.exe106⤵PID:6036
-
C:\Windows\SysWOW64\Fjeibc32.exeC:\Windows\system32\Fjeibc32.exe107⤵
- Modifies registry class
PID:6088 -
C:\Windows\SysWOW64\Fgijkgeh.exeC:\Windows\system32\Fgijkgeh.exe108⤵PID:2384
-
C:\Windows\SysWOW64\Fpandm32.exeC:\Windows\system32\Fpandm32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5348 -
C:\Windows\SysWOW64\Ffnglc32.exeC:\Windows\system32\Ffnglc32.exe110⤵PID:5484
-
C:\Windows\SysWOW64\Fpckjlje.exeC:\Windows\system32\Fpckjlje.exe111⤵PID:5684
-
C:\Windows\SysWOW64\Ffcpgcfj.exeC:\Windows\system32\Ffcpgcfj.exe112⤵PID:5908
-
C:\Windows\SysWOW64\Gcgqag32.exeC:\Windows\system32\Gcgqag32.exe113⤵PID:6020
-
C:\Windows\SysWOW64\Gjcfcakn.exeC:\Windows\system32\Gjcfcakn.exe114⤵PID:5180
-
C:\Windows\SysWOW64\Hjabdo32.exeC:\Windows\system32\Hjabdo32.exe115⤵PID:5420
-
C:\Windows\SysWOW64\Inagpm32.exeC:\Windows\system32\Inagpm32.exe116⤵PID:5600
-
C:\Windows\SysWOW64\Ifmldo32.exeC:\Windows\system32\Ifmldo32.exe117⤵PID:5928
-
C:\Windows\SysWOW64\Iqbpahpc.exeC:\Windows\system32\Iqbpahpc.exe118⤵PID:6132
-
C:\Windows\SysWOW64\Iqdmghnp.exeC:\Windows\system32\Iqdmghnp.exe119⤵PID:5320
-
C:\Windows\SysWOW64\Inkjfk32.exeC:\Windows\system32\Inkjfk32.exe120⤵PID:5936
-
C:\Windows\SysWOW64\Jnmglk32.exeC:\Windows\system32\Jnmglk32.exe121⤵
- Modifies registry class
PID:3088 -
C:\Windows\SysWOW64\Jegohe32.exeC:\Windows\system32\Jegohe32.exe122⤵PID:5128
-
C:\Windows\SysWOW64\Janpnfee.exeC:\Windows\system32\Janpnfee.exe123⤵PID:5768
-
C:\Windows\SysWOW64\Jjfdfl32.exeC:\Windows\system32\Jjfdfl32.exe124⤵PID:6160
-
C:\Windows\SysWOW64\Jgjeppkp.exeC:\Windows\system32\Jgjeppkp.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6204 -
C:\Windows\SysWOW64\Kjpgmj32.exeC:\Windows\system32\Kjpgmj32.exe126⤵PID:6248
-
C:\Windows\SysWOW64\Kaioidkh.exeC:\Windows\system32\Kaioidkh.exe127⤵PID:6292
-
C:\Windows\SysWOW64\Kmppneal.exeC:\Windows\system32\Kmppneal.exe128⤵PID:6336
-
C:\Windows\SysWOW64\Khfdlnab.exeC:\Windows\system32\Khfdlnab.exe129⤵PID:6380
-
C:\Windows\SysWOW64\Kejeebpl.exeC:\Windows\system32\Kejeebpl.exe130⤵PID:6428
-
C:\Windows\SysWOW64\Kjfmminc.exeC:\Windows\system32\Kjfmminc.exe131⤵
- Drops file in System32 directory
PID:6472 -
C:\Windows\SysWOW64\Kaqejcep.exeC:\Windows\system32\Kaqejcep.exe132⤵
- Drops file in System32 directory
PID:6516 -
C:\Windows\SysWOW64\Lhjnfn32.exeC:\Windows\system32\Lhjnfn32.exe133⤵PID:6560
-
C:\Windows\SysWOW64\Lennpb32.exeC:\Windows\system32\Lennpb32.exe134⤵PID:6604
-
C:\Windows\SysWOW64\Lmjcdd32.exeC:\Windows\system32\Lmjcdd32.exe135⤵PID:6652
-
C:\Windows\SysWOW64\Loiong32.exeC:\Windows\system32\Loiong32.exe136⤵PID:6696
-
C:\Windows\SysWOW64\Lmnlpcel.exeC:\Windows\system32\Lmnlpcel.exe137⤵PID:6740
-
C:\Windows\SysWOW64\Loniiflo.exeC:\Windows\system32\Loniiflo.exe138⤵PID:6784
-
C:\Windows\SysWOW64\Mhfmbl32.exeC:\Windows\system32\Mhfmbl32.exe139⤵PID:6828
-
C:\Windows\SysWOW64\Mmebpbod.exeC:\Windows\system32\Mmebpbod.exe140⤵PID:6872
-
C:\Windows\SysWOW64\Mkicjgnn.exeC:\Windows\system32\Mkicjgnn.exe141⤵PID:6916
-
C:\Windows\SysWOW64\Mklpof32.exeC:\Windows\system32\Mklpof32.exe142⤵PID:6960
-
C:\Windows\SysWOW64\Maehlqch.exeC:\Windows\system32\Maehlqch.exe143⤵PID:7004
-
C:\Windows\SysWOW64\Nmlhaa32.exeC:\Windows\system32\Nmlhaa32.exe144⤵
- Modifies registry class
PID:7052 -
C:\Windows\SysWOW64\Ngemjg32.exeC:\Windows\system32\Ngemjg32.exe145⤵PID:7096
-
C:\Windows\SysWOW64\Nefmgogl.exeC:\Windows\system32\Nefmgogl.exe146⤵PID:7140
-
C:\Windows\SysWOW64\Nehjmnei.exeC:\Windows\system32\Nehjmnei.exe147⤵PID:6196
-
C:\Windows\SysWOW64\Nkebee32.exeC:\Windows\system32\Nkebee32.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6260 -
C:\Windows\SysWOW64\Nockkcjg.exeC:\Windows\system32\Nockkcjg.exe149⤵PID:6356
-
C:\Windows\SysWOW64\Oojalb32.exeC:\Windows\system32\Oojalb32.exe150⤵PID:6416
-
C:\Windows\SysWOW64\Ogefqeaj.exeC:\Windows\system32\Ogefqeaj.exe151⤵PID:6504
-
C:\Windows\SysWOW64\Pbdmdlie.exeC:\Windows\system32\Pbdmdlie.exe152⤵PID:6600
-
C:\Windows\SysWOW64\Pdeffgff.exeC:\Windows\system32\Pdeffgff.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6688 -
C:\Windows\SysWOW64\Pfdbpjmi.exeC:\Windows\system32\Pfdbpjmi.exe154⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6800 -
C:\Windows\SysWOW64\Qkchna32.exeC:\Windows\system32\Qkchna32.exe155⤵PID:6864
-
C:\Windows\SysWOW64\Qdllffpo.exeC:\Windows\system32\Qdllffpo.exe156⤵PID:6968
-
C:\Windows\SysWOW64\Anncek32.exeC:\Windows\system32\Anncek32.exe157⤵PID:7024
-
C:\Windows\SysWOW64\Bichcc32.exeC:\Windows\system32\Bichcc32.exe158⤵PID:7108
-
C:\Windows\SysWOW64\Bomppneg.exeC:\Windows\system32\Bomppneg.exe159⤵PID:6172
-
C:\Windows\SysWOW64\Biedhclh.exeC:\Windows\system32\Biedhclh.exe160⤵PID:6312
-
C:\Windows\SysWOW64\Bpomem32.exeC:\Windows\system32\Bpomem32.exe161⤵PID:6448
-
C:\Windows\SysWOW64\Bfieagka.exeC:\Windows\system32\Bfieagka.exe162⤵PID:6528
-
C:\Windows\SysWOW64\Bkfmjnii.exeC:\Windows\system32\Bkfmjnii.exe163⤵PID:6736
-
C:\Windows\SysWOW64\Beobcdoi.exeC:\Windows\system32\Beobcdoi.exe164⤵PID:6844
-
C:\Windows\SysWOW64\Bpdfpmoo.exeC:\Windows\system32\Bpdfpmoo.exe165⤵PID:4052
-
C:\Windows\SysWOW64\Bfnnmg32.exeC:\Windows\system32\Bfnnmg32.exe166⤵PID:7068
-
C:\Windows\SysWOW64\Ceehcc32.exeC:\Windows\system32\Ceehcc32.exe167⤵PID:3960
-
C:\Windows\SysWOW64\Cpklql32.exeC:\Windows\system32\Cpklql32.exe168⤵PID:6500
-
C:\Windows\SysWOW64\Diamko32.exeC:\Windows\system32\Diamko32.exe169⤵PID:6664
-
C:\Windows\SysWOW64\Dbjade32.exeC:\Windows\system32\Dbjade32.exe170⤵PID:6840
-
C:\Windows\SysWOW64\Dpnbmi32.exeC:\Windows\system32\Dpnbmi32.exe171⤵PID:7000
-
C:\Windows\SysWOW64\Eldbbjof.exeC:\Windows\system32\Eldbbjof.exe172⤵PID:2476
-
C:\Windows\SysWOW64\Epiaig32.exeC:\Windows\system32\Epiaig32.exe173⤵PID:6824
-
C:\Windows\SysWOW64\Fibfbm32.exeC:\Windows\system32\Fibfbm32.exe174⤵PID:7164
-
C:\Windows\SysWOW64\Fplnogmb.exeC:\Windows\system32\Fplnogmb.exe175⤵PID:6716
-
C:\Windows\SysWOW64\Fidbgm32.exeC:\Windows\system32\Fidbgm32.exe176⤵PID:6544
-
C:\Windows\SysWOW64\Flekihpc.exeC:\Windows\system32\Flekihpc.exe177⤵PID:7172
-
C:\Windows\SysWOW64\Fgjpfqpi.exeC:\Windows\system32\Fgjpfqpi.exe178⤵
- Modifies registry class
PID:7216 -
C:\Windows\SysWOW64\Fpcdof32.exeC:\Windows\system32\Fpcdof32.exe179⤵PID:7260
-
C:\Windows\SysWOW64\Fepmgm32.exeC:\Windows\system32\Fepmgm32.exe180⤵PID:7304
-
C:\Windows\SysWOW64\Gebimmco.exeC:\Windows\system32\Gebimmco.exe181⤵PID:7348
-
C:\Windows\SysWOW64\Gllajf32.exeC:\Windows\system32\Gllajf32.exe182⤵PID:7396
-
C:\Windows\SysWOW64\Gpjjpe32.exeC:\Windows\system32\Gpjjpe32.exe183⤵PID:7440
-
C:\Windows\SysWOW64\Ggdbmoho.exeC:\Windows\system32\Ggdbmoho.exe184⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7484 -
C:\Windows\SysWOW64\Gplged32.exeC:\Windows\system32\Gplged32.exe185⤵PID:7528
-
C:\Windows\SysWOW64\Gpodkdll.exeC:\Windows\system32\Gpodkdll.exe186⤵PID:7584
-
C:\Windows\SysWOW64\Geklckkd.exeC:\Windows\system32\Geklckkd.exe187⤵PID:7628
-
C:\Windows\SysWOW64\Hcommoin.exeC:\Windows\system32\Hcommoin.exe188⤵PID:7672
-
C:\Windows\SysWOW64\Hofmaq32.exeC:\Windows\system32\Hofmaq32.exe189⤵PID:7724
-
C:\Windows\SysWOW64\Hphfac32.exeC:\Windows\system32\Hphfac32.exe190⤵PID:7768
-
C:\Windows\SysWOW64\Hhckeeam.exeC:\Windows\system32\Hhckeeam.exe191⤵PID:7812
-
C:\Windows\SysWOW64\Hfgloiqf.exeC:\Windows\system32\Hfgloiqf.exe192⤵PID:7856
-
C:\Windows\SysWOW64\Hhehkepj.exeC:\Windows\system32\Hhehkepj.exe193⤵PID:7892
-
C:\Windows\SysWOW64\Icklhnop.exeC:\Windows\system32\Icklhnop.exe194⤵PID:7944
-
C:\Windows\SysWOW64\Ifleji32.exeC:\Windows\system32\Ifleji32.exe195⤵PID:7988
-
C:\Windows\SysWOW64\Icpecm32.exeC:\Windows\system32\Icpecm32.exe196⤵
- Drops file in System32 directory
PID:8032 -
C:\Windows\SysWOW64\Iqdfmajd.exeC:\Windows\system32\Iqdfmajd.exe197⤵PID:8076
-
C:\Windows\SysWOW64\Jqhphq32.exeC:\Windows\system32\Jqhphq32.exe198⤵PID:8120
-
C:\Windows\SysWOW64\Jjqdafmp.exeC:\Windows\system32\Jjqdafmp.exe199⤵PID:8168
-
C:\Windows\SysWOW64\Jfgefg32.exeC:\Windows\system32\Jfgefg32.exe200⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7184 -
C:\Windows\SysWOW64\Jihngboe.exeC:\Windows\system32\Jihngboe.exe201⤵PID:7252
-
C:\Windows\SysWOW64\Jglkkiea.exeC:\Windows\system32\Jglkkiea.exe202⤵PID:7316
-
C:\Windows\SysWOW64\Kmhccpci.exeC:\Windows\system32\Kmhccpci.exe203⤵PID:7376
-
C:\Windows\SysWOW64\Kgngqico.exeC:\Windows\system32\Kgngqico.exe204⤵PID:7448
-
C:\Windows\SysWOW64\Kiodha32.exeC:\Windows\system32\Kiodha32.exe205⤵
- Drops file in System32 directory
PID:7512 -
C:\Windows\SysWOW64\Kgqdfi32.exeC:\Windows\system32\Kgqdfi32.exe206⤵PID:7592
-
C:\Windows\SysWOW64\Kmmmnp32.exeC:\Windows\system32\Kmmmnp32.exe207⤵PID:5332
-
C:\Windows\SysWOW64\Kcgekjgp.exeC:\Windows\system32\Kcgekjgp.exe208⤵PID:7620
-
C:\Windows\SysWOW64\Kidmcqeg.exeC:\Windows\system32\Kidmcqeg.exe209⤵PID:7696
-
C:\Windows\SysWOW64\Kpnepk32.exeC:\Windows\system32\Kpnepk32.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7764 -
C:\Windows\SysWOW64\Kjcjmclj.exeC:\Windows\system32\Kjcjmclj.exe211⤵PID:7820
-
C:\Windows\SysWOW64\Lapopm32.exeC:\Windows\system32\Lapopm32.exe212⤵PID:7900
-
C:\Windows\SysWOW64\Lmfodn32.exeC:\Windows\system32\Lmfodn32.exe213⤵PID:6440
-
C:\Windows\SysWOW64\Lfodmdni.exeC:\Windows\system32\Lfodmdni.exe214⤵PID:7952
-
C:\Windows\SysWOW64\Lpghfi32.exeC:\Windows\system32\Lpghfi32.exe215⤵
- Drops file in System32 directory
PID:8016 -
C:\Windows\SysWOW64\Lfaqcclf.exeC:\Windows\system32\Lfaqcclf.exe216⤵PID:8068
-
C:\Windows\SysWOW64\Ljoiibbm.exeC:\Windows\system32\Ljoiibbm.exe217⤵PID:8152
-
C:\Windows\SysWOW64\Midfjnge.exeC:\Windows\system32\Midfjnge.exe218⤵PID:7212
-
C:\Windows\SysWOW64\Mdjjgggk.exeC:\Windows\system32\Mdjjgggk.exe219⤵
- Modifies registry class
PID:7300 -
C:\Windows\SysWOW64\Migcpneb.exeC:\Windows\system32\Migcpneb.exe220⤵PID:7408
-
C:\Windows\SysWOW64\Mfkcibdl.exeC:\Windows\system32\Mfkcibdl.exe221⤵PID:7472
-
C:\Windows\SysWOW64\Mmdlflki.exeC:\Windows\system32\Mmdlflki.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7576 -
C:\Windows\SysWOW64\Mhjpceko.exeC:\Windows\system32\Mhjpceko.exe223⤵
- Drops file in System32 directory
- Modifies registry class
PID:5312 -
C:\Windows\SysWOW64\Mmghklif.exeC:\Windows\system32\Mmghklif.exe224⤵PID:3688
-
C:\Windows\SysWOW64\Minipm32.exeC:\Windows\system32\Minipm32.exe225⤵PID:7740
-
C:\Windows\SysWOW64\Mdcmnfop.exeC:\Windows\system32\Mdcmnfop.exe226⤵PID:5108
-
C:\Windows\SysWOW64\Ndejcemn.exeC:\Windows\system32\Ndejcemn.exe227⤵
- Drops file in System32 directory
PID:7852 -
C:\Windows\SysWOW64\Nkpbpp32.exeC:\Windows\system32\Nkpbpp32.exe228⤵PID:1544
-
C:\Windows\SysWOW64\Ndhgie32.exeC:\Windows\system32\Ndhgie32.exe229⤵PID:4984
-
C:\Windows\SysWOW64\Nalgbi32.exeC:\Windows\system32\Nalgbi32.exe230⤵PID:8000
-
C:\Windows\SysWOW64\Nhhldc32.exeC:\Windows\system32\Nhhldc32.exe231⤵PID:8060
-
C:\Windows\SysWOW64\Nmedmj32.exeC:\Windows\system32\Nmedmj32.exe232⤵PID:8136
-
C:\Windows\SysWOW64\Ohkijc32.exeC:\Windows\system32\Ohkijc32.exe233⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7200 -
C:\Windows\SysWOW64\Oacmchcl.exeC:\Windows\system32\Oacmchcl.exe234⤵PID:7280
-
C:\Windows\SysWOW64\Odcfdc32.exeC:\Windows\system32\Odcfdc32.exe235⤵PID:7428
-
C:\Windows\SysWOW64\Oiqomj32.exeC:\Windows\system32\Oiqomj32.exe236⤵PID:7496
-
C:\Windows\SysWOW64\Opjgidfa.exeC:\Windows\system32\Opjgidfa.exe237⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5672 -
C:\Windows\SysWOW64\Opmcod32.exeC:\Windows\system32\Opmcod32.exe238⤵PID:2128
-
C:\Windows\SysWOW64\Phfhfa32.exeC:\Windows\system32\Phfhfa32.exe239⤵PID:388
-
C:\Windows\SysWOW64\Paomog32.exeC:\Windows\system32\Paomog32.exe240⤵PID:7876
-
C:\Windows\SysWOW64\Pjjaci32.exeC:\Windows\system32\Pjjaci32.exe241⤵PID:1152
-
C:\Windows\SysWOW64\Phkaqqoi.exeC:\Windows\system32\Phkaqqoi.exe242⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2768