Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe
-
Size
77KB
-
MD5
151c3e61b3558dd89c9dbe91c02ec210
-
SHA1
709ba58e3c56e7a4b62a475d2ac6f44952b0d182
-
SHA256
34d4d7167838062c9a2e7e3b28316e1d424ad7248ed3bef4c72c966e85a88d12
-
SHA512
925b36edd2a54e71cdd1f626dfea109249e3dcd95dadb9ddafedbd5c5a82291deb17b5e71e697c4a2b5d5629f9746faa41af5734fead2e437b3c67fc365abf88
-
SSDEEP
1536:j80OFO5y8aNUBzUyi3Lxc4Y7Ig2LtTpwfi+TjRC/D:CNj24BRHwf1TjYD
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Keifdpif.exeOckdmmoj.exeIqgjmg32.exeMdmngm32.exeAdjjeieh.exeCaqpkjcl.exeJaljbmkd.exeCepadh32.exeMhefhf32.exeBqbohocd.exeBkhceh32.exeKblkap32.exeOgcnmc32.exeGpmomo32.exeOiagde32.exeEilfldoi.exeCjomldfp.exeBfolacnc.exeCpfmlghd.exeNefdbekh.exeIeiajckh.exeMhoahh32.exeDipgpf32.exeDgfdojfm.exeKfidgk32.exeCdimqm32.exeCdbpgl32.exeEnkmfolf.exeGhmbib32.exeDojqjdbl.exeDpkmal32.exeHnbnjc32.exeOacdmo32.exeEbaplnie.exeEjojljqa.exeMddkbbfg.exePaocim32.exeBabcil32.exeFcbnpnme.exeDbbdip32.exeGcpcgfmi.exeJpbjfjci.exeKhiofk32.exeLamlphoo.exeOooaah32.exeAflpkpjm.exeKallod32.exeLdckan32.exeGllajf32.exeDbpjaeoc.exeGkalbj32.exeAmmnhilb.exeGckcap32.exeHofmaq32.exeIehmmb32.exeLcfidb32.exeQiiflaoo.exeBigbmpco.exeNkeipk32.exeDpefaq32.exeGqokekph.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Keifdpif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ockdmmoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iqgjmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdmngm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adjjeieh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caqpkjcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaljbmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cepadh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhefhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bqbohocd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkhceh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kblkap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogcnmc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpmomo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiagde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eilfldoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjomldfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfolacnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpfmlghd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nefdbekh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieiajckh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhoahh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dipgpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgfdojfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfidgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdimqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdbpgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enkmfolf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghmbib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dojqjdbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpkmal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnbnjc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oacdmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebaplnie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejojljqa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mddkbbfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paocim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdimqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Babcil32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcbnpnme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbbdip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejojljqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgfdojfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcpcgfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpbjfjci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khiofk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lamlphoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oooaah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aflpkpjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kallod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldckan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gllajf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbpjaeoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkalbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ammnhilb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gckcap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hofmaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iehmmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcfidb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qiiflaoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bigbmpco.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkeipk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpefaq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqokekph.exe -
Executes dropped EXE 64 IoCs
Processes:
Dbpjaeoc.exeEnigke32.exeEbgpad32.exeEbimgcfi.exeEnpmld32.exeEnbjad32.exeFpbflg32.exeFbbpmb32.exeFechomko.exeFbgihaji.exeGfeaopqo.exeGblbca32.exeGbnoiqdq.exeGbalopbn.exeGfodeohd.exeHfaajnfb.exeHolfoqcm.exeHlpfhe32.exeHidgai32.exeHfhgkmpj.exeHmdlmg32.exeImgicgca.exeIinjhh32.exeIbfnqmpf.exeIpjoja32.exeImnocf32.exeImpliekg.exeJcmdaljn.exeJcoaglhk.exeJpcapp32.exeJebfng32.exeJgbchj32.exeKjblje32.exeKeimof32.exeKlcekpdo.exeKlhnfo32.exeKngkqbgl.exeLfbped32.exeLcgpni32.exeLqkqhm32.exeLfgipd32.exeLfjfecno.exeLmdnbn32.exeLjhnlb32.exeMgloefco.exeMcbpjg32.exeMmkdcm32.exeMmmqhl32.exeMgbefe32.exeNqmfdj32.exeNflkbanj.exeNglhld32.exeNfaemp32.exeNfcabp32.exeOgcnmc32.exeOfhknodl.exeOndljl32.exeOpeiadfg.exePaeelgnj.exePnifekmd.exePdenmbkk.exePaiogf32.exePjbcplpe.exePpolhcnm.exepid process 2916 Dbpjaeoc.exe 2236 Enigke32.exe 3380 Ebgpad32.exe 3816 Ebimgcfi.exe 2980 Enpmld32.exe 3512 Enbjad32.exe 2160 Fpbflg32.exe 1584 Fbbpmb32.exe 4672 Fechomko.exe 4024 Fbgihaji.exe 1556 Gfeaopqo.exe 2300 Gblbca32.exe 4844 Gbnoiqdq.exe 2588 Gbalopbn.exe 3020 Gfodeohd.exe 4728 Hfaajnfb.exe 3416 Holfoqcm.exe 2996 Hlpfhe32.exe 3776 Hidgai32.exe 3716 Hfhgkmpj.exe 2660 Hmdlmg32.exe 1144 Imgicgca.exe 4364 Iinjhh32.exe 4396 Ibfnqmpf.exe 2820 Ipjoja32.exe 1912 Imnocf32.exe 3832 Impliekg.exe 2012 Jcmdaljn.exe 4980 Jcoaglhk.exe 1356 Jpcapp32.exe 2228 Jebfng32.exe 2252 Jgbchj32.exe 4972 Kjblje32.exe 4292 Keimof32.exe 4264 Klcekpdo.exe 1416 Klhnfo32.exe 2628 Kngkqbgl.exe 4900 Lfbped32.exe 5064 Lcgpni32.exe 1300 Lqkqhm32.exe 4352 Lfgipd32.exe 1616 Lfjfecno.exe 3084 Lmdnbn32.exe 2168 Ljhnlb32.exe 4340 Mgloefco.exe 2072 Mcbpjg32.exe 1672 Mmkdcm32.exe 3448 Mmmqhl32.exe 2184 Mgbefe32.exe 1476 Nqmfdj32.exe 2444 Nflkbanj.exe 1764 Nglhld32.exe 3768 Nfaemp32.exe 3676 Nfcabp32.exe 4104 Ogcnmc32.exe 3652 Ofhknodl.exe 1588 Ondljl32.exe 4468 Opeiadfg.exe 452 Paeelgnj.exe 468 Pnifekmd.exe 4088 Pdenmbkk.exe 4632 Paiogf32.exe 1496 Pjbcplpe.exe 2936 Ppolhcnm.exe -
Drops file in System32 directory 64 IoCs
Processes:
Klcekpdo.exeIahgad32.exeMbibfm32.exeHpejlc32.exeJcmdaljn.exePpdbgncl.exeAidehpea.exeGnckooob.exeIodjcnca.exeHnbnjc32.exeAndqol32.exeAddhbo32.exeHfaajnfb.exeLjhnlb32.exeNfihbk32.exeAfockelf.exeAmnebo32.exeHolfoqcm.exeDdifgk32.exeEqmlccdi.exeGggmgk32.exeDmjmekgn.exeNdlacapp.exeHhlnjpdi.exeMmkdcm32.exeMjnnbk32.exeDnienqbi.exeDpkmal32.exeEnkmfolf.exeFcbnpnme.exeJcnbekok.exeBmidnm32.exeIgqbiacj.exeEipilmgh.exeDbbdip32.exeJloibkhh.exeLfqjhmhk.exeAfbgkl32.exeCblebgfh.exeChfegk32.exeIcfmci32.exeBabcil32.exeDcnlnaom.exeFlekihpc.exePfojdh32.exeBigbmpco.exeDnnoip32.exeGeflne32.exeJodlof32.exeHjmodffo.exeMinipm32.exeDlbfmjqi.exePjdpelnc.exeDcphdqmj.exeKocphojh.exeFgpplf32.exeFcneeo32.exeJaemilci.exeGloejmld.exeHnmnengg.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Klhnfo32.exe Klcekpdo.exe File created C:\Windows\SysWOW64\Iialhaad.exe Iahgad32.exe File created C:\Windows\SysWOW64\Nciopppp.exe Mbibfm32.exe File created C:\Windows\SysWOW64\Dfmcgm32.dll Hpejlc32.exe File created C:\Windows\SysWOW64\Bdimkqnb.dll Jcmdaljn.exe File created C:\Windows\SysWOW64\Pfojdh32.exe Ppdbgncl.exe File created C:\Windows\SysWOW64\Ldfakpfj.dll Aidehpea.exe File created C:\Windows\SysWOW64\Gcpcgfmi.exe Gnckooob.exe File created C:\Windows\SysWOW64\Iqdfmajd.exe Iodjcnca.exe File created C:\Windows\SysWOW64\Igjbci32.exe Hnbnjc32.exe File created C:\Windows\SysWOW64\Agmehamp.exe Andqol32.exe File opened for modification C:\Windows\SysWOW64\Anmmkd32.exe Addhbo32.exe File opened for modification C:\Windows\SysWOW64\Holfoqcm.exe Hfaajnfb.exe File created C:\Windows\SysWOW64\Peaggfjj.dll Ljhnlb32.exe File created C:\Windows\SysWOW64\Fanmld32.dll Nfihbk32.exe File created C:\Windows\SysWOW64\Hhdjkflc.dll Afockelf.exe File opened for modification C:\Windows\SysWOW64\Aidehpea.exe Amnebo32.exe File created C:\Windows\SysWOW64\Ddipic32.dll Holfoqcm.exe File opened for modification C:\Windows\SysWOW64\Dnajppda.exe Ddifgk32.exe File created C:\Windows\SysWOW64\Eacdhhjj.dll Eqmlccdi.exe File created C:\Windows\SysWOW64\Gqpapacd.exe Gggmgk32.exe File created C:\Windows\SysWOW64\Acajpc32.dll Dmjmekgn.exe File created C:\Windows\SysWOW64\Gnggfhnm.dll Ndlacapp.exe File opened for modification C:\Windows\SysWOW64\Hikkdc32.exe Hhlnjpdi.exe File created C:\Windows\SysWOW64\Iknmmg32.dll Mmkdcm32.exe File created C:\Windows\SysWOW64\Pninea32.dll Mjnnbk32.exe File created C:\Windows\SysWOW64\Dgaiffii.exe Dnienqbi.exe File created C:\Windows\SysWOW64\Dolmodpi.exe Dpkmal32.exe File created C:\Windows\SysWOW64\Egcaod32.exe Enkmfolf.exe File created C:\Windows\SysWOW64\Hmcipf32.dll Fcbnpnme.exe File created C:\Windows\SysWOW64\Jjhjae32.exe Jcnbekok.exe File created C:\Windows\SysWOW64\Lpphjbnh.dll Bmidnm32.exe File created C:\Windows\SysWOW64\Kcblbn32.dll Igqbiacj.exe File opened for modification C:\Windows\SysWOW64\Epiaig32.exe Eipilmgh.exe File created C:\Windows\SysWOW64\Hceook32.dll Dbbdip32.exe File created C:\Windows\SysWOW64\Jjbjlpga.exe Jloibkhh.exe File opened for modification C:\Windows\SysWOW64\Lpinac32.exe Lfqjhmhk.exe File opened for modification C:\Windows\SysWOW64\Akpoaj32.exe Afbgkl32.exe File opened for modification C:\Windows\SysWOW64\Apggckbf.exe Afockelf.exe File created C:\Windows\SysWOW64\Fdbkja32.exe Fcbnpnme.exe File created C:\Windows\SysWOW64\Cfjnhe32.exe Cblebgfh.exe File created C:\Windows\SysWOW64\Caojpaij.exe Chfegk32.exe File created C:\Windows\SysWOW64\Ieeimlep.exe Icfmci32.exe File created C:\Windows\SysWOW64\Kbpkkeen.dll Babcil32.exe File created C:\Windows\SysWOW64\Dcphdqmj.exe Dcnlnaom.exe File opened for modification C:\Windows\SysWOW64\Fiilblom.exe Flekihpc.exe File opened for modification C:\Windows\SysWOW64\Pmkofa32.exe Pfojdh32.exe File opened for modification C:\Windows\SysWOW64\Bdlfjh32.exe Bigbmpco.exe File created C:\Windows\SysWOW64\Dfaadk32.dll Icfmci32.exe File created C:\Windows\SysWOW64\Gbkkfg32.dll Dnnoip32.exe File opened for modification C:\Windows\SysWOW64\Gammbfqa.exe Geflne32.exe File created C:\Windows\SysWOW64\Kofheeoq.exe Jodlof32.exe File created C:\Windows\SysWOW64\Hjjcnl32.dll Hjmodffo.exe File created C:\Windows\SysWOW64\Mphamg32.exe Minipm32.exe File opened for modification C:\Windows\SysWOW64\Doqbifpl.exe Dlbfmjqi.exe File created C:\Windows\SysWOW64\Ppahmb32.exe Pjdpelnc.exe File created C:\Windows\SysWOW64\Nnoefe32.dll Dcphdqmj.exe File opened for modification C:\Windows\SysWOW64\Kdpiqehp.exe Kocphojh.exe File created C:\Windows\SysWOW64\Qdmdjkpo.dll Fgpplf32.exe File created C:\Windows\SysWOW64\Fncibg32.exe Fcneeo32.exe File opened for modification C:\Windows\SysWOW64\Jhoeef32.exe Jaemilci.exe File created C:\Windows\SysWOW64\Gcimfg32.exe Gloejmld.exe File opened for modification C:\Windows\SysWOW64\Hdffah32.exe Hnmnengg.exe File created C:\Windows\SysWOW64\Plgkpj32.dll Jcnbekok.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7468 8168 WerFault.exe Mbldhn32.exe -
Modifies registry class 64 IoCs
Processes:
Mmkdcm32.exeOahnhncc.exeMgloefco.exeIialhaad.exePnknim32.exePpahmb32.exePdenmbkk.exeGckjlf32.exeGgicbe32.exeGhmbib32.exeEnigke32.exeIobmmoed.exePgbkgmao.exeDpefaq32.exeFgmdec32.exeIjkled32.exeInidkb32.exeOogdfc32.exeQacameaj.exeFncibg32.exeJaemilci.exeLmnlpcel.exeKpgoolbl.exeCbdhgaid.exeFcneeo32.exeJcnbekok.exeHhiaepfl.exeLobhqdec.exeChfegk32.exeMmghklif.exeMapppn32.exeLchfib32.exeHolfoqcm.exeOgcnmc32.exeBhblllfo.exeLkcccn32.exeGbalopbn.exeBhgjcmfi.exeLjjicl32.exeMeadlo32.exePmkofa32.exeOkmpqjad.exeBejobk32.exeFckaeioa.exeOdkcpi32.exeEnkmfolf.exeFlaiho32.exeQdipag32.exeIcfmci32.exeEgbken32.exeFqikob32.exeKhcgfo32.exeLdckan32.exeEaenkj32.exePjbcplpe.exeGammbfqa.exePkholi32.exePcdqhecd.exeHioflcbj.exeIbpgqa32.exeMdghhb32.exeOfbdncaj.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iknmmg32.dll" Mmkdcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oahnhncc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmpjlk32.dll" Mgloefco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iialhaad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnknim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keiifian.dll" Ppahmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apgnjp32.dll" Pdenmbkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gckjlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggicbe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghmbib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enigke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iobmmoed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgbkgmao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oihlnd32.dll" Dpefaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgmdec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijkled32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Inidkb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oogdfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qacameaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fncibg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jaemilci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bepdmhnd.dll" Lmnlpcel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpgoolbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldnekoch.dll" Cbdhgaid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Begndj32.dll" Fcneeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plgkpj32.dll" Jcnbekok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhiaepfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lobhqdec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chfegk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmghklif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkaokcqj.dll" Mapppn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgogbi32.dll" Lchfib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Holfoqcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogcnmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kolfbd32.dll" Bhblllfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkcccn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knkkoggp.dll" Gckjlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbalopbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhgjcmfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nheeabjo.dll" Ljjicl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Meadlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmkofa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okmpqjad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bejobk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmnfcojj.dll" Fckaeioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odkcpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enkmfolf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flaiho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qdipag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icfmci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egbken32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqikob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khcgfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldckan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eaenkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Occmjg32.dll" Pjbcplpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhlebfjp.dll" Gammbfqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aofbkbfe.dll" Pkholi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggicbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcdqhecd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cimjkpjn.dll" Hioflcbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibpgqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdghhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcdfnq32.dll" Ofbdncaj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exeDbpjaeoc.exeEnigke32.exeEbgpad32.exeEbimgcfi.exeEnpmld32.exeEnbjad32.exeFpbflg32.exeFbbpmb32.exeFechomko.exeFbgihaji.exeGfeaopqo.exeGblbca32.exeGbnoiqdq.exeGbalopbn.exeGfodeohd.exeHfaajnfb.exeHolfoqcm.exeHlpfhe32.exeHidgai32.exeHfhgkmpj.exeHmdlmg32.exedescription pid process target process PID 2432 wrote to memory of 2916 2432 151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe Dbpjaeoc.exe PID 2432 wrote to memory of 2916 2432 151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe Dbpjaeoc.exe PID 2432 wrote to memory of 2916 2432 151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe Dbpjaeoc.exe PID 2916 wrote to memory of 2236 2916 Dbpjaeoc.exe Enigke32.exe PID 2916 wrote to memory of 2236 2916 Dbpjaeoc.exe Enigke32.exe PID 2916 wrote to memory of 2236 2916 Dbpjaeoc.exe Enigke32.exe PID 2236 wrote to memory of 3380 2236 Enigke32.exe Ebgpad32.exe PID 2236 wrote to memory of 3380 2236 Enigke32.exe Ebgpad32.exe PID 2236 wrote to memory of 3380 2236 Enigke32.exe Ebgpad32.exe PID 3380 wrote to memory of 3816 3380 Ebgpad32.exe Ebimgcfi.exe PID 3380 wrote to memory of 3816 3380 Ebgpad32.exe Ebimgcfi.exe PID 3380 wrote to memory of 3816 3380 Ebgpad32.exe Ebimgcfi.exe PID 3816 wrote to memory of 2980 3816 Ebimgcfi.exe Enpmld32.exe PID 3816 wrote to memory of 2980 3816 Ebimgcfi.exe Enpmld32.exe PID 3816 wrote to memory of 2980 3816 Ebimgcfi.exe Enpmld32.exe PID 2980 wrote to memory of 3512 2980 Enpmld32.exe Enbjad32.exe PID 2980 wrote to memory of 3512 2980 Enpmld32.exe Enbjad32.exe PID 2980 wrote to memory of 3512 2980 Enpmld32.exe Enbjad32.exe PID 3512 wrote to memory of 2160 3512 Enbjad32.exe Fpbflg32.exe PID 3512 wrote to memory of 2160 3512 Enbjad32.exe Fpbflg32.exe PID 3512 wrote to memory of 2160 3512 Enbjad32.exe Fpbflg32.exe PID 2160 wrote to memory of 1584 2160 Fpbflg32.exe Fbbpmb32.exe PID 2160 wrote to memory of 1584 2160 Fpbflg32.exe Fbbpmb32.exe PID 2160 wrote to memory of 1584 2160 Fpbflg32.exe Fbbpmb32.exe PID 1584 wrote to memory of 4672 1584 Fbbpmb32.exe Fechomko.exe PID 1584 wrote to memory of 4672 1584 Fbbpmb32.exe Fechomko.exe PID 1584 wrote to memory of 4672 1584 Fbbpmb32.exe Fechomko.exe PID 4672 wrote to memory of 4024 4672 Fechomko.exe Fbgihaji.exe PID 4672 wrote to memory of 4024 4672 Fechomko.exe Fbgihaji.exe PID 4672 wrote to memory of 4024 4672 Fechomko.exe Fbgihaji.exe PID 4024 wrote to memory of 1556 4024 Fbgihaji.exe Gfeaopqo.exe PID 4024 wrote to memory of 1556 4024 Fbgihaji.exe Gfeaopqo.exe PID 4024 wrote to memory of 1556 4024 Fbgihaji.exe Gfeaopqo.exe PID 1556 wrote to memory of 2300 1556 Gfeaopqo.exe Gblbca32.exe PID 1556 wrote to memory of 2300 1556 Gfeaopqo.exe Gblbca32.exe PID 1556 wrote to memory of 2300 1556 Gfeaopqo.exe Gblbca32.exe PID 2300 wrote to memory of 4844 2300 Gblbca32.exe Gbnoiqdq.exe PID 2300 wrote to memory of 4844 2300 Gblbca32.exe Gbnoiqdq.exe PID 2300 wrote to memory of 4844 2300 Gblbca32.exe Gbnoiqdq.exe PID 4844 wrote to memory of 2588 4844 Gbnoiqdq.exe Gbalopbn.exe PID 4844 wrote to memory of 2588 4844 Gbnoiqdq.exe Gbalopbn.exe PID 4844 wrote to memory of 2588 4844 Gbnoiqdq.exe Gbalopbn.exe PID 2588 wrote to memory of 3020 2588 Gbalopbn.exe Gfodeohd.exe PID 2588 wrote to memory of 3020 2588 Gbalopbn.exe Gfodeohd.exe PID 2588 wrote to memory of 3020 2588 Gbalopbn.exe Gfodeohd.exe PID 3020 wrote to memory of 4728 3020 Gfodeohd.exe Hfaajnfb.exe PID 3020 wrote to memory of 4728 3020 Gfodeohd.exe Hfaajnfb.exe PID 3020 wrote to memory of 4728 3020 Gfodeohd.exe Hfaajnfb.exe PID 4728 wrote to memory of 3416 4728 Hfaajnfb.exe Holfoqcm.exe PID 4728 wrote to memory of 3416 4728 Hfaajnfb.exe Holfoqcm.exe PID 4728 wrote to memory of 3416 4728 Hfaajnfb.exe Holfoqcm.exe PID 3416 wrote to memory of 2996 3416 Holfoqcm.exe Hlpfhe32.exe PID 3416 wrote to memory of 2996 3416 Holfoqcm.exe Hlpfhe32.exe PID 3416 wrote to memory of 2996 3416 Holfoqcm.exe Hlpfhe32.exe PID 2996 wrote to memory of 3776 2996 Hlpfhe32.exe Hidgai32.exe PID 2996 wrote to memory of 3776 2996 Hlpfhe32.exe Hidgai32.exe PID 2996 wrote to memory of 3776 2996 Hlpfhe32.exe Hidgai32.exe PID 3776 wrote to memory of 3716 3776 Hidgai32.exe Hfhgkmpj.exe PID 3776 wrote to memory of 3716 3776 Hidgai32.exe Hfhgkmpj.exe PID 3776 wrote to memory of 3716 3776 Hidgai32.exe Hfhgkmpj.exe PID 3716 wrote to memory of 2660 3716 Hfhgkmpj.exe Hmdlmg32.exe PID 3716 wrote to memory of 2660 3716 Hfhgkmpj.exe Hmdlmg32.exe PID 3716 wrote to memory of 2660 3716 Hfhgkmpj.exe Hmdlmg32.exe PID 2660 wrote to memory of 1144 2660 Hmdlmg32.exe Imgicgca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\151c3e61b3558dd89c9dbe91c02ec210_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Dbpjaeoc.exeC:\Windows\system32\Dbpjaeoc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Enigke32.exeC:\Windows\system32\Enigke32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Ebgpad32.exeC:\Windows\system32\Ebgpad32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\Ebimgcfi.exeC:\Windows\system32\Ebimgcfi.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\Enpmld32.exeC:\Windows\system32\Enpmld32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Enbjad32.exeC:\Windows\system32\Enbjad32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\Fpbflg32.exeC:\Windows\system32\Fpbflg32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\Fbbpmb32.exeC:\Windows\system32\Fbbpmb32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\Fechomko.exeC:\Windows\system32\Fechomko.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\Fbgihaji.exeC:\Windows\system32\Fbgihaji.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\Gfeaopqo.exeC:\Windows\system32\Gfeaopqo.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\Gblbca32.exeC:\Windows\system32\Gblbca32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Gbnoiqdq.exeC:\Windows\system32\Gbnoiqdq.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\Gbalopbn.exeC:\Windows\system32\Gbalopbn.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Gfodeohd.exeC:\Windows\system32\Gfodeohd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Hfaajnfb.exeC:\Windows\system32\Hfaajnfb.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Holfoqcm.exeC:\Windows\system32\Holfoqcm.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\Hlpfhe32.exeC:\Windows\system32\Hlpfhe32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Hidgai32.exeC:\Windows\system32\Hidgai32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\Hfhgkmpj.exeC:\Windows\system32\Hfhgkmpj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\Hmdlmg32.exeC:\Windows\system32\Hmdlmg32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Imgicgca.exeC:\Windows\system32\Imgicgca.exe23⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Iinjhh32.exeC:\Windows\system32\Iinjhh32.exe24⤵
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\Ibfnqmpf.exeC:\Windows\system32\Ibfnqmpf.exe25⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\Ipjoja32.exeC:\Windows\system32\Ipjoja32.exe26⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\Imnocf32.exeC:\Windows\system32\Imnocf32.exe27⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\Impliekg.exeC:\Windows\system32\Impliekg.exe28⤵
- Executes dropped EXE
PID:3832 -
C:\Windows\SysWOW64\Jcmdaljn.exeC:\Windows\system32\Jcmdaljn.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Jcoaglhk.exeC:\Windows\system32\Jcoaglhk.exe30⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\Jpcapp32.exeC:\Windows\system32\Jpcapp32.exe31⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\Jebfng32.exeC:\Windows\system32\Jebfng32.exe32⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\Jgbchj32.exeC:\Windows\system32\Jgbchj32.exe33⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\Kjblje32.exeC:\Windows\system32\Kjblje32.exe34⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\Keimof32.exeC:\Windows\system32\Keimof32.exe35⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\Klcekpdo.exeC:\Windows\system32\Klcekpdo.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4264 -
C:\Windows\SysWOW64\Klhnfo32.exeC:\Windows\system32\Klhnfo32.exe37⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Kngkqbgl.exeC:\Windows\system32\Kngkqbgl.exe38⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\Lfbped32.exeC:\Windows\system32\Lfbped32.exe39⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\Lcgpni32.exeC:\Windows\system32\Lcgpni32.exe40⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\Lqkqhm32.exeC:\Windows\system32\Lqkqhm32.exe41⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\Lfgipd32.exeC:\Windows\system32\Lfgipd32.exe42⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Lfjfecno.exeC:\Windows\system32\Lfjfecno.exe43⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Lmdnbn32.exeC:\Windows\system32\Lmdnbn32.exe44⤵
- Executes dropped EXE
PID:3084 -
C:\Windows\SysWOW64\Ljhnlb32.exeC:\Windows\system32\Ljhnlb32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\Mgloefco.exeC:\Windows\system32\Mgloefco.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:4340 -
C:\Windows\SysWOW64\Mcbpjg32.exeC:\Windows\system32\Mcbpjg32.exe47⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Mmkdcm32.exeC:\Windows\system32\Mmkdcm32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Mmmqhl32.exeC:\Windows\system32\Mmmqhl32.exe49⤵
- Executes dropped EXE
PID:3448 -
C:\Windows\SysWOW64\Mgbefe32.exeC:\Windows\system32\Mgbefe32.exe50⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\Nqmfdj32.exeC:\Windows\system32\Nqmfdj32.exe51⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\Nflkbanj.exeC:\Windows\system32\Nflkbanj.exe52⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Nglhld32.exeC:\Windows\system32\Nglhld32.exe53⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\Nfaemp32.exeC:\Windows\system32\Nfaemp32.exe54⤵
- Executes dropped EXE
PID:3768 -
C:\Windows\SysWOW64\Nfcabp32.exeC:\Windows\system32\Nfcabp32.exe55⤵
- Executes dropped EXE
PID:3676 -
C:\Windows\SysWOW64\Ogcnmc32.exeC:\Windows\system32\Ogcnmc32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\Ofhknodl.exeC:\Windows\system32\Ofhknodl.exe57⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\Ondljl32.exeC:\Windows\system32\Ondljl32.exe58⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Opeiadfg.exeC:\Windows\system32\Opeiadfg.exe59⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\Paeelgnj.exeC:\Windows\system32\Paeelgnj.exe60⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\Pnifekmd.exeC:\Windows\system32\Pnifekmd.exe61⤵
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\Pdenmbkk.exeC:\Windows\system32\Pdenmbkk.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:4088 -
C:\Windows\SysWOW64\Paiogf32.exeC:\Windows\system32\Paiogf32.exe63⤵
- Executes dropped EXE
PID:4632 -
C:\Windows\SysWOW64\Pjbcplpe.exeC:\Windows\system32\Pjbcplpe.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:1496 -
C:\Windows\SysWOW64\Ppolhcnm.exeC:\Windows\system32\Ppolhcnm.exe65⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Pjdpelnc.exeC:\Windows\system32\Pjdpelnc.exe66⤵
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Ppahmb32.exeC:\Windows\system32\Ppahmb32.exe67⤵
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Qobhkjdi.exeC:\Windows\system32\Qobhkjdi.exe68⤵PID:1852
-
C:\Windows\SysWOW64\Qfmmplad.exeC:\Windows\system32\Qfmmplad.exe69⤵PID:4300
-
C:\Windows\SysWOW64\Qacameaj.exeC:\Windows\system32\Qacameaj.exe70⤵
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Amjbbfgo.exeC:\Windows\system32\Amjbbfgo.exe71⤵PID:5044
-
C:\Windows\SysWOW64\Afbgkl32.exeC:\Windows\system32\Afbgkl32.exe72⤵
- Drops file in System32 directory
PID:3544 -
C:\Windows\SysWOW64\Akpoaj32.exeC:\Windows\system32\Akpoaj32.exe73⤵PID:3424
-
C:\Windows\SysWOW64\Ahdpjn32.exeC:\Windows\system32\Ahdpjn32.exe74⤵PID:2336
-
C:\Windows\SysWOW64\Amcehdod.exeC:\Windows\system32\Amcehdod.exe75⤵PID:2436
-
C:\Windows\SysWOW64\Baannc32.exeC:\Windows\system32\Baannc32.exe76⤵PID:3900
-
C:\Windows\SysWOW64\Bgnffj32.exeC:\Windows\system32\Bgnffj32.exe77⤵PID:4620
-
C:\Windows\SysWOW64\Bmjkic32.exeC:\Windows\system32\Bmjkic32.exe78⤵PID:2196
-
C:\Windows\SysWOW64\Boihcf32.exeC:\Windows\system32\Boihcf32.exe79⤵PID:5144
-
C:\Windows\SysWOW64\Bhblllfo.exeC:\Windows\system32\Bhblllfo.exe80⤵
- Modifies registry class
PID:5188 -
C:\Windows\SysWOW64\Cdimqm32.exeC:\Windows\system32\Cdimqm32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5228 -
C:\Windows\SysWOW64\Cnaaib32.exeC:\Windows\system32\Cnaaib32.exe82⤵PID:5284
-
C:\Windows\SysWOW64\Chfegk32.exeC:\Windows\system32\Chfegk32.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:5328 -
C:\Windows\SysWOW64\Caojpaij.exeC:\Windows\system32\Caojpaij.exe84⤵PID:5368
-
C:\Windows\SysWOW64\Cnfkdb32.exeC:\Windows\system32\Cnfkdb32.exe85⤵PID:5424
-
C:\Windows\SysWOW64\Cgnomg32.exeC:\Windows\system32\Cgnomg32.exe86⤵PID:5480
-
C:\Windows\SysWOW64\Cdbpgl32.exeC:\Windows\system32\Cdbpgl32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5524 -
C:\Windows\SysWOW64\Dojqjdbl.exeC:\Windows\system32\Dojqjdbl.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5572 -
C:\Windows\SysWOW64\Dpkmal32.exeC:\Windows\system32\Dpkmal32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5644 -
C:\Windows\SysWOW64\Dolmodpi.exeC:\Windows\system32\Dolmodpi.exe90⤵PID:5696
-
C:\Windows\SysWOW64\Ddifgk32.exeC:\Windows\system32\Ddifgk32.exe91⤵
- Drops file in System32 directory
PID:5744 -
C:\Windows\SysWOW64\Dnajppda.exeC:\Windows\system32\Dnajppda.exe92⤵PID:5792
-
C:\Windows\SysWOW64\Dgjoif32.exeC:\Windows\system32\Dgjoif32.exe93⤵PID:5856
-
C:\Windows\SysWOW64\Dbocfo32.exeC:\Windows\system32\Dbocfo32.exe94⤵PID:5928
-
C:\Windows\SysWOW64\Dhikci32.exeC:\Windows\system32\Dhikci32.exe95⤵PID:5980
-
C:\Windows\SysWOW64\Doccpcja.exeC:\Windows\system32\Doccpcja.exe96⤵PID:6032
-
C:\Windows\SysWOW64\Ebaplnie.exeC:\Windows\system32\Ebaplnie.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6088 -
C:\Windows\SysWOW64\Enhpao32.exeC:\Windows\system32\Enhpao32.exe98⤵PID:6136
-
C:\Windows\SysWOW64\Ehndnh32.exeC:\Windows\system32\Ehndnh32.exe99⤵PID:5184
-
C:\Windows\SysWOW64\Enkmfolf.exeC:\Windows\system32\Enkmfolf.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5268 -
C:\Windows\SysWOW64\Egcaod32.exeC:\Windows\system32\Egcaod32.exe101⤵PID:5348
-
C:\Windows\SysWOW64\Ebifmm32.exeC:\Windows\system32\Ebifmm32.exe102⤵PID:5400
-
C:\Windows\SysWOW64\Eomffaag.exeC:\Windows\system32\Eomffaag.exe103⤵PID:5532
-
C:\Windows\SysWOW64\Fooclapd.exeC:\Windows\system32\Fooclapd.exe104⤵PID:5608
-
C:\Windows\SysWOW64\Fdlkdhnk.exeC:\Windows\system32\Fdlkdhnk.exe105⤵PID:5708
-
C:\Windows\SysWOW64\Fkfcqb32.exeC:\Windows\system32\Fkfcqb32.exe106⤵PID:5772
-
C:\Windows\SysWOW64\Fbplml32.exeC:\Windows\system32\Fbplml32.exe107⤵PID:5880
-
C:\Windows\SysWOW64\Fgmdec32.exeC:\Windows\system32\Fgmdec32.exe108⤵
- Modifies registry class
PID:5996 -
C:\Windows\SysWOW64\Feqeog32.exeC:\Windows\system32\Feqeog32.exe109⤵PID:6064
-
C:\Windows\SysWOW64\Fecadghc.exeC:\Windows\system32\Fecadghc.exe110⤵PID:5140
-
C:\Windows\SysWOW64\Fkmjaa32.exeC:\Windows\system32\Fkmjaa32.exe111⤵PID:5276
-
C:\Windows\SysWOW64\Fajbjh32.exeC:\Windows\system32\Fajbjh32.exe112⤵PID:5360
-
C:\Windows\SysWOW64\Gbiockdj.exeC:\Windows\system32\Gbiockdj.exe113⤵PID:5460
-
C:\Windows\SysWOW64\Gpmomo32.exeC:\Windows\system32\Gpmomo32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5664 -
C:\Windows\SysWOW64\Gnblnlhl.exeC:\Windows\system32\Gnblnlhl.exe115⤵PID:5784
-
C:\Windows\SysWOW64\Gpaihooo.exeC:\Windows\system32\Gpaihooo.exe116⤵PID:5936
-
C:\Windows\SysWOW64\Gacepg32.exeC:\Windows\system32\Gacepg32.exe117⤵PID:6056
-
C:\Windows\SysWOW64\Gngeik32.exeC:\Windows\system32\Gngeik32.exe118⤵PID:5468
-
C:\Windows\SysWOW64\Hnibokbd.exeC:\Windows\system32\Hnibokbd.exe119⤵PID:5384
-
C:\Windows\SysWOW64\Hioflcbj.exeC:\Windows\system32\Hioflcbj.exe120⤵
- Modifies registry class
PID:5488 -
C:\Windows\SysWOW64\Iijfhbhl.exeC:\Windows\system32\Iijfhbhl.exe121⤵PID:5968
-
C:\Windows\SysWOW64\Iimcma32.exeC:\Windows\system32\Iimcma32.exe122⤵PID:5152
-
C:\Windows\SysWOW64\Iahgad32.exeC:\Windows\system32\Iahgad32.exe123⤵
- Drops file in System32 directory
PID:5868 -
C:\Windows\SysWOW64\Iialhaad.exeC:\Windows\system32\Iialhaad.exe124⤵
- Modifies registry class
PID:5220 -
C:\Windows\SysWOW64\Iehmmb32.exeC:\Windows\system32\Iehmmb32.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5900 -
C:\Windows\SysWOW64\Jblmgf32.exeC:\Windows\system32\Jblmgf32.exe126⤵PID:5616
-
C:\Windows\SysWOW64\Jocnlg32.exeC:\Windows\system32\Jocnlg32.exe127⤵PID:5604
-
C:\Windows\SysWOW64\Jhkbdmbg.exeC:\Windows\system32\Jhkbdmbg.exe128⤵PID:6164
-
C:\Windows\SysWOW64\Jpbjfjci.exeC:\Windows\system32\Jpbjfjci.exe129⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6208 -
C:\Windows\SysWOW64\Jikoopij.exeC:\Windows\system32\Jikoopij.exe130⤵PID:6252
-
C:\Windows\SysWOW64\Jimldogg.exeC:\Windows\system32\Jimldogg.exe131⤵PID:6296
-
C:\Windows\SysWOW64\Jojdlfeo.exeC:\Windows\system32\Jojdlfeo.exe132⤵PID:6340
-
C:\Windows\SysWOW64\Kedlip32.exeC:\Windows\system32\Kedlip32.exe133⤵PID:6384
-
C:\Windows\SysWOW64\Klndfj32.exeC:\Windows\system32\Klndfj32.exe134⤵PID:6428
-
C:\Windows\SysWOW64\Kbhmbdle.exeC:\Windows\system32\Kbhmbdle.exe135⤵PID:6472
-
C:\Windows\SysWOW64\Kibeoo32.exeC:\Windows\system32\Kibeoo32.exe136⤵PID:6516
-
C:\Windows\SysWOW64\Kplmliko.exeC:\Windows\system32\Kplmliko.exe137⤵PID:6556
-
C:\Windows\SysWOW64\Keifdpif.exeC:\Windows\system32\Keifdpif.exe138⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6604 -
C:\Windows\SysWOW64\Khiofk32.exeC:\Windows\system32\Khiofk32.exe139⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6648 -
C:\Windows\SysWOW64\Klggli32.exeC:\Windows\system32\Klggli32.exe140⤵PID:6692
-
C:\Windows\SysWOW64\Lljdai32.exeC:\Windows\system32\Lljdai32.exe141⤵PID:6740
-
C:\Windows\SysWOW64\Lcfidb32.exeC:\Windows\system32\Lcfidb32.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6784 -
C:\Windows\SysWOW64\Lchfib32.exeC:\Windows\system32\Lchfib32.exe143⤵
- Modifies registry class
PID:6824 -
C:\Windows\SysWOW64\Lancko32.exeC:\Windows\system32\Lancko32.exe144⤵PID:6868
-
C:\Windows\SysWOW64\Llcghg32.exeC:\Windows\system32\Llcghg32.exe145⤵PID:6912
-
C:\Windows\SysWOW64\Mapppn32.exeC:\Windows\system32\Mapppn32.exe146⤵
- Modifies registry class
PID:6956 -
C:\Windows\SysWOW64\Mhldbh32.exeC:\Windows\system32\Mhldbh32.exe147⤵PID:7000
-
C:\Windows\SysWOW64\Mhoahh32.exeC:\Windows\system32\Mhoahh32.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7044 -
C:\Windows\SysWOW64\Mjnnbk32.exeC:\Windows\system32\Mjnnbk32.exe149⤵
- Drops file in System32 directory
PID:7088 -
C:\Windows\SysWOW64\Mlljnf32.exeC:\Windows\system32\Mlljnf32.exe150⤵PID:7132
-
C:\Windows\SysWOW64\Mbibfm32.exeC:\Windows\system32\Mbibfm32.exe151⤵
- Drops file in System32 directory
PID:6152 -
C:\Windows\SysWOW64\Nciopppp.exeC:\Windows\system32\Nciopppp.exe152⤵PID:6244
-
C:\Windows\SysWOW64\Nhegig32.exeC:\Windows\system32\Nhegig32.exe153⤵PID:6292
-
C:\Windows\SysWOW64\Nfihbk32.exeC:\Windows\system32\Nfihbk32.exe154⤵
- Drops file in System32 directory
PID:6376 -
C:\Windows\SysWOW64\Ncmhko32.exeC:\Windows\system32\Ncmhko32.exe155⤵PID:6460
-
C:\Windows\SysWOW64\Njgqhicg.exeC:\Windows\system32\Njgqhicg.exe156⤵PID:6552
-
C:\Windows\SysWOW64\Nodiqp32.exeC:\Windows\system32\Nodiqp32.exe157⤵PID:6624
-
C:\Windows\SysWOW64\Njjmni32.exeC:\Windows\system32\Njjmni32.exe158⤵PID:6720
-
C:\Windows\SysWOW64\Nqcejcha.exeC:\Windows\system32\Nqcejcha.exe159⤵PID:6792
-
C:\Windows\SysWOW64\Nqfbpb32.exeC:\Windows\system32\Nqfbpb32.exe160⤵PID:6876
-
C:\Windows\SysWOW64\Obgohklm.exeC:\Windows\system32\Obgohklm.exe161⤵PID:6988
-
C:\Windows\SysWOW64\Oiagde32.exeC:\Windows\system32\Oiagde32.exe162⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7064 -
C:\Windows\SysWOW64\Ookoaokf.exeC:\Windows\system32\Ookoaokf.exe163⤵PID:7144
-
C:\Windows\SysWOW64\Omopjcjp.exeC:\Windows\system32\Omopjcjp.exe164⤵PID:6232
-
C:\Windows\SysWOW64\Ojcpdg32.exeC:\Windows\system32\Ojcpdg32.exe165⤵PID:6352
-
C:\Windows\SysWOW64\Ockdmmoj.exeC:\Windows\system32\Ockdmmoj.exe166⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6504 -
C:\Windows\SysWOW64\Ppdbgncl.exeC:\Windows\system32\Ppdbgncl.exe167⤵
- Drops file in System32 directory
PID:6640 -
C:\Windows\SysWOW64\Pfojdh32.exeC:\Windows\system32\Pfojdh32.exe168⤵
- Drops file in System32 directory
PID:6768 -
C:\Windows\SysWOW64\Pmkofa32.exeC:\Windows\system32\Pmkofa32.exe169⤵
- Modifies registry class
PID:6860 -
C:\Windows\SysWOW64\Pplhhm32.exeC:\Windows\system32\Pplhhm32.exe170⤵PID:7052
-
C:\Windows\SysWOW64\Pfepdg32.exeC:\Windows\system32\Pfepdg32.exe171⤵PID:6220
-
C:\Windows\SysWOW64\Pmphaaln.exeC:\Windows\system32\Pmphaaln.exe172⤵PID:6336
-
C:\Windows\SysWOW64\Pmbegqjk.exeC:\Windows\system32\Pmbegqjk.exe173⤵PID:752
-
C:\Windows\SysWOW64\Qiiflaoo.exeC:\Windows\system32\Qiiflaoo.exe174⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6776 -
C:\Windows\SysWOW64\Amfobp32.exeC:\Windows\system32\Amfobp32.exe175⤵PID:7008
-
C:\Windows\SysWOW64\Afockelf.exeC:\Windows\system32\Afockelf.exe176⤵
- Drops file in System32 directory
PID:6148 -
C:\Windows\SysWOW64\Apggckbf.exeC:\Windows\system32\Apggckbf.exe177⤵PID:6528
-
C:\Windows\SysWOW64\Apjdikqd.exeC:\Windows\system32\Apjdikqd.exe178⤵PID:6772
-
C:\Windows\SysWOW64\Amnebo32.exeC:\Windows\system32\Amnebo32.exe179⤵
- Drops file in System32 directory
PID:7124 -
C:\Windows\SysWOW64\Aidehpea.exeC:\Windows\system32\Aidehpea.exe180⤵
- Drops file in System32 directory
PID:6480 -
C:\Windows\SysWOW64\Adjjeieh.exeC:\Windows\system32\Adjjeieh.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7028 -
C:\Windows\SysWOW64\Bigbmpco.exeC:\Windows\system32\Bigbmpco.exe182⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6820 -
C:\Windows\SysWOW64\Bdlfjh32.exeC:\Windows\system32\Bdlfjh32.exe183⤵PID:2656
-
C:\Windows\SysWOW64\Bjfogbjb.exeC:\Windows\system32\Bjfogbjb.exe184⤵PID:7196
-
C:\Windows\SysWOW64\Bjhkmbho.exeC:\Windows\system32\Bjhkmbho.exe185⤵PID:7240
-
C:\Windows\SysWOW64\Babcil32.exeC:\Windows\system32\Babcil32.exe186⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:7280 -
C:\Windows\SysWOW64\Bfolacnc.exeC:\Windows\system32\Bfolacnc.exe187⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7328 -
C:\Windows\SysWOW64\Bmidnm32.exeC:\Windows\system32\Bmidnm32.exe188⤵
- Drops file in System32 directory
PID:7372 -
C:\Windows\SysWOW64\Bdcmkgmm.exeC:\Windows\system32\Bdcmkgmm.exe189⤵PID:7416
-
C:\Windows\SysWOW64\Bpjmph32.exeC:\Windows\system32\Bpjmph32.exe190⤵PID:7460
-
C:\Windows\SysWOW64\Cmnnimak.exeC:\Windows\system32\Cmnnimak.exe191⤵PID:7512
-
C:\Windows\SysWOW64\Cgfbbb32.exeC:\Windows\system32\Cgfbbb32.exe192⤵PID:7556
-
C:\Windows\SysWOW64\Cpogkhnl.exeC:\Windows\system32\Cpogkhnl.exe193⤵PID:7600
-
C:\Windows\SysWOW64\Cdmoafdb.exeC:\Windows\system32\Cdmoafdb.exe194⤵PID:7644
-
C:\Windows\SysWOW64\Caqpkjcl.exeC:\Windows\system32\Caqpkjcl.exe195⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7688 -
C:\Windows\SysWOW64\Cildom32.exeC:\Windows\system32\Cildom32.exe196⤵PID:7736
-
C:\Windows\SysWOW64\Cpfmlghd.exeC:\Windows\system32\Cpfmlghd.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7780 -
C:\Windows\SysWOW64\Dmjmekgn.exeC:\Windows\system32\Dmjmekgn.exe198⤵
- Drops file in System32 directory
PID:7832 -
C:\Windows\SysWOW64\Dcffnbee.exeC:\Windows\system32\Dcffnbee.exe199⤵PID:7876
-
C:\Windows\SysWOW64\Dahfkimd.exeC:\Windows\system32\Dahfkimd.exe200⤵PID:7920
-
C:\Windows\SysWOW64\Dgdncplk.exeC:\Windows\system32\Dgdncplk.exe201⤵PID:7960
-
C:\Windows\SysWOW64\Dggkipii.exeC:\Windows\system32\Dggkipii.exe202⤵PID:8004
-
C:\Windows\SysWOW64\Dcnlnaom.exeC:\Windows\system32\Dcnlnaom.exe203⤵
- Drops file in System32 directory
PID:8052 -
C:\Windows\SysWOW64\Dcphdqmj.exeC:\Windows\system32\Dcphdqmj.exe204⤵
- Drops file in System32 directory
PID:8096 -
C:\Windows\SysWOW64\Epdime32.exeC:\Windows\system32\Epdime32.exe205⤵PID:8140
-
C:\Windows\SysWOW64\Epffbd32.exeC:\Windows\system32\Epffbd32.exe206⤵PID:8184
-
C:\Windows\SysWOW64\Ejojljqa.exeC:\Windows\system32\Ejojljqa.exe207⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7236 -
C:\Windows\SysWOW64\Egbken32.exeC:\Windows\system32\Egbken32.exe208⤵
- Modifies registry class
PID:7292 -
C:\Windows\SysWOW64\Enlcahgh.exeC:\Windows\system32\Enlcahgh.exe209⤵PID:7360
-
C:\Windows\SysWOW64\Ecikjoep.exeC:\Windows\system32\Ecikjoep.exe210⤵PID:7436
-
C:\Windows\SysWOW64\Eqmlccdi.exeC:\Windows\system32\Eqmlccdi.exe211⤵
- Drops file in System32 directory
PID:7500 -
C:\Windows\SysWOW64\Fjeplijj.exeC:\Windows\system32\Fjeplijj.exe212⤵PID:7596
-
C:\Windows\SysWOW64\Fcneeo32.exeC:\Windows\system32\Fcneeo32.exe213⤵
- Drops file in System32 directory
- Modifies registry class
PID:7640 -
C:\Windows\SysWOW64\Fncibg32.exeC:\Windows\system32\Fncibg32.exe214⤵
- Modifies registry class
PID:7704 -
C:\Windows\SysWOW64\Fcpakn32.exeC:\Windows\system32\Fcpakn32.exe215⤵PID:7768
-
C:\Windows\SysWOW64\Fcbnpnme.exeC:\Windows\system32\Fcbnpnme.exe216⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:7852 -
C:\Windows\SysWOW64\Fdbkja32.exeC:\Windows\system32\Fdbkja32.exe217⤵PID:1072
-
C:\Windows\SysWOW64\Fjocbhbo.exeC:\Windows\system32\Fjocbhbo.exe218⤵PID:7916
-
C:\Windows\SysWOW64\Fqikob32.exeC:\Windows\system32\Fqikob32.exe219⤵
- Modifies registry class
PID:7944 -
C:\Windows\SysWOW64\Gkoplk32.exeC:\Windows\system32\Gkoplk32.exe220⤵PID:8036
-
C:\Windows\SysWOW64\Gkalbj32.exeC:\Windows\system32\Gkalbj32.exe221⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8104 -
C:\Windows\SysWOW64\Gggmgk32.exeC:\Windows\system32\Gggmgk32.exe222⤵
- Drops file in System32 directory
PID:8168 -
C:\Windows\SysWOW64\Gqpapacd.exeC:\Windows\system32\Gqpapacd.exe223⤵PID:7232
-
C:\Windows\SysWOW64\Gbpnjdkg.exeC:\Windows\system32\Gbpnjdkg.exe224⤵PID:7348
-
C:\Windows\SysWOW64\Gkhbbi32.exeC:\Windows\system32\Gkhbbi32.exe225⤵PID:7468
-
C:\Windows\SysWOW64\Gbbkocid.exeC:\Windows\system32\Gbbkocid.exe226⤵PID:7564
-
C:\Windows\SysWOW64\Hjmodffo.exeC:\Windows\system32\Hjmodffo.exe227⤵
- Drops file in System32 directory
PID:7700 -
C:\Windows\SysWOW64\Hebcao32.exeC:\Windows\system32\Hebcao32.exe228⤵PID:7760
-
C:\Windows\SysWOW64\Hkmlnimb.exeC:\Windows\system32\Hkmlnimb.exe229⤵PID:4644
-
C:\Windows\SysWOW64\Hbfdjc32.exeC:\Windows\system32\Hbfdjc32.exe230⤵PID:4832
-
C:\Windows\SysWOW64\Hnmeodjc.exeC:\Windows\system32\Hnmeodjc.exe231⤵PID:8024
-
C:\Windows\SysWOW64\Hcjmhk32.exeC:\Windows\system32\Hcjmhk32.exe232⤵PID:7380
-
C:\Windows\SysWOW64\Hjdedepg.exeC:\Windows\system32\Hjdedepg.exe233⤵PID:7212
-
C:\Windows\SysWOW64\Hcljmj32.exeC:\Windows\system32\Hcljmj32.exe234⤵PID:7408
-
C:\Windows\SysWOW64\Hnbnjc32.exeC:\Windows\system32\Hnbnjc32.exe235⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:7592 -
C:\Windows\SysWOW64\Igjbci32.exeC:\Windows\system32\Igjbci32.exe236⤵PID:6072
-
C:\Windows\SysWOW64\Ibpgqa32.exeC:\Windows\system32\Ibpgqa32.exe237⤵
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\Ijkled32.exeC:\Windows\system32\Ijkled32.exe238⤵
- Modifies registry class
PID:7956 -
C:\Windows\SysWOW64\Ieqpbm32.exeC:\Windows\system32\Ieqpbm32.exe239⤵PID:8132
-
C:\Windows\SysWOW64\Inidkb32.exeC:\Windows\system32\Inidkb32.exe240⤵
- Modifies registry class
PID:7316 -
C:\Windows\SysWOW64\Icfmci32.exeC:\Windows\system32\Icfmci32.exe241⤵
- Drops file in System32 directory
- Modifies registry class
PID:7616 -
C:\Windows\SysWOW64\Ieeimlep.exeC:\Windows\system32\Ieeimlep.exe242⤵PID:7820