Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
68fb1475e20f1c5560c05fa571566ee0
-
SHA1
150fee08a45f8127df6e91073b1e02bacd3fc1cf
-
SHA256
dd7253663dddd0949eae6f02292a452110317d2a7fa56cca869909b7594ac760
-
SHA512
071793d968e4ce61b499d4f90166e7b27fc70ee89aa7e8009b6bcaf0ee491cadb2814f5329bbdc3d9d9136bc77af3d4f3f106b501ceab5aecc148db1062d0afd
-
SSDEEP
24576:CYdPh2kkkkK4kXkkkkkkkke50+YNpsKv2EvZHp3oW6:iKLXZM
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Emdmjamj.exeAobpfb32.exeMhqjen32.exeLknebaba.exeQqbecp32.exeBfhmqhkd.exeCbblda32.exeHhaanh32.exeLgiobadq.exePlijimee.exeOehdan32.exeHlhddh32.exeHldjnhce.exeLpabpcdf.exeFnmmidhm.exeFipdqmje.exeFjlkgn32.exeBoobki32.exeAejglo32.exeNqeapo32.exeOmqjgl32.exeCdanpb32.exePafbadcm.exeDhbhmb32.exeMcfemmna.exeKecjmodq.exeQaofgc32.exeDdmofeam.exeHdlkcdog.exeQpbglhjq.exeFoahmh32.exeJdlacfca.exeDphjcf32.exeOcohkh32.exeAddhcn32.exeKjebjjck.exeKkfhglen.exeHdoghdmd.exeOdgamdef.exeIlhlan32.exeKninog32.exeCpkmehol.exeMchoid32.exeMgmdapml.exeKcajceke.exeAnadojlo.exeFhgifgnb.exeGlfjgaih.exeNoemqe32.exeLcfbdd32.exeGipngg32.exeDcdfdi32.exePqjhjf32.exeLjkaeo32.exePjcmap32.exeEldbkbop.exeOeaael32.exeQoaaqb32.exePmqffonj.exeJlaeab32.exeMobomnoq.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emdmjamj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aobpfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhqjen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lknebaba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qqbecp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bfhmqhkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cbblda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhaanh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgiobadq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plijimee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oehdan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlhddh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hldjnhce.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpabpcdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fnmmidhm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fipdqmje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjlkgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Boobki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aejglo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqeapo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omqjgl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdanpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pafbadcm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhbhmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mcfemmna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kecjmodq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qaofgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddmofeam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hdlkcdog.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpbglhjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Foahmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdlacfca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dphjcf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocohkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Addhcn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjebjjck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkfhglen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hdoghdmd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odgamdef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Addhcn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilhlan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kninog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpkmehol.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mchoid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mgmdapml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kcajceke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anadojlo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhgifgnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glfjgaih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noemqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcfbdd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oehdan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gipngg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dcdfdi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqjhjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ljkaeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjcmap32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eldbkbop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oeaael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qoaaqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ocohkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmqffonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlaeab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mobomnoq.exe -
Executes dropped EXE 64 IoCs
Processes:
Ajgpbj32.exeBlaopqpo.exeCdanpb32.exeCddjebgb.exeCpkkjc32.exeCejphiik.exeDphjcf32.exeDjqoll32.exeDkpkfooh.exeDdhpod32.exeEflill32.exeEfnfbl32.exeEcbfkpfk.exeEnlglnci.exeEhakigbo.exeFbjpblip.exeFnqqgm32.exeFgiepced.exeFcpfedki.exeFqcfnhjb.exeFjlkgn32.exeFbgpkpnn.exeGfehan32.exeGblifo32.exeGldmoepi.exeGembhj32.exeGeoonjeg.exeGngcgp32.exeHahlhkhi.exeHpmiig32.exeHldjnhce.exeHelngnie.exeHbqoqbho.exeIpdojfgh.exeIgijkd32.exeIpbocjlg.exeJpdkii32.exeJgncfcaa.exeJoihjfnl.exeJpiedieo.exeJhdihkcj.exeJdkjnl32.exeKbokgpgg.exeKkgopf32.exeKhkpijma.exeKqfdnljm.exeKmmebm32.exeKfeikcfa.exeKcijeg32.exeLmbonmll.exeLfjcfb32.exeLcncpfaf.exeLkihdioa.exeLklejh32.exeLlnaoh32.exeMgebdipp.exeMmakmp32.exeMfjoeeeh.exeMhilph32.exeMdpldi32.exeMimemp32.exeMfaefd32.exeNfcbldmm.exeNoogpfjh.exepid process 2152 Ajgpbj32.exe 2612 Blaopqpo.exe 2412 Cdanpb32.exe 2844 Cddjebgb.exe 2828 Cpkkjc32.exe 1432 Cejphiik.exe 776 Dphjcf32.exe 2508 Djqoll32.exe 2956 Dkpkfooh.exe 2264 Ddhpod32.exe 1084 Eflill32.exe 1668 Efnfbl32.exe 1864 Ecbfkpfk.exe 308 Enlglnci.exe 2188 Ehakigbo.exe 2100 Fbjpblip.exe 1920 Fnqqgm32.exe 2284 Fgiepced.exe 1332 Fcpfedki.exe 2716 Fqcfnhjb.exe 2960 Fjlkgn32.exe 3032 Fbgpkpnn.exe 1648 Gfehan32.exe 2916 Gblifo32.exe 1608 Gldmoepi.exe 2200 Gembhj32.exe 1616 Geoonjeg.exe 2144 Gngcgp32.exe 2628 Hahlhkhi.exe 2440 Hpmiig32.exe 2492 Hldjnhce.exe 676 Helngnie.exe 276 Hbqoqbho.exe 944 Ipdojfgh.exe 1980 Igijkd32.exe 2312 Ipbocjlg.exe 2124 Jpdkii32.exe 2052 Jgncfcaa.exe 1164 Joihjfnl.exe 1680 Jpiedieo.exe 1224 Jhdihkcj.exe 2688 Jdkjnl32.exe 2820 Kbokgpgg.exe 2332 Kkgopf32.exe 2604 Khkpijma.exe 2512 Kqfdnljm.exe 1260 Kmmebm32.exe 2864 Kfeikcfa.exe 1404 Kcijeg32.exe 2392 Lmbonmll.exe 2988 Lfjcfb32.exe 2780 Lcncpfaf.exe 1128 Lkihdioa.exe 2444 Lklejh32.exe 616 Llnaoh32.exe 2888 Mgebdipp.exe 1664 Mmakmp32.exe 1520 Mfjoeeeh.exe 2520 Mhilph32.exe 1300 Mdpldi32.exe 2316 Mimemp32.exe 784 Mfaefd32.exe 708 Nfcbldmm.exe 1780 Noogpfjh.exe -
Loads dropped DLL 64 IoCs
Processes:
68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exeAjgpbj32.exeBlaopqpo.exeCdanpb32.exeCddjebgb.exeCpkkjc32.exeCejphiik.exeDphjcf32.exeDjqoll32.exeDkpkfooh.exeDdhpod32.exeEflill32.exeEfnfbl32.exeEcbfkpfk.exeEnlglnci.exeEhakigbo.exeFbjpblip.exeFnqqgm32.exeFgiepced.exeFcpfedki.exeFqcfnhjb.exeFjlkgn32.exeFbgpkpnn.exeGfehan32.exeGblifo32.exeGldmoepi.exeGembhj32.exeGeoonjeg.exeGngcgp32.exeHahlhkhi.exeHpmiig32.exeHldjnhce.exepid process 3012 68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe 3012 68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe 2152 Ajgpbj32.exe 2152 Ajgpbj32.exe 2612 Blaopqpo.exe 2612 Blaopqpo.exe 2412 Cdanpb32.exe 2412 Cdanpb32.exe 2844 Cddjebgb.exe 2844 Cddjebgb.exe 2828 Cpkkjc32.exe 2828 Cpkkjc32.exe 1432 Cejphiik.exe 1432 Cejphiik.exe 776 Dphjcf32.exe 776 Dphjcf32.exe 2508 Djqoll32.exe 2508 Djqoll32.exe 2956 Dkpkfooh.exe 2956 Dkpkfooh.exe 2264 Ddhpod32.exe 2264 Ddhpod32.exe 1084 Eflill32.exe 1084 Eflill32.exe 1668 Efnfbl32.exe 1668 Efnfbl32.exe 1864 Ecbfkpfk.exe 1864 Ecbfkpfk.exe 308 Enlglnci.exe 308 Enlglnci.exe 2188 Ehakigbo.exe 2188 Ehakigbo.exe 2100 Fbjpblip.exe 2100 Fbjpblip.exe 1920 Fnqqgm32.exe 1920 Fnqqgm32.exe 2284 Fgiepced.exe 2284 Fgiepced.exe 1332 Fcpfedki.exe 1332 Fcpfedki.exe 2716 Fqcfnhjb.exe 2716 Fqcfnhjb.exe 2960 Fjlkgn32.exe 2960 Fjlkgn32.exe 3032 Fbgpkpnn.exe 3032 Fbgpkpnn.exe 1648 Gfehan32.exe 1648 Gfehan32.exe 2916 Gblifo32.exe 2916 Gblifo32.exe 1608 Gldmoepi.exe 1608 Gldmoepi.exe 2200 Gembhj32.exe 2200 Gembhj32.exe 1616 Geoonjeg.exe 1616 Geoonjeg.exe 2144 Gngcgp32.exe 2144 Gngcgp32.exe 2628 Hahlhkhi.exe 2628 Hahlhkhi.exe 2440 Hpmiig32.exe 2440 Hpmiig32.exe 2492 Hldjnhce.exe 2492 Hldjnhce.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fgohna32.exeHinbppna.exeJmocbnop.exeIkagogco.exeEfffpjmk.exeJpiedieo.exeMgebdipp.exeFqlicclo.exeJgfcja32.exePmhejhao.exePjhpin32.exeChohqebq.exeKmabqf32.exeOoemcb32.exeCddjebgb.exeCebcmdlg.exeIjnnao32.exeMdoccg32.exeCqaiph32.exeEdjlgq32.exeEfpbih32.exeCedpbd32.exeNmejllia.exeEdlhqlfi.exeLpcoeb32.exeOhcdhi32.exeGhdiokbq.exeLnnndl32.exeBafkookd.exeLepclldc.exePapank32.exeBmjhdi32.exeBepjjn32.exeJidbifmb.exeCpkmehol.exeFbjpblip.exeMldeik32.exeFheoiqgi.exePodpoffm.exeLcfbdd32.exeDlljaj32.exeDfbnoc32.exeQhincn32.exeMcbmmbhb.exeOmefkplm.exeQpbglhjq.exeNkehql32.exeGlomllkd.exeGblifo32.exeKcdlhj32.exeLjnqdhga.exeOecmogln.exeHdoghdmd.exeLqipkhbj.exeBpcfcddp.exeOpkccm32.exeBbjdjjdn.exeNdqkleln.exeHnbcaome.exeEdnbncmb.exeEniclh32.exeFkilka32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Fqglggcp.exe Fgohna32.exe File created C:\Windows\SysWOW64\Hiqoeplo.exe Hinbppna.exe File opened for modification C:\Windows\SysWOW64\Kfidqb32.exe Jmocbnop.exe File created C:\Windows\SysWOW64\Jkdcdf32.exe Ikagogco.exe File created C:\Windows\SysWOW64\Imbige32.dll Efffpjmk.exe File created C:\Windows\SysWOW64\Jhdihkcj.exe Jpiedieo.exe File opened for modification C:\Windows\SysWOW64\Mmakmp32.exe Mgebdipp.exe File created C:\Windows\SysWOW64\Fmcjhdbc.exe Fqlicclo.exe File created C:\Windows\SysWOW64\Jlckbh32.exe Jgfcja32.exe File opened for modification C:\Windows\SysWOW64\Pioeoi32.exe Pmhejhao.exe File created C:\Windows\SysWOW64\Fnklgh32.dll Pjhpin32.exe File created C:\Windows\SysWOW64\Coiqmp32.exe Chohqebq.exe File created C:\Windows\SysWOW64\Ddpidhgj.dll Kmabqf32.exe File created C:\Windows\SysWOW64\Ffphmc32.dll Ooemcb32.exe File opened for modification C:\Windows\SysWOW64\Cpkkjc32.exe Cddjebgb.exe File created C:\Windows\SysWOW64\Inaqlm32.dll Cebcmdlg.exe File created C:\Windows\SysWOW64\Ppkfhg32.dll Ijnnao32.exe File opened for modification C:\Windows\SysWOW64\Nljhhi32.exe Mdoccg32.exe File created C:\Windows\SysWOW64\Cjjnhnbl.exe Cqaiph32.exe File created C:\Windows\SysWOW64\Enenef32.exe Edjlgq32.exe File created C:\Windows\SysWOW64\Nmhmmnpq.dll Efpbih32.exe File created C:\Windows\SysWOW64\Qpebakpc.dll Cedpbd32.exe File created C:\Windows\SysWOW64\Nfnneb32.exe Nmejllia.exe File created C:\Windows\SysWOW64\Emdmjamj.exe Edlhqlfi.exe File opened for modification C:\Windows\SysWOW64\Ljnqdhga.exe Lpcoeb32.exe File created C:\Windows\SysWOW64\Oehdan32.exe Ohcdhi32.exe File created C:\Windows\SysWOW64\Glbaei32.exe Ghdiokbq.exe File opened for modification C:\Windows\SysWOW64\Lgiobadq.exe Lnnndl32.exe File opened for modification C:\Windows\SysWOW64\Bjoohdbd.exe Bafkookd.exe File created C:\Windows\SysWOW64\Jdbfjmik.dll Lepclldc.exe File created C:\Windows\SysWOW64\Foefccmp.dll Papank32.exe File created C:\Windows\SysWOW64\Bpkqfdmp.exe Bmjhdi32.exe File created C:\Windows\SysWOW64\Bfmeqjdf.dll Bepjjn32.exe File opened for modification C:\Windows\SysWOW64\Jpnkep32.exe Jidbifmb.exe File created C:\Windows\SysWOW64\Llbmlo32.dll Cpkmehol.exe File opened for modification C:\Windows\SysWOW64\Fnqqgm32.exe Fbjpblip.exe File created C:\Windows\SysWOW64\Mgnfji32.exe Mldeik32.exe File created C:\Windows\SysWOW64\Fjfhkl32.exe Fheoiqgi.exe File created C:\Windows\SysWOW64\Mhcqcl32.dll Podpoffm.exe File opened for modification C:\Windows\SysWOW64\Mchoid32.exe Lcfbdd32.exe File created C:\Windows\SysWOW64\Pbmmpj32.dll Dlljaj32.exe File created C:\Windows\SysWOW64\Ekdchf32.exe Dfbnoc32.exe File created C:\Windows\SysWOW64\Aeokba32.exe Qhincn32.exe File created C:\Windows\SysWOW64\Iocpgbkc.dll Mcbmmbhb.exe File opened for modification C:\Windows\SysWOW64\Pkifdd32.exe Omefkplm.exe File created C:\Windows\SysWOW64\Apedah32.exe Qpbglhjq.exe File opened for modification C:\Windows\SysWOW64\Emdmjamj.exe Edlhqlfi.exe File created C:\Windows\SysWOW64\Deankpkm.dll Nkehql32.exe File created C:\Windows\SysWOW64\Pljhmo32.dll Glomllkd.exe File created C:\Windows\SysWOW64\Gfcgfabf.dll Bmjhdi32.exe File created C:\Windows\SysWOW64\Bolejaam.dll Gblifo32.exe File opened for modification C:\Windows\SysWOW64\Kindeddf.exe Kcdlhj32.exe File created C:\Windows\SysWOW64\Mcfemmna.exe Ljnqdhga.exe File created C:\Windows\SysWOW64\Mphaobfe.dll Oecmogln.exe File created C:\Windows\SysWOW64\Kmkejc32.dll Hdoghdmd.exe File opened for modification C:\Windows\SysWOW64\Nhgnaehm.exe Lqipkhbj.exe File created C:\Windows\SysWOW64\Khhnjk32.dll Bpcfcddp.exe File opened for modification C:\Windows\SysWOW64\Onocmadb.exe Opkccm32.exe File opened for modification C:\Windows\SysWOW64\Bfhmqhkd.exe Bbjdjjdn.exe File created C:\Windows\SysWOW64\Ldcinhie.dll Ndqkleln.exe File opened for modification C:\Windows\SysWOW64\Ifpelq32.exe Hnbcaome.exe File created C:\Windows\SysWOW64\Epecbd32.exe Ednbncmb.exe File opened for modification C:\Windows\SysWOW64\Ecfldoph.exe Eniclh32.exe File created C:\Windows\SysWOW64\Omjefg32.dll Fkilka32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2172 2112 WerFault.exe Gaihob32.exe -
Modifies registry class 64 IoCs
Processes:
Giiglhjb.exeGoldfelp.exeBoobki32.exeChohqebq.exeIpbocjlg.exeDmgkgeah.exeEkdchf32.exeDhklna32.exeFjlkgn32.exeGblifo32.exeFnmmidhm.exeJlckbh32.exeMgmahg32.exeGmqkml32.exeAnadojlo.exePeeabm32.exeOkkfmmqj.exeCddjebgb.exePildgl32.exeEfkbdbai.exeJofejpmc.exeAknngo32.exeBdhleh32.exeHnbcaome.exeOjomdoof.exeNkkmgncb.exeIaaekl32.exeLbmpnjai.exeHnmacpfj.exeFlfnhnfm.exeLaeidfdn.exeNecogkbo.exePjcmap32.exeDlljaj32.exeHinbppna.exeLgiobadq.exeDdmofeam.exeEoompl32.exeOimmjffj.exeBjembh32.exeHdbbnd32.exeBmhkojab.exeEcbfkpfk.exeGdcjpncm.exeGipngg32.exeGfcopl32.exeLndqbk32.exeIaeegh32.exeLpcoeb32.exeAldfcpjn.exePoibmdmh.exePlmpblnb.exeNdqkleln.exeDfbqgldn.exeOlmcchlg.exePapank32.exeQobbofgn.exeNmofdf32.exeNebnigmp.exeNcamen32.exeMgebdipp.exeGaihob32.exeNfcbldmm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Giiglhjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Goldfelp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aankboko.dll" Boobki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Chohqebq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ipbocjlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmgkgeah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhgkakgl.dll" Ekdchf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peqiahfi.dll" Dhklna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paefhp32.dll" Fjlkgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gblifo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jikljfbm.dll" Fnmmidhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jlckbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clnoge32.dll" Mgmahg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnapncmc.dll" Gmqkml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Anadojlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nilacmgb.dll" Peeabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Okkfmmqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idhlad32.dll" Cddjebgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pildgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaeghhnb.dll" Efkbdbai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jofejpmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aknngo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhkfeeek.dll" Bdhleh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hnbcaome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjpbcokk.dll" Ojomdoof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pecikhmn.dll" Nkkmgncb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhjjcdeh.dll" Iaaekl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lbmpnjai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghcmae32.dll" Hnmacpfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Flfnhnfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okgfkeda.dll" Laeidfdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Necogkbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pjcmap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dlljaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klncqmjg.dll" Hinbppna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lgiobadq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddmofeam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eoompl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oimmjffj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bjembh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hdbbnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Capgei32.dll" Lgiobadq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmhkojab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ecbfkpfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdcjpncm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gipngg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gfcopl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lndqbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iaeegh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpcoeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aldfcpjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Poibmdmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Plmpblnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ndqkleln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfbqgldn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egflhe32.dll" Olmcchlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Papank32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qobbofgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhkbcb32.dll" Nmofdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbbpgc32.dll" Nebnigmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgajcccj.dll" Ncamen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mgebdipp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aondioej.dll" Gaihob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nfcbldmm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exeAjgpbj32.exeBlaopqpo.exeCdanpb32.exeCddjebgb.exeCpkkjc32.exeCejphiik.exeDphjcf32.exeDjqoll32.exeDkpkfooh.exeDdhpod32.exeEflill32.exeEfnfbl32.exeEcbfkpfk.exeEnlglnci.exeEhakigbo.exedescription pid process target process PID 3012 wrote to memory of 2152 3012 68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe Ajgpbj32.exe PID 3012 wrote to memory of 2152 3012 68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe Ajgpbj32.exe PID 3012 wrote to memory of 2152 3012 68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe Ajgpbj32.exe PID 3012 wrote to memory of 2152 3012 68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe Ajgpbj32.exe PID 2152 wrote to memory of 2612 2152 Ajgpbj32.exe Blaopqpo.exe PID 2152 wrote to memory of 2612 2152 Ajgpbj32.exe Blaopqpo.exe PID 2152 wrote to memory of 2612 2152 Ajgpbj32.exe Blaopqpo.exe PID 2152 wrote to memory of 2612 2152 Ajgpbj32.exe Blaopqpo.exe PID 2612 wrote to memory of 2412 2612 Blaopqpo.exe Cdanpb32.exe PID 2612 wrote to memory of 2412 2612 Blaopqpo.exe Cdanpb32.exe PID 2612 wrote to memory of 2412 2612 Blaopqpo.exe Cdanpb32.exe PID 2612 wrote to memory of 2412 2612 Blaopqpo.exe Cdanpb32.exe PID 2412 wrote to memory of 2844 2412 Cdanpb32.exe Cddjebgb.exe PID 2412 wrote to memory of 2844 2412 Cdanpb32.exe Cddjebgb.exe PID 2412 wrote to memory of 2844 2412 Cdanpb32.exe Cddjebgb.exe PID 2412 wrote to memory of 2844 2412 Cdanpb32.exe Cddjebgb.exe PID 2844 wrote to memory of 2828 2844 Cddjebgb.exe Cpkkjc32.exe PID 2844 wrote to memory of 2828 2844 Cddjebgb.exe Cpkkjc32.exe PID 2844 wrote to memory of 2828 2844 Cddjebgb.exe Cpkkjc32.exe PID 2844 wrote to memory of 2828 2844 Cddjebgb.exe Cpkkjc32.exe PID 2828 wrote to memory of 1432 2828 Cpkkjc32.exe Cejphiik.exe PID 2828 wrote to memory of 1432 2828 Cpkkjc32.exe Cejphiik.exe PID 2828 wrote to memory of 1432 2828 Cpkkjc32.exe Cejphiik.exe PID 2828 wrote to memory of 1432 2828 Cpkkjc32.exe Cejphiik.exe PID 1432 wrote to memory of 776 1432 Cejphiik.exe Dphjcf32.exe PID 1432 wrote to memory of 776 1432 Cejphiik.exe Dphjcf32.exe PID 1432 wrote to memory of 776 1432 Cejphiik.exe Dphjcf32.exe PID 1432 wrote to memory of 776 1432 Cejphiik.exe Dphjcf32.exe PID 776 wrote to memory of 2508 776 Dphjcf32.exe Djqoll32.exe PID 776 wrote to memory of 2508 776 Dphjcf32.exe Djqoll32.exe PID 776 wrote to memory of 2508 776 Dphjcf32.exe Djqoll32.exe PID 776 wrote to memory of 2508 776 Dphjcf32.exe Djqoll32.exe PID 2508 wrote to memory of 2956 2508 Djqoll32.exe Dkpkfooh.exe PID 2508 wrote to memory of 2956 2508 Djqoll32.exe Dkpkfooh.exe PID 2508 wrote to memory of 2956 2508 Djqoll32.exe Dkpkfooh.exe PID 2508 wrote to memory of 2956 2508 Djqoll32.exe Dkpkfooh.exe PID 2956 wrote to memory of 2264 2956 Dkpkfooh.exe Ddhpod32.exe PID 2956 wrote to memory of 2264 2956 Dkpkfooh.exe Ddhpod32.exe PID 2956 wrote to memory of 2264 2956 Dkpkfooh.exe Ddhpod32.exe PID 2956 wrote to memory of 2264 2956 Dkpkfooh.exe Ddhpod32.exe PID 2264 wrote to memory of 1084 2264 Ddhpod32.exe Eflill32.exe PID 2264 wrote to memory of 1084 2264 Ddhpod32.exe Eflill32.exe PID 2264 wrote to memory of 1084 2264 Ddhpod32.exe Eflill32.exe PID 2264 wrote to memory of 1084 2264 Ddhpod32.exe Eflill32.exe PID 1084 wrote to memory of 1668 1084 Eflill32.exe Efnfbl32.exe PID 1084 wrote to memory of 1668 1084 Eflill32.exe Efnfbl32.exe PID 1084 wrote to memory of 1668 1084 Eflill32.exe Efnfbl32.exe PID 1084 wrote to memory of 1668 1084 Eflill32.exe Efnfbl32.exe PID 1668 wrote to memory of 1864 1668 Efnfbl32.exe Ecbfkpfk.exe PID 1668 wrote to memory of 1864 1668 Efnfbl32.exe Ecbfkpfk.exe PID 1668 wrote to memory of 1864 1668 Efnfbl32.exe Ecbfkpfk.exe PID 1668 wrote to memory of 1864 1668 Efnfbl32.exe Ecbfkpfk.exe PID 1864 wrote to memory of 308 1864 Ecbfkpfk.exe Enlglnci.exe PID 1864 wrote to memory of 308 1864 Ecbfkpfk.exe Enlglnci.exe PID 1864 wrote to memory of 308 1864 Ecbfkpfk.exe Enlglnci.exe PID 1864 wrote to memory of 308 1864 Ecbfkpfk.exe Enlglnci.exe PID 308 wrote to memory of 2188 308 Enlglnci.exe Ehakigbo.exe PID 308 wrote to memory of 2188 308 Enlglnci.exe Ehakigbo.exe PID 308 wrote to memory of 2188 308 Enlglnci.exe Ehakigbo.exe PID 308 wrote to memory of 2188 308 Enlglnci.exe Ehakigbo.exe PID 2188 wrote to memory of 2100 2188 Ehakigbo.exe Fbjpblip.exe PID 2188 wrote to memory of 2100 2188 Ehakigbo.exe Fbjpblip.exe PID 2188 wrote to memory of 2100 2188 Ehakigbo.exe Fbjpblip.exe PID 2188 wrote to memory of 2100 2188 Ehakigbo.exe Fbjpblip.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\68fb1475e20f1c5560c05fa571566ee0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\Ajgpbj32.exeC:\Windows\system32\Ajgpbj32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\Blaopqpo.exeC:\Windows\system32\Blaopqpo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\Cdanpb32.exeC:\Windows\system32\Cdanpb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Cddjebgb.exeC:\Windows\system32\Cddjebgb.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Cpkkjc32.exeC:\Windows\system32\Cpkkjc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Cejphiik.exeC:\Windows\system32\Cejphiik.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Dphjcf32.exeC:\Windows\system32\Dphjcf32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\Djqoll32.exeC:\Windows\system32\Djqoll32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Dkpkfooh.exeC:\Windows\system32\Dkpkfooh.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Ddhpod32.exeC:\Windows\system32\Ddhpod32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Eflill32.exeC:\Windows\system32\Eflill32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\Efnfbl32.exeC:\Windows\system32\Efnfbl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\Ecbfkpfk.exeC:\Windows\system32\Ecbfkpfk.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\Enlglnci.exeC:\Windows\system32\Enlglnci.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\Ehakigbo.exeC:\Windows\system32\Ehakigbo.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Fbjpblip.exeC:\Windows\system32\Fbjpblip.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\Fnqqgm32.exeC:\Windows\system32\Fnqqgm32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1920 -
C:\Windows\SysWOW64\Fgiepced.exeC:\Windows\system32\Fgiepced.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284 -
C:\Windows\SysWOW64\Fcpfedki.exeC:\Windows\system32\Fcpfedki.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332 -
C:\Windows\SysWOW64\Fqcfnhjb.exeC:\Windows\system32\Fqcfnhjb.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Windows\SysWOW64\Fjlkgn32.exeC:\Windows\system32\Fjlkgn32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Fbgpkpnn.exeC:\Windows\system32\Fbgpkpnn.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Windows\SysWOW64\Gfehan32.exeC:\Windows\system32\Gfehan32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Windows\SysWOW64\Gblifo32.exeC:\Windows\system32\Gblifo32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2916 -
C:\Windows\SysWOW64\Gldmoepi.exeC:\Windows\system32\Gldmoepi.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Windows\SysWOW64\Gembhj32.exeC:\Windows\system32\Gembhj32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Windows\SysWOW64\Geoonjeg.exeC:\Windows\system32\Geoonjeg.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Windows\SysWOW64\Gngcgp32.exeC:\Windows\system32\Gngcgp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144 -
C:\Windows\SysWOW64\Hahlhkhi.exeC:\Windows\system32\Hahlhkhi.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\Hpmiig32.exeC:\Windows\system32\Hpmiig32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2440 -
C:\Windows\SysWOW64\Hldjnhce.exeC:\Windows\system32\Hldjnhce.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Windows\SysWOW64\Helngnie.exeC:\Windows\system32\Helngnie.exe33⤵
- Executes dropped EXE
PID:676 -
C:\Windows\SysWOW64\Hbqoqbho.exeC:\Windows\system32\Hbqoqbho.exe34⤵
- Executes dropped EXE
PID:276 -
C:\Windows\SysWOW64\Ipdojfgh.exeC:\Windows\system32\Ipdojfgh.exe35⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\Igijkd32.exeC:\Windows\system32\Igijkd32.exe36⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\Ipbocjlg.exeC:\Windows\system32\Ipbocjlg.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Jpdkii32.exeC:\Windows\system32\Jpdkii32.exe38⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\Jgncfcaa.exeC:\Windows\system32\Jgncfcaa.exe39⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\Joihjfnl.exeC:\Windows\system32\Joihjfnl.exe40⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\Jpiedieo.exeC:\Windows\system32\Jpiedieo.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Jhdihkcj.exeC:\Windows\system32\Jhdihkcj.exe42⤵
- Executes dropped EXE
PID:1224 -
C:\Windows\SysWOW64\Jdkjnl32.exeC:\Windows\system32\Jdkjnl32.exe43⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Kbokgpgg.exeC:\Windows\system32\Kbokgpgg.exe44⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\Kkgopf32.exeC:\Windows\system32\Kkgopf32.exe45⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Khkpijma.exeC:\Windows\system32\Khkpijma.exe46⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Kqfdnljm.exeC:\Windows\system32\Kqfdnljm.exe47⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\Kmmebm32.exeC:\Windows\system32\Kmmebm32.exe48⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\Kfeikcfa.exeC:\Windows\system32\Kfeikcfa.exe49⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\Kcijeg32.exeC:\Windows\system32\Kcijeg32.exe50⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Lmbonmll.exeC:\Windows\system32\Lmbonmll.exe51⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Lfjcfb32.exeC:\Windows\system32\Lfjcfb32.exe52⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\Lcncpfaf.exeC:\Windows\system32\Lcncpfaf.exe53⤵
- Executes dropped EXE
PID:2780 -
C:\Windows\SysWOW64\Lkihdioa.exeC:\Windows\system32\Lkihdioa.exe54⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\Lklejh32.exeC:\Windows\system32\Lklejh32.exe55⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Llnaoh32.exeC:\Windows\system32\Llnaoh32.exe56⤵
- Executes dropped EXE
PID:616 -
C:\Windows\SysWOW64\Mgebdipp.exeC:\Windows\system32\Mgebdipp.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Mmakmp32.exeC:\Windows\system32\Mmakmp32.exe58⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Mfjoeeeh.exeC:\Windows\system32\Mfjoeeeh.exe59⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Mhilph32.exeC:\Windows\system32\Mhilph32.exe60⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\Mdpldi32.exeC:\Windows\system32\Mdpldi32.exe61⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\Mimemp32.exeC:\Windows\system32\Mimemp32.exe62⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Mfaefd32.exeC:\Windows\system32\Mfaefd32.exe63⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\Nfcbldmm.exeC:\Windows\system32\Nfcbldmm.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:708 -
C:\Windows\SysWOW64\Noogpfjh.exeC:\Windows\system32\Noogpfjh.exe65⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\Nhgkil32.exeC:\Windows\system32\Nhgkil32.exe66⤵PID:696
-
C:\Windows\SysWOW64\Neklbppb.exeC:\Windows\system32\Neklbppb.exe67⤵PID:436
-
C:\Windows\SysWOW64\Nocpkf32.exeC:\Windows\system32\Nocpkf32.exe68⤵PID:1152
-
C:\Windows\SysWOW64\Noemqe32.exeC:\Windows\system32\Noemqe32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1588 -
C:\Windows\SysWOW64\Oklnff32.exeC:\Windows\system32\Oklnff32.exe70⤵PID:2236
-
C:\Windows\SysWOW64\Ogcnkgoh.exeC:\Windows\system32\Ogcnkgoh.exe71⤵PID:2204
-
C:\Windows\SysWOW64\Opkccm32.exeC:\Windows\system32\Opkccm32.exe72⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\Onocmadb.exeC:\Windows\system32\Onocmadb.exe73⤵PID:2868
-
C:\Windows\SysWOW64\Ocllehcj.exeC:\Windows\system32\Ocllehcj.exe74⤵PID:1576
-
C:\Windows\SysWOW64\Ocohkh32.exeC:\Windows\system32\Ocohkh32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1100 -
C:\Windows\SysWOW64\Olgmcmgh.exeC:\Windows\system32\Olgmcmgh.exe76⤵PID:576
-
C:\Windows\SysWOW64\Plijimee.exeC:\Windows\system32\Plijimee.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2432 -
C:\Windows\SysWOW64\Pafbadcm.exeC:\Windows\system32\Pafbadcm.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2720 -
C:\Windows\SysWOW64\Pnmcfeia.exeC:\Windows\system32\Pnmcfeia.exe79⤵PID:1228
-
C:\Windows\SysWOW64\Pkacpihj.exeC:\Windows\system32\Pkacpihj.exe80⤵PID:2088
-
C:\Windows\SysWOW64\Pjfpafmb.exeC:\Windows\system32\Pjfpafmb.exe81⤵PID:1184
-
C:\Windows\SysWOW64\Qfmafg32.exeC:\Windows\system32\Qfmafg32.exe82⤵PID:1804
-
C:\Windows\SysWOW64\Qqbecp32.exeC:\Windows\system32\Qqbecp32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2596 -
C:\Windows\SysWOW64\Qmifhq32.exeC:\Windows\system32\Qmifhq32.exe84⤵PID:2272
-
C:\Windows\SysWOW64\Amkbnp32.exeC:\Windows\system32\Amkbnp32.exe85⤵PID:2504
-
C:\Windows\SysWOW64\Afdgfelo.exeC:\Windows\system32\Afdgfelo.exe86⤵PID:632
-
C:\Windows\SysWOW64\Affdle32.exeC:\Windows\system32\Affdle32.exe87⤵PID:1740
-
C:\Windows\SysWOW64\Aekqmbod.exeC:\Windows\system32\Aekqmbod.exe88⤵PID:2372
-
C:\Windows\SysWOW64\Aennba32.exeC:\Windows\system32\Aennba32.exe89⤵PID:3016
-
C:\Windows\SysWOW64\Bbjdjjdn.exeC:\Windows\system32\Bbjdjjdn.exe90⤵
- Drops file in System32 directory
PID:1552 -
C:\Windows\SysWOW64\Bfhmqhkd.exeC:\Windows\system32\Bfhmqhkd.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2684 -
C:\Windows\SysWOW64\Bfkifhib.exeC:\Windows\system32\Bfkifhib.exe92⤵PID:1748
-
C:\Windows\SysWOW64\Cadjgf32.exeC:\Windows\system32\Cadjgf32.exe93⤵PID:1580
-
C:\Windows\SysWOW64\Cebcmdlg.exeC:\Windows\system32\Cebcmdlg.exe94⤵
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\Cedpbd32.exeC:\Windows\system32\Cedpbd32.exe95⤵
- Drops file in System32 directory
PID:516 -
C:\Windows\SysWOW64\Cifelgmd.exeC:\Windows\system32\Cifelgmd.exe96⤵PID:768
-
C:\Windows\SysWOW64\Dmdnbecj.exeC:\Windows\system32\Dmdnbecj.exe97⤵PID:2712
-
C:\Windows\SysWOW64\Dmgkgeah.exeC:\Windows\system32\Dmgkgeah.exe98⤵
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Debplg32.exeC:\Windows\system32\Debplg32.exe99⤵PID:2668
-
C:\Windows\SysWOW64\Dcfpel32.exeC:\Windows\system32\Dcfpel32.exe100⤵PID:3100
-
C:\Windows\SysWOW64\Dhbhmb32.exeC:\Windows\system32\Dhbhmb32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3164 -
C:\Windows\SysWOW64\Dakmfh32.exeC:\Windows\system32\Dakmfh32.exe102⤵PID:3216
-
C:\Windows\SysWOW64\Eoompl32.exeC:\Windows\system32\Eoompl32.exe103⤵
- Modifies registry class
PID:3300 -
C:\Windows\SysWOW64\Ehgbhbgn.exeC:\Windows\system32\Ehgbhbgn.exe104⤵PID:3356
-
C:\Windows\SysWOW64\Ednbncmb.exeC:\Windows\system32\Ednbncmb.exe105⤵
- Drops file in System32 directory
PID:3424 -
C:\Windows\SysWOW64\Epecbd32.exeC:\Windows\system32\Epecbd32.exe106⤵PID:3488
-
C:\Windows\SysWOW64\Eniclh32.exeC:\Windows\system32\Eniclh32.exe107⤵
- Drops file in System32 directory
PID:3556 -
C:\Windows\SysWOW64\Ecfldoph.exeC:\Windows\system32\Ecfldoph.exe108⤵PID:3612
-
C:\Windows\SysWOW64\Eolmip32.exeC:\Windows\system32\Eolmip32.exe109⤵PID:3704
-
C:\Windows\SysWOW64\Fqlicclo.exeC:\Windows\system32\Fqlicclo.exe110⤵
- Drops file in System32 directory
PID:3768 -
C:\Windows\SysWOW64\Fmcjhdbc.exeC:\Windows\system32\Fmcjhdbc.exe111⤵PID:3832
-
C:\Windows\SysWOW64\Ffkoai32.exeC:\Windows\system32\Ffkoai32.exe112⤵PID:3888
-
C:\Windows\SysWOW64\Fnfcel32.exeC:\Windows\system32\Fnfcel32.exe113⤵PID:3976
-
C:\Windows\SysWOW64\Fgohna32.exeC:\Windows\system32\Fgohna32.exe114⤵
- Drops file in System32 directory
PID:4036 -
C:\Windows\SysWOW64\Fqglggcp.exeC:\Windows\system32\Fqglggcp.exe115⤵PID:1592
-
C:\Windows\SysWOW64\Gbfiaj32.exeC:\Windows\system32\Gbfiaj32.exe116⤵PID:1040
-
C:\Windows\SysWOW64\Gnmifk32.exeC:\Windows\system32\Gnmifk32.exe117⤵PID:2532
-
C:\Windows\SysWOW64\Gjdjklek.exeC:\Windows\system32\Gjdjklek.exe118⤵PID:400
-
C:\Windows\SysWOW64\Giiglhjb.exeC:\Windows\system32\Giiglhjb.exe119⤵
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Gcokiaji.exeC:\Windows\system32\Gcokiaji.exe120⤵PID:932
-
C:\Windows\SysWOW64\Gmgpbf32.exeC:\Windows\system32\Gmgpbf32.exe121⤵PID:2536
-
C:\Windows\SysWOW64\Hebdfind.exeC:\Windows\system32\Hebdfind.exe122⤵PID:2588
-
C:\Windows\SysWOW64\Hbfepmmn.exeC:\Windows\system32\Hbfepmmn.exe123⤵PID:3188
-
C:\Windows\SysWOW64\Hloiib32.exeC:\Windows\system32\Hloiib32.exe124⤵PID:1560
-
C:\Windows\SysWOW64\Hibjbgbh.exeC:\Windows\system32\Hibjbgbh.exe125⤵PID:3344
-
C:\Windows\SysWOW64\Hdlkcdog.exeC:\Windows\system32\Hdlkcdog.exe126⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3380 -
C:\Windows\SysWOW64\Hdoghdmd.exeC:\Windows\system32\Hdoghdmd.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3396 -
C:\Windows\SysWOW64\Ipehmebh.exeC:\Windows\system32\Ipehmebh.exe128⤵PID:3564
-
C:\Windows\SysWOW64\Iaeegh32.exeC:\Windows\system32\Iaeegh32.exe129⤵
- Modifies registry class
PID:3520 -
C:\Windows\SysWOW64\Imleli32.exeC:\Windows\system32\Imleli32.exe130⤵PID:3752
-
C:\Windows\SysWOW64\Iibfajdc.exeC:\Windows\system32\Iibfajdc.exe131⤵PID:3660
-
C:\Windows\SysWOW64\Ifffkncm.exeC:\Windows\system32\Ifffkncm.exe132⤵PID:2892
-
C:\Windows\SysWOW64\Ibmgpoia.exeC:\Windows\system32\Ibmgpoia.exe133⤵PID:3872
-
C:\Windows\SysWOW64\Jkhldafl.exeC:\Windows\system32\Jkhldafl.exe134⤵PID:3992
-
C:\Windows\SysWOW64\Jofejpmc.exeC:\Windows\system32\Jofejpmc.exe135⤵
- Modifies registry class
PID:3900 -
C:\Windows\SysWOW64\Jkmeoa32.exeC:\Windows\system32\Jkmeoa32.exe136⤵PID:3972
-
C:\Windows\SysWOW64\Jgdfdbhk.exeC:\Windows\system32\Jgdfdbhk.exe137⤵PID:4060
-
C:\Windows\SysWOW64\Jgfcja32.exeC:\Windows\system32\Jgfcja32.exe138⤵
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\Jlckbh32.exeC:\Windows\system32\Jlckbh32.exe139⤵
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Kjglkm32.exeC:\Windows\system32\Kjglkm32.exe140⤵PID:1960
-
C:\Windows\SysWOW64\Khlili32.exeC:\Windows\system32\Khlili32.exe141⤵PID:2592
-
C:\Windows\SysWOW64\Kjleflod.exeC:\Windows\system32\Kjleflod.exe142⤵PID:884
-
C:\Windows\SysWOW64\Kbgjkn32.exeC:\Windows\system32\Kbgjkn32.exe143⤵PID:3092
-
C:\Windows\SysWOW64\Knnkpobc.exeC:\Windows\system32\Knnkpobc.exe144⤵PID:3224
-
C:\Windows\SysWOW64\Lomgjb32.exeC:\Windows\system32\Lomgjb32.exe145⤵PID:3240
-
C:\Windows\SysWOW64\Lkdhoc32.exeC:\Windows\system32\Lkdhoc32.exe146⤵PID:3308
-
C:\Windows\SysWOW64\Lqqpgj32.exeC:\Windows\system32\Lqqpgj32.exe147⤵PID:3372
-
C:\Windows\SysWOW64\Lneaqn32.exeC:\Windows\system32\Lneaqn32.exe148⤵PID:3528
-
C:\Windows\SysWOW64\Ljkaeo32.exeC:\Windows\system32\Ljkaeo32.exe149⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3584 -
C:\Windows\SysWOW64\Lgoboc32.exeC:\Windows\system32\Lgoboc32.exe150⤵PID:3740
-
C:\Windows\SysWOW64\Lcfbdd32.exeC:\Windows\system32\Lcfbdd32.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3764 -
C:\Windows\SysWOW64\Mchoid32.exeC:\Windows\system32\Mchoid32.exe152⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3812 -
C:\Windows\SysWOW64\Mnbpjb32.exeC:\Windows\system32\Mnbpjb32.exe153⤵PID:3804
-
C:\Windows\SysWOW64\Mndmoaog.exeC:\Windows\system32\Mndmoaog.exe154⤵PID:3964
-
C:\Windows\SysWOW64\Mgmahg32.exeC:\Windows\system32\Mgmahg32.exe155⤵
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\Mhonngce.exeC:\Windows\system32\Mhonngce.exe156⤵PID:284
-
C:\Windows\SysWOW64\Necogkbo.exeC:\Windows\system32\Necogkbo.exe157⤵
- Modifies registry class
PID:2472 -
C:\Windows\SysWOW64\Najpll32.exeC:\Windows\system32\Najpll32.exe158⤵PID:928
-
C:\Windows\SysWOW64\Njbdea32.exeC:\Windows\system32\Njbdea32.exe159⤵PID:1644
-
C:\Windows\SysWOW64\Ndkhngdd.exeC:\Windows\system32\Ndkhngdd.exe160⤵PID:3156
-
C:\Windows\SysWOW64\Nlfmbibo.exeC:\Windows\system32\Nlfmbibo.exe161⤵PID:3084
-
C:\Windows\SysWOW64\Nmejllia.exeC:\Windows\system32\Nmejllia.exe162⤵
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Nfnneb32.exeC:\Windows\system32\Nfnneb32.exe163⤵PID:3332
-
C:\Windows\SysWOW64\Obdojcef.exeC:\Windows\system32\Obdojcef.exe164⤵PID:3420
-
C:\Windows\SysWOW64\Olmcchlg.exeC:\Windows\system32\Olmcchlg.exe165⤵
- Modifies registry class
PID:3388 -
C:\Windows\SysWOW64\Ohcdhi32.exeC:\Windows\system32\Ohcdhi32.exe166⤵
- Drops file in System32 directory
PID:3748 -
C:\Windows\SysWOW64\Oehdan32.exeC:\Windows\system32\Oehdan32.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3648 -
C:\Windows\SysWOW64\Omcifpnp.exeC:\Windows\system32\Omcifpnp.exe168⤵PID:4024
-
C:\Windows\SysWOW64\Omefkplm.exeC:\Windows\system32\Omefkplm.exe169⤵
- Drops file in System32 directory
PID:3852 -
C:\Windows\SysWOW64\Pkifdd32.exeC:\Windows\system32\Pkifdd32.exe170⤵PID:3020
-
C:\Windows\SysWOW64\Pcdkif32.exeC:\Windows\system32\Pcdkif32.exe171⤵PID:3948
-
C:\Windows\SysWOW64\Plmpblnb.exeC:\Windows\system32\Plmpblnb.exe172⤵
- Modifies registry class
PID:4068 -
C:\Windows\SysWOW64\Pgbdodnh.exeC:\Windows\system32\Pgbdodnh.exe173⤵PID:2676
-
C:\Windows\SysWOW64\Ppkhhjei.exeC:\Windows\system32\Ppkhhjei.exe174⤵PID:1688
-
C:\Windows\SysWOW64\Pjcmap32.exeC:\Windows\system32\Pjcmap32.exe175⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\Pckajebj.exeC:\Windows\system32\Pckajebj.exe176⤵PID:2296
-
C:\Windows\SysWOW64\Qobbofgn.exeC:\Windows\system32\Qobbofgn.exe177⤵
- Modifies registry class
PID:2428 -
C:\Windows\SysWOW64\Qhjfgl32.exeC:\Windows\system32\Qhjfgl32.exe178⤵PID:3208
-
C:\Windows\SysWOW64\Lqipkhbj.exeC:\Windows\system32\Lqipkhbj.exe179⤵
- Drops file in System32 directory
PID:2728 -
C:\Windows\SysWOW64\Nhgnaehm.exeC:\Windows\system32\Nhgnaehm.exe180⤵PID:2972
-
C:\Windows\SysWOW64\Njhfcp32.exeC:\Windows\system32\Njhfcp32.exe181⤵PID:3540
-
C:\Windows\SysWOW64\Ndqkleln.exeC:\Windows\system32\Ndqkleln.exe182⤵
- Drops file in System32 directory
- Modifies registry class
PID:3544 -
C:\Windows\SysWOW64\Ojomdoof.exeC:\Windows\system32\Ojomdoof.exe183⤵
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Odgamdef.exeC:\Windows\system32\Odgamdef.exe184⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2756 -
C:\Windows\SysWOW64\Ofhjopbg.exeC:\Windows\system32\Ofhjopbg.exe185⤵PID:3884
-
C:\Windows\SysWOW64\Obokcqhk.exeC:\Windows\system32\Obokcqhk.exe186⤵PID:3920
-
C:\Windows\SysWOW64\Pbagipfi.exeC:\Windows\system32\Pbagipfi.exe187⤵PID:828
-
C:\Windows\SysWOW64\Pljlbf32.exeC:\Windows\system32\Pljlbf32.exe188⤵PID:2184
-
C:\Windows\SysWOW64\Pgfjhcge.exeC:\Windows\system32\Pgfjhcge.exe189⤵PID:900
-
C:\Windows\SysWOW64\Pkcbnanl.exeC:\Windows\system32\Pkcbnanl.exe190⤵PID:1636
-
C:\Windows\SysWOW64\Qpbglhjq.exeC:\Windows\system32\Qpbglhjq.exe191⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\Apedah32.exeC:\Windows\system32\Apedah32.exe192⤵PID:3204
-
C:\Windows\SysWOW64\Aojabdlf.exeC:\Windows\system32\Aojabdlf.exe193⤵PID:2084
-
C:\Windows\SysWOW64\Alnalh32.exeC:\Windows\system32\Alnalh32.exe194⤵PID:1020
-
C:\Windows\SysWOW64\Akfkbd32.exeC:\Windows\system32\Akfkbd32.exe195⤵PID:3176
-
C:\Windows\SysWOW64\Bgllgedi.exeC:\Windows\system32\Bgllgedi.exe196⤵PID:3368
-
C:\Windows\SysWOW64\Bqgmfkhg.exeC:\Windows\system32\Bqgmfkhg.exe197⤵PID:2680
-
C:\Windows\SysWOW64\Bnknoogp.exeC:\Windows\system32\Bnknoogp.exe198⤵PID:3264
-
C:\Windows\SysWOW64\Bbmcibjp.exeC:\Windows\system32\Bbmcibjp.exe199⤵PID:3932
-
C:\Windows\SysWOW64\Bkegah32.exeC:\Windows\system32\Bkegah32.exe200⤵PID:2548
-
C:\Windows\SysWOW64\Cbblda32.exeC:\Windows\system32\Cbblda32.exe201⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4076 -
C:\Windows\SysWOW64\Ckjamgmk.exeC:\Windows\system32\Ckjamgmk.exe202⤵PID:3160
-
C:\Windows\SysWOW64\Cbffoabe.exeC:\Windows\system32\Cbffoabe.exe203⤵PID:3668
-
C:\Windows\SysWOW64\Cjakccop.exeC:\Windows\system32\Cjakccop.exe204⤵PID:2788
-
C:\Windows\SysWOW64\Cegoqlof.exeC:\Windows\system32\Cegoqlof.exe205⤵PID:2924
-
C:\Windows\SysWOW64\Djdgic32.exeC:\Windows\system32\Djdgic32.exe206⤵PID:3404
-
C:\Windows\SysWOW64\Dbdehdfc.exeC:\Windows\system32\Dbdehdfc.exe207⤵PID:3580
-
C:\Windows\SysWOW64\Dlljaj32.exeC:\Windows\system32\Dlljaj32.exe208⤵
- Drops file in System32 directory
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\Dfbnoc32.exeC:\Windows\system32\Dfbnoc32.exe209⤵
- Drops file in System32 directory
PID:2488 -
C:\Windows\SysWOW64\Ekdchf32.exeC:\Windows\system32\Ekdchf32.exe210⤵
- Modifies registry class
PID:3856 -
C:\Windows\SysWOW64\Edlhqlfi.exeC:\Windows\system32\Edlhqlfi.exe211⤵
- Drops file in System32 directory
PID:4004 -
C:\Windows\SysWOW64\Emdmjamj.exeC:\Windows\system32\Emdmjamj.exe212⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1940 -
C:\Windows\SysWOW64\Ekkjheja.exeC:\Windows\system32\Ekkjheja.exe213⤵PID:108
-
C:\Windows\SysWOW64\Egajnfoe.exeC:\Windows\system32\Egajnfoe.exe214⤵PID:1652
-
C:\Windows\SysWOW64\Feiddbbj.exeC:\Windows\system32\Feiddbbj.exe215⤵PID:3064
-
C:\Windows\SysWOW64\Foahmh32.exeC:\Windows\system32\Foahmh32.exe216⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2268 -
C:\Windows\SysWOW64\Gdcjpncm.exeC:\Windows\system32\Gdcjpncm.exe217⤵
- Modifies registry class
PID:3112 -
C:\Windows\SysWOW64\Ggagmjbq.exeC:\Windows\system32\Ggagmjbq.exe218⤵PID:3348
-
C:\Windows\SysWOW64\Gaihob32.exeC:\Windows\system32\Gaihob32.exe219⤵
- Modifies registry class
PID:2112 -
C:\Windows\SysWOW64\Glchpp32.exeC:\Windows\system32\Glchpp32.exe220⤵PID:3440
-
C:\Windows\SysWOW64\Gqcnln32.exeC:\Windows\system32\Gqcnln32.exe221⤵PID:1952
-
C:\Windows\SysWOW64\Hinbppna.exeC:\Windows\system32\Hinbppna.exe222⤵
- Drops file in System32 directory
- Modifies registry class
PID:3840 -
C:\Windows\SysWOW64\Hiqoeplo.exeC:\Windows\system32\Hiqoeplo.exe223⤵PID:3376
-
C:\Windows\SysWOW64\Hegpjaac.exeC:\Windows\system32\Hegpjaac.exe224⤵PID:3280
-
C:\Windows\SysWOW64\Hnpdcf32.exeC:\Windows\system32\Hnpdcf32.exe225⤵PID:3688
-
C:\Windows\SysWOW64\Hnbaif32.exeC:\Windows\system32\Hnbaif32.exe226⤵PID:1776
-
C:\Windows\SysWOW64\Ikfbbjdj.exeC:\Windows\system32\Ikfbbjdj.exe227⤵PID:1996
-
C:\Windows\SysWOW64\Ipjdameg.exeC:\Windows\system32\Ipjdameg.exe228⤵PID:1376
-
C:\Windows\SysWOW64\Ibkmchbh.exeC:\Windows\system32\Ibkmchbh.exe229⤵PID:1784
-
C:\Windows\SysWOW64\Imaapa32.exeC:\Windows\system32\Imaapa32.exe230⤵PID:836
-
C:\Windows\SysWOW64\Jbpfnh32.exeC:\Windows\system32\Jbpfnh32.exe231⤵PID:2188
-
C:\Windows\SysWOW64\Jlhkgm32.exeC:\Windows\system32\Jlhkgm32.exe232⤵PID:640
-
C:\Windows\SysWOW64\Jeclebja.exeC:\Windows\system32\Jeclebja.exe233⤵PID:1920
-
C:\Windows\SysWOW64\Jajmjcoe.exeC:\Windows\system32\Jajmjcoe.exe234⤵PID:2664
-
C:\Windows\SysWOW64\Kalipcmb.exeC:\Windows\system32\Kalipcmb.exe235⤵PID:3252
-
C:\Windows\SysWOW64\Kigndekn.exeC:\Windows\system32\Kigndekn.exe236⤵PID:1240
-
C:\Windows\SysWOW64\Kmegjdad.exeC:\Windows\system32\Kmegjdad.exe237⤵PID:1648
-
C:\Windows\SysWOW64\Kcdlhj32.exeC:\Windows\system32\Kcdlhj32.exe238⤵
- Drops file in System32 directory
PID:3600 -
C:\Windows\SysWOW64\Kindeddf.exeC:\Windows\system32\Kindeddf.exe239⤵PID:3824
-
C:\Windows\SysWOW64\Kokmmkcm.exeC:\Windows\system32\Kokmmkcm.exe240⤵PID:3336
-
C:\Windows\SysWOW64\Lopfhk32.exeC:\Windows\system32\Lopfhk32.exe241⤵PID:1608
-
C:\Windows\SysWOW64\Lpabpcdf.exeC:\Windows\system32\Lpabpcdf.exe242⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3456