Analysis
-
max time kernel
137s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 23:01
Behavioral task
behavioral1
Sample
30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe
-
Size
448KB
-
MD5
30c2fab4f018906465e236308bcf6450
-
SHA1
86ff9b7a8fbbfbf049ab30a5405b05a71b857d42
-
SHA256
3fc9b091f2bf05520d055f3136df4bba360bda622bc4900152173c6da26a0bd1
-
SHA512
7b57b9e06a54bca14414531047c314c157f721a635cc942ad8ef3507578c3555193acf24b6c84cd79f8fddabad876280b670b27cb4f56432e37ff87636189025
-
SSDEEP
12288:ZCQVEoXH5pV6yYPMLnfBJKFbhDwBpV6yYP6Utri+Woh3YRVDDf1LcXD3v+2JFrf3:NWMLnfBJKhVwBW6Utri+WoxYRVDr1Lc/
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Nnafno32.exeNjhgbp32.exeNmfcok32.exeOgekbb32.exeApmhiq32.exeCdpcal32.exeCacckp32.exeJocnlg32.exeHblkjo32.exeIckglm32.exeKckqbj32.exeNadleilm.exeDddllkbf.exeEdionhpn.exeMcoljagj.exeOjcpdg32.exeHlpfhe32.exeCogddd32.exeHicpgc32.exeJleijb32.exeKncaec32.exeEbaplnie.exeFbbicl32.exeLhnhajba.exePccahbmn.exeCkebcg32.exeCgqlcg32.exeDpkmal32.exeFkmjaa32.exeHbihjifh.exeNhhdnf32.exeJlgepanl.exeNclbpf32.exePpnenlka.exeHlglidlo.exeJcfggkac.exeAkdilipp.exeLhenai32.exeCgnomg32.exeFinnef32.exeCdkifmjq.exeDdkbmj32.exeLmdnbn32.exeQhjmdp32.exeHalhfe32.exeJbccge32.exeLpjjmg32.exePbhgoh32.exeKjgeedch.exeEhlhih32.exeGkaclqkk.exeHoclopne.exeKoodbl32.exePmmlla32.exeBpkdjofm.exeGbpedjnb.exeIojkeh32.exeNqmfdj32.exePjdpelnc.exeMjnnbk32.exeMlljnf32.exePfoann32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnafno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Njhgbp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmfcok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogekbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Apmhiq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdpcal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cacckp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jocnlg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hblkjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ickglm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kckqbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nadleilm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddllkbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Edionhpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcoljagj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ojcpdg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlpfhe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cogddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hicpgc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jleijb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kncaec32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebaplnie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbbicl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhnhajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pccahbmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckebcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cgqlcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpkmal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkmjaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbihjifh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhhdnf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlgepanl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nclbpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apmhiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ppnenlka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlglidlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jcfggkac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Akdilipp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hicpgc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhenai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgnomg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Finnef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdkifmjq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddkbmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmdnbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qhjmdp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Halhfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jbccge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpjjmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbhgoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kjgeedch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehlhih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkaclqkk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hoclopne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Koodbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pmmlla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bpkdjofm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbpedjnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iojkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nqmfdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjdpelnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjnnbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlljnf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfoann32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Hibjli32.exe family_berbew C:\Windows\SysWOW64\Hffken32.exe family_berbew C:\Windows\SysWOW64\Hehkajig.exe family_berbew C:\Windows\SysWOW64\Hmpcbhji.exe family_berbew C:\Windows\SysWOW64\Hblkjo32.exe family_berbew C:\Windows\SysWOW64\Hifcgion.exe family_berbew C:\Windows\SysWOW64\Hpqldc32.exe family_berbew C:\Windows\SysWOW64\Hlglidlo.exe family_berbew C:\Windows\SysWOW64\Imgicgca.exe family_berbew C:\Windows\SysWOW64\Igajal32.exe family_berbew C:\Windows\SysWOW64\Ibfnqmpf.exe family_berbew C:\Windows\SysWOW64\Iojbpo32.exe family_berbew C:\Windows\SysWOW64\Illfdc32.exe family_berbew C:\Windows\SysWOW64\Imiehfao.exe family_berbew C:\Windows\SysWOW64\Iinjhh32.exe family_berbew C:\Windows\SysWOW64\Ifomll32.exe family_berbew C:\Windows\SysWOW64\Ibcaknbi.exe family_berbew C:\Windows\SysWOW64\Ipeeobbe.exe family_berbew C:\Windows\SysWOW64\Iliinc32.exe family_berbew C:\Windows\SysWOW64\Iepaaico.exe family_berbew C:\Windows\SysWOW64\Ifmqfm32.exe family_berbew C:\Windows\SysWOW64\Ibaeen32.exe family_berbew C:\Windows\SysWOW64\Hmdlmg32.exe family_berbew C:\Windows\SysWOW64\Hemdlj32.exe family_berbew C:\Windows\SysWOW64\Hfjdqmng.exe family_berbew C:\Windows\SysWOW64\Hoclopne.exe family_berbew C:\Windows\SysWOW64\Hmbphg32.exe family_berbew C:\Windows\SysWOW64\Hekgfj32.exe family_berbew C:\Windows\SysWOW64\Hoaojp32.exe family_berbew C:\Windows\SysWOW64\Hlbcnd32.exe family_berbew C:\Windows\SysWOW64\Hoobdp32.exe family_berbew C:\Windows\SysWOW64\Hlpfhe32.exe family_berbew C:\Windows\SysWOW64\Nclbpf32.exe family_berbew C:\Windows\SysWOW64\Onmfimga.exe family_berbew C:\Windows\SysWOW64\Onocomdo.exe family_berbew C:\Windows\SysWOW64\Ofmdio32.exe family_berbew C:\Windows\SysWOW64\Qpcecb32.exe family_berbew C:\Windows\SysWOW64\Afbgkl32.exe family_berbew C:\Windows\SysWOW64\Bdagpnbk.exe family_berbew C:\Windows\SysWOW64\Bogkmgba.exe family_berbew C:\Windows\SysWOW64\Cdimqm32.exe family_berbew C:\Windows\SysWOW64\Cdbpgl32.exe family_berbew C:\Windows\SysWOW64\Dolmodpi.exe family_berbew C:\Windows\SysWOW64\Ebaplnie.exe family_berbew C:\Windows\SysWOW64\Fdlkdhnk.exe family_berbew C:\Windows\SysWOW64\Fbplml32.exe family_berbew C:\Windows\SysWOW64\Gnblnlhl.exe family_berbew C:\Windows\SysWOW64\Ggkqgaol.exe family_berbew C:\Windows\SysWOW64\Geanfelc.exe family_berbew C:\Windows\SysWOW64\Inebjihf.exe family_berbew C:\Windows\SysWOW64\Ihmfco32.exe family_berbew C:\Windows\SysWOW64\Joekag32.exe family_berbew C:\Windows\SysWOW64\Jlikkkhn.exe family_berbew C:\Windows\SysWOW64\Jbccge32.exe family_berbew C:\Windows\SysWOW64\Jhplpl32.exe family_berbew C:\Windows\SysWOW64\Jbepme32.exe family_berbew C:\Windows\SysWOW64\Lcfidb32.exe family_berbew C:\Windows\SysWOW64\Loacdc32.exe family_berbew C:\Windows\SysWOW64\Mjnnbk32.exe family_berbew C:\Windows\SysWOW64\Nhhdnf32.exe family_berbew C:\Windows\SysWOW64\Nbbeml32.exe family_berbew C:\Windows\SysWOW64\Ooibkpmi.exe family_berbew C:\Windows\SysWOW64\Ocgkan32.exe family_berbew C:\Windows\SysWOW64\Ofjqihnn.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Hibjli32.exeHlpfhe32.exeHoobdp32.exeHffken32.exeHehkajig.exeHmpcbhji.exeHlbcnd32.exeHoaojp32.exeHblkjo32.exeHekgfj32.exeHifcgion.exeHmbphg32.exeHpqldc32.exeHoclopne.exeHfjdqmng.exeHemdlj32.exeHmdlmg32.exeHlglidlo.exeIbaeen32.exeIfmqfm32.exeIepaaico.exeImgicgca.exeIliinc32.exeIpeeobbe.exeIbcaknbi.exeIfomll32.exeIinjhh32.exeImiehfao.exeIllfdc32.exeIojbpo32.exeIbfnqmpf.exeIgajal32.exeIipfmggc.exeImkbnf32.exeIlnbicff.exeIomoenej.exeIbhkfm32.exeIefgbh32.exeImnocf32.exeIlqoobdd.exeIoolkncg.exeIckglm32.exeIeidhh32.exeImpliekg.exeJoahqn32.exeJghpbk32.exeJekqmhia.exeJmbhoeid.exeJleijb32.exeJocefm32.exeJgkmgk32.exeJenmcggo.exeJmeede32.exeJlgepanl.exeJofalmmp.exeJcanll32.exeJepjhg32.exeJljbeali.exeJpenfp32.exeJcdjbk32.exeJebfng32.exeJinboekc.exeJllokajf.exeJokkgl32.exepid process 1976 Hibjli32.exe 3548 Hlpfhe32.exe 3116 Hoobdp32.exe 4960 Hffken32.exe 1568 Hehkajig.exe 2188 Hmpcbhji.exe 1576 Hlbcnd32.exe 4984 Hoaojp32.exe 2680 Hblkjo32.exe 3228 Hekgfj32.exe 804 Hifcgion.exe 4812 Hmbphg32.exe 3684 Hpqldc32.exe 1924 Hoclopne.exe 3244 Hfjdqmng.exe 3144 Hemdlj32.exe 464 Hmdlmg32.exe 1632 Hlglidlo.exe 624 Ibaeen32.exe 1420 Ifmqfm32.exe 3420 Iepaaico.exe 2524 Imgicgca.exe 2588 Iliinc32.exe 5068 Ipeeobbe.exe 4908 Ibcaknbi.exe 2780 Ifomll32.exe 1880 Iinjhh32.exe 4528 Imiehfao.exe 4844 Illfdc32.exe 2392 Iojbpo32.exe 1972 Ibfnqmpf.exe 2080 Igajal32.exe 2724 Iipfmggc.exe 2452 Imkbnf32.exe 2696 Ilnbicff.exe 3076 Iomoenej.exe 3804 Ibhkfm32.exe 1820 Iefgbh32.exe 2688 Imnocf32.exe 2708 Ilqoobdd.exe 116 Ioolkncg.exe 4980 Ickglm32.exe 4780 Ieidhh32.exe 2072 Impliekg.exe 2972 Joahqn32.exe 2568 Jghpbk32.exe 4612 Jekqmhia.exe 2824 Jmbhoeid.exe 4536 Jleijb32.exe 3296 Jocefm32.exe 1860 Jgkmgk32.exe 4640 Jenmcggo.exe 5136 Jmeede32.exe 5176 Jlgepanl.exe 5212 Jofalmmp.exe 5248 Jcanll32.exe 5280 Jepjhg32.exe 5316 Jljbeali.exe 5352 Jpenfp32.exe 5392 Jcdjbk32.exe 5428 Jebfng32.exe 5460 Jinboekc.exe 5500 Jllokajf.exe 5536 Jokkgl32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Hehkajig.exeOghghb32.exeCdpcal32.exeJppnpjel.exeFqgedh32.exeHemmac32.exeIiopca32.exeKckqbj32.exePjmjdm32.exeAmlogfel.exeDolmodpi.exeCkgohf32.exeMofmobmo.exeHlbcnd32.exeJcdjbk32.exeOpeiadfg.exeCggimh32.exeNpiiffqe.exeFoapaa32.exeIhkjno32.exeIlphdlqh.exeJidinqpb.exeNcmhko32.exeNofefp32.exeMgphpe32.exeNnhmnn32.exeGlhimp32.exeFkofga32.exeMfkkqmiq.exeKcpjnjii.exeLoighj32.exeNgndaccj.exeQjfmkk32.exePplobcpp.exeBdojjo32.exeNfihbk32.exeDgeenfog.exeGpmomo32.exePplhhm32.exeHmpcbhji.exeJcfggkac.exeBnoddcef.exeLafmjp32.exeNnfpinmi.exeHicpgc32.exeIlnlom32.exePjaleemj.exeNodiqp32.exeGaloohke.exeLpgmhg32.exeLpjjmg32.exeMjidgkog.exeHblkjo32.exeAdcjop32.exeDpkmal32.exeIialhaad.exeCacckp32.exeMjnnbk32.exePaiogf32.exeEnmjlojd.exeEdgbii32.exedescription ioc process File created C:\Windows\SysWOW64\Ibdlakbf.dll Hehkajig.exe File created C:\Windows\SysWOW64\Nphihiif.dll Oghghb32.exe File created C:\Windows\SysWOW64\Ijilflah.dll Cdpcal32.exe File opened for modification C:\Windows\SysWOW64\Jocnlg32.exe Jppnpjel.exe File created C:\Windows\SysWOW64\Finnef32.exe Fqgedh32.exe File created C:\Windows\SysWOW64\Olekop32.dll Hemmac32.exe File created C:\Windows\SysWOW64\Lckggdbo.dll Iiopca32.exe File created C:\Windows\SysWOW64\Keimof32.exe Kckqbj32.exe File created C:\Windows\SysWOW64\Pmlfqh32.exe Pjmjdm32.exe File created C:\Windows\SysWOW64\Ahaceo32.exe Amlogfel.exe File created C:\Windows\SysWOW64\Ddifgk32.exe Dolmodpi.exe File created C:\Windows\SysWOW64\Qkicbhla.dll Ckgohf32.exe File created C:\Windows\SysWOW64\Mbdiknlb.exe Mofmobmo.exe File created C:\Windows\SysWOW64\Hoaojp32.exe Hlbcnd32.exe File opened for modification C:\Windows\SysWOW64\Jebfng32.exe Jcdjbk32.exe File opened for modification C:\Windows\SysWOW64\Pfoann32.exe Opeiadfg.exe File created C:\Windows\SysWOW64\Conanfli.exe Cggimh32.exe File created C:\Windows\SysWOW64\Dempqa32.dll Npiiffqe.exe File opened for modification C:\Windows\SysWOW64\Fbplml32.exe Foapaa32.exe File opened for modification C:\Windows\SysWOW64\Ipbaol32.exe Ihkjno32.exe File created C:\Windows\SysWOW64\Iondqhpl.exe Ilphdlqh.exe File created C:\Windows\SysWOW64\Jlbejloe.exe Jidinqpb.exe File opened for modification C:\Windows\SysWOW64\Nfldgk32.exe Ncmhko32.exe File opened for modification C:\Windows\SysWOW64\Nbebbk32.exe Nofefp32.exe File created C:\Windows\SysWOW64\Mjcngpjh.exe Mgphpe32.exe File created C:\Windows\SysWOW64\Jchdqkfl.dll Nnhmnn32.exe File created C:\Windows\SysWOW64\Gngeik32.exe Glhimp32.exe File created C:\Windows\SysWOW64\Hnjfof32.dll Ihkjno32.exe File opened for modification C:\Windows\SysWOW64\Gokbgpeg.exe Fkofga32.exe File created C:\Windows\SysWOW64\Mjggal32.exe Mfkkqmiq.exe File opened for modification C:\Windows\SysWOW64\Knenkbio.exe Kcpjnjii.exe File created C:\Windows\SysWOW64\Lmdnbn32.exe Loighj32.exe File opened for modification C:\Windows\SysWOW64\Nnhmnn32.exe Ngndaccj.exe File created C:\Windows\SysWOW64\Qmeigg32.exe Qjfmkk32.exe File created C:\Windows\SysWOW64\Phcgcqab.exe Pplobcpp.exe File created C:\Windows\SysWOW64\Bgnffj32.exe Bdojjo32.exe File created C:\Windows\SysWOW64\Cnaqob32.dll Nfihbk32.exe File created C:\Windows\SysWOW64\Cepjip32.dll Dgeenfog.exe File opened for modification C:\Windows\SysWOW64\Gbkkik32.exe Gpmomo32.exe File opened for modification C:\Windows\SysWOW64\Mjggal32.exe Mfkkqmiq.exe File created C:\Windows\SysWOW64\Pbjddh32.exe Pplhhm32.exe File created C:\Windows\SysWOW64\Klqcmdnk.dll Hmpcbhji.exe File created C:\Windows\SysWOW64\Jedccfqg.exe Jcfggkac.exe File opened for modification C:\Windows\SysWOW64\Bajqda32.exe Bnoddcef.exe File created C:\Windows\SysWOW64\Lindkm32.exe Lafmjp32.exe File opened for modification C:\Windows\SysWOW64\Nadleilm.exe Nnfpinmi.exe File opened for modification C:\Windows\SysWOW64\Hlblcn32.exe Hicpgc32.exe File opened for modification C:\Windows\SysWOW64\Iolhkh32.exe Ilnlom32.exe File opened for modification C:\Windows\SysWOW64\Pmphaaln.exe Pjaleemj.exe File created C:\Windows\SysWOW64\Bpenhh32.dll Nodiqp32.exe File created C:\Windows\SysWOW64\Ecipcemb.dll Fkofga32.exe File opened for modification C:\Windows\SysWOW64\Gicgpelg.exe Galoohke.exe File created C:\Windows\SysWOW64\Cbqfhb32.dll Lpgmhg32.exe File created C:\Windows\SysWOW64\Ipamlopb.dll Lpjjmg32.exe File opened for modification C:\Windows\SysWOW64\Mlhqcgnk.exe Mjidgkog.exe File opened for modification C:\Windows\SysWOW64\Hekgfj32.exe Hblkjo32.exe File created C:\Windows\SysWOW64\Afbgkl32.exe Adcjop32.exe File created C:\Windows\SysWOW64\Dgihjf32.dll Dpkmal32.exe File opened for modification C:\Windows\SysWOW64\Ilphdlqh.exe Iialhaad.exe File created C:\Windows\SysWOW64\Cdbpgl32.exe Cacckp32.exe File created C:\Windows\SysWOW64\Mlljnf32.exe Mjnnbk32.exe File created C:\Windows\SysWOW64\Pplobcpp.exe Paiogf32.exe File opened for modification C:\Windows\SysWOW64\Ebifmm32.exe Enmjlojd.exe File created C:\Windows\SysWOW64\Ehbnigjj.exe Edgbii32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 12336 12116 WerFault.exe Pififb32.exe -
Modifies registry class 64 IoCs
Processes:
Ifomll32.exeDpkmal32.exeDhbebj32.exeGbiockdj.exeMlhqcgnk.exeMlofcf32.exeLancko32.exeBnoddcef.exeFkofga32.exeJhplpl32.exeHlbcnd32.exeHlglidlo.exePdmdnadc.exeBacjdbch.exeCkebcg32.exeDggbcf32.exeGokbgpeg.exeOcnabm32.exeOfmdio32.exeQmeigg32.exeIfmqfm32.exeAhaceo32.exeNqmojd32.exeHpqldc32.exeBajqda32.exeJoekag32.exeJllokajf.exePfdjinjo.exeGngeik32.exeKhiofk32.exeLindkm32.exeHoobdp32.exeNadleilm.exeGejhef32.exeMjidgkog.exeImiehfao.exeJenmcggo.exePmpolgoi.exeKpnjah32.exeKcoccc32.exeJgkmgk32.exeKcpjnjii.exeMmkdcm32.exeOjfcdnjc.exePfoann32.exeGbpedjnb.exePiocecgj.exeIlqoobdd.exeAmlogfel.exeBgkiaj32.exeDnmaea32.exeIpbaol32.exeIojkeh32.exeMcoljagj.exeKoaagkcb.exeNmfcok32.exeEnpfan32.exeFbmohmoh.exeKiphjo32.exeLcfidb32.exePafkgphl.exeJcanll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ifomll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dpkmal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcknij32.dll" Dhbebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hodlgn32.dll" Gbiockdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mlhqcgnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mlofcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipdbmgdb.dll" Lancko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cklgfgfg.dll" Bnoddcef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkofga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jhplpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpabibmg.dll" Hlbcnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lciibdmj.dll" Hlglidlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pdmdnadc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adnbpqkj.dll" Bacjdbch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qfoaecol.dll" Ckebcg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dggbcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gokbgpeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ocnabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhhmleng.dll" Ofmdio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cggkemhh.dll" Qmeigg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ifmqfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcgplk32.dll" Ahaceo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nqmojd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hpqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bajqda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnknop32.dll" Joekag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jllokajf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pfdjinjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhbebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnnjancb.dll" Gngeik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Khiofk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lindkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hoobdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkbfan32.dll" Nadleilm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dahceqce.dll" Gejhef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Faoiogei.dll" Mjidgkog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgjamboa.dll" Imiehfao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkjcgjio.dll" Jenmcggo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nadleilm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pmpolgoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpnjah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kcoccc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eieijp32.dll" Jgkmgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kcpjnjii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpkpbaea.dll" Mmkdcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kibohd32.dll" Ojfcdnjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omfmcjlk.dll" Pfoann32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbfecjhc.dll" Gbpedjnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Piocecgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ilqoobdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnkdmlfj.dll" Amlogfel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bgkiaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dnmaea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ipbaol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aglmllpq.dll" Iojkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caecnh32.dll" Mcoljagj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Koaagkcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nmfcok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Enpfan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnjkcfod.dll" Fbmohmoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kiphjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lcfidb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pafkgphl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jcanll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exeHibjli32.exeHlpfhe32.exeHoobdp32.exeHffken32.exeHehkajig.exeHmpcbhji.exeHlbcnd32.exeHoaojp32.exeHblkjo32.exeHekgfj32.exeHifcgion.exeHmbphg32.exeHpqldc32.exeHoclopne.exeHfjdqmng.exeHemdlj32.exeHmdlmg32.exeHlglidlo.exeIbaeen32.exeIfmqfm32.exeIepaaico.exedescription pid process target process PID 4948 wrote to memory of 1976 4948 30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe Hibjli32.exe PID 4948 wrote to memory of 1976 4948 30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe Hibjli32.exe PID 4948 wrote to memory of 1976 4948 30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe Hibjli32.exe PID 1976 wrote to memory of 3548 1976 Hibjli32.exe Hlpfhe32.exe PID 1976 wrote to memory of 3548 1976 Hibjli32.exe Hlpfhe32.exe PID 1976 wrote to memory of 3548 1976 Hibjli32.exe Hlpfhe32.exe PID 3548 wrote to memory of 3116 3548 Hlpfhe32.exe Hoobdp32.exe PID 3548 wrote to memory of 3116 3548 Hlpfhe32.exe Hoobdp32.exe PID 3548 wrote to memory of 3116 3548 Hlpfhe32.exe Hoobdp32.exe PID 3116 wrote to memory of 4960 3116 Hoobdp32.exe Hffken32.exe PID 3116 wrote to memory of 4960 3116 Hoobdp32.exe Hffken32.exe PID 3116 wrote to memory of 4960 3116 Hoobdp32.exe Hffken32.exe PID 4960 wrote to memory of 1568 4960 Hffken32.exe Hehkajig.exe PID 4960 wrote to memory of 1568 4960 Hffken32.exe Hehkajig.exe PID 4960 wrote to memory of 1568 4960 Hffken32.exe Hehkajig.exe PID 1568 wrote to memory of 2188 1568 Hehkajig.exe Hmpcbhji.exe PID 1568 wrote to memory of 2188 1568 Hehkajig.exe Hmpcbhji.exe PID 1568 wrote to memory of 2188 1568 Hehkajig.exe Hmpcbhji.exe PID 2188 wrote to memory of 1576 2188 Hmpcbhji.exe Hlbcnd32.exe PID 2188 wrote to memory of 1576 2188 Hmpcbhji.exe Hlbcnd32.exe PID 2188 wrote to memory of 1576 2188 Hmpcbhji.exe Hlbcnd32.exe PID 1576 wrote to memory of 4984 1576 Hlbcnd32.exe Hoaojp32.exe PID 1576 wrote to memory of 4984 1576 Hlbcnd32.exe Hoaojp32.exe PID 1576 wrote to memory of 4984 1576 Hlbcnd32.exe Hoaojp32.exe PID 4984 wrote to memory of 2680 4984 Hoaojp32.exe Hblkjo32.exe PID 4984 wrote to memory of 2680 4984 Hoaojp32.exe Hblkjo32.exe PID 4984 wrote to memory of 2680 4984 Hoaojp32.exe Hblkjo32.exe PID 2680 wrote to memory of 3228 2680 Hblkjo32.exe Hekgfj32.exe PID 2680 wrote to memory of 3228 2680 Hblkjo32.exe Hekgfj32.exe PID 2680 wrote to memory of 3228 2680 Hblkjo32.exe Hekgfj32.exe PID 3228 wrote to memory of 804 3228 Hekgfj32.exe Hifcgion.exe PID 3228 wrote to memory of 804 3228 Hekgfj32.exe Hifcgion.exe PID 3228 wrote to memory of 804 3228 Hekgfj32.exe Hifcgion.exe PID 804 wrote to memory of 4812 804 Hifcgion.exe Hmbphg32.exe PID 804 wrote to memory of 4812 804 Hifcgion.exe Hmbphg32.exe PID 804 wrote to memory of 4812 804 Hifcgion.exe Hmbphg32.exe PID 4812 wrote to memory of 3684 4812 Hmbphg32.exe Hpqldc32.exe PID 4812 wrote to memory of 3684 4812 Hmbphg32.exe Hpqldc32.exe PID 4812 wrote to memory of 3684 4812 Hmbphg32.exe Hpqldc32.exe PID 3684 wrote to memory of 1924 3684 Hpqldc32.exe Hoclopne.exe PID 3684 wrote to memory of 1924 3684 Hpqldc32.exe Hoclopne.exe PID 3684 wrote to memory of 1924 3684 Hpqldc32.exe Hoclopne.exe PID 1924 wrote to memory of 3244 1924 Hoclopne.exe Hfjdqmng.exe PID 1924 wrote to memory of 3244 1924 Hoclopne.exe Hfjdqmng.exe PID 1924 wrote to memory of 3244 1924 Hoclopne.exe Hfjdqmng.exe PID 3244 wrote to memory of 3144 3244 Hfjdqmng.exe Hemdlj32.exe PID 3244 wrote to memory of 3144 3244 Hfjdqmng.exe Hemdlj32.exe PID 3244 wrote to memory of 3144 3244 Hfjdqmng.exe Hemdlj32.exe PID 3144 wrote to memory of 464 3144 Hemdlj32.exe Hmdlmg32.exe PID 3144 wrote to memory of 464 3144 Hemdlj32.exe Hmdlmg32.exe PID 3144 wrote to memory of 464 3144 Hemdlj32.exe Hmdlmg32.exe PID 464 wrote to memory of 1632 464 Hmdlmg32.exe Hlglidlo.exe PID 464 wrote to memory of 1632 464 Hmdlmg32.exe Hlglidlo.exe PID 464 wrote to memory of 1632 464 Hmdlmg32.exe Hlglidlo.exe PID 1632 wrote to memory of 624 1632 Hlglidlo.exe Ibaeen32.exe PID 1632 wrote to memory of 624 1632 Hlglidlo.exe Ibaeen32.exe PID 1632 wrote to memory of 624 1632 Hlglidlo.exe Ibaeen32.exe PID 624 wrote to memory of 1420 624 Ibaeen32.exe Ifmqfm32.exe PID 624 wrote to memory of 1420 624 Ibaeen32.exe Ifmqfm32.exe PID 624 wrote to memory of 1420 624 Ibaeen32.exe Ifmqfm32.exe PID 1420 wrote to memory of 3420 1420 Ifmqfm32.exe Iepaaico.exe PID 1420 wrote to memory of 3420 1420 Ifmqfm32.exe Iepaaico.exe PID 1420 wrote to memory of 3420 1420 Ifmqfm32.exe Iepaaico.exe PID 3420 wrote to memory of 2524 3420 Iepaaico.exe Imgicgca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\30c2fab4f018906465e236308bcf6450_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\Hibjli32.exeC:\Windows\system32\Hibjli32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\Hlpfhe32.exeC:\Windows\system32\Hlpfhe32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\Hoobdp32.exeC:\Windows\system32\Hoobdp32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\Hffken32.exeC:\Windows\system32\Hffken32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Hehkajig.exeC:\Windows\system32\Hehkajig.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\Hmpcbhji.exeC:\Windows\system32\Hmpcbhji.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Hlbcnd32.exeC:\Windows\system32\Hlbcnd32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\Hoaojp32.exeC:\Windows\system32\Hoaojp32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\Hblkjo32.exeC:\Windows\system32\Hblkjo32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Hekgfj32.exeC:\Windows\system32\Hekgfj32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\Hifcgion.exeC:\Windows\system32\Hifcgion.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\Hmbphg32.exeC:\Windows\system32\Hmbphg32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Hpqldc32.exeC:\Windows\system32\Hpqldc32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\Hoclopne.exeC:\Windows\system32\Hoclopne.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Hfjdqmng.exeC:\Windows\system32\Hfjdqmng.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\Hemdlj32.exeC:\Windows\system32\Hemdlj32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\Hmdlmg32.exeC:\Windows\system32\Hmdlmg32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\Hlglidlo.exeC:\Windows\system32\Hlglidlo.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\Ibaeen32.exeC:\Windows\system32\Ibaeen32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\Ifmqfm32.exeC:\Windows\system32\Ifmqfm32.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\Iepaaico.exeC:\Windows\system32\Iepaaico.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\Imgicgca.exeC:\Windows\system32\Imgicgca.exe23⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Iliinc32.exeC:\Windows\system32\Iliinc32.exe24⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Ipeeobbe.exeC:\Windows\system32\Ipeeobbe.exe25⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\Ibcaknbi.exeC:\Windows\system32\Ibcaknbi.exe26⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\Ifomll32.exeC:\Windows\system32\Ifomll32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Iinjhh32.exeC:\Windows\system32\Iinjhh32.exe28⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Imiehfao.exeC:\Windows\system32\Imiehfao.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\Illfdc32.exeC:\Windows\system32\Illfdc32.exe30⤵
- Executes dropped EXE
PID:4844 -
C:\Windows\SysWOW64\Iojbpo32.exeC:\Windows\system32\Iojbpo32.exe31⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Ibfnqmpf.exeC:\Windows\system32\Ibfnqmpf.exe32⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\Igajal32.exeC:\Windows\system32\Igajal32.exe33⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\Iipfmggc.exeC:\Windows\system32\Iipfmggc.exe34⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\Imkbnf32.exeC:\Windows\system32\Imkbnf32.exe35⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Ilnbicff.exeC:\Windows\system32\Ilnbicff.exe36⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\Iomoenej.exeC:\Windows\system32\Iomoenej.exe37⤵
- Executes dropped EXE
PID:3076 -
C:\Windows\SysWOW64\Ibhkfm32.exeC:\Windows\system32\Ibhkfm32.exe38⤵
- Executes dropped EXE
PID:3804 -
C:\Windows\SysWOW64\Iefgbh32.exeC:\Windows\system32\Iefgbh32.exe39⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Imnocf32.exeC:\Windows\system32\Imnocf32.exe40⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Ilqoobdd.exeC:\Windows\system32\Ilqoobdd.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:2708 -
C:\Windows\SysWOW64\Ioolkncg.exeC:\Windows\system32\Ioolkncg.exe42⤵
- Executes dropped EXE
PID:116 -
C:\Windows\SysWOW64\Ickglm32.exeC:\Windows\system32\Ickglm32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\Ieidhh32.exeC:\Windows\system32\Ieidhh32.exe44⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\Impliekg.exeC:\Windows\system32\Impliekg.exe45⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Joahqn32.exeC:\Windows\system32\Joahqn32.exe46⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Jghpbk32.exeC:\Windows\system32\Jghpbk32.exe47⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Jekqmhia.exeC:\Windows\system32\Jekqmhia.exe48⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\Jmbhoeid.exeC:\Windows\system32\Jmbhoeid.exe49⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Jleijb32.exeC:\Windows\system32\Jleijb32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\Jocefm32.exeC:\Windows\system32\Jocefm32.exe51⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\Jgkmgk32.exeC:\Windows\system32\Jgkmgk32.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1860 -
C:\Windows\SysWOW64\Jenmcggo.exeC:\Windows\system32\Jenmcggo.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:4640 -
C:\Windows\SysWOW64\Jmeede32.exeC:\Windows\system32\Jmeede32.exe54⤵
- Executes dropped EXE
PID:5136 -
C:\Windows\SysWOW64\Jlgepanl.exeC:\Windows\system32\Jlgepanl.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5176 -
C:\Windows\SysWOW64\Jofalmmp.exeC:\Windows\system32\Jofalmmp.exe56⤵
- Executes dropped EXE
PID:5212 -
C:\Windows\SysWOW64\Jcanll32.exeC:\Windows\system32\Jcanll32.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:5248 -
C:\Windows\SysWOW64\Jepjhg32.exeC:\Windows\system32\Jepjhg32.exe58⤵
- Executes dropped EXE
PID:5280 -
C:\Windows\SysWOW64\Jljbeali.exeC:\Windows\system32\Jljbeali.exe59⤵
- Executes dropped EXE
PID:5316 -
C:\Windows\SysWOW64\Jpenfp32.exeC:\Windows\system32\Jpenfp32.exe60⤵
- Executes dropped EXE
PID:5352 -
C:\Windows\SysWOW64\Jcdjbk32.exeC:\Windows\system32\Jcdjbk32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5392 -
C:\Windows\SysWOW64\Jebfng32.exeC:\Windows\system32\Jebfng32.exe62⤵
- Executes dropped EXE
PID:5428 -
C:\Windows\SysWOW64\Jinboekc.exeC:\Windows\system32\Jinboekc.exe63⤵
- Executes dropped EXE
PID:5460 -
C:\Windows\SysWOW64\Jllokajf.exeC:\Windows\system32\Jllokajf.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:5500 -
C:\Windows\SysWOW64\Jokkgl32.exeC:\Windows\system32\Jokkgl32.exe65⤵
- Executes dropped EXE
PID:5536 -
C:\Windows\SysWOW64\Jcfggkac.exeC:\Windows\system32\Jcfggkac.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5568 -
C:\Windows\SysWOW64\Jedccfqg.exeC:\Windows\system32\Jedccfqg.exe67⤵PID:5608
-
C:\Windows\SysWOW64\Jjpode32.exeC:\Windows\system32\Jjpode32.exe68⤵PID:5644
-
C:\Windows\SysWOW64\Jnlkedai.exeC:\Windows\system32\Jnlkedai.exe69⤵PID:5680
-
C:\Windows\SysWOW64\Kpjgaoqm.exeC:\Windows\system32\Kpjgaoqm.exe70⤵PID:5716
-
C:\Windows\SysWOW64\Komhll32.exeC:\Windows\system32\Komhll32.exe71⤵PID:5752
-
C:\Windows\SysWOW64\Kcidmkpq.exeC:\Windows\system32\Kcidmkpq.exe72⤵PID:5784
-
C:\Windows\SysWOW64\Kegpifod.exeC:\Windows\system32\Kegpifod.exe73⤵PID:5824
-
C:\Windows\SysWOW64\Kjblje32.exeC:\Windows\system32\Kjblje32.exe74⤵PID:5860
-
C:\Windows\SysWOW64\Klahfp32.exeC:\Windows\system32\Klahfp32.exe75⤵PID:5892
-
C:\Windows\SysWOW64\Koodbl32.exeC:\Windows\system32\Koodbl32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5932 -
C:\Windows\SysWOW64\Kckqbj32.exeC:\Windows\system32\Kckqbj32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5964 -
C:\Windows\SysWOW64\Keimof32.exeC:\Windows\system32\Keimof32.exe78⤵PID:6000
-
C:\Windows\SysWOW64\Knqepc32.exeC:\Windows\system32\Knqepc32.exe79⤵PID:6040
-
C:\Windows\SysWOW64\Kpoalo32.exeC:\Windows\system32\Kpoalo32.exe80⤵PID:6076
-
C:\Windows\SysWOW64\Koaagkcb.exeC:\Windows\system32\Koaagkcb.exe81⤵
- Modifies registry class
PID:6108 -
C:\Windows\SysWOW64\Kgiiiidd.exeC:\Windows\system32\Kgiiiidd.exe82⤵PID:1360
-
C:\Windows\SysWOW64\Kjgeedch.exeC:\Windows\system32\Kjgeedch.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4396 -
C:\Windows\SysWOW64\Kncaec32.exeC:\Windows\system32\Kncaec32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3124 -
C:\Windows\SysWOW64\Kpanan32.exeC:\Windows\system32\Kpanan32.exe85⤵PID:4368
-
C:\Windows\SysWOW64\Kcpjnjii.exeC:\Windows\system32\Kcpjnjii.exe86⤵
- Drops file in System32 directory
- Modifies registry class
PID:4924 -
C:\Windows\SysWOW64\Knenkbio.exeC:\Windows\system32\Knenkbio.exe87⤵PID:3492
-
C:\Windows\SysWOW64\Kofkbk32.exeC:\Windows\system32\Kofkbk32.exe88⤵PID:5288
-
C:\Windows\SysWOW64\Kfpcoefj.exeC:\Windows\system32\Kfpcoefj.exe89⤵PID:1072
-
C:\Windows\SysWOW64\Lpfgmnfp.exeC:\Windows\system32\Lpfgmnfp.exe90⤵PID:4824
-
C:\Windows\SysWOW64\Loighj32.exeC:\Windows\system32\Loighj32.exe91⤵
- Drops file in System32 directory
PID:5596 -
C:\Windows\SysWOW64\Lmdnbn32.exeC:\Windows\system32\Lmdnbn32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5660 -
C:\Windows\SysWOW64\Lcnfohmi.exeC:\Windows\system32\Lcnfohmi.exe93⤵PID:5792
-
C:\Windows\SysWOW64\Lflbkcll.exeC:\Windows\system32\Lflbkcll.exe94⤵PID:2268
-
C:\Windows\SysWOW64\Mogcihaj.exeC:\Windows\system32\Mogcihaj.exe95⤵PID:5960
-
C:\Windows\SysWOW64\Mfqlfb32.exeC:\Windows\system32\Mfqlfb32.exe96⤵PID:6128
-
C:\Windows\SysWOW64\Mmkdcm32.exeC:\Windows\system32\Mmkdcm32.exe97⤵
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Mcelpggq.exeC:\Windows\system32\Mcelpggq.exe98⤵PID:4092
-
C:\Windows\SysWOW64\Mgphpe32.exeC:\Windows\system32\Mgphpe32.exe99⤵
- Drops file in System32 directory
PID:3924 -
C:\Windows\SysWOW64\Mjcngpjh.exeC:\Windows\system32\Mjcngpjh.exe100⤵PID:4848
-
C:\Windows\SysWOW64\Nqmfdj32.exeC:\Windows\system32\Nqmfdj32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5300 -
C:\Windows\SysWOW64\Nclbpf32.exeC:\Windows\system32\Nclbpf32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5560 -
C:\Windows\SysWOW64\Nnafno32.exeC:\Windows\system32\Nnafno32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5304 -
C:\Windows\SysWOW64\Nqpcjj32.exeC:\Windows\system32\Nqpcjj32.exe104⤵PID:5264
-
C:\Windows\SysWOW64\Ngjkfd32.exeC:\Windows\system32\Ngjkfd32.exe105⤵PID:5340
-
C:\Windows\SysWOW64\Njhgbp32.exeC:\Windows\system32\Njhgbp32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5520 -
C:\Windows\SysWOW64\Nmfcok32.exeC:\Windows\system32\Nmfcok32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5768 -
C:\Windows\SysWOW64\Nfohgqlg.exeC:\Windows\system32\Nfohgqlg.exe108⤵PID:5876
-
C:\Windows\SysWOW64\Nnfpinmi.exeC:\Windows\system32\Nnfpinmi.exe109⤵
- Drops file in System32 directory
PID:1120 -
C:\Windows\SysWOW64\Nadleilm.exeC:\Windows\system32\Nadleilm.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5988 -
C:\Windows\SysWOW64\Ncchae32.exeC:\Windows\system32\Ncchae32.exe111⤵PID:856
-
C:\Windows\SysWOW64\Ngndaccj.exeC:\Windows\system32\Ngndaccj.exe112⤵
- Drops file in System32 directory
PID:5092 -
C:\Windows\SysWOW64\Nnhmnn32.exeC:\Windows\system32\Nnhmnn32.exe113⤵
- Drops file in System32 directory
PID:6028 -
C:\Windows\SysWOW64\Npiiffqe.exeC:\Windows\system32\Npiiffqe.exe114⤵
- Drops file in System32 directory
PID:6140 -
C:\Windows\SysWOW64\Ngqagcag.exeC:\Windows\system32\Ngqagcag.exe115⤵PID:5128
-
C:\Windows\SysWOW64\Ojomcopk.exeC:\Windows\system32\Ojomcopk.exe116⤵PID:5380
-
C:\Windows\SysWOW64\Oaifpi32.exeC:\Windows\system32\Oaifpi32.exe117⤵PID:1512
-
C:\Windows\SysWOW64\Oplfkeob.exeC:\Windows\system32\Oplfkeob.exe118⤵PID:5468
-
C:\Windows\SysWOW64\Ogcnmc32.exeC:\Windows\system32\Ogcnmc32.exe119⤵PID:5852
-
C:\Windows\SysWOW64\Offnhpfo.exeC:\Windows\system32\Offnhpfo.exe120⤵PID:6092
-
C:\Windows\SysWOW64\Onmfimga.exeC:\Windows\system32\Onmfimga.exe121⤵PID:388
-
C:\Windows\SysWOW64\Opnbae32.exeC:\Windows\system32\Opnbae32.exe122⤵PID:5996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-