Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 18:46
Behavioral task
behavioral1
Sample
e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe
-
Size
640KB
-
MD5
e7a626ddcfbfe02bb1678057ffe6f6a0
-
SHA1
046512092c642a32d78472c8fcb8128c9a7e86ed
-
SHA256
ed30eb025ac3ddb794eab3f23b5db8d2ab7fff94e3fff3e3d58e37dc7254dff8
-
SHA512
953709ade16a5099da799a3668cca0ef75de3a501b7e18248f2181e6f274e78d7e522bf8e51e747cfa9d08bac620a6f58b0e98a572c640862069b38930fba676
-
SSDEEP
12288:rSDdXHaINIVIIVy2oIvPKiK13fS2hEYM9RIPk:rwdXHfNIVIIVy2jU13fS2hEYM9RIPk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fbpchb32.exeGlipgf32.exeGhojbq32.exeNjljch32.exeFealin32.exeIidphgcn.exeIijfhbhl.exeLepleocn.exeNbnlaldg.exeEfeihb32.exeGlbjggof.exeHehdfdek.exeLoacdc32.exeKnenkbio.exeChdialdl.exeDdnobj32.exeEbfign32.exeChiigadc.exeLmaamn32.exePmblagmf.exeFooclapd.exeKakmna32.exeKofdhd32.exeDdgplado.exeAkdilipp.exeEhpadhll.exeFiodpl32.exeOqoefand.exeOophlo32.exeMfqlfb32.exeAmjbbfgo.exeDdifgk32.exeFkfcqb32.exeMhckcgpj.exee7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exeCdkifmjq.exeJeocna32.exeJbepme32.exeGbiockdj.exeLindkm32.exeNoblkqca.exeEkmhejao.exeAkpoaj32.exeCgqlcg32.exeJpegkj32.exeCnjdpaki.exePblajhje.exeKoonge32.exePlpjoe32.exeBhpfqcln.exeDoaneiop.exeIpgbdbqb.exeNnojho32.exeOaifpi32.exeEgohdegl.exeAhofoogd.exeAmlogfel.exeAkblfj32.exeEqlfhjig.exeIlfennic.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbpchb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glipgf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghojbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njljch32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fealin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iidphgcn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iijfhbhl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lepleocn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbnlaldg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efeihb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glbjggof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hehdfdek.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loacdc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knenkbio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chdialdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddnobj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebfign32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chiigadc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmaamn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmblagmf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fooclapd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kakmna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kofdhd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddgplado.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akdilipp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehpadhll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fiodpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iijfhbhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqoefand.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oophlo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfqlfb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amjbbfgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddifgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkfcqb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhckcgpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdkifmjq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jeocna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbepme32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbiockdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lindkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noblkqca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekmhejao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akpoaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgqlcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghojbq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpegkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmblagmf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnjdpaki.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pblajhje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koonge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plpjoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhpfqcln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doaneiop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glipgf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipgbdbqb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnojho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oaifpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egohdegl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahofoogd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amlogfel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akblfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqlfhjig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilfennic.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Najmjokc.exe family_berbew C:\Windows\SysWOW64\Oelolmnd.exe family_berbew C:\Windows\SysWOW64\Pddhbipj.exe family_berbew C:\Windows\SysWOW64\Plpjoe32.exe family_berbew C:\Windows\SysWOW64\Pejkmk32.exe family_berbew C:\Windows\SysWOW64\Qlgpod32.exe family_berbew C:\Windows\SysWOW64\Aeaanjkl.exe family_berbew C:\Windows\SysWOW64\Ahdged32.exe family_berbew C:\Windows\SysWOW64\Bhpfqcln.exe family_berbew C:\Windows\SysWOW64\Bnmoijje.exe family_berbew C:\Windows\SysWOW64\Bemqih32.exe family_berbew C:\Windows\SysWOW64\Cnahdi32.exe family_berbew C:\Windows\SysWOW64\Chiigadc.exe family_berbew C:\Windows\SysWOW64\Chnbbqpn.exe family_berbew C:\Windows\SysWOW64\Ddgplado.exe family_berbew C:\Windows\SysWOW64\Dnpdegjp.exe family_berbew C:\Windows\SysWOW64\Doaneiop.exe family_berbew C:\Windows\SysWOW64\Efpomccg.exe family_berbew C:\Windows\SysWOW64\Ekmhejao.exe family_berbew C:\Windows\SysWOW64\Eiahnnph.exe family_berbew C:\Windows\SysWOW64\Efeihb32.exe family_berbew C:\Windows\SysWOW64\Fbpchb32.exe family_berbew C:\Windows\SysWOW64\Fiodpl32.exe family_berbew C:\Windows\SysWOW64\Fiaael32.exe family_berbew C:\Windows\SysWOW64\Gihgfk32.exe family_berbew C:\Windows\SysWOW64\Glipgf32.exe family_berbew C:\Windows\SysWOW64\Gfodeohd.exe family_berbew C:\Windows\SysWOW64\Gbalopbn.exe family_berbew C:\Windows\SysWOW64\Hlnjbedi.exe family_berbew C:\Windows\SysWOW64\Hlbcnd32.exe family_berbew C:\Windows\SysWOW64\Iipfmggc.exe family_berbew C:\Windows\SysWOW64\Koaagkcb.exe family_berbew C:\Windows\SysWOW64\Lmaamn32.exe family_berbew C:\Windows\SysWOW64\Gihgfk32.exe family_berbew C:\Windows\SysWOW64\Fiodpl32.exe family_berbew C:\Windows\SysWOW64\Qpcecb32.exe family_berbew C:\Windows\SysWOW64\Bacjdbch.exe family_berbew C:\Windows\SysWOW64\Bgbpaipl.exe family_berbew C:\Windows\SysWOW64\Pdjgha32.exe family_berbew C:\Windows\SysWOW64\Pplobcpp.exe family_berbew C:\Windows\SysWOW64\Cnjdpaki.exe family_berbew C:\Windows\SysWOW64\Dgjoif32.exe family_berbew C:\Windows\SysWOW64\Eiekog32.exe family_berbew C:\Windows\SysWOW64\Foclgq32.exe family_berbew C:\Windows\SysWOW64\Eqlfhjig.exe family_berbew C:\Windows\SysWOW64\Fgcjfbed.exe family_berbew C:\Windows\SysWOW64\Geldkfpi.exe family_berbew C:\Windows\SysWOW64\Hbenoi32.exe family_berbew C:\Windows\SysWOW64\Hajkqfoe.exe family_berbew C:\Windows\SysWOW64\Hehdfdek.exe family_berbew C:\Windows\SysWOW64\Gacepg32.exe family_berbew C:\Windows\SysWOW64\Ggfglb32.exe family_berbew C:\Windows\SysWOW64\Iajdgcab.exe family_berbew C:\Windows\SysWOW64\Jhifomdj.exe family_berbew C:\Windows\SysWOW64\Eojiqb32.exe family_berbew C:\Windows\SysWOW64\Jbepme32.exe family_berbew C:\Windows\SysWOW64\Keifdpif.exe family_berbew C:\Windows\SysWOW64\Kcoccc32.exe family_berbew C:\Windows\SysWOW64\Lljdai32.exe family_berbew C:\Windows\SysWOW64\Ledepn32.exe family_berbew C:\Windows\SysWOW64\Mfkkqmiq.exe family_berbew C:\Windows\SysWOW64\Egaejeej.exe family_berbew C:\Windows\SysWOW64\Nfgklkoc.exe family_berbew C:\Windows\SysWOW64\Noblkqca.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Najmjokc.exeOelolmnd.exePddhbipj.exePlpjoe32.exePejkmk32.exeQlgpod32.exeAeaanjkl.exeAhdged32.exeBemqih32.exeBhpfqcln.exeBnmoijje.exeCnahdi32.exeChiigadc.exeChnbbqpn.exeDdgplado.exeDnpdegjp.exeDoaneiop.exeEfpomccg.exeEkmhejao.exeEiahnnph.exeEfeihb32.exeFbpchb32.exeFealin32.exeFiodpl32.exeFiaael32.exeGlbjggof.exeGihgfk32.exeGbalopbn.exeGlipgf32.exeGfodeohd.exeHlnjbedi.exeHlbcnd32.exeIbaeen32.exeIpgbdbqb.exeIipfmggc.exeIplkpa32.exeIidphgcn.exeIpoheakj.exeJiglnf32.exeJgkmgk32.exeJlgepanl.exeJcanll32.exeJilfifme.exeJphkkpbp.exeJnlkedai.exeKgdpni32.exeKnqepc32.exeKoaagkcb.exeKlfaapbl.exeKnenkbio.exeLljklo32.exeLfbped32.exeLcgpni32.exeLnldla32.exeLgdidgjg.exeLmaamn32.exeLnangaoa.exeMfqlfb32.exeMgphpe32.exeMcgiefen.exeMmpmnl32.exeNnojho32.exeNnafno32.exeNflkbanj.exepid process 496 Najmjokc.exe 2096 Oelolmnd.exe 3028 Pddhbipj.exe 940 Plpjoe32.exe 2020 Pejkmk32.exe 3688 Qlgpod32.exe 2672 Aeaanjkl.exe 4192 Ahdged32.exe 3312 Bemqih32.exe 2996 Bhpfqcln.exe 4788 Bnmoijje.exe 3288 Cnahdi32.exe 3988 Chiigadc.exe 5032 Chnbbqpn.exe 3064 Ddgplado.exe 3972 Dnpdegjp.exe 2248 Doaneiop.exe 2560 Efpomccg.exe 4884 Ekmhejao.exe 2520 Eiahnnph.exe 3956 Efeihb32.exe 3768 Fbpchb32.exe 3796 Fealin32.exe 4616 Fiodpl32.exe 492 Fiaael32.exe 5044 Glbjggof.exe 4412 Gihgfk32.exe 4776 Gbalopbn.exe 4404 Glipgf32.exe 4900 Gfodeohd.exe 4612 Hlnjbedi.exe 2808 Hlbcnd32.exe 3524 Ibaeen32.exe 1152 Ipgbdbqb.exe 2708 Iipfmggc.exe 2880 Iplkpa32.exe 1620 Iidphgcn.exe 688 Ipoheakj.exe 1412 Jiglnf32.exe 4508 Jgkmgk32.exe 3888 Jlgepanl.exe 3452 Jcanll32.exe 920 Jilfifme.exe 380 Jphkkpbp.exe 5008 Jnlkedai.exe 2756 Kgdpni32.exe 1744 Knqepc32.exe 1852 Koaagkcb.exe 1592 Klfaapbl.exe 1140 Knenkbio.exe 556 Lljklo32.exe 448 Lfbped32.exe 808 Lcgpni32.exe 1064 Lnldla32.exe 1700 Lgdidgjg.exe 2212 Lmaamn32.exe 3724 Lnangaoa.exe 4660 Mfqlfb32.exe 1640 Mgphpe32.exe 4880 Mcgiefen.exe 4828 Mmpmnl32.exe 1676 Nnojho32.exe 3980 Nnafno32.exe 4672 Nflkbanj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dgeenfog.exeLindkm32.exeLoacdc32.exePcbkml32.exeIplkpa32.exeKlfaapbl.exePjbcplpe.exeAhofoogd.exeEhpadhll.exeKcoccc32.exeGeldkfpi.exeHppeim32.exeIidphgcn.exeOaifpi32.exeEgened32.exeJnlkedai.exePblajhje.exeLegben32.exeOikjkc32.exeDnpdegjp.exePpjbmc32.exeJoqafgni.exeLckboblp.exeObqanjdb.exeHaodle32.exeMhckcgpj.exeEiahnnph.exeJilfifme.exeEgaejeej.exeGihgfk32.exePafkgphl.exeEgohdegl.exeNodiqp32.exeBhpfqcln.exePjpfjl32.exeNfnamjhk.exeAeaanjkl.exeFgoakc32.exeJeocna32.exePejkmk32.exeKhiofk32.exeLepleocn.exeIlfennic.exeJphkkpbp.exeEojiqb32.exeGgfglb32.exeFbdehlip.exeFgcjfbed.exeMfbaalbi.exeJlgepanl.exeNflkbanj.exeCdkifmjq.exeJpbjfjci.exeJpegkj32.exeLpjjmg32.exee7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exeNnojho32.exeAkpoaj32.exeBgbpaipl.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Dnonkq32.exe Dgeenfog.exe File created C:\Windows\SysWOW64\Lojmcdgl.exe Lindkm32.exe File opened for modification C:\Windows\SysWOW64\Mfkkqmiq.exe Loacdc32.exe File created C:\Windows\SysWOW64\Iheocj32.dll Pcbkml32.exe File opened for modification C:\Windows\SysWOW64\Iidphgcn.exe Iplkpa32.exe File opened for modification C:\Windows\SysWOW64\Knenkbio.exe Klfaapbl.exe File opened for modification C:\Windows\SysWOW64\Pdjgha32.exe Pjbcplpe.exe File created C:\Windows\SysWOW64\Qgaeof32.dll Ahofoogd.exe File opened for modification C:\Windows\SysWOW64\Eojiqb32.exe Ehpadhll.exe File opened for modification C:\Windows\SysWOW64\Kiikpnmj.exe Kcoccc32.exe File created C:\Windows\SysWOW64\Gpaihooo.exe Geldkfpi.exe File created C:\Windows\SysWOW64\Ddlnnc32.dll Hppeim32.exe File opened for modification C:\Windows\SysWOW64\Ipoheakj.exe Iidphgcn.exe File opened for modification C:\Windows\SysWOW64\Ogcnmc32.exe Oaifpi32.exe File created C:\Windows\SysWOW64\Ebkbbmqj.exe Egened32.exe File opened for modification C:\Windows\SysWOW64\Kgdpni32.exe Jnlkedai.exe File opened for modification C:\Windows\SysWOW64\Piocecgj.exe Pcbkml32.exe File created C:\Windows\SysWOW64\Pififb32.exe Pblajhje.exe File created C:\Windows\SysWOW64\Llqjbhdc.exe Legben32.exe File created C:\Windows\SysWOW64\Ppdbgncl.exe Oikjkc32.exe File created C:\Windows\SysWOW64\Doaneiop.exe Dnpdegjp.exe File created C:\Windows\SysWOW64\Ggpenegb.dll Ppjbmc32.exe File created C:\Windows\SysWOW64\Jhifomdj.exe Joqafgni.exe File created C:\Windows\SysWOW64\Loacdc32.exe Lckboblp.exe File created C:\Windows\SysWOW64\Lhnoigkk.dll Obqanjdb.exe File created C:\Windows\SysWOW64\Dlofiddl.dll Haodle32.exe File created C:\Windows\SysWOW64\Ojqhdcii.dll Mhckcgpj.exe File created C:\Windows\SysWOW64\Kdjfee32.dll Eiahnnph.exe File created C:\Windows\SysWOW64\Jphkkpbp.exe Jilfifme.exe File opened for modification C:\Windows\SysWOW64\Ebfign32.exe Egaejeej.exe File created C:\Windows\SysWOW64\Galdglpd.dll Gihgfk32.exe File opened for modification C:\Windows\SysWOW64\Paihlpfi.exe Pafkgphl.exe File opened for modification C:\Windows\SysWOW64\Enhpao32.exe Egohdegl.exe File created C:\Windows\SysWOW64\Gipbmd32.dll Nodiqp32.exe File created C:\Windows\SysWOW64\Bnmoijje.exe Bhpfqcln.exe File created C:\Windows\SysWOW64\Cjceejee.dll Pjpfjl32.exe File created C:\Windows\SysWOW64\Pdjgha32.exe Pjbcplpe.exe File created C:\Windows\SysWOW64\Nmhijd32.exe Nfnamjhk.exe File created C:\Windows\SysWOW64\Ahdged32.exe Aeaanjkl.exe File created C:\Windows\SysWOW64\Plgdqf32.dll Fgoakc32.exe File created C:\Windows\SysWOW64\Jpegkj32.exe Jeocna32.exe File created C:\Windows\SysWOW64\Ockkandf.dll Pejkmk32.exe File opened for modification C:\Windows\SysWOW64\Kcoccc32.exe Khiofk32.exe File opened for modification C:\Windows\SysWOW64\Lljdai32.exe Lepleocn.exe File created C:\Windows\SysWOW64\Cimjkpjn.dll Ilfennic.exe File created C:\Windows\SysWOW64\Jnlkedai.exe Jphkkpbp.exe File created C:\Windows\SysWOW64\Cnggkf32.dll Eojiqb32.exe File created C:\Windows\SysWOW64\Jjpdeo32.dll Ggfglb32.exe File created C:\Windows\SysWOW64\Baampdgc.dll Fbdehlip.exe File opened for modification C:\Windows\SysWOW64\Gbiockdj.exe Fgcjfbed.exe File created C:\Windows\SysWOW64\Mcfbkpab.exe Mfbaalbi.exe File created C:\Windows\SysWOW64\Jcanll32.exe Jlgepanl.exe File created C:\Windows\SysWOW64\Bgemej32.dll Nflkbanj.exe File opened for modification C:\Windows\SysWOW64\Eqlfhjig.exe Eojiqb32.exe File created C:\Windows\SysWOW64\Jhijep32.dll Cdkifmjq.exe File opened for modification C:\Windows\SysWOW64\Fkmjaa32.exe Fbdehlip.exe File created C:\Windows\SysWOW64\Mnknop32.dll Jpbjfjci.exe File created C:\Windows\SysWOW64\Jeapcq32.exe Jpegkj32.exe File created C:\Windows\SysWOW64\Legben32.exe Lpjjmg32.exe File created C:\Windows\SysWOW64\Najmjokc.exe e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Efeihb32.exe Eiahnnph.exe File opened for modification C:\Windows\SysWOW64\Nnafno32.exe Nnojho32.exe File created C:\Windows\SysWOW64\Kajimagp.dll Akpoaj32.exe File created C:\Windows\SysWOW64\Gbhhlfgd.dll Bgbpaipl.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8000 7616 WerFault.exe Pififb32.exe -
Modifies registry class 64 IoCs
Processes:
Dnpdegjp.exeHlbcnd32.exeQjiipk32.exePafkgphl.exeGlipgf32.exeJiglnf32.exeJcanll32.exeAkdilipp.exeIhpcinld.exeLoacdc32.exeMpeiie32.exeNfnamjhk.exeOfgdcipq.exeGbalopbn.exeOanokhdb.exePjmjdm32.exeEnhpao32.exeFbplml32.exePpdbgncl.exeOjhpimhp.exeAmjbbfgo.exeEgohdegl.exeGbiockdj.exeIhbponja.exeNjljch32.exeFiodpl32.exeNflkbanj.exeNfaemp32.exePcbkml32.exeJilfifme.exePjpfjl32.exeHajkqfoe.exeBnmoijje.exeEkmhejao.exeJhgiim32.exeJemfhacc.exeMfkkqmiq.exeLnldla32.exeNjjdho32.exeGeldkfpi.exeLedepn32.exeOfegni32.exeHlnjbedi.exeLfbped32.exeOgcnmc32.exeEgaejeej.exeDdnobj32.exeHaodle32.exeLindkm32.exee7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exeLmaamn32.exePjbcplpe.exeCdkifmjq.exeDnonkq32.exeIogopi32.exeAeaanjkl.exeBhpfqcln.exePdjgha32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilchfdgp.dll" Dnpdegjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlbcnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qjiipk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pafkgphl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emcnmpcj.dll" Glipgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jiglnf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcanll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phlepppi.dll" Akdilipp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihpcinld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Loacdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpeiie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfnamjhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lodabb32.dll" Ofgdcipq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gqhejb32.dll" Gbalopbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nphihiif.dll" Oanokhdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjmjdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enhpao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbplml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjmgil32.dll" Ppdbgncl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojhpimhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amjbbfgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egohdegl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbiockdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihbponja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njljch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiodpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nflkbanj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfaemp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcbkml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Konidd32.dll" Fiodpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jilfifme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjpfjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hajkqfoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnmoijje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekmhejao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jiglnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbplml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhgiim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjaqmkhl.dll" Jemfhacc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfkkqmiq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnldla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njjdho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckkpjkai.dll" Njjdho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Geldkfpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ledepn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofegni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klqcmdnk.dll" Hlnjbedi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncpgam32.dll" Lfbped32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogcnmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egaejeej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojhpimhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbgdmb32.dll" Ddnobj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Haodle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lindkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmaamn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmnbjama.dll" Pjbcplpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdkifmjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnonkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbiockdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iogopi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aeaanjkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhpfqcln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iafphi32.dll" Pdjgha32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exeNajmjokc.exeOelolmnd.exePddhbipj.exePlpjoe32.exePejkmk32.exeQlgpod32.exeAeaanjkl.exeAhdged32.exeBemqih32.exeBhpfqcln.exeBnmoijje.exeCnahdi32.exeChiigadc.exeChnbbqpn.exeDdgplado.exeDnpdegjp.exeDoaneiop.exeEfpomccg.exeEkmhejao.exeEiahnnph.exeEfeihb32.exedescription pid process target process PID 4840 wrote to memory of 496 4840 e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe Najmjokc.exe PID 4840 wrote to memory of 496 4840 e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe Najmjokc.exe PID 4840 wrote to memory of 496 4840 e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe Najmjokc.exe PID 496 wrote to memory of 2096 496 Najmjokc.exe Oelolmnd.exe PID 496 wrote to memory of 2096 496 Najmjokc.exe Oelolmnd.exe PID 496 wrote to memory of 2096 496 Najmjokc.exe Oelolmnd.exe PID 2096 wrote to memory of 3028 2096 Oelolmnd.exe Pddhbipj.exe PID 2096 wrote to memory of 3028 2096 Oelolmnd.exe Pddhbipj.exe PID 2096 wrote to memory of 3028 2096 Oelolmnd.exe Pddhbipj.exe PID 3028 wrote to memory of 940 3028 Pddhbipj.exe Plpjoe32.exe PID 3028 wrote to memory of 940 3028 Pddhbipj.exe Plpjoe32.exe PID 3028 wrote to memory of 940 3028 Pddhbipj.exe Plpjoe32.exe PID 940 wrote to memory of 2020 940 Plpjoe32.exe Pejkmk32.exe PID 940 wrote to memory of 2020 940 Plpjoe32.exe Pejkmk32.exe PID 940 wrote to memory of 2020 940 Plpjoe32.exe Pejkmk32.exe PID 2020 wrote to memory of 3688 2020 Pejkmk32.exe Qlgpod32.exe PID 2020 wrote to memory of 3688 2020 Pejkmk32.exe Qlgpod32.exe PID 2020 wrote to memory of 3688 2020 Pejkmk32.exe Qlgpod32.exe PID 3688 wrote to memory of 2672 3688 Qlgpod32.exe Aeaanjkl.exe PID 3688 wrote to memory of 2672 3688 Qlgpod32.exe Aeaanjkl.exe PID 3688 wrote to memory of 2672 3688 Qlgpod32.exe Aeaanjkl.exe PID 2672 wrote to memory of 4192 2672 Aeaanjkl.exe Ahdged32.exe PID 2672 wrote to memory of 4192 2672 Aeaanjkl.exe Ahdged32.exe PID 2672 wrote to memory of 4192 2672 Aeaanjkl.exe Ahdged32.exe PID 4192 wrote to memory of 3312 4192 Ahdged32.exe Bemqih32.exe PID 4192 wrote to memory of 3312 4192 Ahdged32.exe Bemqih32.exe PID 4192 wrote to memory of 3312 4192 Ahdged32.exe Bemqih32.exe PID 3312 wrote to memory of 2996 3312 Bemqih32.exe Bhpfqcln.exe PID 3312 wrote to memory of 2996 3312 Bemqih32.exe Bhpfqcln.exe PID 3312 wrote to memory of 2996 3312 Bemqih32.exe Bhpfqcln.exe PID 2996 wrote to memory of 4788 2996 Bhpfqcln.exe Bnmoijje.exe PID 2996 wrote to memory of 4788 2996 Bhpfqcln.exe Bnmoijje.exe PID 2996 wrote to memory of 4788 2996 Bhpfqcln.exe Bnmoijje.exe PID 4788 wrote to memory of 3288 4788 Bnmoijje.exe Cnahdi32.exe PID 4788 wrote to memory of 3288 4788 Bnmoijje.exe Cnahdi32.exe PID 4788 wrote to memory of 3288 4788 Bnmoijje.exe Cnahdi32.exe PID 3288 wrote to memory of 3988 3288 Cnahdi32.exe Chiigadc.exe PID 3288 wrote to memory of 3988 3288 Cnahdi32.exe Chiigadc.exe PID 3288 wrote to memory of 3988 3288 Cnahdi32.exe Chiigadc.exe PID 3988 wrote to memory of 5032 3988 Chiigadc.exe Chnbbqpn.exe PID 3988 wrote to memory of 5032 3988 Chiigadc.exe Chnbbqpn.exe PID 3988 wrote to memory of 5032 3988 Chiigadc.exe Chnbbqpn.exe PID 5032 wrote to memory of 3064 5032 Chnbbqpn.exe Ddgplado.exe PID 5032 wrote to memory of 3064 5032 Chnbbqpn.exe Ddgplado.exe PID 5032 wrote to memory of 3064 5032 Chnbbqpn.exe Ddgplado.exe PID 3064 wrote to memory of 3972 3064 Ddgplado.exe Dnpdegjp.exe PID 3064 wrote to memory of 3972 3064 Ddgplado.exe Dnpdegjp.exe PID 3064 wrote to memory of 3972 3064 Ddgplado.exe Dnpdegjp.exe PID 3972 wrote to memory of 2248 3972 Dnpdegjp.exe Doaneiop.exe PID 3972 wrote to memory of 2248 3972 Dnpdegjp.exe Doaneiop.exe PID 3972 wrote to memory of 2248 3972 Dnpdegjp.exe Doaneiop.exe PID 2248 wrote to memory of 2560 2248 Doaneiop.exe Efpomccg.exe PID 2248 wrote to memory of 2560 2248 Doaneiop.exe Efpomccg.exe PID 2248 wrote to memory of 2560 2248 Doaneiop.exe Efpomccg.exe PID 2560 wrote to memory of 4884 2560 Efpomccg.exe Ekmhejao.exe PID 2560 wrote to memory of 4884 2560 Efpomccg.exe Ekmhejao.exe PID 2560 wrote to memory of 4884 2560 Efpomccg.exe Ekmhejao.exe PID 4884 wrote to memory of 2520 4884 Ekmhejao.exe Eiahnnph.exe PID 4884 wrote to memory of 2520 4884 Ekmhejao.exe Eiahnnph.exe PID 4884 wrote to memory of 2520 4884 Ekmhejao.exe Eiahnnph.exe PID 2520 wrote to memory of 3956 2520 Eiahnnph.exe Efeihb32.exe PID 2520 wrote to memory of 3956 2520 Eiahnnph.exe Efeihb32.exe PID 2520 wrote to memory of 3956 2520 Eiahnnph.exe Efeihb32.exe PID 3956 wrote to memory of 3768 3956 Efeihb32.exe Fbpchb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e7a626ddcfbfe02bb1678057ffe6f6a0_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\Najmjokc.exeC:\Windows\system32\Najmjokc.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\Oelolmnd.exeC:\Windows\system32\Oelolmnd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Pddhbipj.exeC:\Windows\system32\Pddhbipj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Plpjoe32.exeC:\Windows\system32\Plpjoe32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\Pejkmk32.exeC:\Windows\system32\Pejkmk32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Qlgpod32.exeC:\Windows\system32\Qlgpod32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\Aeaanjkl.exeC:\Windows\system32\Aeaanjkl.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Ahdged32.exeC:\Windows\system32\Ahdged32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Bemqih32.exeC:\Windows\system32\Bemqih32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\Bhpfqcln.exeC:\Windows\system32\Bhpfqcln.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Bnmoijje.exeC:\Windows\system32\Bnmoijje.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Cnahdi32.exeC:\Windows\system32\Cnahdi32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\Chiigadc.exeC:\Windows\system32\Chiigadc.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\Chnbbqpn.exeC:\Windows\system32\Chnbbqpn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\Ddgplado.exeC:\Windows\system32\Ddgplado.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Dnpdegjp.exeC:\Windows\system32\Dnpdegjp.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\Doaneiop.exeC:\Windows\system32\Doaneiop.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\Efpomccg.exeC:\Windows\system32\Efpomccg.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Ekmhejao.exeC:\Windows\system32\Ekmhejao.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\Eiahnnph.exeC:\Windows\system32\Eiahnnph.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Efeihb32.exeC:\Windows\system32\Efeihb32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\Fbpchb32.exeC:\Windows\system32\Fbpchb32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3768 -
C:\Windows\SysWOW64\Fealin32.exeC:\Windows\system32\Fealin32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3796 -
C:\Windows\SysWOW64\Fiodpl32.exeC:\Windows\system32\Fiodpl32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4616 -
C:\Windows\SysWOW64\Fiaael32.exeC:\Windows\system32\Fiaael32.exe26⤵
- Executes dropped EXE
PID:492 -
C:\Windows\SysWOW64\Glbjggof.exeC:\Windows\system32\Glbjggof.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5044 -
C:\Windows\SysWOW64\Gihgfk32.exeC:\Windows\system32\Gihgfk32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4412 -
C:\Windows\SysWOW64\Gbalopbn.exeC:\Windows\system32\Gbalopbn.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4776 -
C:\Windows\SysWOW64\Glipgf32.exeC:\Windows\system32\Glipgf32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4404 -
C:\Windows\SysWOW64\Gfodeohd.exeC:\Windows\system32\Gfodeohd.exe31⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\Hlnjbedi.exeC:\Windows\system32\Hlnjbedi.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\Hlbcnd32.exeC:\Windows\system32\Hlbcnd32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Ibaeen32.exeC:\Windows\system32\Ibaeen32.exe34⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Ipgbdbqb.exeC:\Windows\system32\Ipgbdbqb.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Iipfmggc.exeC:\Windows\system32\Iipfmggc.exe36⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\Iplkpa32.exeC:\Windows\system32\Iplkpa32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\Iidphgcn.exeC:\Windows\system32\Iidphgcn.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Ipoheakj.exeC:\Windows\system32\Ipoheakj.exe39⤵
- Executes dropped EXE
PID:688 -
C:\Windows\SysWOW64\Jiglnf32.exeC:\Windows\system32\Jiglnf32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:1412 -
C:\Windows\SysWOW64\Jgkmgk32.exeC:\Windows\system32\Jgkmgk32.exe41⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\Jlgepanl.exeC:\Windows\system32\Jlgepanl.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3888 -
C:\Windows\SysWOW64\Jcanll32.exeC:\Windows\system32\Jcanll32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:3452 -
C:\Windows\SysWOW64\Jilfifme.exeC:\Windows\system32\Jilfifme.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:920 -
C:\Windows\SysWOW64\Jphkkpbp.exeC:\Windows\system32\Jphkkpbp.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:380 -
C:\Windows\SysWOW64\Jnlkedai.exeC:\Windows\system32\Jnlkedai.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5008 -
C:\Windows\SysWOW64\Kgdpni32.exeC:\Windows\system32\Kgdpni32.exe47⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Klahfp32.exeC:\Windows\system32\Klahfp32.exe48⤵PID:4860
-
C:\Windows\SysWOW64\Knqepc32.exeC:\Windows\system32\Knqepc32.exe49⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Koaagkcb.exeC:\Windows\system32\Koaagkcb.exe50⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\Klfaapbl.exeC:\Windows\system32\Klfaapbl.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Knenkbio.exeC:\Windows\system32\Knenkbio.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\Lljklo32.exeC:\Windows\system32\Lljklo32.exe53⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\Lfbped32.exeC:\Windows\system32\Lfbped32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:448 -
C:\Windows\SysWOW64\Lcgpni32.exeC:\Windows\system32\Lcgpni32.exe55⤵
- Executes dropped EXE
PID:808 -
C:\Windows\SysWOW64\Lnldla32.exeC:\Windows\system32\Lnldla32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1064 -
C:\Windows\SysWOW64\Lgdidgjg.exeC:\Windows\system32\Lgdidgjg.exe57⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\Lmaamn32.exeC:\Windows\system32\Lmaamn32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2212 -
C:\Windows\SysWOW64\Lnangaoa.exeC:\Windows\system32\Lnangaoa.exe59⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\SysWOW64\Mfqlfb32.exeC:\Windows\system32\Mfqlfb32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4660 -
C:\Windows\SysWOW64\Mgphpe32.exeC:\Windows\system32\Mgphpe32.exe61⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Mcgiefen.exeC:\Windows\system32\Mcgiefen.exe62⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\Mmpmnl32.exeC:\Windows\system32\Mmpmnl32.exe63⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\Nnojho32.exeC:\Windows\system32\Nnojho32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1676 -
C:\Windows\SysWOW64\Nnafno32.exeC:\Windows\system32\Nnafno32.exe65⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\Nflkbanj.exeC:\Windows\system32\Nflkbanj.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4672 -
C:\Windows\SysWOW64\Njjdho32.exeC:\Windows\system32\Njjdho32.exe67⤵
- Modifies registry class
PID:916 -
C:\Windows\SysWOW64\Nfaemp32.exeC:\Windows\system32\Nfaemp32.exe68⤵
- Modifies registry class
PID:4848 -
C:\Windows\SysWOW64\Nceefd32.exeC:\Windows\system32\Nceefd32.exe69⤵PID:2320
-
C:\Windows\SysWOW64\Oaifpi32.exeC:\Windows\system32\Oaifpi32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5092 -
C:\Windows\SysWOW64\Ogcnmc32.exeC:\Windows\system32\Ogcnmc32.exe71⤵
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\Oakbehfe.exeC:\Windows\system32\Oakbehfe.exe72⤵PID:1636
-
C:\Windows\SysWOW64\Ofhknodl.exeC:\Windows\system32\Ofhknodl.exe73⤵PID:3156
-
C:\Windows\SysWOW64\Oanokhdb.exeC:\Windows\system32\Oanokhdb.exe74⤵
- Modifies registry class
PID:3656 -
C:\Windows\SysWOW64\Ojfcdnjc.exeC:\Windows\system32\Ojfcdnjc.exe75⤵PID:4104
-
C:\Windows\SysWOW64\Ojhpimhp.exeC:\Windows\system32\Ojhpimhp.exe76⤵
- Modifies registry class
PID:3304 -
C:\Windows\SysWOW64\Ohlqcagj.exeC:\Windows\system32\Ohlqcagj.exe77⤵PID:1268
-
C:\Windows\SysWOW64\Paeelgnj.exeC:\Windows\system32\Paeelgnj.exe78⤵PID:1596
-
C:\Windows\SysWOW64\Pjmjdm32.exeC:\Windows\system32\Pjmjdm32.exe79⤵
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\Ppjbmc32.exeC:\Windows\system32\Ppjbmc32.exe80⤵
- Drops file in System32 directory
PID:4068 -
C:\Windows\SysWOW64\Pjpfjl32.exeC:\Windows\system32\Pjpfjl32.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:3264 -
C:\Windows\SysWOW64\Pplobcpp.exeC:\Windows\system32\Pplobcpp.exe82⤵PID:1236
-
C:\Windows\SysWOW64\Pjbcplpe.exeC:\Windows\system32\Pjbcplpe.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:5164 -
C:\Windows\SysWOW64\Pdjgha32.exeC:\Windows\system32\Pdjgha32.exe84⤵
- Modifies registry class
PID:5208 -
C:\Windows\SysWOW64\Pmblagmf.exeC:\Windows\system32\Pmblagmf.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5252 -
C:\Windows\SysWOW64\Qjfmkk32.exeC:\Windows\system32\Qjfmkk32.exe86⤵PID:5300
-
C:\Windows\SysWOW64\Qpcecb32.exeC:\Windows\system32\Qpcecb32.exe87⤵PID:5344
-
C:\Windows\SysWOW64\Qjiipk32.exeC:\Windows\system32\Qjiipk32.exe88⤵
- Modifies registry class
PID:5388 -
C:\Windows\SysWOW64\Ahmjjoig.exeC:\Windows\system32\Ahmjjoig.exe89⤵PID:5432
-
C:\Windows\SysWOW64\Amjbbfgo.exeC:\Windows\system32\Amjbbfgo.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5476 -
C:\Windows\SysWOW64\Ahofoogd.exeC:\Windows\system32\Ahofoogd.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5520 -
C:\Windows\SysWOW64\Amlogfel.exeC:\Windows\system32\Amlogfel.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5564 -
C:\Windows\SysWOW64\Adfgdpmi.exeC:\Windows\system32\Adfgdpmi.exe93⤵PID:5608
-
C:\Windows\SysWOW64\Akpoaj32.exeC:\Windows\system32\Akpoaj32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5652 -
C:\Windows\SysWOW64\Adhdjpjf.exeC:\Windows\system32\Adhdjpjf.exe95⤵PID:5696
-
C:\Windows\SysWOW64\Akblfj32.exeC:\Windows\system32\Akblfj32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5740 -
C:\Windows\SysWOW64\Aaldccip.exeC:\Windows\system32\Aaldccip.exe97⤵PID:5784
-
C:\Windows\SysWOW64\Akdilipp.exeC:\Windows\system32\Akdilipp.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5828 -
C:\Windows\SysWOW64\Aaoaic32.exeC:\Windows\system32\Aaoaic32.exe99⤵PID:5876
-
C:\Windows\SysWOW64\Baannc32.exeC:\Windows\system32\Baannc32.exe100⤵PID:5920
-
C:\Windows\SysWOW64\Bacjdbch.exeC:\Windows\system32\Bacjdbch.exe101⤵PID:5964
-
C:\Windows\SysWOW64\Bmjkic32.exeC:\Windows\system32\Bmjkic32.exe102⤵PID:6008
-
C:\Windows\SysWOW64\Bgbpaipl.exeC:\Windows\system32\Bgbpaipl.exe103⤵
- Drops file in System32 directory
PID:6052 -
C:\Windows\SysWOW64\Bdfpkm32.exeC:\Windows\system32\Bdfpkm32.exe104⤵PID:6096
-
C:\Windows\SysWOW64\Chdialdl.exeC:\Windows\system32\Chdialdl.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6140 -
C:\Windows\SysWOW64\Cdkifmjq.exeC:\Windows\system32\Cdkifmjq.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5200 -
C:\Windows\SysWOW64\Cgqlcg32.exeC:\Windows\system32\Cgqlcg32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5296 -
C:\Windows\SysWOW64\Cnjdpaki.exeC:\Windows\system32\Cnjdpaki.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5376 -
C:\Windows\SysWOW64\Dkndie32.exeC:\Windows\system32\Dkndie32.exe109⤵PID:5416
-
C:\Windows\SysWOW64\Dahmfpap.exeC:\Windows\system32\Dahmfpap.exe110⤵PID:5024
-
C:\Windows\SysWOW64\Dgeenfog.exeC:\Windows\system32\Dgeenfog.exe111⤵
- Drops file in System32 directory
PID:5548 -
C:\Windows\SysWOW64\Dnonkq32.exeC:\Windows\system32\Dnonkq32.exe112⤵
- Modifies registry class
PID:5604 -
C:\Windows\SysWOW64\Ddifgk32.exeC:\Windows\system32\Ddifgk32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5660 -
C:\Windows\SysWOW64\Doojec32.exeC:\Windows\system32\Doojec32.exe114⤵PID:5724
-
C:\Windows\SysWOW64\Dqpfmlce.exeC:\Windows\system32\Dqpfmlce.exe115⤵PID:5792
-
C:\Windows\SysWOW64\Dgjoif32.exeC:\Windows\system32\Dgjoif32.exe116⤵PID:5860
-
C:\Windows\SysWOW64\Dndgfpbo.exeC:\Windows\system32\Dndgfpbo.exe117⤵PID:5932
-
C:\Windows\SysWOW64\Ddnobj32.exeC:\Windows\system32\Ddnobj32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5988 -
C:\Windows\SysWOW64\Dkhgod32.exeC:\Windows\system32\Dkhgod32.exe119⤵PID:6080
-
C:\Windows\SysWOW64\Ebaplnie.exeC:\Windows\system32\Ebaplnie.exe120⤵PID:5148
-
C:\Windows\SysWOW64\Egohdegl.exeC:\Windows\system32\Egohdegl.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5240 -
C:\Windows\SysWOW64\Enhpao32.exeC:\Windows\system32\Enhpao32.exe122⤵
- Modifies registry class
PID:5384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-