Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 00:11
Behavioral task
behavioral1
Sample
3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe
-
Size
844KB
-
MD5
3c6a00d44894021606b50c412fa93640
-
SHA1
e4f58b25166d15770730132b49e5e11a1c811139
-
SHA256
305dcb5283d200f38eec2f5046c7457a4339e1d87de48e4c125c9b3f184e2762
-
SHA512
bb10052b6f8716d7ae54d732864f8ec03738bce166c1275ebabbfe4fd7c6a51e25b8abe203ff0f7346408d58e4d77700a417d49c259598e3aece1417b4f8e2a4
-
SSDEEP
24576:2bIkH5W3TnbQihMpQnqrdX72LbY6x46uR/qYglMi:qH5W3TbQihw+cdX2x46uhqllMi
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ofelmloo.exeNgibaj32.exeOhfeog32.exePggbla32.exeCppkph32.exeDoehqead.exeDjmicm32.exeKgcpjmcb.exeAjpjakhc.exeAhikqd32.exeCnaocmmi.exeDhnmij32.exeAcmhepko.exeNglfapnl.exeCohigamf.exeIhgainbg.exeKaldcb32.exeBbdallnd.exeBmclhi32.exeEpfhbign.exeHkcdafqb.exeOkanklik.exeLdfgebbe.exeFnfamcoj.exeKeednado.exeNncahjgl.exeOonafa32.exeNaimccpo.exeNajdnj32.exeFagjnn32.exeBilmcf32.exeBalkchpi.exeAjejgp32.exeCghggc32.exeGpcmpijk.exeMgalqkbk.exeApalea32.exeLeonofpp.exeKmefooki.exeCpkbdiqb.exeLfpclh32.exeKmaled32.exeLbqabkql.exeDfdjhndl.exeOfjfhk32.exeDfoqmo32.exeGbomfe32.exeLclnemgd.exeCmjbhh32.exeHpocfncj.exeHjjddchg.exeNigome32.exeCpceidcn.exeMmihhelk.exeIdklfpon.exeOdobjg32.exeEnhacojl.exeHpgfki32.exeMelfncqb.exePmccjbaf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofelmloo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngibaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohfeog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pggbla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cppkph32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doehqead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djmicm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgcpjmcb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajpjakhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahikqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cnaocmmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhnmij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Acmhepko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nglfapnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cohigamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihgainbg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaldcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmclhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Epfhbign.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hkcdafqb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okanklik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldfgebbe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnfamcoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Keednado.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nncahjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oonafa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naimccpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Najdnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fagjnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bilmcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Balkchpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajejgp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cghggc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gpcmpijk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgalqkbk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apalea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leonofpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmefooki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohfeog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cpkbdiqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lfpclh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmaled32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbqabkql.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfdjhndl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofjfhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfoqmo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbomfe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lclnemgd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmjbhh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpocfncj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjjddchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nigome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cpceidcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmjbhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmihhelk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idklfpon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmaled32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Leonofpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Odobjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enhacojl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpgfki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Melfncqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pmccjbaf.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Epaogi32.exe family_berbew C:\Windows\SysWOW64\Ekklaj32.exe family_berbew C:\Windows\SysWOW64\Epfhbign.exe family_berbew \Windows\SysWOW64\Fnbkddem.exe family_berbew C:\Windows\SysWOW64\Fdapak32.exe family_berbew \Windows\SysWOW64\Gicbeald.exe family_berbew C:\Windows\SysWOW64\Gopkmhjk.exe family_berbew \Windows\SysWOW64\Gmjaic32.exe family_berbew \Windows\SysWOW64\Hcifgjgc.exe family_berbew \Windows\SysWOW64\Hpocfncj.exe family_berbew C:\Windows\SysWOW64\Henidd32.exe family_berbew \Windows\SysWOW64\Hjjddchg.exe family_berbew \Windows\SysWOW64\Inqcif32.exe family_berbew C:\Windows\SysWOW64\Idklfpon.exe family_berbew C:\Windows\SysWOW64\Jnemdecl.exe family_berbew C:\Windows\SysWOW64\Jonplmcb.exe family_berbew C:\Windows\SysWOW64\Jbllihbf.exe family_berbew C:\Windows\SysWOW64\Kngfih32.exe family_berbew C:\Windows\SysWOW64\Keanebkb.exe family_berbew C:\Windows\SysWOW64\Knjbnh32.exe family_berbew C:\Windows\SysWOW64\Kgbggnhc.exe family_berbew behavioral1/memory/1460-266-0x0000000000250000-0x0000000000293000-memory.dmp family_berbew behavioral1/memory/1460-265-0x0000000000250000-0x0000000000293000-memory.dmp family_berbew C:\Windows\SysWOW64\Kfgdhjmk.exe family_berbew C:\Windows\SysWOW64\Kmaled32.exe family_berbew behavioral1/memory/1296-288-0x00000000003B0000-0x00000000003F3000-memory.dmp family_berbew behavioral1/memory/1296-287-0x00000000003B0000-0x00000000003F3000-memory.dmp family_berbew C:\Windows\SysWOW64\Lbqabkql.exe family_berbew C:\Windows\SysWOW64\Leonofpp.exe family_berbew C:\Windows\SysWOW64\Lhpfqama.exe family_berbew C:\Windows\SysWOW64\Lpdbloof.exe family_berbew behavioral1/memory/1916-343-0x0000000000250000-0x0000000000293000-memory.dmp family_berbew behavioral1/memory/1940-342-0x0000000000250000-0x0000000000293000-memory.dmp family_berbew C:\Windows\SysWOW64\Ldfgebbe.exe family_berbew C:\Windows\SysWOW64\Lojomkdn.exe family_berbew C:\Windows\SysWOW64\Mkclhl32.exe family_berbew behavioral1/memory/2608-379-0x0000000000250000-0x0000000000293000-memory.dmp family_berbew behavioral1/memory/2608-378-0x0000000000250000-0x0000000000293000-memory.dmp family_berbew C:\Windows\SysWOW64\Mppepcfg.exe family_berbew C:\Windows\SysWOW64\Mhgmapfi.exe family_berbew C:\Windows\SysWOW64\Mkgfckcj.exe family_berbew behavioral1/memory/2524-402-0x0000000000260000-0x00000000002A3000-memory.dmp family_berbew C:\Windows\SysWOW64\Mgnfhlin.exe family_berbew behavioral1/memory/2520-416-0x0000000000450000-0x0000000000493000-memory.dmp family_berbew C:\Windows\SysWOW64\Mimbdhhb.exe family_berbew C:\Windows\SysWOW64\Mpigfa32.exe family_berbew C:\Windows\SysWOW64\Najdnj32.exe family_berbew C:\Windows\SysWOW64\Nkbhgojk.exe family_berbew C:\Windows\SysWOW64\Ndkmpe32.exe family_berbew C:\Windows\SysWOW64\Nkeelohh.exe family_berbew C:\Windows\SysWOW64\Nialog32.exe family_berbew C:\Windows\SysWOW64\Nncahjgl.exe family_berbew C:\Windows\SysWOW64\Nglfapnl.exe family_berbew behavioral1/memory/2764-444-0x0000000000300000-0x0000000000343000-memory.dmp family_berbew behavioral1/memory/2764-443-0x0000000000300000-0x0000000000343000-memory.dmp family_berbew C:\Windows\SysWOW64\Naajoinb.exe family_berbew C:\Windows\SysWOW64\Ndbcpd32.exe family_berbew C:\Windows\SysWOW64\Oklkmnbp.exe family_berbew C:\Windows\SysWOW64\Onjgiiad.exe family_berbew C:\Windows\SysWOW64\Ofelmloo.exe family_berbew C:\Windows\SysWOW64\Olpdjf32.exe family_berbew C:\Windows\SysWOW64\Oonafa32.exe family_berbew C:\Windows\SysWOW64\Ohfeog32.exe family_berbew C:\Windows\SysWOW64\Ofjfhk32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Epaogi32.exeEkklaj32.exeEpfhbign.exeFnbkddem.exeFdapak32.exeGicbeald.exeGopkmhjk.exeGmjaic32.exeHcifgjgc.exeHpocfncj.exeHenidd32.exeHjjddchg.exeInqcif32.exeIdklfpon.exeJnemdecl.exeJonplmcb.exeJbllihbf.exeKngfih32.exeKeanebkb.exeKnjbnh32.exeKgbggnhc.exeKfgdhjmk.exeKmaled32.exeLbqabkql.exeLeonofpp.exeLpdbloof.exeLhpfqama.exeLojomkdn.exeLdfgebbe.exeMkclhl32.exeMppepcfg.exeMhgmapfi.exeMkgfckcj.exeMgnfhlin.exeMimbdhhb.exeMpigfa32.exeNajdnj32.exeNialog32.exeNkbhgojk.exeNdkmpe32.exeNkeelohh.exeNncahjgl.exeNglfapnl.exeNaajoinb.exeNdbcpd32.exeOklkmnbp.exeOnjgiiad.exeOfelmloo.exeOlpdjf32.exeOonafa32.exeOhfeog32.exeOfjfhk32.exeOhibdf32.exeOdobjg32.exeOmfkke32.exeOoeggp32.exePgplkb32.exePnjdhmdo.exePnlqnl32.exePefijfii.exePkpagq32.exePeiepfgg.exePggbla32.exePmdjdh32.exepid process 2284 Epaogi32.exe 2672 Ekklaj32.exe 2756 Epfhbign.exe 2936 Fnbkddem.exe 2472 Fdapak32.exe 1236 Gicbeald.exe 2700 Gopkmhjk.exe 2796 Gmjaic32.exe 1012 Hcifgjgc.exe 2372 Hpocfncj.exe 2352 Henidd32.exe 744 Hjjddchg.exe 1176 Inqcif32.exe 1828 Idklfpon.exe 2252 Jnemdecl.exe 2092 Jonplmcb.exe 1772 Jbllihbf.exe 2324 Kngfih32.exe 1460 Keanebkb.exe 792 Knjbnh32.exe 1296 Kgbggnhc.exe 800 Kfgdhjmk.exe 3024 Kmaled32.exe 1488 Lbqabkql.exe 3012 Leonofpp.exe 1940 Lpdbloof.exe 1916 Lhpfqama.exe 1896 Lojomkdn.exe 2608 Ldfgebbe.exe 2728 Mkclhl32.exe 2740 Mppepcfg.exe 2524 Mhgmapfi.exe 2520 Mkgfckcj.exe 2532 Mgnfhlin.exe 2764 Mimbdhhb.exe 748 Mpigfa32.exe 2196 Najdnj32.exe 1408 Nialog32.exe 784 Nkbhgojk.exe 652 Ndkmpe32.exe 2548 Nkeelohh.exe 2260 Nncahjgl.exe 2784 Nglfapnl.exe 772 Naajoinb.exe 1564 Ndbcpd32.exe 2392 Oklkmnbp.exe 3028 Onjgiiad.exe 112 Ofelmloo.exe 1860 Olpdjf32.exe 2080 Oonafa32.exe 3044 Ohfeog32.exe 2068 Ofjfhk32.exe 1648 Ohibdf32.exe 2568 Odobjg32.exe 3068 Omfkke32.exe 2704 Ooeggp32.exe 1600 Pgplkb32.exe 2656 Pnjdhmdo.exe 1020 Pnlqnl32.exe 1272 Pefijfii.exe 1556 Pkpagq32.exe 1644 Peiepfgg.exe 2164 Pggbla32.exe 676 Pmdjdh32.exe -
Loads dropped DLL 64 IoCs
Processes:
3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exeEpaogi32.exeEkklaj32.exeEpfhbign.exeFnbkddem.exeFdapak32.exeGicbeald.exeGopkmhjk.exeGmjaic32.exeHcifgjgc.exeHpocfncj.exeHenidd32.exeHjjddchg.exeInqcif32.exeIdklfpon.exeJnemdecl.exeJonplmcb.exeJbllihbf.exeKngfih32.exeKeanebkb.exeKnjbnh32.exeKgbggnhc.exeKfgdhjmk.exeKmaled32.exeLbqabkql.exeLeonofpp.exeLpdbloof.exeLhpfqama.exeLojomkdn.exeLdfgebbe.exeMkclhl32.exeMppepcfg.exepid process 1608 3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe 1608 3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe 2284 Epaogi32.exe 2284 Epaogi32.exe 2672 Ekklaj32.exe 2672 Ekklaj32.exe 2756 Epfhbign.exe 2756 Epfhbign.exe 2936 Fnbkddem.exe 2936 Fnbkddem.exe 2472 Fdapak32.exe 2472 Fdapak32.exe 1236 Gicbeald.exe 1236 Gicbeald.exe 2700 Gopkmhjk.exe 2700 Gopkmhjk.exe 2796 Gmjaic32.exe 2796 Gmjaic32.exe 1012 Hcifgjgc.exe 1012 Hcifgjgc.exe 2372 Hpocfncj.exe 2372 Hpocfncj.exe 2352 Henidd32.exe 2352 Henidd32.exe 744 Hjjddchg.exe 744 Hjjddchg.exe 1176 Inqcif32.exe 1176 Inqcif32.exe 1828 Idklfpon.exe 1828 Idklfpon.exe 2252 Jnemdecl.exe 2252 Jnemdecl.exe 2092 Jonplmcb.exe 2092 Jonplmcb.exe 1772 Jbllihbf.exe 1772 Jbllihbf.exe 2324 Kngfih32.exe 2324 Kngfih32.exe 1460 Keanebkb.exe 1460 Keanebkb.exe 792 Knjbnh32.exe 792 Knjbnh32.exe 1296 Kgbggnhc.exe 1296 Kgbggnhc.exe 800 Kfgdhjmk.exe 800 Kfgdhjmk.exe 3024 Kmaled32.exe 3024 Kmaled32.exe 1488 Lbqabkql.exe 1488 Lbqabkql.exe 3012 Leonofpp.exe 3012 Leonofpp.exe 1940 Lpdbloof.exe 1940 Lpdbloof.exe 1916 Lhpfqama.exe 1916 Lhpfqama.exe 1896 Lojomkdn.exe 1896 Lojomkdn.exe 2608 Ldfgebbe.exe 2608 Ldfgebbe.exe 2728 Mkclhl32.exe 2728 Mkclhl32.exe 2740 Mppepcfg.exe 2740 Mppepcfg.exe -
Drops file in System32 directory 64 IoCs
Processes:
Okanklik.exeCmjbhh32.exeCbgjqo32.exeJbllihbf.exeMieeibkn.exeNcpcfkbg.exeFmpkjkma.exeOhibdf32.exeBpiipf32.exePggbla32.exeKeednado.exeMmihhelk.exePmagdbci.exeHpocfncj.exeGdgcpi32.exeNmpnhdfc.exeKebgia32.exeKfgdhjmk.exeIimjmbae.exeAhdaee32.exeEdnpej32.exeFlehkhai.exeNaimccpo.exeKeanebkb.exeLhpfqama.exeLdfgebbe.exeAgfgqo32.exeCpkbdiqb.exeGanpomec.exeMoanaiie.exeDdigjkid.exeGjfdhbld.exeGbaileio.exeIhjnom32.exeOfelmloo.exePefijfii.exeBbjbaa32.exeMgnfhlin.exeBmpfojmp.exeGpcmpijk.exeNofdklgl.exeApalea32.exeQmfgjh32.exeGpncej32.exeIcfofg32.exeHapicp32.exeJfiale32.exeOnjgiiad.exeLjmlbfhi.exeFljafg32.exeHbhomd32.exeInkccpgk.exeLfpclh32.exeOaiibg32.exeLcojjmea.exeBjdplm32.exeBifgdk32.exeQqeicede.exeIdklfpon.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Onpjghhn.exe Okanklik.exe File created C:\Windows\SysWOW64\Llaemaih.dll Cmjbhh32.exe File opened for modification C:\Windows\SysWOW64\Ceegmj32.exe Cbgjqo32.exe File opened for modification C:\Windows\SysWOW64\Kngfih32.exe Jbllihbf.exe File opened for modification C:\Windows\SysWOW64\Moanaiie.exe Mieeibkn.exe File opened for modification C:\Windows\SysWOW64\Niikceid.exe Ncpcfkbg.exe File created C:\Windows\SysWOW64\Fcjcfe32.exe Fmpkjkma.exe File opened for modification C:\Windows\SysWOW64\Odobjg32.exe Ohibdf32.exe File created C:\Windows\SysWOW64\Biamilfj.exe Bpiipf32.exe File created C:\Windows\SysWOW64\Pmdjdh32.exe Pggbla32.exe File created C:\Windows\SysWOW64\Hloopaak.dll Keednado.exe File created C:\Windows\SysWOW64\Mgalqkbk.exe Mmihhelk.exe File created C:\Windows\SysWOW64\Ldeamlkj.dll Pmagdbci.exe File created C:\Windows\SysWOW64\Henidd32.exe Hpocfncj.exe File created C:\Windows\SysWOW64\Gjakmc32.exe Gdgcpi32.exe File opened for modification C:\Windows\SysWOW64\Npojdpef.exe Nmpnhdfc.exe File created C:\Windows\SysWOW64\Hqalfl32.dll Kebgia32.exe File opened for modification C:\Windows\SysWOW64\Kmaled32.exe Kfgdhjmk.exe File opened for modification C:\Windows\SysWOW64\Icfofg32.exe Iimjmbae.exe File opened for modification C:\Windows\SysWOW64\Abjebn32.exe Ahdaee32.exe File created C:\Windows\SysWOW64\Kcbabf32.dll Ednpej32.exe File opened for modification C:\Windows\SysWOW64\Fncdgcqm.exe Flehkhai.exe File created C:\Windows\SysWOW64\Nplmop32.exe Naimccpo.exe File created C:\Windows\SysWOW64\Akodpalp.dll Keanebkb.exe File created C:\Windows\SysWOW64\Aefbii32.dll Lhpfqama.exe File created C:\Windows\SysWOW64\Mkclhl32.exe Ldfgebbe.exe File created C:\Windows\SysWOW64\Apalea32.exe Agfgqo32.exe File opened for modification C:\Windows\SysWOW64\Cgejac32.exe Cpkbdiqb.exe File created C:\Windows\SysWOW64\Iqapllgh.dll Ganpomec.exe File created C:\Windows\SysWOW64\Melfncqb.exe Moanaiie.exe File created C:\Windows\SysWOW64\Ljpome32.dll Kfgdhjmk.exe File created C:\Windows\SysWOW64\Dggcffhg.exe Ddigjkid.exe File created C:\Windows\SysWOW64\Ngemkm32.dll Gjfdhbld.exe File opened for modification C:\Windows\SysWOW64\Gpejeihi.exe Gbaileio.exe File created C:\Windows\SysWOW64\Pledghce.dll Ihjnom32.exe File opened for modification C:\Windows\SysWOW64\Olpdjf32.exe Ofelmloo.exe File created C:\Windows\SysWOW64\Gljilnja.dll Pefijfii.exe File created C:\Windows\SysWOW64\Bmpfojmp.exe Bbjbaa32.exe File opened for modification C:\Windows\SysWOW64\Mimbdhhb.exe Mgnfhlin.exe File created C:\Windows\SysWOW64\Fgpimg32.dll Bmpfojmp.exe File created C:\Windows\SysWOW64\Gbaileio.exe Gpcmpijk.exe File created C:\Windows\SysWOW64\Neplhf32.exe Nofdklgl.exe File opened for modification C:\Windows\SysWOW64\Acmhepko.exe Apalea32.exe File created C:\Windows\SysWOW64\Jjlcbpdk.dll Qmfgjh32.exe File created C:\Windows\SysWOW64\Gifhnpea.exe Gpncej32.exe File created C:\Windows\SysWOW64\Inkccpgk.exe Icfofg32.exe File created C:\Windows\SysWOW64\Hiknhbcg.exe Hapicp32.exe File opened for modification C:\Windows\SysWOW64\Jnpinc32.exe Jfiale32.exe File created C:\Windows\SysWOW64\Fddcahee.dll Onjgiiad.exe File opened for modification C:\Windows\SysWOW64\Lcfqkl32.exe Ljmlbfhi.exe File created C:\Windows\SysWOW64\Onpjghhn.exe Okanklik.exe File created C:\Windows\SysWOW64\Kgcpjmcb.exe Keednado.exe File opened for modification C:\Windows\SysWOW64\Fagjnn32.exe Fljafg32.exe File opened for modification C:\Windows\SysWOW64\Hlqdei32.exe Hbhomd32.exe File created C:\Windows\SysWOW64\Iefhhbef.exe Inkccpgk.exe File opened for modification C:\Windows\SysWOW64\Ljkomfjl.exe Lfpclh32.exe File created C:\Windows\SysWOW64\Cdepma32.dll Oaiibg32.exe File opened for modification C:\Windows\SysWOW64\Cbgjqo32.exe Cmjbhh32.exe File created C:\Windows\SysWOW64\Labkdack.exe Lcojjmea.exe File created C:\Windows\SysWOW64\Bmclhi32.exe Bjdplm32.exe File created C:\Windows\SysWOW64\Ekjajfei.dll Bifgdk32.exe File created C:\Windows\SysWOW64\Gioicn32.dll Apalea32.exe File opened for modification C:\Windows\SysWOW64\Qkkmqnck.exe Qqeicede.exe File created C:\Windows\SysWOW64\Dhcebp32.dll Idklfpon.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3556 3436 WerFault.exe Ceegmj32.exe -
Modifies registry class 64 IoCs
Processes:
Alnqqd32.exeHojgfemq.exeHlqdei32.exeKjifhc32.exeLjmlbfhi.exeNmpnhdfc.exeBiojif32.exeBalkchpi.exeOfelmloo.exeEpfhbign.exeDjmicm32.exeAgfgqo32.exePkpagq32.exeCgejac32.exeEbjglbml.exeGopkmhjk.exeMencccop.exeQjnmlk32.exeBnkbam32.exeOoeggp32.exeQmfgjh32.exeIcfofg32.exeCkiigmcd.exePnlqnl32.exeKilfcpqm.exeOopfakpa.exeHenidd32.exeHgjefg32.exeLcojjmea.exeLbfdaigg.exeOghopm32.exeOlpdjf32.exeIefhhbef.exeApdhjq32.exeGmjaic32.exeHiknhbcg.exeNcpcfkbg.exePqjfoa32.exeJnemdecl.exeOonafa32.exeFmmkcoap.exeCpceidcn.exeKgbggnhc.exeMooaljkh.exeNgdifkpi.exeQkkmqnck.exeFnbkddem.exeLbqabkql.exeCghggc32.exeHkaglf32.exeJfiale32.exeAlegac32.exeJbllihbf.exeGbaileio.exeLcfqkl32.exePbnoliap.exeChnqkg32.exeFljafg32.exeGbomfe32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Alnqqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcodhoaf.dll" Hojgfemq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hlqdei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kjifhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ljmlbfhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqnolc32.dll" Nmpnhdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nodmbemj.dll" Biojif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Balkchpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofelmloo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaeldika.dll" Epfhbign.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Djmicm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Agfgqo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pkpagq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cgejac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abofbl32.dll" Ebjglbml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gopkmhjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mencccop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qjnmlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bnkbam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ooeggp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjlcbpdk.dll" Qmfgjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icfofg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pnlqnl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kilfcpqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ljmlbfhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikhkppkn.dll" Oopfakpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhfkbo32.dll" Henidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkcinege.dll" Hgjefg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aepjgc32.dll" Lcojjmea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lbfdaigg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oflcmqaa.dll" Oghopm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Olpdjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iefhhbef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Apdhjq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Epfhbign.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fealjk32.dll" Gmjaic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hiknhbcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncpcfkbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pqjfoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jnemdecl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oonafa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhmkol32.dll" Fmmkcoap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bnkbam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjpdmqog.dll" Cpceidcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kgbggnhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mooaljkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ngdifkpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nmpnhdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qkkmqnck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fnbkddem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lbqabkql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cghggc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hkaglf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhdffl32.dll" Jfiale32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Alegac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbllihbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbaileio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhhmapcq.dll" Lcfqkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pbnoliap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljhcccai.dll" Qjnmlk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Chnqkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fljafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbomfe32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exeEpaogi32.exeEkklaj32.exeEpfhbign.exeFnbkddem.exeFdapak32.exeGicbeald.exeGopkmhjk.exeGmjaic32.exeHcifgjgc.exeHpocfncj.exeHenidd32.exeHjjddchg.exeInqcif32.exeIdklfpon.exeJnemdecl.exedescription pid process target process PID 1608 wrote to memory of 2284 1608 3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe Epaogi32.exe PID 1608 wrote to memory of 2284 1608 3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe Epaogi32.exe PID 1608 wrote to memory of 2284 1608 3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe Epaogi32.exe PID 1608 wrote to memory of 2284 1608 3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe Epaogi32.exe PID 2284 wrote to memory of 2672 2284 Epaogi32.exe Ekklaj32.exe PID 2284 wrote to memory of 2672 2284 Epaogi32.exe Ekklaj32.exe PID 2284 wrote to memory of 2672 2284 Epaogi32.exe Ekklaj32.exe PID 2284 wrote to memory of 2672 2284 Epaogi32.exe Ekklaj32.exe PID 2672 wrote to memory of 2756 2672 Ekklaj32.exe Epfhbign.exe PID 2672 wrote to memory of 2756 2672 Ekklaj32.exe Epfhbign.exe PID 2672 wrote to memory of 2756 2672 Ekklaj32.exe Epfhbign.exe PID 2672 wrote to memory of 2756 2672 Ekklaj32.exe Epfhbign.exe PID 2756 wrote to memory of 2936 2756 Epfhbign.exe Fnbkddem.exe PID 2756 wrote to memory of 2936 2756 Epfhbign.exe Fnbkddem.exe PID 2756 wrote to memory of 2936 2756 Epfhbign.exe Fnbkddem.exe PID 2756 wrote to memory of 2936 2756 Epfhbign.exe Fnbkddem.exe PID 2936 wrote to memory of 2472 2936 Fnbkddem.exe Fdapak32.exe PID 2936 wrote to memory of 2472 2936 Fnbkddem.exe Fdapak32.exe PID 2936 wrote to memory of 2472 2936 Fnbkddem.exe Fdapak32.exe PID 2936 wrote to memory of 2472 2936 Fnbkddem.exe Fdapak32.exe PID 2472 wrote to memory of 1236 2472 Fdapak32.exe Gicbeald.exe PID 2472 wrote to memory of 1236 2472 Fdapak32.exe Gicbeald.exe PID 2472 wrote to memory of 1236 2472 Fdapak32.exe Gicbeald.exe PID 2472 wrote to memory of 1236 2472 Fdapak32.exe Gicbeald.exe PID 1236 wrote to memory of 2700 1236 Gicbeald.exe Gopkmhjk.exe PID 1236 wrote to memory of 2700 1236 Gicbeald.exe Gopkmhjk.exe PID 1236 wrote to memory of 2700 1236 Gicbeald.exe Gopkmhjk.exe PID 1236 wrote to memory of 2700 1236 Gicbeald.exe Gopkmhjk.exe PID 2700 wrote to memory of 2796 2700 Gopkmhjk.exe Gmjaic32.exe PID 2700 wrote to memory of 2796 2700 Gopkmhjk.exe Gmjaic32.exe PID 2700 wrote to memory of 2796 2700 Gopkmhjk.exe Gmjaic32.exe PID 2700 wrote to memory of 2796 2700 Gopkmhjk.exe Gmjaic32.exe PID 2796 wrote to memory of 1012 2796 Gmjaic32.exe Hcifgjgc.exe PID 2796 wrote to memory of 1012 2796 Gmjaic32.exe Hcifgjgc.exe PID 2796 wrote to memory of 1012 2796 Gmjaic32.exe Hcifgjgc.exe PID 2796 wrote to memory of 1012 2796 Gmjaic32.exe Hcifgjgc.exe PID 1012 wrote to memory of 2372 1012 Hcifgjgc.exe Hpocfncj.exe PID 1012 wrote to memory of 2372 1012 Hcifgjgc.exe Hpocfncj.exe PID 1012 wrote to memory of 2372 1012 Hcifgjgc.exe Hpocfncj.exe PID 1012 wrote to memory of 2372 1012 Hcifgjgc.exe Hpocfncj.exe PID 2372 wrote to memory of 2352 2372 Hpocfncj.exe Henidd32.exe PID 2372 wrote to memory of 2352 2372 Hpocfncj.exe Henidd32.exe PID 2372 wrote to memory of 2352 2372 Hpocfncj.exe Henidd32.exe PID 2372 wrote to memory of 2352 2372 Hpocfncj.exe Henidd32.exe PID 2352 wrote to memory of 744 2352 Henidd32.exe Hjjddchg.exe PID 2352 wrote to memory of 744 2352 Henidd32.exe Hjjddchg.exe PID 2352 wrote to memory of 744 2352 Henidd32.exe Hjjddchg.exe PID 2352 wrote to memory of 744 2352 Henidd32.exe Hjjddchg.exe PID 744 wrote to memory of 1176 744 Hjjddchg.exe Inqcif32.exe PID 744 wrote to memory of 1176 744 Hjjddchg.exe Inqcif32.exe PID 744 wrote to memory of 1176 744 Hjjddchg.exe Inqcif32.exe PID 744 wrote to memory of 1176 744 Hjjddchg.exe Inqcif32.exe PID 1176 wrote to memory of 1828 1176 Inqcif32.exe Idklfpon.exe PID 1176 wrote to memory of 1828 1176 Inqcif32.exe Idklfpon.exe PID 1176 wrote to memory of 1828 1176 Inqcif32.exe Idklfpon.exe PID 1176 wrote to memory of 1828 1176 Inqcif32.exe Idklfpon.exe PID 1828 wrote to memory of 2252 1828 Idklfpon.exe Jnemdecl.exe PID 1828 wrote to memory of 2252 1828 Idklfpon.exe Jnemdecl.exe PID 1828 wrote to memory of 2252 1828 Idklfpon.exe Jnemdecl.exe PID 1828 wrote to memory of 2252 1828 Idklfpon.exe Jnemdecl.exe PID 2252 wrote to memory of 2092 2252 Jnemdecl.exe Jonplmcb.exe PID 2252 wrote to memory of 2092 2252 Jnemdecl.exe Jonplmcb.exe PID 2252 wrote to memory of 2092 2252 Jnemdecl.exe Jonplmcb.exe PID 2252 wrote to memory of 2092 2252 Jnemdecl.exe Jonplmcb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3c6a00d44894021606b50c412fa93640_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\Epaogi32.exeC:\Windows\system32\Epaogi32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\Ekklaj32.exeC:\Windows\system32\Ekklaj32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Epfhbign.exeC:\Windows\system32\Epfhbign.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Fnbkddem.exeC:\Windows\system32\Fnbkddem.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\Gicbeald.exeC:\Windows\system32\Gicbeald.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\Gopkmhjk.exeC:\Windows\system32\Gopkmhjk.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\Gmjaic32.exeC:\Windows\system32\Gmjaic32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Hcifgjgc.exeC:\Windows\system32\Hcifgjgc.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\Henidd32.exeC:\Windows\system32\Henidd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Hjjddchg.exeC:\Windows\system32\Hjjddchg.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\Inqcif32.exeC:\Windows\system32\Inqcif32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Idklfpon.exeC:\Windows\system32\Idklfpon.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\Jnemdecl.exeC:\Windows\system32\Jnemdecl.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Jonplmcb.exeC:\Windows\system32\Jonplmcb.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Windows\SysWOW64\Jbllihbf.exeC:\Windows\system32\Jbllihbf.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1772 -
C:\Windows\SysWOW64\Kngfih32.exeC:\Windows\system32\Kngfih32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2324 -
C:\Windows\SysWOW64\Keanebkb.exeC:\Windows\system32\Keanebkb.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1460 -
C:\Windows\SysWOW64\Knjbnh32.exeC:\Windows\system32\Knjbnh32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:792 -
C:\Windows\SysWOW64\Kgbggnhc.exeC:\Windows\system32\Kgbggnhc.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1296 -
C:\Windows\SysWOW64\Kfgdhjmk.exeC:\Windows\system32\Kfgdhjmk.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:800 -
C:\Windows\SysWOW64\Kmaled32.exeC:\Windows\system32\Kmaled32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Windows\SysWOW64\Lbqabkql.exeC:\Windows\system32\Lbqabkql.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Leonofpp.exeC:\Windows\system32\Leonofpp.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3012 -
C:\Windows\SysWOW64\Lpdbloof.exeC:\Windows\system32\Lpdbloof.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Windows\SysWOW64\Lhpfqama.exeC:\Windows\system32\Lhpfqama.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\Lojomkdn.exeC:\Windows\system32\Lojomkdn.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1896 -
C:\Windows\SysWOW64\Ldfgebbe.exeC:\Windows\system32\Ldfgebbe.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\Mkclhl32.exeC:\Windows\system32\Mkclhl32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Windows\SysWOW64\Mppepcfg.exeC:\Windows\system32\Mppepcfg.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740 -
C:\Windows\SysWOW64\Mhgmapfi.exeC:\Windows\system32\Mhgmapfi.exe33⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Mkgfckcj.exeC:\Windows\system32\Mkgfckcj.exe34⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\Mgnfhlin.exeC:\Windows\system32\Mgnfhlin.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2532 -
C:\Windows\SysWOW64\Mimbdhhb.exeC:\Windows\system32\Mimbdhhb.exe36⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\Mpigfa32.exeC:\Windows\system32\Mpigfa32.exe37⤵
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Najdnj32.exeC:\Windows\system32\Najdnj32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Nialog32.exeC:\Windows\system32\Nialog32.exe39⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Nkbhgojk.exeC:\Windows\system32\Nkbhgojk.exe40⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\Ndkmpe32.exeC:\Windows\system32\Ndkmpe32.exe41⤵
- Executes dropped EXE
PID:652 -
C:\Windows\SysWOW64\Nkeelohh.exeC:\Windows\system32\Nkeelohh.exe42⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Nncahjgl.exeC:\Windows\system32\Nncahjgl.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Nglfapnl.exeC:\Windows\system32\Nglfapnl.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\Naajoinb.exeC:\Windows\system32\Naajoinb.exe45⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\Ndbcpd32.exeC:\Windows\system32\Ndbcpd32.exe46⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\Oklkmnbp.exeC:\Windows\system32\Oklkmnbp.exe47⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Onjgiiad.exeC:\Windows\system32\Onjgiiad.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\Ofelmloo.exeC:\Windows\system32\Ofelmloo.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:112 -
C:\Windows\SysWOW64\Olpdjf32.exeC:\Windows\system32\Olpdjf32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:1860 -
C:\Windows\SysWOW64\Oonafa32.exeC:\Windows\system32\Oonafa32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Ohfeog32.exeC:\Windows\system32\Ohfeog32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\Ofjfhk32.exeC:\Windows\system32\Ofjfhk32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Ohibdf32.exeC:\Windows\system32\Ohibdf32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\Odobjg32.exeC:\Windows\system32\Odobjg32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Omfkke32.exeC:\Windows\system32\Omfkke32.exe56⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\Ooeggp32.exeC:\Windows\system32\Ooeggp32.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\Pgplkb32.exeC:\Windows\system32\Pgplkb32.exe58⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\Pnjdhmdo.exeC:\Windows\system32\Pnjdhmdo.exe59⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\Pnlqnl32.exeC:\Windows\system32\Pnlqnl32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:1020 -
C:\Windows\SysWOW64\Pefijfii.exeC:\Windows\system32\Pefijfii.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\Pkpagq32.exeC:\Windows\system32\Pkpagq32.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:1556 -
C:\Windows\SysWOW64\Peiepfgg.exeC:\Windows\system32\Peiepfgg.exe63⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\Pggbla32.exeC:\Windows\system32\Pggbla32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\Pmdjdh32.exeC:\Windows\system32\Pmdjdh32.exe65⤵
- Executes dropped EXE
PID:676 -
C:\Windows\SysWOW64\Pgioaa32.exeC:\Windows\system32\Pgioaa32.exe66⤵PID:2008
-
C:\Windows\SysWOW64\Qmfgjh32.exeC:\Windows\system32\Qmfgjh32.exe67⤵
- Drops file in System32 directory
- Modifies registry class
PID:876 -
C:\Windows\SysWOW64\Qimhoi32.exeC:\Windows\system32\Qimhoi32.exe68⤵PID:2884
-
C:\Windows\SysWOW64\Qbelgood.exeC:\Windows\system32\Qbelgood.exe69⤵PID:2420
-
C:\Windows\SysWOW64\Qedhdjnh.exeC:\Windows\system32\Qedhdjnh.exe70⤵PID:2880
-
C:\Windows\SysWOW64\Alnqqd32.exeC:\Windows\system32\Alnqqd32.exe71⤵
- Modifies registry class
PID:1776 -
C:\Windows\SysWOW64\Afcenm32.exeC:\Windows\system32\Afcenm32.exe72⤵PID:2404
-
C:\Windows\SysWOW64\Ahdaee32.exeC:\Windows\system32\Ahdaee32.exe73⤵
- Drops file in System32 directory
PID:1780 -
C:\Windows\SysWOW64\Abjebn32.exeC:\Windows\system32\Abjebn32.exe74⤵PID:3004
-
C:\Windows\SysWOW64\Aidnohbk.exeC:\Windows\system32\Aidnohbk.exe75⤵PID:2928
-
C:\Windows\SysWOW64\Ajejgp32.exeC:\Windows\system32\Ajejgp32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1484 -
C:\Windows\SysWOW64\Ahikqd32.exeC:\Windows\system32\Ahikqd32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1992 -
C:\Windows\SysWOW64\Alegac32.exeC:\Windows\system32\Alegac32.exe78⤵
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Anccmo32.exeC:\Windows\system32\Anccmo32.exe79⤵PID:2996
-
C:\Windows\SysWOW64\Ajjcbpdd.exeC:\Windows\system32\Ajjcbpdd.exe80⤵PID:2624
-
C:\Windows\SysWOW64\Bjlqhoba.exeC:\Windows\system32\Bjlqhoba.exe81⤵PID:2504
-
C:\Windows\SysWOW64\Bpiipf32.exeC:\Windows\system32\Bpiipf32.exe82⤵
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\Biamilfj.exeC:\Windows\system32\Biamilfj.exe83⤵PID:2368
-
C:\Windows\SysWOW64\Blpjegfm.exeC:\Windows\system32\Blpjegfm.exe84⤵PID:524
-
C:\Windows\SysWOW64\Bbjbaa32.exeC:\Windows\system32\Bbjbaa32.exe85⤵
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\Bmpfojmp.exeC:\Windows\system32\Bmpfojmp.exe86⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Bifgdk32.exeC:\Windows\system32\Bifgdk32.exe87⤵
- Drops file in System32 directory
PID:2220 -
C:\Windows\SysWOW64\Bbokmqie.exeC:\Windows\system32\Bbokmqie.exe88⤵PID:408
-
C:\Windows\SysWOW64\Baakhm32.exeC:\Windows\system32\Baakhm32.exe89⤵PID:2148
-
C:\Windows\SysWOW64\Biicik32.exeC:\Windows\system32\Biicik32.exe90⤵PID:328
-
C:\Windows\SysWOW64\Blgpef32.exeC:\Windows\system32\Blgpef32.exe91⤵PID:2112
-
C:\Windows\SysWOW64\Chnqkg32.exeC:\Windows\system32\Chnqkg32.exe92⤵
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\Cklmgb32.exeC:\Windows\system32\Cklmgb32.exe93⤵PID:3036
-
C:\Windows\SysWOW64\Cohigamf.exeC:\Windows\system32\Cohigamf.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2876 -
C:\Windows\SysWOW64\Cpkbdiqb.exeC:\Windows\system32\Cpkbdiqb.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\Cgejac32.exeC:\Windows\system32\Cgejac32.exe96⤵
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Cjdfmo32.exeC:\Windows\system32\Cjdfmo32.exe97⤵PID:1228
-
C:\Windows\SysWOW64\Cghggc32.exeC:\Windows\system32\Cghggc32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\Cnaocmmi.exeC:\Windows\system32\Cnaocmmi.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1476 -
C:\Windows\SysWOW64\Cppkph32.exeC:\Windows\system32\Cppkph32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1492 -
C:\Windows\SysWOW64\Dndlim32.exeC:\Windows\system32\Dndlim32.exe101⤵PID:2156
-
C:\Windows\SysWOW64\Doehqead.exeC:\Windows\system32\Doehqead.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1136 -
C:\Windows\SysWOW64\Dfoqmo32.exeC:\Windows\system32\Dfoqmo32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2416 -
C:\Windows\SysWOW64\Dhnmij32.exeC:\Windows\system32\Dhnmij32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:904 -
C:\Windows\SysWOW64\Dogefd32.exeC:\Windows\system32\Dogefd32.exe105⤵PID:1932
-
C:\Windows\SysWOW64\Djmicm32.exeC:\Windows\system32\Djmicm32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:848 -
C:\Windows\SysWOW64\Dlkepi32.exeC:\Windows\system32\Dlkepi32.exe107⤵PID:1604
-
C:\Windows\SysWOW64\Dfdjhndl.exeC:\Windows\system32\Dfdjhndl.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2652 -
C:\Windows\SysWOW64\Dolnad32.exeC:\Windows\system32\Dolnad32.exe109⤵PID:896
-
C:\Windows\SysWOW64\Dfffnn32.exeC:\Windows\system32\Dfffnn32.exe110⤵PID:2632
-
C:\Windows\SysWOW64\Ddigjkid.exeC:\Windows\system32\Ddigjkid.exe111⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Dggcffhg.exeC:\Windows\system32\Dggcffhg.exe112⤵PID:1784
-
C:\Windows\SysWOW64\Ejhlgaeh.exeC:\Windows\system32\Ejhlgaeh.exe113⤵PID:1548
-
C:\Windows\SysWOW64\Ednpej32.exeC:\Windows\system32\Ednpej32.exe114⤵
- Drops file in System32 directory
PID:1552 -
C:\Windows\SysWOW64\Egllae32.exeC:\Windows\system32\Egllae32.exe115⤵PID:2940
-
C:\Windows\SysWOW64\Ekhhadmk.exeC:\Windows\system32\Ekhhadmk.exe116⤵PID:2328
-
C:\Windows\SysWOW64\Enhacojl.exeC:\Windows\system32\Enhacojl.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1736 -
C:\Windows\SysWOW64\Eqgnokip.exeC:\Windows\system32\Eqgnokip.exe118⤵PID:1436
-
C:\Windows\SysWOW64\Egafleqm.exeC:\Windows\system32\Egafleqm.exe119⤵PID:1216
-
C:\Windows\SysWOW64\Emnndlod.exeC:\Windows\system32\Emnndlod.exe120⤵PID:1112
-
C:\Windows\SysWOW64\Ebjglbml.exeC:\Windows\system32\Ebjglbml.exe121⤵
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\Fmpkjkma.exeC:\Windows\system32\Fmpkjkma.exe122⤵
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\Fcjcfe32.exeC:\Windows\system32\Fcjcfe32.exe123⤵PID:1628
-
C:\Windows\SysWOW64\Figlolbf.exeC:\Windows\system32\Figlolbf.exe124⤵PID:2708
-
C:\Windows\SysWOW64\Flehkhai.exeC:\Windows\system32\Flehkhai.exe125⤵
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\Fncdgcqm.exeC:\Windows\system32\Fncdgcqm.exe126⤵PID:264
-
C:\Windows\SysWOW64\Fnfamcoj.exeC:\Windows\system32\Fnfamcoj.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2012 -
C:\Windows\SysWOW64\Fepiimfg.exeC:\Windows\system32\Fepiimfg.exe128⤵PID:1396
-
C:\Windows\SysWOW64\Fljafg32.exeC:\Windows\system32\Fljafg32.exe129⤵
- Drops file in System32 directory
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Fagjnn32.exeC:\Windows\system32\Fagjnn32.exe130⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1448 -
C:\Windows\SysWOW64\Fmmkcoap.exeC:\Windows\system32\Fmmkcoap.exe131⤵
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\Gdgcpi32.exeC:\Windows\system32\Gdgcpi32.exe132⤵
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\Gjakmc32.exeC:\Windows\system32\Gjakmc32.exe133⤵PID:396
-
C:\Windows\SysWOW64\Gpncej32.exeC:\Windows\system32\Gpncej32.exe134⤵
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Gifhnpea.exeC:\Windows\system32\Gifhnpea.exe135⤵PID:2612
-
C:\Windows\SysWOW64\Ganpomec.exeC:\Windows\system32\Ganpomec.exe136⤵
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Gbomfe32.exeC:\Windows\system32\Gbomfe32.exe137⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1204 -
C:\Windows\SysWOW64\Gjfdhbld.exeC:\Windows\system32\Gjfdhbld.exe138⤵
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\Gpcmpijk.exeC:\Windows\system32\Gpcmpijk.exe139⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\Gbaileio.exeC:\Windows\system32\Gbaileio.exe140⤵
- Drops file in System32 directory
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Gpejeihi.exeC:\Windows\system32\Gpejeihi.exe141⤵PID:1544
-
C:\Windows\SysWOW64\Gbcfadgl.exeC:\Windows\system32\Gbcfadgl.exe142⤵PID:580
-
C:\Windows\SysWOW64\Hpgfki32.exeC:\Windows\system32\Hpgfki32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1388 -
C:\Windows\SysWOW64\Hojgfemq.exeC:\Windows\system32\Hojgfemq.exe144⤵
- Modifies registry class
PID:1232 -
C:\Windows\SysWOW64\Hkaglf32.exeC:\Windows\system32\Hkaglf32.exe145⤵
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Hbhomd32.exeC:\Windows\system32\Hbhomd32.exe146⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Hlqdei32.exeC:\Windows\system32\Hlqdei32.exe147⤵
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Hkcdafqb.exeC:\Windows\system32\Hkcdafqb.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1852 -
C:\Windows\SysWOW64\Hgjefg32.exeC:\Windows\system32\Hgjefg32.exe149⤵
- Modifies registry class
PID:1304 -
C:\Windows\SysWOW64\Hapicp32.exeC:\Windows\system32\Hapicp32.exe150⤵
- Drops file in System32 directory
PID:352 -
C:\Windows\SysWOW64\Hiknhbcg.exeC:\Windows\system32\Hiknhbcg.exe151⤵
- Modifies registry class
PID:476 -
C:\Windows\SysWOW64\Habfipdj.exeC:\Windows\system32\Habfipdj.exe152⤵PID:2364
-
C:\Windows\SysWOW64\Ikkjbe32.exeC:\Windows\system32\Ikkjbe32.exe153⤵PID:2828
-
C:\Windows\SysWOW64\Iimjmbae.exeC:\Windows\system32\Iimjmbae.exe154⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\Icfofg32.exeC:\Windows\system32\Icfofg32.exe155⤵
- Drops file in System32 directory
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\Inkccpgk.exeC:\Windows\system32\Inkccpgk.exe156⤵
- Drops file in System32 directory
PID:2344 -
C:\Windows\SysWOW64\Iefhhbef.exeC:\Windows\system32\Iefhhbef.exe157⤵
- Modifies registry class
PID:1016 -
C:\Windows\SysWOW64\Iheddndj.exeC:\Windows\system32\Iheddndj.exe158⤵PID:2712
-
C:\Windows\SysWOW64\Ieidmbcc.exeC:\Windows\system32\Ieidmbcc.exe159⤵PID:1692
-
C:\Windows\SysWOW64\Ihgainbg.exeC:\Windows\system32\Ihgainbg.exe160⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2664 -
C:\Windows\SysWOW64\Ifkacb32.exeC:\Windows\system32\Ifkacb32.exe161⤵PID:2648
-
C:\Windows\SysWOW64\Ihjnom32.exeC:\Windows\system32\Ihjnom32.exe162⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\Jhljdm32.exeC:\Windows\system32\Jhljdm32.exe163⤵PID:1196
-
C:\Windows\SysWOW64\Jkjfah32.exeC:\Windows\system32\Jkjfah32.exe164⤵PID:2832
-
C:\Windows\SysWOW64\Jhngjmlo.exeC:\Windows\system32\Jhngjmlo.exe165⤵PID:3064
-
C:\Windows\SysWOW64\Jjpcbe32.exeC:\Windows\system32\Jjpcbe32.exe166⤵PID:1284
-
C:\Windows\SysWOW64\Jgcdki32.exeC:\Windows\system32\Jgcdki32.exe167⤵PID:2616
-
C:\Windows\SysWOW64\Jmplcp32.exeC:\Windows\system32\Jmplcp32.exe168⤵PID:2720
-
C:\Windows\SysWOW64\Jfiale32.exeC:\Windows\system32\Jfiale32.exe169⤵
- Drops file in System32 directory
- Modifies registry class
PID:856 -
C:\Windows\SysWOW64\Jnpinc32.exeC:\Windows\system32\Jnpinc32.exe170⤵PID:2380
-
C:\Windows\SysWOW64\Kjfjbdle.exeC:\Windows\system32\Kjfjbdle.exe171⤵PID:2848
-
C:\Windows\SysWOW64\Kmefooki.exeC:\Windows\system32\Kmefooki.exe172⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1664 -
C:\Windows\SysWOW64\Kjifhc32.exeC:\Windows\system32\Kjifhc32.exe173⤵
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Kilfcpqm.exeC:\Windows\system32\Kilfcpqm.exe174⤵
- Modifies registry class
PID:2216 -
C:\Windows\SysWOW64\Kebgia32.exeC:\Windows\system32\Kebgia32.exe175⤵
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\Kmjojo32.exeC:\Windows\system32\Kmjojo32.exe176⤵PID:1572
-
C:\Windows\SysWOW64\Keednado.exeC:\Windows\system32\Keednado.exe177⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\Kgcpjmcb.exeC:\Windows\system32\Kgcpjmcb.exe178⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1704 -
C:\Windows\SysWOW64\Kaldcb32.exeC:\Windows\system32\Kaldcb32.exe179⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2896 -
C:\Windows\SysWOW64\Kgemplap.exeC:\Windows\system32\Kgemplap.exe180⤵PID:944
-
C:\Windows\SysWOW64\Lclnemgd.exeC:\Windows\system32\Lclnemgd.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2176 -
C:\Windows\SysWOW64\Lnbbbffj.exeC:\Windows\system32\Lnbbbffj.exe182⤵PID:332
-
C:\Windows\SysWOW64\Lcojjmea.exeC:\Windows\system32\Lcojjmea.exe183⤵
- Drops file in System32 directory
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Labkdack.exeC:\Windows\system32\Labkdack.exe184⤵PID:2724
-
C:\Windows\SysWOW64\Lfpclh32.exeC:\Windows\system32\Lfpclh32.exe185⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\Ljkomfjl.exeC:\Windows\system32\Ljkomfjl.exe186⤵PID:2580
-
C:\Windows\SysWOW64\Lbfdaigg.exeC:\Windows\system32\Lbfdaigg.exe187⤵
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Ljmlbfhi.exeC:\Windows\system32\Ljmlbfhi.exe188⤵
- Drops file in System32 directory
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Lcfqkl32.exeC:\Windows\system32\Lcfqkl32.exe189⤵
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Lfdmggnm.exeC:\Windows\system32\Lfdmggnm.exe190⤵PID:576
-
C:\Windows\SysWOW64\Mlaeonld.exeC:\Windows\system32\Mlaeonld.exe191⤵PID:1728
-
C:\Windows\SysWOW64\Mooaljkh.exeC:\Windows\system32\Mooaljkh.exe192⤵
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Mffimglk.exeC:\Windows\system32\Mffimglk.exe193⤵PID:892
-
C:\Windows\SysWOW64\Mieeibkn.exeC:\Windows\system32\Mieeibkn.exe194⤵
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\Moanaiie.exeC:\Windows\system32\Moanaiie.exe195⤵
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\Melfncqb.exeC:\Windows\system32\Melfncqb.exe196⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2572 -
C:\Windows\SysWOW64\Modkfi32.exeC:\Windows\system32\Modkfi32.exe197⤵PID:2332
-
C:\Windows\SysWOW64\Mencccop.exeC:\Windows\system32\Mencccop.exe198⤵
- Modifies registry class
PID:2292 -
C:\Windows\SysWOW64\Mlhkpm32.exeC:\Windows\system32\Mlhkpm32.exe199⤵PID:2780
-
C:\Windows\SysWOW64\Mmihhelk.exeC:\Windows\system32\Mmihhelk.exe200⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\Mgalqkbk.exeC:\Windows\system32\Mgalqkbk.exe201⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3008 -
C:\Windows\SysWOW64\Mmldme32.exeC:\Windows\system32\Mmldme32.exe202⤵PID:3080
-
C:\Windows\SysWOW64\Nhaikn32.exeC:\Windows\system32\Nhaikn32.exe203⤵PID:3120
-
C:\Windows\SysWOW64\Ngdifkpi.exeC:\Windows\system32\Ngdifkpi.exe204⤵
- Modifies registry class
PID:3160 -
C:\Windows\SysWOW64\Naimccpo.exeC:\Windows\system32\Naimccpo.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3200 -
C:\Windows\SysWOW64\Nplmop32.exeC:\Windows\system32\Nplmop32.exe206⤵PID:3240
-
C:\Windows\SysWOW64\Nmpnhdfc.exeC:\Windows\system32\Nmpnhdfc.exe207⤵
- Drops file in System32 directory
- Modifies registry class
PID:3280 -
C:\Windows\SysWOW64\Npojdpef.exeC:\Windows\system32\Npojdpef.exe208⤵PID:3320
-
C:\Windows\SysWOW64\Ngibaj32.exeC:\Windows\system32\Ngibaj32.exe209⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3360 -
C:\Windows\SysWOW64\Nigome32.exeC:\Windows\system32\Nigome32.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3400 -
C:\Windows\SysWOW64\Ncpcfkbg.exeC:\Windows\system32\Ncpcfkbg.exe211⤵
- Drops file in System32 directory
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\Niikceid.exeC:\Windows\system32\Niikceid.exe212⤵PID:3484
-
C:\Windows\SysWOW64\Nofdklgl.exeC:\Windows\system32\Nofdklgl.exe213⤵
- Drops file in System32 directory
PID:3524 -
C:\Windows\SysWOW64\Neplhf32.exeC:\Windows\system32\Neplhf32.exe214⤵PID:3568
-
C:\Windows\SysWOW64\Nkmdpm32.exeC:\Windows\system32\Nkmdpm32.exe215⤵PID:3608
-
C:\Windows\SysWOW64\Oagmmgdm.exeC:\Windows\system32\Oagmmgdm.exe216⤵PID:3648
-
C:\Windows\SysWOW64\Ookmfk32.exeC:\Windows\system32\Ookmfk32.exe217⤵PID:3688
-
C:\Windows\SysWOW64\Oaiibg32.exeC:\Windows\system32\Oaiibg32.exe218⤵
- Drops file in System32 directory
PID:3728 -
C:\Windows\SysWOW64\Okanklik.exeC:\Windows\system32\Okanklik.exe219⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3768 -
C:\Windows\SysWOW64\Onpjghhn.exeC:\Windows\system32\Onpjghhn.exe220⤵PID:3808
-
C:\Windows\SysWOW64\Oghopm32.exeC:\Windows\system32\Oghopm32.exe221⤵
- Modifies registry class
PID:3848 -
C:\Windows\SysWOW64\Oopfakpa.exeC:\Windows\system32\Oopfakpa.exe222⤵
- Modifies registry class
PID:3888 -
C:\Windows\SysWOW64\Ohhkjp32.exeC:\Windows\system32\Ohhkjp32.exe223⤵PID:3928
-
C:\Windows\SysWOW64\Okfgfl32.exeC:\Windows\system32\Okfgfl32.exe224⤵PID:3968
-
C:\Windows\SysWOW64\Odoloalf.exeC:\Windows\system32\Odoloalf.exe225⤵PID:4008
-
C:\Windows\SysWOW64\Ocalkn32.exeC:\Windows\system32\Ocalkn32.exe226⤵PID:4048
-
C:\Windows\SysWOW64\Pjldghjm.exeC:\Windows\system32\Pjldghjm.exe227⤵PID:4088
-
C:\Windows\SysWOW64\Pdaheq32.exeC:\Windows\system32\Pdaheq32.exe228⤵PID:3104
-
C:\Windows\SysWOW64\Pnimnfpc.exeC:\Windows\system32\Pnimnfpc.exe229⤵PID:3148
-
C:\Windows\SysWOW64\Pmlmic32.exeC:\Windows\system32\Pmlmic32.exe230⤵PID:3192
-
C:\Windows\SysWOW64\Pjpnbg32.exeC:\Windows\system32\Pjpnbg32.exe231⤵PID:3260
-
C:\Windows\SysWOW64\Pqjfoa32.exeC:\Windows\system32\Pqjfoa32.exe232⤵
- Modifies registry class
PID:3304 -
C:\Windows\SysWOW64\Pjbjhgde.exeC:\Windows\system32\Pjbjhgde.exe233⤵PID:3356
-
C:\Windows\SysWOW64\Pmagdbci.exeC:\Windows\system32\Pmagdbci.exe234⤵
- Drops file in System32 directory
PID:3420 -
C:\Windows\SysWOW64\Pkdgpo32.exeC:\Windows\system32\Pkdgpo32.exe235⤵PID:3460
-
C:\Windows\SysWOW64\Pbnoliap.exeC:\Windows\system32\Pbnoliap.exe236⤵
- Modifies registry class
PID:3532 -
C:\Windows\SysWOW64\Pmccjbaf.exeC:\Windows\system32\Pmccjbaf.exe237⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3560 -
C:\Windows\SysWOW64\Qbplbi32.exeC:\Windows\system32\Qbplbi32.exe238⤵PID:3604
-
C:\Windows\SysWOW64\Qodlkm32.exeC:\Windows\system32\Qodlkm32.exe239⤵PID:3668
-
C:\Windows\SysWOW64\Qqeicede.exeC:\Windows\system32\Qqeicede.exe240⤵
- Drops file in System32 directory
PID:3712 -
C:\Windows\SysWOW64\Qkkmqnck.exeC:\Windows\system32\Qkkmqnck.exe241⤵
- Modifies registry class
PID:3756 -