Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 01:21
Behavioral task
behavioral1
Sample
47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe
-
Size
448KB
-
MD5
47eb5b739c9b584985b337387da194e0
-
SHA1
0d8c355c5b04c5a82ae4dedec4e246fd95a95013
-
SHA256
14f6defdfab37ab8afbd5b3a207192a9b774e43b16e2b0218da8cfdaf2f99cb5
-
SHA512
d0dc476d834770ebe26a11840745610d84056950dd54508e67157ff9a96953a70e8fdd3330b780450504f3380d21921d8a2f8573074517de9f2e9a01d8d2b947
-
SSDEEP
12288:dHoYa/mwpV6yYPMLnfBJKFbhDwBpV6yYP6Utri+Woh3YRVDDf1LcXD3v+2JFrfzj:RNsHWMLnfBJKhVwBW6Utri+WoxYRVDrs
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Chnbcpmn.exeHjcppidk.exeBbonei32.exeCjakccop.exeFnipkkdl.exeGghkdp32.exeBjkhdacm.exe47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exeAmkbnp32.exeIegjqk32.exeJaeafklf.exeMnomjl32.exeAccnekon.exeAbkhkgbb.exeDmdnbecj.exeJabdql32.exeLkdhoc32.exeNpolmh32.exeHibjbgbh.exeOdjdmjgo.exeCfpldf32.exeKnhjjj32.exeAjpepm32.exeChlfnp32.exeOionacqo.exeKkmand32.exeOpaebkmc.exeNjfjnpgp.exeBjmeiq32.exeEjpdai32.exeKkoncdcp.exeLqqpgj32.exeCicalakk.exeObokcqhk.exeMfoiqe32.exeFqlicclo.exeLbicoamh.exeNmnclmoj.exeAkkoig32.exeKhkbbc32.exeCbdiia32.exeDkadjn32.exeHjofdi32.exeIamdkfnc.exeJpgjgboe.exeNibqqh32.exeJblnaq32.exeNplfdj32.exeCcdmnj32.exeOplelf32.exeOiffkkbk.exePkofjijm.exeDdiibc32.exeFbbofjnh.exeHphidanj.exeQkffng32.exeLnhgim32.exeNmfbpk32.exeLnlnlc32.exeFlhmfbim.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chnbcpmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hjcppidk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbonei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cjakccop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnipkkdl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gghkdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bjkhdacm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amkbnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fnipkkdl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iegjqk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaeafklf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jaeafklf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mnomjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Accnekon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abkhkgbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmdnbecj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jabdql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lkdhoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npolmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hibjbgbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Odjdmjgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cfpldf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knhjjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajpepm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chlfnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oionacqo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkmand32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opaebkmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Njfjnpgp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjmeiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ejpdai32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkoncdcp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqqpgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cicalakk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjcppidk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Obokcqhk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjakccop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfoiqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqlicclo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbicoamh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nmnclmoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akkoig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Khkbbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cbdiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkadjn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjofdi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iamdkfnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jpgjgboe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nibqqh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jblnaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nplfdj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccdmnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oplelf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiffkkbk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkofjijm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddiibc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbbofjnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hphidanj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkffng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnhgim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmfbpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnlnlc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flhmfbim.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Imoilo32.exe family_berbew \Windows\SysWOW64\Jjjclobg.exe family_berbew \Windows\SysWOW64\Jcbhee32.exe family_berbew \Windows\SysWOW64\Jblnaq32.exe family_berbew \Windows\SysWOW64\Jlbboiip.exe family_berbew \Windows\SysWOW64\Khiccj32.exe family_berbew \Windows\SysWOW64\Kcgmoggn.exe family_berbew \Windows\SysWOW64\Ljfogake.exe family_berbew C:\Windows\SysWOW64\Liklhmom.exe family_berbew \Windows\SysWOW64\Lklejh32.exe family_berbew \Windows\SysWOW64\Lnlnlc32.exe family_berbew C:\Windows\SysWOW64\Mlpneh32.exe family_berbew C:\Windows\SysWOW64\Mfoiqe32.exe family_berbew C:\Windows\SysWOW64\Mdbiji32.exe family_berbew C:\Windows\SysWOW64\Nplfdj32.exe family_berbew C:\Windows\SysWOW64\Nehomq32.exe family_berbew C:\Windows\SysWOW64\Oionacqo.exe family_berbew C:\Windows\SysWOW64\Ocjophem.exe family_berbew C:\Windows\SysWOW64\Olbchn32.exe family_berbew C:\Windows\SysWOW64\Ohidmoaa.exe family_berbew behavioral1/memory/2628-294-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Pohfehdi.exe family_berbew C:\Windows\SysWOW64\Oihqgbhd.exe family_berbew C:\Windows\SysWOW64\Qglmpi32.exe family_berbew C:\Windows\SysWOW64\Abkhkgbb.exe family_berbew C:\Windows\SysWOW64\Aoohekal.exe family_berbew behavioral1/memory/2696-389-0x00000000002B0000-0x00000000002E5000-memory.dmp family_berbew C:\Windows\SysWOW64\Blchcpko.exe family_berbew C:\Windows\SysWOW64\Chlfnp32.exe family_berbew C:\Windows\SysWOW64\Chnbcpmn.exe family_berbew C:\Windows\SysWOW64\Caidaeak.exe family_berbew C:\Windows\SysWOW64\Cffljlpc.exe family_berbew C:\Windows\SysWOW64\Cheido32.exe family_berbew C:\Windows\SysWOW64\Cmbalfem.exe family_berbew C:\Windows\SysWOW64\Dmdnbecj.exe family_berbew C:\Windows\SysWOW64\Dljkcb32.exe family_berbew C:\Windows\SysWOW64\Dhplhc32.exe family_berbew C:\Windows\SysWOW64\Daipqhdg.exe family_berbew C:\Windows\SysWOW64\Dbafjlaa.exe family_berbew C:\Windows\SysWOW64\Dkadjn32.exe family_berbew C:\Windows\SysWOW64\Eoompl32.exe family_berbew C:\Windows\SysWOW64\Ddiibc32.exe family_berbew C:\Windows\SysWOW64\Ehgbhbgn.exe family_berbew C:\Windows\SysWOW64\Endjaief.exe family_berbew C:\Windows\SysWOW64\Eabcggll.exe family_berbew C:\Windows\SysWOW64\Ejmhkiig.exe family_berbew C:\Windows\SysWOW64\Fheabelm.exe family_berbew C:\Windows\SysWOW64\Fqlicclo.exe family_berbew C:\Windows\SysWOW64\Ffibkj32.exe family_berbew C:\Windows\SysWOW64\Fkejcq32.exe family_berbew C:\Windows\SysWOW64\Fhikme32.exe family_berbew C:\Windows\SysWOW64\Fbbofjnh.exe family_berbew C:\Windows\SysWOW64\Fchijone.exe family_berbew C:\Windows\SysWOW64\Fdpkbf32.exe family_berbew C:\Windows\SysWOW64\Findhdcb.exe family_berbew C:\Windows\SysWOW64\Fnipkkdl.exe family_berbew C:\Windows\SysWOW64\Ejpdai32.exe family_berbew C:\Windows\SysWOW64\Gbfiaj32.exe family_berbew C:\Windows\SysWOW64\Gghkdp32.exe family_berbew C:\Windows\SysWOW64\Gjbmelgm.exe family_berbew C:\Windows\SysWOW64\Bbonei32.exe family_berbew C:\Windows\SysWOW64\Gfmgelil.exe family_berbew C:\Windows\SysWOW64\Gpelnb32.exe family_berbew C:\Windows\SysWOW64\Hphidanj.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Imoilo32.exeJjjclobg.exeJcbhee32.exeJblnaq32.exeJlbboiip.exeKhiccj32.exeKcgmoggn.exeLjfogake.exeLiklhmom.exeLklejh32.exeLnlnlc32.exeMlpneh32.exeMpbdnk32.exeMfoiqe32.exeMdbiji32.exeNplfdj32.exeNehomq32.exeNhiholof.exeOionacqo.exeOmmfga32.exeOcjophem.exeOlbchn32.exeOhidmoaa.exeOihqgbhd.exePohfehdi.exePkofjijm.exeQfmafg32.exeQglmpi32.exeAccnekon.exeAmkbnp32.exeAbkhkgbb.exeAoohekal.exeAgjmim32.exeAjjfkh32.exeBccjdnbi.exeBmkomchi.exeBaigca32.exeBlchcpko.exeBbonei32.exeChlfnp32.exeChnbcpmn.exeCaidaeak.exeCffljlpc.exeCheido32.exeCmbalfem.exeDmdnbecj.exeDbafjlaa.exeDljkcb32.exeDhplhc32.exeDaipqhdg.exeDkadjn32.exeDdiibc32.exeEoompl32.exeEhgbhbgn.exeEndjaief.exeEabcggll.exeEjmhkiig.exeEjpdai32.exeFchijone.exeFheabelm.exeFqlicclo.exeFfibkj32.exeFkejcq32.exeFhikme32.exepid process 2684 Imoilo32.exe 2524 Jjjclobg.exe 2536 Jcbhee32.exe 2640 Jblnaq32.exe 2380 Jlbboiip.exe 2856 Khiccj32.exe 1716 Kcgmoggn.exe 576 Ljfogake.exe 2636 Liklhmom.exe 2916 Lklejh32.exe 1912 Lnlnlc32.exe 928 Mlpneh32.exe 2352 Mpbdnk32.exe 1464 Mfoiqe32.exe 1740 Mdbiji32.exe 544 Nplfdj32.exe 2964 Nehomq32.exe 2960 Nhiholof.exe 1932 Oionacqo.exe 1168 Ommfga32.exe 2348 Ocjophem.exe 2628 Olbchn32.exe 3068 Ohidmoaa.exe 1732 Oihqgbhd.exe 2100 Pohfehdi.exe 1684 Pkofjijm.exe 1728 Qfmafg32.exe 2168 Qglmpi32.exe 2540 Accnekon.exe 2900 Amkbnp32.exe 2696 Abkhkgbb.exe 2444 Aoohekal.exe 3044 Agjmim32.exe 1344 Ajjfkh32.exe 1336 Bccjdnbi.exe 2728 Bmkomchi.exe 1516 Baigca32.exe 1680 Blchcpko.exe 2700 Bbonei32.exe 1456 Chlfnp32.exe 2708 Chnbcpmn.exe 1780 Caidaeak.exe 2756 Cffljlpc.exe 1936 Cheido32.exe 1116 Cmbalfem.exe 332 Dmdnbecj.exe 2104 Dbafjlaa.exe 2188 Dljkcb32.exe 2308 Dhplhc32.exe 1064 Daipqhdg.exe 1752 Dkadjn32.exe 2080 Ddiibc32.exe 2588 Eoompl32.exe 792 Ehgbhbgn.exe 1708 Endjaief.exe 2568 Eabcggll.exe 1948 Ejmhkiig.exe 2668 Ejpdai32.exe 2712 Fchijone.exe 2368 Fheabelm.exe 2716 Fqlicclo.exe 1760 Ffibkj32.exe 1908 Fkejcq32.exe 2764 Fhikme32.exe -
Loads dropped DLL 64 IoCs
Processes:
47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exeImoilo32.exeJjjclobg.exeJcbhee32.exeJblnaq32.exeJlbboiip.exeKhiccj32.exeKcgmoggn.exeLjfogake.exeLiklhmom.exeLklejh32.exeLnlnlc32.exeMlpneh32.exeMpbdnk32.exeMfoiqe32.exeMdbiji32.exeNplfdj32.exeNehomq32.exeNhiholof.exeOionacqo.exeOmmfga32.exeOcjophem.exeOlbchn32.exeOhidmoaa.exeOihqgbhd.exePohfehdi.exePkofjijm.exeQfmafg32.exeQglmpi32.exeAccnekon.exeAmkbnp32.exeAbkhkgbb.exepid process 2196 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe 2196 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe 2684 Imoilo32.exe 2684 Imoilo32.exe 2524 Jjjclobg.exe 2524 Jjjclobg.exe 2536 Jcbhee32.exe 2536 Jcbhee32.exe 2640 Jblnaq32.exe 2640 Jblnaq32.exe 2380 Jlbboiip.exe 2380 Jlbboiip.exe 2856 Khiccj32.exe 2856 Khiccj32.exe 1716 Kcgmoggn.exe 1716 Kcgmoggn.exe 576 Ljfogake.exe 576 Ljfogake.exe 2636 Liklhmom.exe 2636 Liklhmom.exe 2916 Lklejh32.exe 2916 Lklejh32.exe 1912 Lnlnlc32.exe 1912 Lnlnlc32.exe 928 Mlpneh32.exe 928 Mlpneh32.exe 2352 Mpbdnk32.exe 2352 Mpbdnk32.exe 1464 Mfoiqe32.exe 1464 Mfoiqe32.exe 1740 Mdbiji32.exe 1740 Mdbiji32.exe 544 Nplfdj32.exe 544 Nplfdj32.exe 2964 Nehomq32.exe 2964 Nehomq32.exe 2960 Nhiholof.exe 2960 Nhiholof.exe 1932 Oionacqo.exe 1932 Oionacqo.exe 1168 Ommfga32.exe 1168 Ommfga32.exe 2348 Ocjophem.exe 2348 Ocjophem.exe 2628 Olbchn32.exe 2628 Olbchn32.exe 3068 Ohidmoaa.exe 3068 Ohidmoaa.exe 1732 Oihqgbhd.exe 1732 Oihqgbhd.exe 2100 Pohfehdi.exe 2100 Pohfehdi.exe 1684 Pkofjijm.exe 1684 Pkofjijm.exe 1728 Qfmafg32.exe 1728 Qfmafg32.exe 2168 Qglmpi32.exe 2168 Qglmpi32.exe 2540 Accnekon.exe 2540 Accnekon.exe 2900 Amkbnp32.exe 2900 Amkbnp32.exe 2696 Abkhkgbb.exe 2696 Abkhkgbb.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kfnmpn32.exeKkmand32.exeMbcoio32.exeCgcnghpl.exeHlafnbal.exeNpdfhhhe.exeCjjkpe32.exeGcgnnlle.exeBhjlli32.exeDbafjlaa.exeFchijone.exeKnbhlkkc.exeNibqqh32.exeJbqmhnbo.exePlaimk32.exeBgdibkam.exePkoicb32.exeCbdiia32.exeCcjoli32.exeLjfogake.exeAgjmim32.exeAfffenbp.exeGkglnm32.exeJpgjgboe.exeOfcqcp32.exeBbonei32.exeEndjaief.exeHjofdi32.exeHjcppidk.exeMdbiji32.exeGbfiaj32.exeAlihaioe.exeOcjophem.exeLcjlnpmo.exeNfkapb32.exeDeollamj.exeKnhjjj32.exeCinafkkd.exeIiecgjba.exeMnomjl32.exeNpjlhcmd.exeNehomq32.exeObgkpb32.exeBgaebe32.exeGfmgelil.exeLqqpgj32.exeAopahjll.exeEoepnk32.exeFjhcegll.exeAoohekal.exeJlbboiip.exeJabdql32.exeBnknoogp.exeLkfddc32.exeAknlofim.exePplaki32.exeBkegah32.exe47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exeMmogmjmn.exeEdfbaabj.exedescription ioc process File created C:\Windows\SysWOW64\Bddlnn32.dll Kfnmpn32.exe File created C:\Windows\SysWOW64\Nedohngn.dll Kkmand32.exe File created C:\Windows\SysWOW64\Aoapfe32.dll Mbcoio32.exe File created C:\Windows\SysWOW64\Gpajfg32.dll Cgcnghpl.exe File created C:\Windows\SysWOW64\Hdlkcdog.exe Hlafnbal.exe File created C:\Windows\SysWOW64\Oiljam32.exe Npdfhhhe.exe File opened for modification C:\Windows\SysWOW64\Cfpldf32.exe Cjjkpe32.exe File created C:\Windows\SysWOW64\Bgcegq32.dll Gcgnnlle.exe File opened for modification C:\Windows\SysWOW64\Bjkhdacm.exe Bhjlli32.exe File created C:\Windows\SysWOW64\Jkjlciol.dll Dbafjlaa.exe File opened for modification C:\Windows\SysWOW64\Fheabelm.exe Fchijone.exe File opened for modification C:\Windows\SysWOW64\Oiljam32.exe Npdfhhhe.exe File created C:\Windows\SysWOW64\Oaccbmie.dll Knbhlkkc.exe File opened for modification C:\Windows\SysWOW64\Nbjeinje.exe Nibqqh32.exe File opened for modification C:\Windows\SysWOW64\Jliaac32.exe Jbqmhnbo.exe File opened for modification C:\Windows\SysWOW64\Qkffng32.exe Plaimk32.exe File opened for modification C:\Windows\SysWOW64\Bammlq32.exe Bgdibkam.exe File opened for modification C:\Windows\SysWOW64\Pplaki32.exe Pkoicb32.exe File created C:\Windows\SysWOW64\Eepejpil.dll Cbdiia32.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe Ccjoli32.exe File created C:\Windows\SysWOW64\Liklhmom.exe Ljfogake.exe File opened for modification C:\Windows\SysWOW64\Ajjfkh32.exe Agjmim32.exe File opened for modification C:\Windows\SysWOW64\Akcomepg.exe Afffenbp.exe File created C:\Windows\SysWOW64\Kkfmcc32.dll Gkglnm32.exe File created C:\Windows\SysWOW64\Jlnklcej.exe Jpgjgboe.exe File opened for modification C:\Windows\SysWOW64\Oplelf32.exe Ofcqcp32.exe File opened for modification C:\Windows\SysWOW64\Chlfnp32.exe Bbonei32.exe File opened for modification C:\Windows\SysWOW64\Eabcggll.exe Endjaief.exe File created C:\Windows\SysWOW64\Hmoofdea.exe Hjofdi32.exe File created C:\Windows\SysWOW64\Hihlqeib.exe Hjcppidk.exe File opened for modification C:\Windows\SysWOW64\Nplfdj32.exe Mdbiji32.exe File created C:\Windows\SysWOW64\Gjbmelgm.exe Gbfiaj32.exe File created C:\Windows\SysWOW64\Imafcg32.dll Alihaioe.exe File opened for modification C:\Windows\SysWOW64\Olbchn32.exe Ocjophem.exe File opened for modification C:\Windows\SysWOW64\Lpnmgdli.exe Lcjlnpmo.exe File created C:\Windows\SysWOW64\Pfpemp32.dll Nfkapb32.exe File opened for modification C:\Windows\SysWOW64\Dphmloih.exe Deollamj.exe File created C:\Windows\SysWOW64\Kgqocoin.exe Knhjjj32.exe File created C:\Windows\SysWOW64\Cnkjnb32.exe Cinafkkd.exe File created C:\Windows\SysWOW64\Abojgp32.dll Iiecgjba.exe File created C:\Windows\SysWOW64\Nlemad32.dll Mnomjl32.exe File created C:\Windows\SysWOW64\Nibqqh32.exe Npjlhcmd.exe File created C:\Windows\SysWOW64\Nhiholof.exe Nehomq32.exe File created C:\Windows\SysWOW64\Okbpde32.exe Obgkpb32.exe File opened for modification C:\Windows\SysWOW64\Bnknoogp.exe Bgaebe32.exe File created C:\Windows\SysWOW64\Gpelnb32.exe Gfmgelil.exe File created C:\Windows\SysWOW64\Lkfddc32.exe Lqqpgj32.exe File created C:\Windows\SysWOW64\Bnldjekl.exe Aopahjll.exe File created C:\Windows\SysWOW64\Eeohkeoe.exe Eoepnk32.exe File created C:\Windows\SysWOW64\Flhmfbim.exe Fjhcegll.exe File created C:\Windows\SysWOW64\Agjmim32.exe Aoohekal.exe File opened for modification C:\Windows\SysWOW64\Khiccj32.exe Jlbboiip.exe File opened for modification C:\Windows\SysWOW64\Jaeafklf.exe Jabdql32.exe File created C:\Windows\SysWOW64\Kkoncdcp.exe Kkmand32.exe File created C:\Windows\SysWOW64\Bmpkqklh.exe Bnknoogp.exe File created C:\Windows\SysWOW64\Mkdfahce.dll Endjaief.exe File created C:\Windows\SysWOW64\Ljkaeo32.exe Lkfddc32.exe File created C:\Windows\SysWOW64\Klqahn32.dll Aknlofim.exe File created C:\Windows\SysWOW64\Cfpldf32.exe Cjjkpe32.exe File opened for modification C:\Windows\SysWOW64\Pmpbdm32.exe Pplaki32.exe File created C:\Windows\SysWOW64\Cbdiia32.exe Bkegah32.exe File opened for modification C:\Windows\SysWOW64\Imoilo32.exe 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Jkofeknc.dll Mmogmjmn.exe File created C:\Windows\SysWOW64\Ebaijflc.dll Edfbaabj.exe -
Drops file in Windows directory 1 IoCs
Processes:
Dpapaj32.exedescription ioc process File created C:\Windows\system32†Eahedh32.¾ll Dpapaj32.exe -
Modifies registry class 64 IoCs
Processes:
Jcbhee32.exeLjkaeo32.exeJdejhfig.exeBlchcpko.exeDbafjlaa.exeFkejcq32.exeHibjbgbh.exeMfihkoal.exePkoicb32.exeChnbcpmn.exeOiljam32.exeCjgoje32.exeCcdmnj32.exeMdbiji32.exeDljkcb32.exeEabcggll.exeBfioia32.exeFbbofjnh.exeGbfiaj32.exeEihgfd32.exe47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exeOcjophem.exeJplkmgol.exeIakgefqe.exeLklejh32.exeMlpneh32.exeMpbdnk32.exeAoohekal.exeDknajh32.exeLcjlnpmo.exeIegjqk32.exeBnknoogp.exeAccnekon.exePlaimk32.exeFcnkhmdp.exeHmoofdea.exePmgbao32.exePljlbf32.exeEndjaief.exeGqdefddb.exeKlpdaf32.exeBcjcme32.exeNhiholof.exeJaeafklf.exeJlckbh32.exeOkbpde32.exeBgaebe32.exeAchjibcl.exeDaipqhdg.exeKcamjb32.exeObgkpb32.exeQcogbdkg.exeDdiibc32.exeFheabelm.exeHelgmg32.exeEcbhdi32.exeEoompl32.exeOaqbln32.exeDkqnoh32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jcbhee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ljkaeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jdejhfig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbdjhe32.dll" Blchcpko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkjlciol.dll" Dbafjlaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnndbd32.dll" Fkejcq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anpmdf32.dll" Hibjbgbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikmnfdoq.dll" Mfihkoal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkdhkd32.dll" Pkoicb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdmhki32.dll" Chnbcpmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jaknfc32.dll" Oiljam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cjgoje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bflbhgjm.dll" Ccdmnj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mdbiji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dljkcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blgdjk32.dll" Eabcggll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bfioia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fbbofjnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gbfiaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcjjof32.dll" Eihgfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ocjophem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jplkmgol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iakgefqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lklejh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mlpneh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mpbdnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aoohekal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dknajh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lcjlnpmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mpbdnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hembkl32.dll" Iegjqk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bnknoogp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eipfohgn.dll" Accnekon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Plaimk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egqjelqn.dll" Fcnkhmdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hmoofdea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onffhdlh.dll" Pmgbao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qqmfpqmc.dll" Pljlbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Endjaief.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gqdefddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gobdahei.dll" Klpdaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Accnekon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bcjcme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nhiholof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jaeafklf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgaebl32.dll" Jlckbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Okbpde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckndebll.dll" Bgaebe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Achjibcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Daipqhdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eabcggll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kcamjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Obgkpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbbnekdd.dll" Qcogbdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfgbgqka.dll" Ddiibc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fheabelm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Helgmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cafngogd.dll" Ecbhdi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iakgefqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifdofiam.dll" Eoompl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oaqbln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkqnoh32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exeImoilo32.exeJjjclobg.exeJcbhee32.exeJblnaq32.exeJlbboiip.exeKhiccj32.exeKcgmoggn.exeLjfogake.exeLiklhmom.exeLklejh32.exeLnlnlc32.exeMlpneh32.exeMpbdnk32.exeMfoiqe32.exeMdbiji32.exedescription pid process target process PID 2196 wrote to memory of 2684 2196 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe Imoilo32.exe PID 2196 wrote to memory of 2684 2196 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe Imoilo32.exe PID 2196 wrote to memory of 2684 2196 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe Imoilo32.exe PID 2196 wrote to memory of 2684 2196 47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe Imoilo32.exe PID 2684 wrote to memory of 2524 2684 Imoilo32.exe Jjjclobg.exe PID 2684 wrote to memory of 2524 2684 Imoilo32.exe Jjjclobg.exe PID 2684 wrote to memory of 2524 2684 Imoilo32.exe Jjjclobg.exe PID 2684 wrote to memory of 2524 2684 Imoilo32.exe Jjjclobg.exe PID 2524 wrote to memory of 2536 2524 Jjjclobg.exe Jcbhee32.exe PID 2524 wrote to memory of 2536 2524 Jjjclobg.exe Jcbhee32.exe PID 2524 wrote to memory of 2536 2524 Jjjclobg.exe Jcbhee32.exe PID 2524 wrote to memory of 2536 2524 Jjjclobg.exe Jcbhee32.exe PID 2536 wrote to memory of 2640 2536 Jcbhee32.exe Jblnaq32.exe PID 2536 wrote to memory of 2640 2536 Jcbhee32.exe Jblnaq32.exe PID 2536 wrote to memory of 2640 2536 Jcbhee32.exe Jblnaq32.exe PID 2536 wrote to memory of 2640 2536 Jcbhee32.exe Jblnaq32.exe PID 2640 wrote to memory of 2380 2640 Jblnaq32.exe Jlbboiip.exe PID 2640 wrote to memory of 2380 2640 Jblnaq32.exe Jlbboiip.exe PID 2640 wrote to memory of 2380 2640 Jblnaq32.exe Jlbboiip.exe PID 2640 wrote to memory of 2380 2640 Jblnaq32.exe Jlbboiip.exe PID 2380 wrote to memory of 2856 2380 Jlbboiip.exe Khiccj32.exe PID 2380 wrote to memory of 2856 2380 Jlbboiip.exe Khiccj32.exe PID 2380 wrote to memory of 2856 2380 Jlbboiip.exe Khiccj32.exe PID 2380 wrote to memory of 2856 2380 Jlbboiip.exe Khiccj32.exe PID 2856 wrote to memory of 1716 2856 Khiccj32.exe Kcgmoggn.exe PID 2856 wrote to memory of 1716 2856 Khiccj32.exe Kcgmoggn.exe PID 2856 wrote to memory of 1716 2856 Khiccj32.exe Kcgmoggn.exe PID 2856 wrote to memory of 1716 2856 Khiccj32.exe Kcgmoggn.exe PID 1716 wrote to memory of 576 1716 Kcgmoggn.exe Ljfogake.exe PID 1716 wrote to memory of 576 1716 Kcgmoggn.exe Ljfogake.exe PID 1716 wrote to memory of 576 1716 Kcgmoggn.exe Ljfogake.exe PID 1716 wrote to memory of 576 1716 Kcgmoggn.exe Ljfogake.exe PID 576 wrote to memory of 2636 576 Ljfogake.exe Liklhmom.exe PID 576 wrote to memory of 2636 576 Ljfogake.exe Liklhmom.exe PID 576 wrote to memory of 2636 576 Ljfogake.exe Liklhmom.exe PID 576 wrote to memory of 2636 576 Ljfogake.exe Liklhmom.exe PID 2636 wrote to memory of 2916 2636 Liklhmom.exe Lklejh32.exe PID 2636 wrote to memory of 2916 2636 Liklhmom.exe Lklejh32.exe PID 2636 wrote to memory of 2916 2636 Liklhmom.exe Lklejh32.exe PID 2636 wrote to memory of 2916 2636 Liklhmom.exe Lklejh32.exe PID 2916 wrote to memory of 1912 2916 Lklejh32.exe Lnlnlc32.exe PID 2916 wrote to memory of 1912 2916 Lklejh32.exe Lnlnlc32.exe PID 2916 wrote to memory of 1912 2916 Lklejh32.exe Lnlnlc32.exe PID 2916 wrote to memory of 1912 2916 Lklejh32.exe Lnlnlc32.exe PID 1912 wrote to memory of 928 1912 Lnlnlc32.exe Mlpneh32.exe PID 1912 wrote to memory of 928 1912 Lnlnlc32.exe Mlpneh32.exe PID 1912 wrote to memory of 928 1912 Lnlnlc32.exe Mlpneh32.exe PID 1912 wrote to memory of 928 1912 Lnlnlc32.exe Mlpneh32.exe PID 928 wrote to memory of 2352 928 Mlpneh32.exe Mpbdnk32.exe PID 928 wrote to memory of 2352 928 Mlpneh32.exe Mpbdnk32.exe PID 928 wrote to memory of 2352 928 Mlpneh32.exe Mpbdnk32.exe PID 928 wrote to memory of 2352 928 Mlpneh32.exe Mpbdnk32.exe PID 2352 wrote to memory of 1464 2352 Mpbdnk32.exe Mfoiqe32.exe PID 2352 wrote to memory of 1464 2352 Mpbdnk32.exe Mfoiqe32.exe PID 2352 wrote to memory of 1464 2352 Mpbdnk32.exe Mfoiqe32.exe PID 2352 wrote to memory of 1464 2352 Mpbdnk32.exe Mfoiqe32.exe PID 1464 wrote to memory of 1740 1464 Mfoiqe32.exe Mdbiji32.exe PID 1464 wrote to memory of 1740 1464 Mfoiqe32.exe Mdbiji32.exe PID 1464 wrote to memory of 1740 1464 Mfoiqe32.exe Mdbiji32.exe PID 1464 wrote to memory of 1740 1464 Mfoiqe32.exe Mdbiji32.exe PID 1740 wrote to memory of 544 1740 Mdbiji32.exe Nplfdj32.exe PID 1740 wrote to memory of 544 1740 Mdbiji32.exe Nplfdj32.exe PID 1740 wrote to memory of 544 1740 Mdbiji32.exe Nplfdj32.exe PID 1740 wrote to memory of 544 1740 Mdbiji32.exe Nplfdj32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\47eb5b739c9b584985b337387da194e0_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Imoilo32.exeC:\Windows\system32\Imoilo32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Jjjclobg.exeC:\Windows\system32\Jjjclobg.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Jcbhee32.exeC:\Windows\system32\Jcbhee32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Jblnaq32.exeC:\Windows\system32\Jblnaq32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Jlbboiip.exeC:\Windows\system32\Jlbboiip.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\Khiccj32.exeC:\Windows\system32\Khiccj32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Kcgmoggn.exeC:\Windows\system32\Kcgmoggn.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\Ljfogake.exeC:\Windows\system32\Ljfogake.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\Liklhmom.exeC:\Windows\system32\Liklhmom.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Lklejh32.exeC:\Windows\system32\Lklejh32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Lnlnlc32.exeC:\Windows\system32\Lnlnlc32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\Mlpneh32.exeC:\Windows\system32\Mlpneh32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\Mpbdnk32.exeC:\Windows\system32\Mpbdnk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Mfoiqe32.exeC:\Windows\system32\Mfoiqe32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\Mdbiji32.exeC:\Windows\system32\Mdbiji32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Nplfdj32.exeC:\Windows\system32\Nplfdj32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:544 -
C:\Windows\SysWOW64\Nehomq32.exeC:\Windows\system32\Nehomq32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2964 -
C:\Windows\SysWOW64\Nhiholof.exeC:\Windows\system32\Nhiholof.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Oionacqo.exeC:\Windows\system32\Oionacqo.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Windows\SysWOW64\Ommfga32.exeC:\Windows\system32\Ommfga32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1168 -
C:\Windows\SysWOW64\Ocjophem.exeC:\Windows\system32\Ocjophem.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2348 -
C:\Windows\SysWOW64\Olbchn32.exeC:\Windows\system32\Olbchn32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\Ohidmoaa.exeC:\Windows\system32\Ohidmoaa.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068 -
C:\Windows\SysWOW64\Oihqgbhd.exeC:\Windows\system32\Oihqgbhd.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732 -
C:\Windows\SysWOW64\Pohfehdi.exeC:\Windows\system32\Pohfehdi.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Windows\SysWOW64\Pkofjijm.exeC:\Windows\system32\Pkofjijm.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Windows\SysWOW64\Qfmafg32.exeC:\Windows\system32\Qfmafg32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\Qglmpi32.exeC:\Windows\system32\Qglmpi32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2168 -
C:\Windows\SysWOW64\Accnekon.exeC:\Windows\system32\Accnekon.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Amkbnp32.exeC:\Windows\system32\Amkbnp32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Windows\SysWOW64\Abkhkgbb.exeC:\Windows\system32\Abkhkgbb.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2696 -
C:\Windows\SysWOW64\Aoohekal.exeC:\Windows\system32\Aoohekal.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Agjmim32.exeC:\Windows\system32\Agjmim32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3044 -
C:\Windows\SysWOW64\Ajjfkh32.exeC:\Windows\system32\Ajjfkh32.exe35⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Bccjdnbi.exeC:\Windows\system32\Bccjdnbi.exe36⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\Bmkomchi.exeC:\Windows\system32\Bmkomchi.exe37⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\Baigca32.exeC:\Windows\system32\Baigca32.exe38⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\Blchcpko.exeC:\Windows\system32\Blchcpko.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Bbonei32.exeC:\Windows\system32\Bbonei32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\Chlfnp32.exeC:\Windows\system32\Chlfnp32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\Chnbcpmn.exeC:\Windows\system32\Chnbcpmn.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2708 -
C:\Windows\SysWOW64\Caidaeak.exeC:\Windows\system32\Caidaeak.exe43⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\Cffljlpc.exeC:\Windows\system32\Cffljlpc.exe44⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Cheido32.exeC:\Windows\system32\Cheido32.exe45⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Cmbalfem.exeC:\Windows\system32\Cmbalfem.exe46⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\Dmdnbecj.exeC:\Windows\system32\Dmdnbecj.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\Dbafjlaa.exeC:\Windows\system32\Dbafjlaa.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Dljkcb32.exeC:\Windows\system32\Dljkcb32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Dhplhc32.exeC:\Windows\system32\Dhplhc32.exe50⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\Daipqhdg.exeC:\Windows\system32\Daipqhdg.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:1064 -
C:\Windows\SysWOW64\Dkadjn32.exeC:\Windows\system32\Dkadjn32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\Ddiibc32.exeC:\Windows\system32\Ddiibc32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Eoompl32.exeC:\Windows\system32\Eoompl32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Ehgbhbgn.exeC:\Windows\system32\Ehgbhbgn.exe55⤵
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\Endjaief.exeC:\Windows\system32\Endjaief.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Eabcggll.exeC:\Windows\system32\Eabcggll.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:2568 -
C:\Windows\SysWOW64\Ejmhkiig.exeC:\Windows\system32\Ejmhkiig.exe58⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\Ejpdai32.exeC:\Windows\system32\Ejpdai32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\Fchijone.exeC:\Windows\system32\Fchijone.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\Fheabelm.exeC:\Windows\system32\Fheabelm.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Fqlicclo.exeC:\Windows\system32\Fqlicclo.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Ffibkj32.exeC:\Windows\system32\Ffibkj32.exe63⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\Fkejcq32.exeC:\Windows\system32\Fkejcq32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\Fhikme32.exeC:\Windows\system32\Fhikme32.exe65⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\Fbbofjnh.exeC:\Windows\system32\Fbbofjnh.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Fdpkbf32.exeC:\Windows\system32\Fdpkbf32.exe67⤵PID:3064
-
C:\Windows\SysWOW64\Fnipkkdl.exeC:\Windows\system32\Fnipkkdl.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2284 -
C:\Windows\SysWOW64\Findhdcb.exeC:\Windows\system32\Findhdcb.exe69⤵PID:2896
-
C:\Windows\SysWOW64\Gbfiaj32.exeC:\Windows\system32\Gbfiaj32.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:1952 -
C:\Windows\SysWOW64\Gjbmelgm.exeC:\Windows\system32\Gjbmelgm.exe71⤵PID:1676
-
C:\Windows\SysWOW64\Gghkdp32.exeC:\Windows\system32\Gghkdp32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:768 -
C:\Windows\SysWOW64\Gfmgelil.exeC:\Windows\system32\Gfmgelil.exe73⤵
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\Gpelnb32.exeC:\Windows\system32\Gpelnb32.exe74⤵PID:2312
-
C:\Windows\SysWOW64\Hmjlhfof.exeC:\Windows\system32\Hmjlhfof.exe75⤵PID:1828
-
C:\Windows\SysWOW64\Hphidanj.exeC:\Windows\system32\Hphidanj.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2424 -
C:\Windows\SysWOW64\Hhcmhdke.exeC:\Windows\system32\Hhcmhdke.exe77⤵PID:2484
-
C:\Windows\SysWOW64\Hibjbgbh.exeC:\Windows\system32\Hibjbgbh.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\Hlafnbal.exeC:\Windows\system32\Hlafnbal.exe79⤵
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\Hdlkcdog.exeC:\Windows\system32\Hdlkcdog.exe80⤵PID:2652
-
C:\Windows\SysWOW64\Helgmg32.exeC:\Windows\system32\Helgmg32.exe81⤵
- Modifies registry class
PID:2828 -
C:\Windows\SysWOW64\Iegjqk32.exeC:\Windows\system32\Iegjqk32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\Iiecgjba.exeC:\Windows\system32\Iiecgjba.exe83⤵
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\Ielclkhe.exeC:\Windows\system32\Ielclkhe.exe84⤵PID:1820
-
C:\Windows\SysWOW64\Jabdql32.exeC:\Windows\system32\Jabdql32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2956 -
C:\Windows\SysWOW64\Jaeafklf.exeC:\Windows\system32\Jaeafklf.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\Jnkakl32.exeC:\Windows\system32\Jnkakl32.exe87⤵PID:1308
-
C:\Windows\SysWOW64\Jdejhfig.exeC:\Windows\system32\Jdejhfig.exe88⤵
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Jplkmgol.exeC:\Windows\system32\Jplkmgol.exe89⤵
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\Jlckbh32.exeC:\Windows\system32\Jlckbh32.exe90⤵
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Knbhlkkc.exeC:\Windows\system32\Knbhlkkc.exe91⤵
- Drops file in System32 directory
PID:1832 -
C:\Windows\SysWOW64\Kfnmpn32.exeC:\Windows\system32\Kfnmpn32.exe92⤵
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\Kcamjb32.exeC:\Windows\system32\Kcamjb32.exe93⤵
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\Kkmand32.exeC:\Windows\system32\Kkmand32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\Kkoncdcp.exeC:\Windows\system32\Kkoncdcp.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2752 -
C:\Windows\SysWOW64\Kgfoie32.exeC:\Windows\system32\Kgfoie32.exe96⤵PID:1568
-
C:\Windows\SysWOW64\Lqncaj32.exeC:\Windows\system32\Lqncaj32.exe97⤵PID:2644
-
C:\Windows\SysWOW64\Lkdhoc32.exeC:\Windows\system32\Lkdhoc32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1724 -
C:\Windows\SysWOW64\Lqqpgj32.exeC:\Windows\system32\Lqqpgj32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Lkfddc32.exeC:\Windows\system32\Lkfddc32.exe100⤵
- Drops file in System32 directory
PID:1296 -
C:\Windows\SysWOW64\Ljkaeo32.exeC:\Windows\system32\Ljkaeo32.exe101⤵
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Lohjnf32.exeC:\Windows\system32\Lohjnf32.exe102⤵PID:1104
-
C:\Windows\SysWOW64\Lmljgj32.exeC:\Windows\system32\Lmljgj32.exe103⤵PID:940
-
C:\Windows\SysWOW64\Lbicoamh.exeC:\Windows\system32\Lbicoamh.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1604 -
C:\Windows\SysWOW64\Mmogmjmn.exeC:\Windows\system32\Mmogmjmn.exe105⤵
- Drops file in System32 directory
PID:1052 -
C:\Windows\SysWOW64\Miehak32.exeC:\Windows\system32\Miehak32.exe106⤵PID:2888
-
C:\Windows\SysWOW64\Mfihkoal.exeC:\Windows\system32\Mfihkoal.exe107⤵
- Modifies registry class
PID:2056 -
C:\Windows\SysWOW64\Mpamde32.exeC:\Windows\system32\Mpamde32.exe108⤵PID:2940
-
C:\Windows\SysWOW64\Mijamjnm.exeC:\Windows\system32\Mijamjnm.exe109⤵PID:2584
-
C:\Windows\SysWOW64\Meabakda.exeC:\Windows\system32\Meabakda.exe110⤵PID:2396
-
C:\Windows\SysWOW64\Mnifja32.exeC:\Windows\system32\Mnifja32.exe111⤵PID:2544
-
C:\Windows\SysWOW64\Nmnclmoj.exeC:\Windows\system32\Nmnclmoj.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:932 -
C:\Windows\SysWOW64\Nfghdcfj.exeC:\Windows\system32\Nfghdcfj.exe113⤵PID:2280
-
C:\Windows\SysWOW64\Npolmh32.exeC:\Windows\system32\Npolmh32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2172 -
C:\Windows\SysWOW64\Nfkapb32.exeC:\Windows\system32\Nfkapb32.exe115⤵
- Drops file in System32 directory
PID:1080 -
C:\Windows\SysWOW64\Npdfhhhe.exeC:\Windows\system32\Npdfhhhe.exe116⤵
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\Oiljam32.exeC:\Windows\system32\Oiljam32.exe117⤵
- Modifies registry class
PID:916 -
C:\Windows\SysWOW64\Okpcoe32.exeC:\Windows\system32\Okpcoe32.exe118⤵PID:1632
-
C:\Windows\SysWOW64\Obgkpb32.exeC:\Windows\system32\Obgkpb32.exe119⤵
- Drops file in System32 directory
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Okbpde32.exeC:\Windows\system32\Okbpde32.exe120⤵
- Modifies registry class
PID:2264 -
C:\Windows\SysWOW64\Odjdmjgo.exeC:\Windows\system32\Odjdmjgo.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2516 -
C:\Windows\SysWOW64\Opaebkmc.exeC:\Windows\system32\Opaebkmc.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2256 -
C:\Windows\SysWOW64\Oaqbln32.exeC:\Windows\system32\Oaqbln32.exe123⤵
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Pmgbao32.exeC:\Windows\system32\Pmgbao32.exe124⤵
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Pincfpoo.exeC:\Windows\system32\Pincfpoo.exe125⤵PID:1528
-
C:\Windows\SysWOW64\Pcghof32.exeC:\Windows\system32\Pcghof32.exe126⤵PID:1184
-
C:\Windows\SysWOW64\Ppkhhjei.exeC:\Windows\system32\Ppkhhjei.exe127⤵PID:1580
-
C:\Windows\SysWOW64\Plaimk32.exeC:\Windows\system32\Plaimk32.exe128⤵
- Drops file in System32 directory
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\Qkffng32.exeC:\Windows\system32\Qkffng32.exe129⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2220 -
C:\Windows\SysWOW64\Qfljkp32.exeC:\Windows\system32\Qfljkp32.exe130⤵PID:1436
-
C:\Windows\SysWOW64\Qackpado.exeC:\Windows\system32\Qackpado.exe131⤵PID:1524
-
C:\Windows\SysWOW64\Akkoig32.exeC:\Windows\system32\Akkoig32.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1396 -
C:\Windows\SysWOW64\Aknlofim.exeC:\Windows\system32\Aknlofim.exe133⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Adfqgl32.exeC:\Windows\system32\Adfqgl32.exe134⤵PID:2772
-
C:\Windows\SysWOW64\Aopahjll.exeC:\Windows\system32\Aopahjll.exe135⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\Bnldjekl.exeC:\Windows\system32\Bnldjekl.exe136⤵PID:556
-
C:\Windows\SysWOW64\Bgdibkam.exeC:\Windows\system32\Bgdibkam.exe137⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Bammlq32.exeC:\Windows\system32\Bammlq32.exe138⤵PID:2724
-
C:\Windows\SysWOW64\Bgffhkoj.exeC:\Windows\system32\Bgffhkoj.exe139⤵PID:1476
-
C:\Windows\SysWOW64\Bejfao32.exeC:\Windows\system32\Bejfao32.exe140⤵PID:560
-
C:\Windows\SysWOW64\Cjgoje32.exeC:\Windows\system32\Cjgoje32.exe141⤵
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\Cjjkpe32.exeC:\Windows\system32\Cjjkpe32.exe142⤵
- Drops file in System32 directory
PID:1312 -
C:\Windows\SysWOW64\Cfpldf32.exeC:\Windows\system32\Cfpldf32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2688 -
C:\Windows\SysWOW64\Ccdmnj32.exeC:\Windows\system32\Ccdmnj32.exe144⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\Ciaefa32.exeC:\Windows\system32\Ciaefa32.exe145⤵PID:1712
-
C:\Windows\SysWOW64\Cpkmcldj.exeC:\Windows\system32\Cpkmcldj.exe146⤵PID:2576
-
C:\Windows\SysWOW64\Cicalakk.exeC:\Windows\system32\Cicalakk.exe147⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2720 -
C:\Windows\SysWOW64\Difnaqih.exeC:\Windows\system32\Difnaqih.exe148⤵PID:1928
-
C:\Windows\SysWOW64\Dbncjf32.exeC:\Windows\system32\Dbncjf32.exe149⤵PID:1624
-
C:\Windows\SysWOW64\Dlfgcl32.exeC:\Windows\system32\Dlfgcl32.exe150⤵PID:620
-
C:\Windows\SysWOW64\Deollamj.exeC:\Windows\system32\Deollamj.exe151⤵
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\Dphmloih.exeC:\Windows\system32\Dphmloih.exe152⤵PID:1404
-
C:\Windows\SysWOW64\Dknajh32.exeC:\Windows\system32\Dknajh32.exe153⤵
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Dbifnj32.exeC:\Windows\system32\Dbifnj32.exe154⤵PID:1924
-
C:\Windows\SysWOW64\Dkqnoh32.exeC:\Windows\system32\Dkqnoh32.exe155⤵
- Modifies registry class
PID:3024 -
C:\Windows\SysWOW64\Eldglp32.exeC:\Windows\system32\Eldglp32.exe156⤵PID:684
-
C:\Windows\SysWOW64\Eobchk32.exeC:\Windows\system32\Eobchk32.exe157⤵PID:1584
-
C:\Windows\SysWOW64\Eihgfd32.exeC:\Windows\system32\Eihgfd32.exe158⤵
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Eoepnk32.exeC:\Windows\system32\Eoepnk32.exe159⤵
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\Eeohkeoe.exeC:\Windows\system32\Eeohkeoe.exe160⤵PID:2656
-
C:\Windows\SysWOW64\Ecbhdi32.exeC:\Windows\system32\Ecbhdi32.exe161⤵
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\Eoiiijcc.exeC:\Windows\system32\Eoiiijcc.exe162⤵PID:1196
-
C:\Windows\SysWOW64\Edfbaabj.exeC:\Windows\system32\Edfbaabj.exe163⤵
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\Fkpjnkig.exeC:\Windows\system32\Fkpjnkig.exe164⤵PID:1260
-
C:\Windows\SysWOW64\Fcnkhmdp.exeC:\Windows\system32\Fcnkhmdp.exe165⤵
- Modifies registry class
PID:2840 -
C:\Windows\SysWOW64\Fjhcegll.exeC:\Windows\system32\Fjhcegll.exe166⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\Flhmfbim.exeC:\Windows\system32\Flhmfbim.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1836 -
C:\Windows\SysWOW64\Fcbecl32.exeC:\Windows\system32\Fcbecl32.exe168⤵PID:1876
-
C:\Windows\SysWOW64\Fqfemqod.exeC:\Windows\system32\Fqfemqod.exe169⤵PID:2148
-
C:\Windows\SysWOW64\Gcgnnlle.exeC:\Windows\system32\Gcgnnlle.exe170⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\Gnaooi32.exeC:\Windows\system32\Gnaooi32.exe171⤵PID:2392
-
C:\Windows\SysWOW64\Gkephn32.exeC:\Windows\system32\Gkephn32.exe172⤵PID:2416
-
C:\Windows\SysWOW64\Gkglnm32.exeC:\Windows\system32\Gkglnm32.exe173⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Gqdefddb.exeC:\Windows\system32\Gqdefddb.exe174⤵
- Modifies registry class
PID:2476 -
C:\Windows\SysWOW64\Hqfaldbo.exeC:\Windows\system32\Hqfaldbo.exe175⤵PID:1916
-
C:\Windows\SysWOW64\Hjofdi32.exeC:\Windows\system32\Hjofdi32.exe176⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1452 -
C:\Windows\SysWOW64\Hmoofdea.exeC:\Windows\system32\Hmoofdea.exe177⤵
- Modifies registry class
PID:1480 -
C:\Windows\SysWOW64\Hjcppidk.exeC:\Windows\system32\Hjcppidk.exe178⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\Hihlqeib.exeC:\Windows\system32\Hihlqeib.exe179⤵PID:2836
-
C:\Windows\SysWOW64\Hneeilgj.exeC:\Windows\system32\Hneeilgj.exe180⤵PID:2660
-
C:\Windows\SysWOW64\Ibcnojnp.exeC:\Windows\system32\Ibcnojnp.exe181⤵PID:2976
-
C:\Windows\SysWOW64\Injndk32.exeC:\Windows\system32\Injndk32.exe182⤵PID:920
-
C:\Windows\SysWOW64\Ilnomp32.exeC:\Windows\system32\Ilnomp32.exe183⤵PID:1944
-
C:\Windows\SysWOW64\Iakgefqe.exeC:\Windows\system32\Iakgefqe.exe184⤵
- Modifies registry class
PID:2560 -
C:\Windows\SysWOW64\Iamdkfnc.exeC:\Windows\system32\Iamdkfnc.exe185⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2848 -
C:\Windows\SysWOW64\Ijehdl32.exeC:\Windows\system32\Ijehdl32.exe186⤵PID:2872
-
C:\Windows\SysWOW64\Jbqmhnbo.exeC:\Windows\system32\Jbqmhnbo.exe187⤵
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\Jliaac32.exeC:\Windows\system32\Jliaac32.exe188⤵PID:1412
-
C:\Windows\SysWOW64\Jfofol32.exeC:\Windows\system32\Jfofol32.exe189⤵PID:2812
-
C:\Windows\SysWOW64\Jpgjgboe.exeC:\Windows\system32\Jpgjgboe.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2488 -
C:\Windows\SysWOW64\Jlnklcej.exeC:\Windows\system32\Jlnklcej.exe191⤵PID:2128
-
C:\Windows\SysWOW64\Khielcfh.exeC:\Windows\system32\Khielcfh.exe192⤵PID:2124
-
C:\Windows\SysWOW64\Khkbbc32.exeC:\Windows\system32\Khkbbc32.exe193⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2228 -
C:\Windows\SysWOW64\Knhjjj32.exeC:\Windows\system32\Knhjjj32.exe194⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Kgqocoin.exeC:\Windows\system32\Kgqocoin.exe195⤵PID:2156
-
C:\Windows\SysWOW64\Klngkfge.exeC:\Windows\system32\Klngkfge.exe196⤵PID:2520
-
C:\Windows\SysWOW64\Klpdaf32.exeC:\Windows\system32\Klpdaf32.exe197⤵
- Modifies registry class
PID:1408 -
C:\Windows\SysWOW64\Lcjlnpmo.exeC:\Windows\system32\Lcjlnpmo.exe198⤵
- Drops file in System32 directory
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\Lpnmgdli.exeC:\Windows\system32\Lpnmgdli.exe199⤵PID:1696
-
C:\Windows\SysWOW64\Ljfapjbi.exeC:\Windows\system32\Ljfapjbi.exe200⤵PID:1644
-
C:\Windows\SysWOW64\Lfmbek32.exeC:\Windows\system32\Lfmbek32.exe201⤵PID:3108
-
C:\Windows\SysWOW64\Lnhgim32.exeC:\Windows\system32\Lnhgim32.exe202⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3148 -
C:\Windows\SysWOW64\Lhnkffeo.exeC:\Windows\system32\Lhnkffeo.exe203⤵PID:3188
-
C:\Windows\SysWOW64\Lbfook32.exeC:\Windows\system32\Lbfook32.exe204⤵PID:3228
-
C:\Windows\SysWOW64\Mnmpdlac.exeC:\Windows\system32\Mnmpdlac.exe205⤵PID:3268
-
C:\Windows\SysWOW64\Mnomjl32.exeC:\Windows\system32\Mnomjl32.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3308 -
C:\Windows\SysWOW64\Mggabaea.exeC:\Windows\system32\Mggabaea.exe207⤵PID:3348
-
C:\Windows\SysWOW64\Mqpflg32.exeC:\Windows\system32\Mqpflg32.exe208⤵PID:3388
-
C:\Windows\SysWOW64\Mikjpiim.exeC:\Windows\system32\Mikjpiim.exe209⤵PID:3428
-
C:\Windows\SysWOW64\Mbcoio32.exeC:\Windows\system32\Mbcoio32.exe210⤵
- Drops file in System32 directory
PID:3468 -
C:\Windows\SysWOW64\Nbflno32.exeC:\Windows\system32\Nbflno32.exe211⤵PID:3512
-
C:\Windows\SysWOW64\Npjlhcmd.exeC:\Windows\system32\Npjlhcmd.exe212⤵
- Drops file in System32 directory
PID:3552 -
C:\Windows\SysWOW64\Nibqqh32.exeC:\Windows\system32\Nibqqh32.exe213⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3592 -
C:\Windows\SysWOW64\Nbjeinje.exeC:\Windows\system32\Nbjeinje.exe214⤵PID:3636
-
C:\Windows\SysWOW64\Njfjnpgp.exeC:\Windows\system32\Njfjnpgp.exe215⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3676 -
C:\Windows\SysWOW64\Ncnngfna.exeC:\Windows\system32\Ncnngfna.exe216⤵PID:3716
-
C:\Windows\SysWOW64\Nmfbpk32.exeC:\Windows\system32\Nmfbpk32.exe217⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3756 -
C:\Windows\SysWOW64\Nhlgmd32.exeC:\Windows\system32\Nhlgmd32.exe218⤵PID:3796
-
C:\Windows\SysWOW64\Oadkej32.exeC:\Windows\system32\Oadkej32.exe219⤵PID:3836
-
C:\Windows\SysWOW64\Ojmpooah.exeC:\Windows\system32\Ojmpooah.exe220⤵PID:3876
-
C:\Windows\SysWOW64\Ofcqcp32.exeC:\Windows\system32\Ofcqcp32.exe221⤵
- Drops file in System32 directory
PID:3916 -
C:\Windows\SysWOW64\Oplelf32.exeC:\Windows\system32\Oplelf32.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3956 -
C:\Windows\SysWOW64\Oidiekdn.exeC:\Windows\system32\Oidiekdn.exe223⤵PID:3996
-
C:\Windows\SysWOW64\Opnbbe32.exeC:\Windows\system32\Opnbbe32.exe224⤵PID:4036
-
C:\Windows\SysWOW64\Oiffkkbk.exeC:\Windows\system32\Oiffkkbk.exe225⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4076 -
C:\Windows\SysWOW64\Obokcqhk.exeC:\Windows\system32\Obokcqhk.exe226⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3088 -
C:\Windows\SysWOW64\Pofkha32.exeC:\Windows\system32\Pofkha32.exe227⤵PID:3140
-
C:\Windows\SysWOW64\Pepcelel.exeC:\Windows\system32\Pepcelel.exe228⤵PID:3184
-
C:\Windows\SysWOW64\Pljlbf32.exeC:\Windows\system32\Pljlbf32.exe229⤵
- Modifies registry class
PID:3244 -
C:\Windows\SysWOW64\Pebpkk32.exeC:\Windows\system32\Pebpkk32.exe230⤵PID:3284
-
C:\Windows\SysWOW64\Pkoicb32.exeC:\Windows\system32\Pkoicb32.exe231⤵
- Drops file in System32 directory
- Modifies registry class
PID:3336 -
C:\Windows\SysWOW64\Pplaki32.exeC:\Windows\system32\Pplaki32.exe232⤵
- Drops file in System32 directory
PID:3380 -
C:\Windows\SysWOW64\Pmpbdm32.exeC:\Windows\system32\Pmpbdm32.exe233⤵PID:3400
-
C:\Windows\SysWOW64\Pghfnc32.exeC:\Windows\system32\Pghfnc32.exe234⤵PID:3484
-
C:\Windows\SysWOW64\Qcogbdkg.exeC:\Windows\system32\Qcogbdkg.exe235⤵
- Modifies registry class
PID:3548 -
C:\Windows\SysWOW64\Qlgkki32.exeC:\Windows\system32\Qlgkki32.exe236⤵PID:3588
-
C:\Windows\SysWOW64\Qeppdo32.exeC:\Windows\system32\Qeppdo32.exe237⤵PID:3628
-
C:\Windows\SysWOW64\Alihaioe.exeC:\Windows\system32\Alihaioe.exe238⤵
- Drops file in System32 directory
PID:3684 -
C:\Windows\SysWOW64\Aohdmdoh.exeC:\Windows\system32\Aohdmdoh.exe239⤵PID:3688
-
C:\Windows\SysWOW64\Apgagg32.exeC:\Windows\system32\Apgagg32.exe240⤵PID:3804
-
C:\Windows\SysWOW64\Ajpepm32.exeC:\Windows\system32\Ajpepm32.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3832 -