Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 07:39
Behavioral task
behavioral1
Sample
3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe
-
Size
109KB
-
MD5
3f231e88353def58846761f484ef6b90
-
SHA1
dcd1426487430b3a3124614e3fcf89442394e6aa
-
SHA256
b239c6d63f9028ef01ab887ea1f52cd2768a2a4cfff642f47f74065c823aaaaf
-
SHA512
09fa8af2aa0394c86101be1be605eb5aeb07b8cd6e247e33fc8d8a77ed6aeff6984874230d64787bef5d67028c24bb7f8eba9c8acc9084250a1bd658c5fe7000
-
SSDEEP
3072:35VAC/26nvSy4J9/LCqwzBu1DjHLMVDqqkSpR:3MCeE/4J9zwtu1DjrFqhz
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Libjncnc.exeJkchmo32.exeEmgioakg.exeEpbbkf32.exeGkebafoa.exeFpoolael.exeGcbabpcf.exeHmmbqegc.exeAlqnah32.exeHnmeen32.exeLjkaeo32.exeAodkci32.exeFjegog32.exeBjkhdacm.exeBbmcibjp.exeQemldifo.exeHdbpekam.exeIeibdnnp.exeCileqlmg.exeOecmogln.exeDafoikjb.exeCcbbachm.exeEfjmbaba.exeFihfnp32.exeHcgjmo32.exeQgjccb32.exeGkmbmh32.exeBlfapfpg.exeBmnnkl32.exeAobpfb32.exeEikfdl32.exeGmpjagfa.exeMlhnifmq.exeObgkpb32.exeOiffkkbk.exeHfhfhbce.exeKenhopmf.exeJeqopcld.exeLjnqdhga.exeJfmkbebl.exeJcciqi32.exeKkoncdcp.exePgbdodnh.exeBffbdadk.exeEkdchf32.exePldebkhj.exeCnnnnh32.exeNjeccjcd.exeFgocmc32.exeKfbfkmeh.exeQdaglmcb.exeKlbdgb32.exeEoblnd32.exeFliook32.exePalepb32.exeQdojgmfe.exeEgikjh32.exeIikifegp.exeIfjlcmmj.exeDboeco32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libjncnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jkchmo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emgioakg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epbbkf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkebafoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fpoolael.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcbabpcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hmmbqegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Alqnah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hnmeen32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljkaeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aodkci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjegog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjkhdacm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbmcibjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qemldifo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hdbpekam.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieibdnnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cileqlmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oecmogln.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dafoikjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gkebafoa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccbbachm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efjmbaba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fihfnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcgjmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qgjccb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gkmbmh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blfapfpg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmnnkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aobpfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eikfdl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdbpekam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmpjagfa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlhnifmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Obgkpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oiffkkbk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfhfhbce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kenhopmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jeqopcld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ljnqdhga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfmkbebl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcciqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkoncdcp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgbdodnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bffbdadk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekdchf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pldebkhj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnnnnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njeccjcd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgocmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kfbfkmeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qdaglmcb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klbdgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eoblnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fliook32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Palepb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qdojgmfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egikjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iikifegp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ifjlcmmj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bffbdadk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cileqlmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dboeco32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/2256-0-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Gmpjagfa.exe family_berbew behavioral1/memory/2256-6-0x0000000000220000-0x0000000000264000-memory.dmp family_berbew C:\Windows\SysWOW64\Gpabcbdb.exe family_berbew behavioral1/memory/1696-14-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2868-27-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Gildahhp.exe family_berbew behavioral1/memory/2868-39-0x0000000000260000-0x00000000002A4000-memory.dmp family_berbew behavioral1/memory/2604-41-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2604-49-0x00000000003B0000-0x00000000003F4000-memory.dmp family_berbew \Windows\SysWOW64\Hmjlhfof.exe family_berbew behavioral1/memory/2556-62-0x00000000001B0000-0x00000000001F4000-memory.dmp family_berbew \Windows\SysWOW64\Hfbaql32.exe family_berbew \Windows\SysWOW64\Hnmeen32.exe family_berbew behavioral1/memory/2416-79-0x0000000000220000-0x0000000000264000-memory.dmp family_berbew \Windows\SysWOW64\Hhejnc32.exe family_berbew behavioral1/memory/2388-88-0x0000000000220000-0x0000000000264000-memory.dmp family_berbew behavioral1/memory/2808-100-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Hbknkl32.exe family_berbew behavioral1/memory/2320-109-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Hlccdboi.exe family_berbew \Windows\SysWOW64\Ifoqjo32.exe family_berbew behavioral1/memory/2320-117-0x0000000000220000-0x0000000000264000-memory.dmp family_berbew \Windows\SysWOW64\Ilofhffj.exe family_berbew \Windows\SysWOW64\Iegjqk32.exe family_berbew \Windows\SysWOW64\Ioooiack.exe family_berbew \Windows\SysWOW64\Ihhcbf32.exe family_berbew C:\Windows\SysWOW64\Iigpli32.exe family_berbew behavioral1/memory/2080-201-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Jbpdeogo.exe family_berbew behavioral1/memory/2108-215-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2064-226-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Jhoice32.exe family_berbew behavioral1/memory/1424-238-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/1128-249-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/1676-260-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Jjdofm32.exe family_berbew behavioral1/memory/1300-282-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2892-293-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2284-318-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/1564-325-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2284-324-0x0000000000220000-0x0000000000264000-memory.dmp family_berbew behavioral1/memory/1564-337-0x0000000000220000-0x0000000000264000-memory.dmp family_berbew behavioral1/memory/2276-335-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2632-361-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2872-368-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Lbnpkmfg.exe family_berbew C:\Windows\SysWOW64\Lqcmmjko.exe family_berbew behavioral1/memory/2532-394-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2396-405-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2256-407-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Lcdfnehp.exe family_berbew C:\Windows\SysWOW64\Lmljgj32.exe family_berbew C:\Windows\SysWOW64\Micklk32.exe family_berbew C:\Windows\SysWOW64\Mchoid32.exe family_berbew behavioral1/memory/2656-451-0x0000000000260000-0x00000000002A4000-memory.dmp family_berbew behavioral1/memory/2416-455-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2324-460-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2388-471-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/1468-477-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2172-476-0x0000000000450000-0x0000000000494000-memory.dmp family_berbew C:\Windows\SysWOW64\Mbpipp32.exe family_berbew C:\Windows\SysWOW64\Mlhnifmq.exe family_berbew behavioral1/memory/2320-487-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Gmpjagfa.exeGpabcbdb.exeGildahhp.exeHmjlhfof.exeHfbaql32.exeHnmeen32.exeHhejnc32.exeHbknkl32.exeHlccdboi.exeIfoqjo32.exeIlofhffj.exeIegjqk32.exeIoooiack.exeIhhcbf32.exeIigpli32.exeJbpdeogo.exeJofejpmc.exeJhoice32.exeJnkakl32.exeJgdfdbhk.exeJaijak32.exeJjdofm32.exeKfkpknkq.exeKgkleabc.exeKpcqnf32.exeKbdmeoob.exeKfbfkmeh.exeKkoncdcp.exeLkakicam.exeLdjpbign.exeLbnpkmfg.exeLqcmmjko.exeLjkaeo32.exeLcdfnehp.exeLmljgj32.exeMicklk32.exeMchoid32.exeMkddnf32.exeMihdgkpp.exeMbpipp32.exeMlhnifmq.exeNecogkbo.exeNjpgpbpf.exeNhdhif32.exeNdkhngdd.exeNeqnqofm.exeOhojmjep.exeOhagbj32.exeObgkpb32.exeOhcdhi32.exeOonldcih.exeOdjdmjgo.exeOmcifpnp.exeOkgjodmi.exeOaqbln32.exePgnjde32.exePmgbao32.exePdakniag.exePlmpblnb.exePgbdodnh.exePlolgk32.exePalepb32.exePlaimk32.exePldebkhj.exepid process 1696 Gmpjagfa.exe 2868 Gpabcbdb.exe 2604 Gildahhp.exe 2556 Hmjlhfof.exe 2416 Hfbaql32.exe 2388 Hnmeen32.exe 2808 Hhejnc32.exe 2320 Hbknkl32.exe 1816 Hlccdboi.exe 2652 Ifoqjo32.exe 1480 Ilofhffj.exe 2212 Iegjqk32.exe 2576 Ioooiack.exe 1656 Ihhcbf32.exe 2080 Iigpli32.exe 2108 Jbpdeogo.exe 2064 Jofejpmc.exe 1424 Jhoice32.exe 1128 Jnkakl32.exe 1676 Jgdfdbhk.exe 972 Jaijak32.exe 1300 Jjdofm32.exe 2892 Kfkpknkq.exe 2772 Kgkleabc.exe 2284 Kpcqnf32.exe 1564 Kbdmeoob.exe 2276 Kfbfkmeh.exe 1576 Kkoncdcp.exe 2632 Lkakicam.exe 2872 Ldjpbign.exe 2692 Lbnpkmfg.exe 2532 Lqcmmjko.exe 2396 Ljkaeo32.exe 2596 Lcdfnehp.exe 1308 Lmljgj32.exe 1164 Micklk32.exe 2656 Mchoid32.exe 2324 Mkddnf32.exe 2172 Mihdgkpp.exe 1468 Mbpipp32.exe 2496 Mlhnifmq.exe 1660 Necogkbo.exe 2740 Njpgpbpf.exe 1712 Nhdhif32.exe 2136 Ndkhngdd.exe 1588 Neqnqofm.exe 2920 Ohojmjep.exe 3064 Ohagbj32.exe 600 Obgkpb32.exe 1504 Ohcdhi32.exe 2040 Oonldcih.exe 908 Odjdmjgo.exe 1644 Omcifpnp.exe 2588 Okgjodmi.exe 2908 Oaqbln32.exe 2684 Pgnjde32.exe 2848 Pmgbao32.exe 2244 Pdakniag.exe 1744 Plmpblnb.exe 1412 Pgbdodnh.exe 2672 Plolgk32.exe 876 Palepb32.exe 2056 Plaimk32.exe 2304 Pldebkhj.exe -
Loads dropped DLL 64 IoCs
Processes:
3f231e88353def58846761f484ef6b90_NeikiAnalytics.exeGmpjagfa.exeGpabcbdb.exeGildahhp.exeHmjlhfof.exeHfbaql32.exeHnmeen32.exeHhejnc32.exeHbknkl32.exeHlccdboi.exeIfoqjo32.exeIlofhffj.exeIegjqk32.exeIoooiack.exeIhhcbf32.exeIigpli32.exeJbpdeogo.exeJofejpmc.exeJhoice32.exeJnkakl32.exeJgdfdbhk.exeJaijak32.exeJjdofm32.exeKfkpknkq.exeKgkleabc.exeKpcqnf32.exeKbdmeoob.exeKfbfkmeh.exeKkoncdcp.exeLkakicam.exeLdjpbign.exeLbnpkmfg.exepid process 2256 3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe 2256 3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe 1696 Gmpjagfa.exe 1696 Gmpjagfa.exe 2868 Gpabcbdb.exe 2868 Gpabcbdb.exe 2604 Gildahhp.exe 2604 Gildahhp.exe 2556 Hmjlhfof.exe 2556 Hmjlhfof.exe 2416 Hfbaql32.exe 2416 Hfbaql32.exe 2388 Hnmeen32.exe 2388 Hnmeen32.exe 2808 Hhejnc32.exe 2808 Hhejnc32.exe 2320 Hbknkl32.exe 2320 Hbknkl32.exe 1816 Hlccdboi.exe 1816 Hlccdboi.exe 2652 Ifoqjo32.exe 2652 Ifoqjo32.exe 1480 Ilofhffj.exe 1480 Ilofhffj.exe 2212 Iegjqk32.exe 2212 Iegjqk32.exe 2576 Ioooiack.exe 2576 Ioooiack.exe 1656 Ihhcbf32.exe 1656 Ihhcbf32.exe 2080 Iigpli32.exe 2080 Iigpli32.exe 2108 Jbpdeogo.exe 2108 Jbpdeogo.exe 2064 Jofejpmc.exe 2064 Jofejpmc.exe 1424 Jhoice32.exe 1424 Jhoice32.exe 1128 Jnkakl32.exe 1128 Jnkakl32.exe 1676 Jgdfdbhk.exe 1676 Jgdfdbhk.exe 972 Jaijak32.exe 972 Jaijak32.exe 1300 Jjdofm32.exe 1300 Jjdofm32.exe 2892 Kfkpknkq.exe 2892 Kfkpknkq.exe 2772 Kgkleabc.exe 2772 Kgkleabc.exe 2284 Kpcqnf32.exe 2284 Kpcqnf32.exe 1564 Kbdmeoob.exe 1564 Kbdmeoob.exe 2276 Kfbfkmeh.exe 2276 Kfbfkmeh.exe 1576 Kkoncdcp.exe 1576 Kkoncdcp.exe 2632 Lkakicam.exe 2632 Lkakicam.exe 2872 Ldjpbign.exe 2872 Ldjpbign.exe 2692 Lbnpkmfg.exe 2692 Lbnpkmfg.exe -
Drops file in System32 directory 64 IoCs
Processes:
Palepb32.exeLcofio32.exeKkjpggkn.exeAkkoig32.exeNapbjjom.exeOpnbbe32.exeBlfapfpg.exeHcdgmimg.exeQemldifo.exeCjjnhnbl.exeOhojmjep.exeGkpfmnlb.exeEgmabg32.exeJigbebhb.exeIfoqjo32.exeEhkhaqpk.exeIimfld32.exeAbmgjo32.exeEinjdb32.exeDjocbqpb.exeMicklk32.exePlolgk32.exeFajbke32.exeEhlmljkm.exeJhoice32.exeOaqbln32.exeMcknhm32.exeJfmkbebl.exeBjkhdacm.exeFckhhgcf.exeGaagcpdl.exeLqcmmjko.exeOdjdmjgo.exeNlnpgd32.exeNecogkbo.exeEggndi32.exeFolfoj32.exeBkpeci32.exeLdbofgme.exeIjnkifgp.exeOecmogln.exeDafmqb32.exeHfcjdkpg.exeHifpke32.exeJeafjiop.exeCcbphk32.exeAcicla32.exeNjpgpbpf.exePmgbao32.exeAciqcifh.exeIfjlcmmj.exeMmdjkhdh.exeAdcdbl32.exeKlbdgb32.exeJmipdo32.exeJefbnacn.exe3f231e88353def58846761f484ef6b90_NeikiAnalytics.exeLdjpbign.exeLhknaf32.exedescription ioc process File created C:\Windows\SysWOW64\Plaimk32.exe Palepb32.exe File opened for modification C:\Windows\SysWOW64\Lhknaf32.exe Lcofio32.exe File created C:\Windows\SysWOW64\Kfaalh32.exe Kkjpggkn.exe File opened for modification C:\Windows\SysWOW64\Adcdbl32.exe Akkoig32.exe File created C:\Windows\SysWOW64\Nhcmgmam.dll Napbjjom.exe File created C:\Windows\SysWOW64\Oiffkkbk.exe Opnbbe32.exe File created C:\Windows\SysWOW64\Bfoeil32.exe Blfapfpg.exe File created C:\Windows\SysWOW64\Klncqmjg.dll Hcdgmimg.exe File created C:\Windows\SysWOW64\Ahfalc32.dll Qemldifo.exe File opened for modification C:\Windows\SysWOW64\Ccbbachm.exe Cjjnhnbl.exe File opened for modification C:\Windows\SysWOW64\Ohagbj32.exe Ohojmjep.exe File opened for modification C:\Windows\SysWOW64\Gqahqd32.exe Gkpfmnlb.exe File opened for modification C:\Windows\SysWOW64\Nlefhcnc.exe Napbjjom.exe File created C:\Windows\SysWOW64\Emgioakg.exe Egmabg32.exe File opened for modification C:\Windows\SysWOW64\Jndjmifj.exe Jigbebhb.exe File opened for modification C:\Windows\SysWOW64\Ilofhffj.exe Ifoqjo32.exe File created C:\Windows\SysWOW64\Eijdkcgn.exe Ehkhaqpk.exe File opened for modification C:\Windows\SysWOW64\Ibejdjln.exe Iimfld32.exe File created C:\Windows\SysWOW64\Bjkhdacm.exe Abmgjo32.exe File opened for modification C:\Windows\SysWOW64\Eipgjaoi.exe Einjdb32.exe File opened for modification C:\Windows\SysWOW64\Dcghkf32.exe Djocbqpb.exe File created C:\Windows\SysWOW64\Pcncbo32.dll Micklk32.exe File created C:\Windows\SysWOW64\Palepb32.exe Plolgk32.exe File created C:\Windows\SysWOW64\Kgfkgo32.dll Fajbke32.exe File opened for modification C:\Windows\SysWOW64\Einjdb32.exe Ehlmljkm.exe File created C:\Windows\SysWOW64\Poeofkoh.dll Jhoice32.exe File created C:\Windows\SysWOW64\Pgnjde32.exe Oaqbln32.exe File opened for modification C:\Windows\SysWOW64\Mdogedmh.exe Mcknhm32.exe File opened for modification C:\Windows\SysWOW64\Jmfcop32.exe Jfmkbebl.exe File created C:\Windows\SysWOW64\Godonkii.dll Bjkhdacm.exe File opened for modification C:\Windows\SysWOW64\Fpohakbp.exe Fckhhgcf.exe File opened for modification C:\Windows\SysWOW64\Hkjkle32.exe Gaagcpdl.exe File created C:\Windows\SysWOW64\Ljkaeo32.exe Lqcmmjko.exe File created C:\Windows\SysWOW64\Lilfnc32.dll Odjdmjgo.exe File created C:\Windows\SysWOW64\Gqahqd32.exe Gkpfmnlb.exe File created C:\Windows\SysWOW64\Edeomgho.dll Nlnpgd32.exe File opened for modification C:\Windows\SysWOW64\Njpgpbpf.exe Necogkbo.exe File created C:\Windows\SysWOW64\Mihmog32.dll Eggndi32.exe File created C:\Windows\SysWOW64\Fajbke32.exe Folfoj32.exe File created C:\Windows\SysWOW64\Bbjmpcab.exe Bkpeci32.exe File created C:\Windows\SysWOW64\Lddlkg32.exe Ldbofgme.exe File created C:\Windows\SysWOW64\Mmjplobo.dll Ijnkifgp.exe File created C:\Windows\SysWOW64\Meoaif32.dll Oecmogln.exe File opened for modification C:\Windows\SysWOW64\Dgbeiiqe.exe Dafmqb32.exe File created C:\Windows\SysWOW64\Hmmbqegc.exe Hfcjdkpg.exe File opened for modification C:\Windows\SysWOW64\Hlgimqhf.exe Hifpke32.exe File created C:\Windows\SysWOW64\Jioopgef.exe Jeafjiop.exe File opened for modification C:\Windows\SysWOW64\Ciohqa32.exe Ccbphk32.exe File created C:\Windows\SysWOW64\Onlahm32.exe Oecmogln.exe File created C:\Windows\SysWOW64\Fmiogi32.dll Acicla32.exe File created C:\Windows\SysWOW64\Nhdhif32.exe Njpgpbpf.exe File created C:\Windows\SysWOW64\Pdakniag.exe Pmgbao32.exe File opened for modification C:\Windows\SysWOW64\Anneqafn.exe Aciqcifh.exe File created C:\Windows\SysWOW64\Jbqmhnbo.exe Ifjlcmmj.exe File created C:\Windows\SysWOW64\Jhjpijfl.dll Ldbofgme.exe File created C:\Windows\SysWOW64\Qggfio32.dll Mmdjkhdh.exe File created C:\Windows\SysWOW64\Dhjojo32.dll Adcdbl32.exe File created C:\Windows\SysWOW64\Khielcfh.exe Klbdgb32.exe File created C:\Windows\SysWOW64\Nmogcf32.dll Gaagcpdl.exe File created C:\Windows\SysWOW64\Jcciqi32.exe Jmipdo32.exe File opened for modification C:\Windows\SysWOW64\Jplfkjbd.exe Jefbnacn.exe File created C:\Windows\SysWOW64\Ngfpmcbo.dll 3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Kjnmgq32.dll Ldjpbign.exe File created C:\Windows\SysWOW64\Ljlmgnqj.dll Lhknaf32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2556 2604 WerFault.exe Lbjofi32.exe -
Modifies registry class 64 IoCs
Processes:
Ljkaeo32.exeQldhkc32.exeKfbfkmeh.exeCcbphk32.exeEkdchf32.exeEddeladm.exeJpdnbbah.exeKmegjdad.exeOalkih32.exeQmhahkdj.exeCjogcm32.exeJgdfdbhk.exeKjokokha.exeAgolnbok.exeDjiqdb32.exeNjbfnjeg.exeEikfdl32.exeMkddnf32.exeLonpma32.exeBmnnkl32.exeJlnmel32.exeOaqbln32.exeFkecij32.exeIimfld32.exeKeqkofno.exeIcncgf32.exeCiohqa32.exeHmmbqegc.exeLcofio32.exeFmaeho32.exeNapbjjom.exeFdqnkoep.exeMlafkb32.exePgbdodnh.exeAihfap32.exeCeeieced.exeMmdjkhdh.exeNbflno32.exeCcgklc32.exeJbqmhnbo.exeClojhf32.exeFgocmc32.exeOhdfqbio.exeBnochnpm.exeDboeco32.exeAodkci32.exeCiihklpj.exeFpohakbp.exeHnpdcf32.exeNeqnqofm.exeKpcqnf32.exeOplelf32.exeAobpfb32.exeBlkjkflb.exeHhejnc32.exeAckmih32.exeMdghaf32.exeJeqopcld.exeJpigma32.exeQemldifo.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Heapkela.dll" Ljkaeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qldhkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kfbfkmeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdaemiaj.dll" Ccbphk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ekdchf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eddeladm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfdoodan.dll" Jpdnbbah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kmegjdad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oalkih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qmhahkdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghdjfq32.dll" Cjogcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jgdfdbhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kjokokha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Agolnbok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbahid32.dll" Djiqdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njbfnjeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eikfdl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkddnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjlkhpje.dll" Lonpma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bmnnkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmnfciac.dll" Jlnmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmmnhb32.dll" Oaqbln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fkecij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iimfld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Keqkofno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njboon32.dll" Icncgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ciohqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hmmbqegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgknkqan.dll" Lcofio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fmaeho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Napbjjom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fdqnkoep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlafkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgcfig32.dll" Pgbdodnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aihfap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ceeieced.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmdjkhdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nbflno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ccgklc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jbqmhnbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Clojhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbceme32.dll" Fgocmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ohdfqbio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bnochnpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njmokcbh.dll" Dboeco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aodkci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ciohqa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ciihklpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fpohakbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oqelhkhc.dll" Hnpdcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Neqnqofm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kpcqnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dafqii32.dll" Oplelf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ohdfqbio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chfkee32.dll" Aobpfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blkjkflb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hhejnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ackmih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mdghaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jeqopcld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aobpfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mahlae32.dll" Jpigma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahfalc32.dll" Qemldifo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aobpfb32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3f231e88353def58846761f484ef6b90_NeikiAnalytics.exeGmpjagfa.exeGpabcbdb.exeGildahhp.exeHmjlhfof.exeHfbaql32.exeHnmeen32.exeHhejnc32.exeHbknkl32.exeHlccdboi.exeIfoqjo32.exeIlofhffj.exeIegjqk32.exeIoooiack.exeIhhcbf32.exeIigpli32.exedescription pid process target process PID 2256 wrote to memory of 1696 2256 3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe Gmpjagfa.exe PID 2256 wrote to memory of 1696 2256 3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe Gmpjagfa.exe PID 2256 wrote to memory of 1696 2256 3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe Gmpjagfa.exe PID 2256 wrote to memory of 1696 2256 3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe Gmpjagfa.exe PID 1696 wrote to memory of 2868 1696 Gmpjagfa.exe Gpabcbdb.exe PID 1696 wrote to memory of 2868 1696 Gmpjagfa.exe Gpabcbdb.exe PID 1696 wrote to memory of 2868 1696 Gmpjagfa.exe Gpabcbdb.exe PID 1696 wrote to memory of 2868 1696 Gmpjagfa.exe Gpabcbdb.exe PID 2868 wrote to memory of 2604 2868 Gpabcbdb.exe Gildahhp.exe PID 2868 wrote to memory of 2604 2868 Gpabcbdb.exe Gildahhp.exe PID 2868 wrote to memory of 2604 2868 Gpabcbdb.exe Gildahhp.exe PID 2868 wrote to memory of 2604 2868 Gpabcbdb.exe Gildahhp.exe PID 2604 wrote to memory of 2556 2604 Gildahhp.exe Hmjlhfof.exe PID 2604 wrote to memory of 2556 2604 Gildahhp.exe Hmjlhfof.exe PID 2604 wrote to memory of 2556 2604 Gildahhp.exe Hmjlhfof.exe PID 2604 wrote to memory of 2556 2604 Gildahhp.exe Hmjlhfof.exe PID 2556 wrote to memory of 2416 2556 Hmjlhfof.exe Hfbaql32.exe PID 2556 wrote to memory of 2416 2556 Hmjlhfof.exe Hfbaql32.exe PID 2556 wrote to memory of 2416 2556 Hmjlhfof.exe Hfbaql32.exe PID 2556 wrote to memory of 2416 2556 Hmjlhfof.exe Hfbaql32.exe PID 2416 wrote to memory of 2388 2416 Hfbaql32.exe Hnmeen32.exe PID 2416 wrote to memory of 2388 2416 Hfbaql32.exe Hnmeen32.exe PID 2416 wrote to memory of 2388 2416 Hfbaql32.exe Hnmeen32.exe PID 2416 wrote to memory of 2388 2416 Hfbaql32.exe Hnmeen32.exe PID 2388 wrote to memory of 2808 2388 Hnmeen32.exe Hhejnc32.exe PID 2388 wrote to memory of 2808 2388 Hnmeen32.exe Hhejnc32.exe PID 2388 wrote to memory of 2808 2388 Hnmeen32.exe Hhejnc32.exe PID 2388 wrote to memory of 2808 2388 Hnmeen32.exe Hhejnc32.exe PID 2808 wrote to memory of 2320 2808 Hhejnc32.exe Hbknkl32.exe PID 2808 wrote to memory of 2320 2808 Hhejnc32.exe Hbknkl32.exe PID 2808 wrote to memory of 2320 2808 Hhejnc32.exe Hbknkl32.exe PID 2808 wrote to memory of 2320 2808 Hhejnc32.exe Hbknkl32.exe PID 2320 wrote to memory of 1816 2320 Hbknkl32.exe Hlccdboi.exe PID 2320 wrote to memory of 1816 2320 Hbknkl32.exe Hlccdboi.exe PID 2320 wrote to memory of 1816 2320 Hbknkl32.exe Hlccdboi.exe PID 2320 wrote to memory of 1816 2320 Hbknkl32.exe Hlccdboi.exe PID 1816 wrote to memory of 2652 1816 Hlccdboi.exe Ifoqjo32.exe PID 1816 wrote to memory of 2652 1816 Hlccdboi.exe Ifoqjo32.exe PID 1816 wrote to memory of 2652 1816 Hlccdboi.exe Ifoqjo32.exe PID 1816 wrote to memory of 2652 1816 Hlccdboi.exe Ifoqjo32.exe PID 2652 wrote to memory of 1480 2652 Ifoqjo32.exe Ilofhffj.exe PID 2652 wrote to memory of 1480 2652 Ifoqjo32.exe Ilofhffj.exe PID 2652 wrote to memory of 1480 2652 Ifoqjo32.exe Ilofhffj.exe PID 2652 wrote to memory of 1480 2652 Ifoqjo32.exe Ilofhffj.exe PID 1480 wrote to memory of 2212 1480 Ilofhffj.exe Iegjqk32.exe PID 1480 wrote to memory of 2212 1480 Ilofhffj.exe Iegjqk32.exe PID 1480 wrote to memory of 2212 1480 Ilofhffj.exe Iegjqk32.exe PID 1480 wrote to memory of 2212 1480 Ilofhffj.exe Iegjqk32.exe PID 2212 wrote to memory of 2576 2212 Iegjqk32.exe Ioooiack.exe PID 2212 wrote to memory of 2576 2212 Iegjqk32.exe Ioooiack.exe PID 2212 wrote to memory of 2576 2212 Iegjqk32.exe Ioooiack.exe PID 2212 wrote to memory of 2576 2212 Iegjqk32.exe Ioooiack.exe PID 2576 wrote to memory of 1656 2576 Ioooiack.exe Ihhcbf32.exe PID 2576 wrote to memory of 1656 2576 Ioooiack.exe Ihhcbf32.exe PID 2576 wrote to memory of 1656 2576 Ioooiack.exe Ihhcbf32.exe PID 2576 wrote to memory of 1656 2576 Ioooiack.exe Ihhcbf32.exe PID 1656 wrote to memory of 2080 1656 Ihhcbf32.exe Iigpli32.exe PID 1656 wrote to memory of 2080 1656 Ihhcbf32.exe Iigpli32.exe PID 1656 wrote to memory of 2080 1656 Ihhcbf32.exe Iigpli32.exe PID 1656 wrote to memory of 2080 1656 Ihhcbf32.exe Iigpli32.exe PID 2080 wrote to memory of 2108 2080 Iigpli32.exe Jbpdeogo.exe PID 2080 wrote to memory of 2108 2080 Iigpli32.exe Jbpdeogo.exe PID 2080 wrote to memory of 2108 2080 Iigpli32.exe Jbpdeogo.exe PID 2080 wrote to memory of 2108 2080 Iigpli32.exe Jbpdeogo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3f231e88353def58846761f484ef6b90_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\Gmpjagfa.exeC:\Windows\system32\Gmpjagfa.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Gpabcbdb.exeC:\Windows\system32\Gpabcbdb.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Gildahhp.exeC:\Windows\system32\Gildahhp.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Hmjlhfof.exeC:\Windows\system32\Hmjlhfof.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\Hfbaql32.exeC:\Windows\system32\Hfbaql32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\Hnmeen32.exeC:\Windows\system32\Hnmeen32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Hhejnc32.exeC:\Windows\system32\Hhejnc32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Hbknkl32.exeC:\Windows\system32\Hbknkl32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Hlccdboi.exeC:\Windows\system32\Hlccdboi.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Ifoqjo32.exeC:\Windows\system32\Ifoqjo32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Ilofhffj.exeC:\Windows\system32\Ilofhffj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\Iegjqk32.exeC:\Windows\system32\Iegjqk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\Ioooiack.exeC:\Windows\system32\Ioooiack.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Ihhcbf32.exeC:\Windows\system32\Ihhcbf32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Iigpli32.exeC:\Windows\system32\Iigpli32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Jbpdeogo.exeC:\Windows\system32\Jbpdeogo.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108 -
C:\Windows\SysWOW64\Jofejpmc.exeC:\Windows\system32\Jofejpmc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Windows\SysWOW64\Jhoice32.exeC:\Windows\system32\Jhoice32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1424 -
C:\Windows\SysWOW64\Jnkakl32.exeC:\Windows\system32\Jnkakl32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Windows\SysWOW64\Jgdfdbhk.exeC:\Windows\system32\Jgdfdbhk.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Jaijak32.exeC:\Windows\system32\Jaijak32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:972 -
C:\Windows\SysWOW64\Jjdofm32.exeC:\Windows\system32\Jjdofm32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Windows\SysWOW64\Kfkpknkq.exeC:\Windows\system32\Kfkpknkq.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892 -
C:\Windows\SysWOW64\Kgkleabc.exeC:\Windows\system32\Kgkleabc.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Windows\SysWOW64\Kpcqnf32.exeC:\Windows\system32\Kpcqnf32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2284 -
C:\Windows\SysWOW64\Kbdmeoob.exeC:\Windows\system32\Kbdmeoob.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564 -
C:\Windows\SysWOW64\Kfbfkmeh.exeC:\Windows\system32\Kfbfkmeh.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Kkoncdcp.exeC:\Windows\system32\Kkoncdcp.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1576 -
C:\Windows\SysWOW64\Lkakicam.exeC:\Windows\system32\Lkakicam.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Windows\SysWOW64\Ldjpbign.exeC:\Windows\system32\Ldjpbign.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\Lbnpkmfg.exeC:\Windows\system32\Lbnpkmfg.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Windows\SysWOW64\Lqcmmjko.exeC:\Windows\system32\Lqcmmjko.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2532 -
C:\Windows\SysWOW64\Ljkaeo32.exeC:\Windows\system32\Ljkaeo32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Lcdfnehp.exeC:\Windows\system32\Lcdfnehp.exe35⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Lmljgj32.exeC:\Windows\system32\Lmljgj32.exe36⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\Micklk32.exeC:\Windows\system32\Micklk32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1164 -
C:\Windows\SysWOW64\Mchoid32.exeC:\Windows\system32\Mchoid32.exe38⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\Mkddnf32.exeC:\Windows\system32\Mkddnf32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:2324 -
C:\Windows\SysWOW64\Mihdgkpp.exeC:\Windows\system32\Mihdgkpp.exe40⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\Mbpipp32.exeC:\Windows\system32\Mbpipp32.exe41⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\Mlhnifmq.exeC:\Windows\system32\Mlhnifmq.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\Necogkbo.exeC:\Windows\system32\Necogkbo.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\Njpgpbpf.exeC:\Windows\system32\Njpgpbpf.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\Nhdhif32.exeC:\Windows\system32\Nhdhif32.exe45⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Ndkhngdd.exeC:\Windows\system32\Ndkhngdd.exe46⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\Neqnqofm.exeC:\Windows\system32\Neqnqofm.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Ohojmjep.exeC:\Windows\system32\Ohojmjep.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\Ohagbj32.exeC:\Windows\system32\Ohagbj32.exe49⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Obgkpb32.exeC:\Windows\system32\Obgkpb32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:600 -
C:\Windows\SysWOW64\Ohcdhi32.exeC:\Windows\system32\Ohcdhi32.exe51⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Oonldcih.exeC:\Windows\system32\Oonldcih.exe52⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\Odjdmjgo.exeC:\Windows\system32\Odjdmjgo.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\Omcifpnp.exeC:\Windows\system32\Omcifpnp.exe54⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\Ohhmcinf.exeC:\Windows\system32\Ohhmcinf.exe55⤵PID:2052
-
C:\Windows\SysWOW64\Okgjodmi.exeC:\Windows\system32\Okgjodmi.exe56⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Oaqbln32.exeC:\Windows\system32\Oaqbln32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Pgnjde32.exeC:\Windows\system32\Pgnjde32.exe58⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Pmgbao32.exeC:\Windows\system32\Pmgbao32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Pdakniag.exeC:\Windows\system32\Pdakniag.exe60⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Plmpblnb.exeC:\Windows\system32\Plmpblnb.exe61⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Pgbdodnh.exeC:\Windows\system32\Pgbdodnh.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1412 -
C:\Windows\SysWOW64\Plolgk32.exeC:\Windows\system32\Plolgk32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\Palepb32.exeC:\Windows\system32\Palepb32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\Plaimk32.exeC:\Windows\system32\Plaimk32.exe65⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Pldebkhj.exeC:\Windows\system32\Pldebkhj.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\Qaqnkafa.exeC:\Windows\system32\Qaqnkafa.exe67⤵PID:3008
-
C:\Windows\SysWOW64\Qdojgmfe.exeC:\Windows\system32\Qdojgmfe.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2904 -
C:\Windows\SysWOW64\Qododfek.exeC:\Windows\system32\Qododfek.exe69⤵PID:268
-
C:\Windows\SysWOW64\Qdaglmcb.exeC:\Windows\system32\Qdaglmcb.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2760 -
C:\Windows\SysWOW64\Akkoig32.exeC:\Windows\system32\Akkoig32.exe71⤵
- Drops file in System32 directory
PID:2020 -
C:\Windows\SysWOW64\Adcdbl32.exeC:\Windows\system32\Adcdbl32.exe72⤵
- Drops file in System32 directory
PID:1032 -
C:\Windows\SysWOW64\Ajqljc32.exeC:\Windows\system32\Ajqljc32.exe73⤵PID:1236
-
C:\Windows\SysWOW64\Aciqcifh.exeC:\Windows\system32\Aciqcifh.exe74⤵
- Drops file in System32 directory
PID:1740 -
C:\Windows\SysWOW64\Anneqafn.exeC:\Windows\system32\Anneqafn.exe75⤵PID:2600
-
C:\Windows\SysWOW64\Ackmih32.exeC:\Windows\system32\Ackmih32.exe76⤵
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Aihfap32.exeC:\Windows\system32\Aihfap32.exe77⤵
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Acnjnh32.exeC:\Windows\system32\Acnjnh32.exe78⤵PID:2436
-
C:\Windows\SysWOW64\Ajgbkbjp.exeC:\Windows\system32\Ajgbkbjp.exe79⤵PID:1104
-
C:\Windows\SysWOW64\Aodkci32.exeC:\Windows\system32\Aodkci32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Bkklhjnk.exeC:\Windows\system32\Bkklhjnk.exe81⤵PID:1916
-
C:\Windows\SysWOW64\Bgblmk32.exeC:\Windows\system32\Bgblmk32.exe82⤵PID:1516
-
C:\Windows\SysWOW64\Bajqfq32.exeC:\Windows\system32\Bajqfq32.exe83⤵PID:2152
-
C:\Windows\SysWOW64\Bkpeci32.exeC:\Windows\system32\Bkpeci32.exe84⤵
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\Bbjmpcab.exeC:\Windows\system32\Bbjmpcab.exe85⤵PID:2816
-
C:\Windows\SysWOW64\Bgffhkoj.exeC:\Windows\system32\Bgffhkoj.exe86⤵PID:2176
-
C:\Windows\SysWOW64\Bmcnqama.exeC:\Windows\system32\Bmcnqama.exe87⤵PID:2360
-
C:\Windows\SysWOW64\Bflbigdb.exeC:\Windows\system32\Bflbigdb.exe88⤵PID:3016
-
C:\Windows\SysWOW64\Cfnoogbo.exeC:\Windows\system32\Cfnoogbo.exe89⤵PID:1356
-
C:\Windows\SysWOW64\Ccbphk32.exeC:\Windows\system32\Ccbphk32.exe90⤵
- Drops file in System32 directory
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Ciohqa32.exeC:\Windows\system32\Ciohqa32.exe91⤵
- Modifies registry class
PID:616 -
C:\Windows\SysWOW64\Ccdmnj32.exeC:\Windows\system32\Ccdmnj32.exe92⤵PID:3024
-
C:\Windows\SysWOW64\Ceeieced.exeC:\Windows\system32\Ceeieced.exe93⤵
- Modifies registry class
PID:376 -
C:\Windows\SysWOW64\Cnnnnh32.exeC:\Windows\system32\Cnnnnh32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2060 -
C:\Windows\SysWOW64\Cehfkb32.exeC:\Windows\system32\Cehfkb32.exe95⤵PID:2164
-
C:\Windows\SysWOW64\Dejbqb32.exeC:\Windows\system32\Dejbqb32.exe96⤵PID:804
-
C:\Windows\SysWOW64\Dhiomn32.exeC:\Windows\system32\Dhiomn32.exe97⤵PID:2112
-
C:\Windows\SysWOW64\Dbncjf32.exeC:\Windows\system32\Dbncjf32.exe98⤵PID:2688
-
C:\Windows\SysWOW64\Doecog32.exeC:\Windows\system32\Doecog32.exe99⤵PID:2488
-
C:\Windows\SysWOW64\Deollamj.exeC:\Windows\system32\Deollamj.exe100⤵PID:1484
-
C:\Windows\SysWOW64\Dogpdg32.exeC:\Windows\system32\Dogpdg32.exe101⤵PID:2148
-
C:\Windows\SysWOW64\Dafmqb32.exeC:\Windows\system32\Dafmqb32.exe102⤵
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\Dgbeiiqe.exeC:\Windows\system32\Dgbeiiqe.exe103⤵PID:2120
-
C:\Windows\SysWOW64\Dahifbpk.exeC:\Windows\system32\Dahifbpk.exe104⤵PID:2200
-
C:\Windows\SysWOW64\Dbifnj32.exeC:\Windows\system32\Dbifnj32.exe105⤵PID:976
-
C:\Windows\SysWOW64\Edibhmml.exeC:\Windows\system32\Edibhmml.exe106⤵PID:1496
-
C:\Windows\SysWOW64\Eggndi32.exeC:\Windows\system32\Eggndi32.exe107⤵
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Egikjh32.exeC:\Windows\system32\Egikjh32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2828 -
C:\Windows\SysWOW64\Ehkhaqpk.exeC:\Windows\system32\Ehkhaqpk.exe109⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\Eijdkcgn.exeC:\Windows\system32\Eijdkcgn.exe110⤵PID:2880
-
C:\Windows\SysWOW64\Eogmcjef.exeC:\Windows\system32\Eogmcjef.exe111⤵PID:2504
-
C:\Windows\SysWOW64\Eddeladm.exeC:\Windows\system32\Eddeladm.exe112⤵
- Modifies registry class
PID:888 -
C:\Windows\SysWOW64\Eoiiijcc.exeC:\Windows\system32\Eoiiijcc.exe113⤵PID:1812
-
C:\Windows\SysWOW64\Folfoj32.exeC:\Windows\system32\Folfoj32.exe114⤵
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Fajbke32.exeC:\Windows\system32\Fajbke32.exe115⤵
- Drops file in System32 directory
PID:1400 -
C:\Windows\SysWOW64\Fjegog32.exeC:\Windows\system32\Fjegog32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1792 -
C:\Windows\SysWOW64\Fpoolael.exeC:\Windows\system32\Fpoolael.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2928 -
C:\Windows\SysWOW64\Fkecij32.exeC:\Windows\system32\Fkecij32.exe118⤵
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Fqalaa32.exeC:\Windows\system32\Fqalaa32.exe119⤵PID:2756
-
C:\Windows\SysWOW64\Flhmfbim.exeC:\Windows\system32\Flhmfbim.exe120⤵PID:2208
-
C:\Windows\SysWOW64\Fogibnha.exeC:\Windows\system32\Fogibnha.exe121⤵PID:2132
-
C:\Windows\SysWOW64\Fmkilb32.exeC:\Windows\system32\Fmkilb32.exe122⤵PID:2700
-
C:\Windows\SysWOW64\Gkpfmnlb.exeC:\Windows\system32\Gkpfmnlb.exe123⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\Gqahqd32.exeC:\Windows\system32\Gqahqd32.exe124⤵PID:2252
-
C:\Windows\SysWOW64\Gcbabpcf.exeC:\Windows\system32\Gcbabpcf.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2560 -
C:\Windows\SysWOW64\Hfcjdkpg.exeC:\Windows\system32\Hfcjdkpg.exe126⤵
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\Hmmbqegc.exeC:\Windows\system32\Hmmbqegc.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Hcgjmo32.exeC:\Windows\system32\Hcgjmo32.exe128⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1948 -
C:\Windows\SysWOW64\Hidcef32.exeC:\Windows\system32\Hidcef32.exe129⤵PID:2964
-
C:\Windows\SysWOW64\Hifpke32.exeC:\Windows\system32\Hifpke32.exe130⤵
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\Hlgimqhf.exeC:\Windows\system32\Hlgimqhf.exe131⤵PID:2340
-
C:\Windows\SysWOW64\Iikifegp.exeC:\Windows\system32\Iikifegp.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2968 -
C:\Windows\SysWOW64\Iimfld32.exeC:\Windows\system32\Iimfld32.exe133⤵
- Drops file in System32 directory
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Ibejdjln.exeC:\Windows\system32\Ibejdjln.exe134⤵PID:2068
-
C:\Windows\SysWOW64\Ifgpnmom.exeC:\Windows\system32\Ifgpnmom.exe135⤵PID:2724
-
C:\Windows\SysWOW64\Ifjlcmmj.exeC:\Windows\system32\Ifjlcmmj.exe136⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:980 -
C:\Windows\SysWOW64\Jbqmhnbo.exeC:\Windows\system32\Jbqmhnbo.exe137⤵
- Modifies registry class
PID:1052 -
C:\Windows\SysWOW64\Jpdnbbah.exeC:\Windows\system32\Jpdnbbah.exe138⤵
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Jeafjiop.exeC:\Windows\system32\Jeafjiop.exe139⤵
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\Jioopgef.exeC:\Windows\system32\Jioopgef.exe140⤵PID:2592
-
C:\Windows\SysWOW64\Jpigma32.exeC:\Windows\system32\Jpigma32.exe141⤵
- Modifies registry class
PID:1304 -
C:\Windows\SysWOW64\Jkchmo32.exeC:\Windows\system32\Jkchmo32.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2452 -
C:\Windows\SysWOW64\Klbdgb32.exeC:\Windows\system32\Klbdgb32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1220 -
C:\Windows\SysWOW64\Khielcfh.exeC:\Windows\system32\Khielcfh.exe144⤵PID:1336
-
C:\Windows\SysWOW64\Khkbbc32.exeC:\Windows\system32\Khkbbc32.exe145⤵PID:1856
-
C:\Windows\SysWOW64\Kjokokha.exeC:\Windows\system32\Kjokokha.exe146⤵
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\Kcgphp32.exeC:\Windows\system32\Kcgphp32.exe147⤵PID:828
-
C:\Windows\SysWOW64\Lonpma32.exeC:\Windows\system32\Lonpma32.exe148⤵
- Modifies registry class
PID:3012 -
C:\Windows\SysWOW64\Lhfefgkg.exeC:\Windows\system32\Lhfefgkg.exe149⤵PID:2644
-
C:\Windows\SysWOW64\Lboiol32.exeC:\Windows\system32\Lboiol32.exe150⤵PID:1224
-
C:\Windows\SysWOW64\Lcofio32.exeC:\Windows\system32\Lcofio32.exe151⤵
- Drops file in System32 directory
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Lhknaf32.exeC:\Windows\system32\Lhknaf32.exe152⤵
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\Lkjjma32.exeC:\Windows\system32\Lkjjma32.exe153⤵PID:1724
-
C:\Windows\SysWOW64\Ldbofgme.exeC:\Windows\system32\Ldbofgme.exe154⤵
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\Lddlkg32.exeC:\Windows\system32\Lddlkg32.exe155⤵PID:1952
-
C:\Windows\SysWOW64\Mdghaf32.exeC:\Windows\system32\Mdghaf32.exe156⤵
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\Mmdjkhdh.exeC:\Windows\system32\Mmdjkhdh.exe157⤵
- Drops file in System32 directory
- Modifies registry class
PID:2196 -
C:\Windows\SysWOW64\Mjhjdm32.exeC:\Windows\system32\Mjhjdm32.exe158⤵PID:1080
-
C:\Windows\SysWOW64\Mcqombic.exeC:\Windows\system32\Mcqombic.exe159⤵PID:2720
-
C:\Windows\SysWOW64\Nbflno32.exeC:\Windows\system32\Nbflno32.exe160⤵
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Nlnpgd32.exeC:\Windows\system32\Nlnpgd32.exe161⤵
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\Nfdddm32.exeC:\Windows\system32\Nfdddm32.exe162⤵PID:1936
-
C:\Windows\SysWOW64\Nidmfh32.exeC:\Windows\system32\Nidmfh32.exe163⤵PID:2552
-
C:\Windows\SysWOW64\Napbjjom.exeC:\Windows\system32\Napbjjom.exe164⤵
- Drops file in System32 directory
- Modifies registry class
PID:1388 -
C:\Windows\SysWOW64\Nlefhcnc.exeC:\Windows\system32\Nlefhcnc.exe165⤵PID:2440
-
C:\Windows\SysWOW64\Nenkqi32.exeC:\Windows\system32\Nenkqi32.exe166⤵PID:368
-
C:\Windows\SysWOW64\Opglafab.exeC:\Windows\system32\Opglafab.exe167⤵PID:2032
-
C:\Windows\SysWOW64\Opihgfop.exeC:\Windows\system32\Opihgfop.exe168⤵PID:432
-
C:\Windows\SysWOW64\Oibmpl32.exeC:\Windows\system32\Oibmpl32.exe169⤵PID:816
-
C:\Windows\SysWOW64\Oplelf32.exeC:\Windows\system32\Oplelf32.exe170⤵
- Modifies registry class
PID:2696 -
C:\Windows\SysWOW64\Opnbbe32.exeC:\Windows\system32\Opnbbe32.exe171⤵
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\Oiffkkbk.exeC:\Windows\system32\Oiffkkbk.exe172⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1860 -
C:\Windows\SysWOW64\Oococb32.exeC:\Windows\system32\Oococb32.exe173⤵PID:464
-
C:\Windows\SysWOW64\Pkjphcff.exeC:\Windows\system32\Pkjphcff.exe174⤵PID:3048
-
C:\Windows\SysWOW64\Phnpagdp.exeC:\Windows\system32\Phnpagdp.exe175⤵PID:1084
-
C:\Windows\SysWOW64\Pnbojmmp.exeC:\Windows\system32\Pnbojmmp.exe176⤵PID:1604
-
C:\Windows\SysWOW64\Qgjccb32.exeC:\Windows\system32\Qgjccb32.exe177⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2980 -
C:\Windows\SysWOW64\Aohdmdoh.exeC:\Windows\system32\Aohdmdoh.exe178⤵PID:2380
-
C:\Windows\SysWOW64\Agolnbok.exeC:\Windows\system32\Agolnbok.exe179⤵
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Afdiondb.exeC:\Windows\system32\Afdiondb.exe180⤵PID:2948
-
C:\Windows\SysWOW64\Achjibcl.exeC:\Windows\system32\Achjibcl.exe181⤵PID:2900
-
C:\Windows\SysWOW64\Alqnah32.exeC:\Windows\system32\Alqnah32.exe182⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2408 -
C:\Windows\SysWOW64\Abmgjo32.exeC:\Windows\system32\Abmgjo32.exe183⤵
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Bjkhdacm.exeC:\Windows\system32\Bjkhdacm.exe184⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3044 -
C:\Windows\SysWOW64\Bmnnkl32.exeC:\Windows\system32\Bmnnkl32.exe185⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Bffbdadk.exeC:\Windows\system32\Bffbdadk.exe186⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2744 -
C:\Windows\SysWOW64\Bbmcibjp.exeC:\Windows\system32\Bbmcibjp.exe187⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1640 -
C:\Windows\SysWOW64\Coacbfii.exeC:\Windows\system32\Coacbfii.exe188⤵PID:2296
-
C:\Windows\SysWOW64\Ciihklpj.exeC:\Windows\system32\Ciihklpj.exe189⤵
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\Cocphf32.exeC:\Windows\system32\Cocphf32.exe190⤵PID:2472
-
C:\Windows\SysWOW64\Cileqlmg.exeC:\Windows\system32\Cileqlmg.exe191⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2508 -
C:\Windows\SysWOW64\Cbdiia32.exeC:\Windows\system32\Cbdiia32.exe192⤵PID:2336
-
C:\Windows\SysWOW64\Cinafkkd.exeC:\Windows\system32\Cinafkkd.exe193⤵PID:3076
-
C:\Windows\SysWOW64\Ckmnbg32.exeC:\Windows\system32\Ckmnbg32.exe194⤵PID:3120
-
C:\Windows\SysWOW64\Clojhf32.exeC:\Windows\system32\Clojhf32.exe195⤵
- Modifies registry class
PID:3168 -
C:\Windows\SysWOW64\Cmpgpond.exeC:\Windows\system32\Cmpgpond.exe196⤵PID:3208
-
C:\Windows\SysWOW64\Cfhkhd32.exeC:\Windows\system32\Cfhkhd32.exe197⤵PID:3248
-
C:\Windows\SysWOW64\Dcllbhdn.exeC:\Windows\system32\Dcllbhdn.exe198⤵PID:3288
-
C:\Windows\SysWOW64\Djiqdb32.exeC:\Windows\system32\Djiqdb32.exe199⤵
- Modifies registry class
PID:3328 -
C:\Windows\SysWOW64\Dfpaic32.exeC:\Windows\system32\Dfpaic32.exe200⤵PID:3368
-
C:\Windows\SysWOW64\Dokfme32.exeC:\Windows\system32\Dokfme32.exe201⤵PID:3408
-
C:\Windows\SysWOW64\Domccejd.exeC:\Windows\system32\Domccejd.exe202⤵PID:3448
-
C:\Windows\SysWOW64\Ekdchf32.exeC:\Windows\system32\Ekdchf32.exe203⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\Eoblnd32.exeC:\Windows\system32\Eoblnd32.exe204⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3528 -
C:\Windows\SysWOW64\Egmabg32.exeC:\Windows\system32\Egmabg32.exe205⤵
- Drops file in System32 directory
PID:3568 -
C:\Windows\SysWOW64\Emgioakg.exeC:\Windows\system32\Emgioakg.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3608 -
C:\Windows\SysWOW64\Ehlmljkm.exeC:\Windows\system32\Ehlmljkm.exe207⤵
- Drops file in System32 directory
PID:3648 -
C:\Windows\SysWOW64\Einjdb32.exeC:\Windows\system32\Einjdb32.exe208⤵
- Drops file in System32 directory
PID:3692 -
C:\Windows\SysWOW64\Eipgjaoi.exeC:\Windows\system32\Eipgjaoi.exe209⤵PID:3732
-
C:\Windows\SysWOW64\Fdekgjno.exeC:\Windows\system32\Fdekgjno.exe210⤵PID:3772
-
C:\Windows\SysWOW64\Fckhhgcf.exeC:\Windows\system32\Fckhhgcf.exe211⤵
- Drops file in System32 directory
PID:3812 -
C:\Windows\SysWOW64\Fpohakbp.exeC:\Windows\system32\Fpohakbp.exe212⤵
- Modifies registry class
PID:3852 -
C:\Windows\SysWOW64\Fkhibino.exeC:\Windows\system32\Fkhibino.exe213⤵PID:3892
-
C:\Windows\SysWOW64\Fdqnkoep.exeC:\Windows\system32\Fdqnkoep.exe214⤵
- Modifies registry class
PID:3932 -
C:\Windows\SysWOW64\Gkmbmh32.exeC:\Windows\system32\Gkmbmh32.exe215⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3972 -
C:\Windows\SysWOW64\Ghacfmic.exeC:\Windows\system32\Ghacfmic.exe216⤵PID:4012
-
C:\Windows\SysWOW64\Ggfpgi32.exeC:\Windows\system32\Ggfpgi32.exe217⤵PID:4052
-
C:\Windows\SysWOW64\Gnphdceh.exeC:\Windows\system32\Gnphdceh.exe218⤵PID:4092
-
C:\Windows\SysWOW64\Gnbejb32.exeC:\Windows\system32\Gnbejb32.exe219⤵PID:3108
-
C:\Windows\SysWOW64\Gconbj32.exeC:\Windows\system32\Gconbj32.exe220⤵PID:3176
-
C:\Windows\SysWOW64\Hinbppna.exeC:\Windows\system32\Hinbppna.exe221⤵PID:3228
-
C:\Windows\SysWOW64\Hcdgmimg.exeC:\Windows\system32\Hcdgmimg.exe222⤵
- Drops file in System32 directory
PID:3260 -
C:\Windows\SysWOW64\Hiqoeplo.exeC:\Windows\system32\Hiqoeplo.exe223⤵PID:3316
-
C:\Windows\SysWOW64\Hfepod32.exeC:\Windows\system32\Hfepod32.exe224⤵PID:3352
-
C:\Windows\SysWOW64\Hnpdcf32.exeC:\Windows\system32\Hnpdcf32.exe225⤵
- Modifies registry class
PID:3428 -
C:\Windows\SysWOW64\Haqnea32.exeC:\Windows\system32\Haqnea32.exe226⤵PID:3484
-
C:\Windows\SysWOW64\Ifpcchai.exeC:\Windows\system32\Ifpcchai.exe227⤵PID:3500
-
C:\Windows\SysWOW64\Ijnkifgp.exeC:\Windows\system32\Ijnkifgp.exe228⤵
- Drops file in System32 directory
PID:3564 -
C:\Windows\SysWOW64\Iejiodbl.exeC:\Windows\system32\Iejiodbl.exe229⤵PID:3628
-
C:\Windows\SysWOW64\Jigbebhb.exeC:\Windows\system32\Jigbebhb.exe230⤵
- Drops file in System32 directory
PID:3688 -
C:\Windows\SysWOW64\Jndjmifj.exeC:\Windows\system32\Jndjmifj.exe231⤵PID:3724
-
C:\Windows\SysWOW64\Jeqopcld.exeC:\Windows\system32\Jeqopcld.exe232⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3780 -
C:\Windows\SysWOW64\Jokqnhpa.exeC:\Windows\system32\Jokqnhpa.exe233⤵PID:3824
-
C:\Windows\SysWOW64\Klfjpa32.exeC:\Windows\system32\Klfjpa32.exe234⤵PID:3864
-
C:\Windows\SysWOW64\Kmegjdad.exeC:\Windows\system32\Kmegjdad.exe235⤵
- Modifies registry class
PID:3924 -
C:\Windows\SysWOW64\Keqkofno.exeC:\Windows\system32\Keqkofno.exe236⤵
- Modifies registry class
PID:3968 -
C:\Windows\SysWOW64\Khadpa32.exeC:\Windows\system32\Khadpa32.exe237⤵PID:4008
-
C:\Windows\SysWOW64\Kokmmkcm.exeC:\Windows\system32\Kokmmkcm.exe238⤵PID:4084
-
C:\Windows\SysWOW64\Legaoehg.exeC:\Windows\system32\Legaoehg.exe239⤵PID:3096
-
C:\Windows\SysWOW64\Ldmopa32.exeC:\Windows\system32\Ldmopa32.exe240⤵PID:3140
-
C:\Windows\SysWOW64\Ljigih32.exeC:\Windows\system32\Ljigih32.exe241⤵PID:3232
-