Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe
-
Size
163KB
-
MD5
20f2b9aa3ad6324e40f612b816e6c640
-
SHA1
d5c103f2b2ccda79fbee80ace4811e70b451eaa8
-
SHA256
5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e
-
SHA512
0d38feb7c1478673157d5bf0514d5252e32b48e6a7b5d0d4c61c5414e41609a27d8314719a736a75228a1c0dd1a2c5717f5e1c6a0be4c5879e1d495937b66522
-
SSDEEP
1536:PdaQB61cOdo6hUmxmIzj7ud9PIQg8wW/lProNVU4qNVUrk/9QbfBr+7GwKrPAsqE:lKfowrvPuwQgZQltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Poklngnf.exeBkegah32.exeMabphn32.exePnalad32.exeFdbhge32.exeGepafc32.exePkacpihj.exeGqiimfam.exeBgaebe32.exeCkhdggom.exeEjmhkiig.exePgpgjepk.exeNhiholof.exeJodhdp32.exeOhcdhi32.exeBajqfq32.exeNlnpgd32.exeAhgofi32.exeBhfcpb32.exeGnmifk32.exeMejlalji.exeBaigca32.exeDoecog32.exeCgpjlnhh.exeIhbqdh32.exeOnocmadb.exeHlgimqhf.exeKklkcn32.exeOplelf32.exeQdlggg32.exeNbniid32.exeOijjka32.exeBcmfmlen.exePldebkhj.exePggdejno.exeAfdgfelo.exeAkeijlfq.exeBehilopf.exeEejopecj.exeImahkg32.exeMdbiji32.exeHapklimq.exeFfkoai32.exeJlhhndno.exeKddomchg.exePokieo32.exeHjqqap32.exeNadimacd.exeOoclji32.exeFbdlkj32.exeMpebmc32.exeBbmcibjp.exeKncofa32.exeDljkcb32.exeHboddk32.exePdbdqh32.exeNemhhpmp.exeOehdan32.exeHpbbdfik.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Poklngnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkegah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mabphn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnalad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdbhge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gepafc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkacpihj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqiimfam.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gepafc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgaebe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckhdggom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejmhkiig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdbhge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgpgjepk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhiholof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jodhdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohcdhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bajqfq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlnpgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahgofi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhfcpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnmifk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mejlalji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baigca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doecog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgpjlnhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihbqdh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onocmadb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlgimqhf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kklkcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oplelf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qdlggg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbniid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oijjka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcmfmlen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pldebkhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pggdejno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afdgfelo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akeijlfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Behilopf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eejopecj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imahkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdbiji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hapklimq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jodhdp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnalad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffkoai32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlhhndno.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kddomchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pokieo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjqqap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nadimacd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ooclji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbdlkj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpebmc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbmcibjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kncofa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dljkcb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hboddk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdbdqh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nemhhpmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afdgfelo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oehdan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpbbdfik.exe -
Executes dropped EXE 64 IoCs
Processes:
Okanklik.exeOopfakpa.exePmjqcc32.exePokieo32.exePqjfoa32.exePbnoliap.exeQgmdjp32.exeQkkmqnck.exeAchojp32.exeAgfgqo32.exeAfkdakjb.exeAfnagk32.exeBecnhgmg.exeBiafnecn.exeBhfcpb32.exeCkiigmcd.exeCgpjlnhh.exeCddjebgb.exeClooiddm.exeDobdqo32.exeDdomif32.exeDgbcpq32.exeDgdpfp32.exeEjehgkdp.exeEjgemkbm.exeEjjbbkpj.exeEhoocgeb.exeEnlglnci.exeFgfhjcgg.exeFjlkgn32.exeFbgpkpnn.exeGcglec32.exeGfgegnbb.exeGppipc32.exeGeoonjeg.exeGngcgp32.exeHfbhkb32.exeHjqqap32.exeHmaick32.exeHpbbdfik.exeIhmgiiff.exeIeagbm32.exeIhbqdh32.exeIoliqbjn.exeIggned32.exeIamabm32.exeIdmkdh32.exeJnfomn32.exeJeadap32.exeJpfhoi32.exeJpiedieo.exeJcgapdeb.exeJhdihkcj.exeJcjnfdbp.exeKncofa32.exeKglcogeo.exeKbaglpee.exeKkileele.exeKdbpnk32.exeKklikejc.exeKmmebm32.exeKnmamp32.exeLfhfab32.exeLifbmn32.exepid process 2416 Okanklik.exe 2052 Oopfakpa.exe 2948 Pmjqcc32.exe 2656 Pokieo32.exe 1520 Pqjfoa32.exe 2540 Pbnoliap.exe 648 Qgmdjp32.exe 1184 Qkkmqnck.exe 2856 Achojp32.exe 2804 Agfgqo32.exe 1052 Afkdakjb.exe 1932 Afnagk32.exe 3068 Becnhgmg.exe 1740 Biafnecn.exe 2312 Bhfcpb32.exe 2204 Ckiigmcd.exe 2248 Cgpjlnhh.exe 1044 Cddjebgb.exe 2364 Clooiddm.exe 824 Dobdqo32.exe 1292 Ddomif32.exe 1956 Dgbcpq32.exe 2816 Dgdpfp32.exe 852 Ejehgkdp.exe 680 Ejgemkbm.exe 1708 Ejjbbkpj.exe 1976 Ehoocgeb.exe 1596 Enlglnci.exe 2568 Fgfhjcgg.exe 2748 Fjlkgn32.exe 2756 Fbgpkpnn.exe 1880 Gcglec32.exe 2476 Gfgegnbb.exe 516 Gppipc32.exe 2168 Geoonjeg.exe 1584 Gngcgp32.exe 672 Hfbhkb32.exe 2724 Hjqqap32.exe 1760 Hmaick32.exe 2564 Hpbbdfik.exe 1232 Ihmgiiff.exe 756 Ieagbm32.exe 2292 Ihbqdh32.exe 2068 Ioliqbjn.exe 2952 Iggned32.exe 2372 Iamabm32.exe 3052 Idmkdh32.exe 292 Jnfomn32.exe 1088 Jeadap32.exe 1952 Jpfhoi32.exe 1964 Jpiedieo.exe 2988 Jcgapdeb.exe 2984 Jhdihkcj.exe 2036 Jcjnfdbp.exe 3064 Kncofa32.exe 2664 Kglcogeo.exe 2624 Kbaglpee.exe 2636 Kkileele.exe 2008 Kdbpnk32.exe 2500 Kklikejc.exe 1864 Kmmebm32.exe 736 Knmamp32.exe 1324 Lfhfab32.exe 2916 Lifbmn32.exe -
Loads dropped DLL 64 IoCs
Processes:
5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exeOkanklik.exeOopfakpa.exePmjqcc32.exePokieo32.exePqjfoa32.exePbnoliap.exeQgmdjp32.exeQkkmqnck.exeAchojp32.exeAgfgqo32.exeAfkdakjb.exeAfnagk32.exeBecnhgmg.exeBiafnecn.exeBhfcpb32.exeCkiigmcd.exeCgpjlnhh.exeCddjebgb.exeClooiddm.exeDobdqo32.exeDdomif32.exeDgbcpq32.exeDgdpfp32.exeEjehgkdp.exeEjgemkbm.exeEjjbbkpj.exeEhoocgeb.exeEnlglnci.exeFgfhjcgg.exeFjlkgn32.exeFbgpkpnn.exepid process 2208 5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe 2208 5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe 2416 Okanklik.exe 2416 Okanklik.exe 2052 Oopfakpa.exe 2052 Oopfakpa.exe 2948 Pmjqcc32.exe 2948 Pmjqcc32.exe 2656 Pokieo32.exe 2656 Pokieo32.exe 1520 Pqjfoa32.exe 1520 Pqjfoa32.exe 2540 Pbnoliap.exe 2540 Pbnoliap.exe 648 Qgmdjp32.exe 648 Qgmdjp32.exe 1184 Qkkmqnck.exe 1184 Qkkmqnck.exe 2856 Achojp32.exe 2856 Achojp32.exe 2804 Agfgqo32.exe 2804 Agfgqo32.exe 1052 Afkdakjb.exe 1052 Afkdakjb.exe 1932 Afnagk32.exe 1932 Afnagk32.exe 3068 Becnhgmg.exe 3068 Becnhgmg.exe 1740 Biafnecn.exe 1740 Biafnecn.exe 2312 Bhfcpb32.exe 2312 Bhfcpb32.exe 2204 Ckiigmcd.exe 2204 Ckiigmcd.exe 2248 Cgpjlnhh.exe 2248 Cgpjlnhh.exe 1044 Cddjebgb.exe 1044 Cddjebgb.exe 2364 Clooiddm.exe 2364 Clooiddm.exe 824 Dobdqo32.exe 824 Dobdqo32.exe 1292 Ddomif32.exe 1292 Ddomif32.exe 1956 Dgbcpq32.exe 1956 Dgbcpq32.exe 2816 Dgdpfp32.exe 2816 Dgdpfp32.exe 852 Ejehgkdp.exe 852 Ejehgkdp.exe 680 Ejgemkbm.exe 680 Ejgemkbm.exe 1708 Ejjbbkpj.exe 1708 Ejjbbkpj.exe 1976 Ehoocgeb.exe 1976 Ehoocgeb.exe 1596 Enlglnci.exe 1596 Enlglnci.exe 2568 Fgfhjcgg.exe 2568 Fgfhjcgg.exe 2748 Fjlkgn32.exe 2748 Fjlkgn32.exe 2756 Fbgpkpnn.exe 2756 Fbgpkpnn.exe -
Drops file in System32 directory 64 IoCs
Processes:
Enlglnci.exeKnnkpobc.exePciddedl.exeBehilopf.exeFdmhbplb.exeFqdiga32.exeBecnhgmg.exeBhfcpb32.exePojbkh32.exeMejlalji.exeGoplilpf.exeHapklimq.exeJlckbh32.exeBbeded32.exeEdfbaabj.exeBdqlajbb.exeDobdqo32.exeIeagbm32.exeImahkg32.exeBfhmqhkd.exeCkahkk32.exeAccnekon.exePoklngnf.exeFfaaoh32.exeOplelf32.exePdgkco32.exeLjghjpfe.exeIdicbbpi.exeOabkom32.exeIhbqdh32.exeKklkcn32.exeKbaglpee.exeKmmebm32.exeBjallg32.exeDakmfh32.exeIeajkfmd.exeOopfakpa.exeAfkdakjb.exeGppipc32.exeOklnff32.exePkacpihj.exeOhhmcinf.exeKnmamp32.exePqphnp32.exeCeebklai.exeJhdihkcj.exeCifelgmd.exeDhbhmb32.exeGqiimfam.exeGnmifk32.exePmgbao32.exeCddjebgb.exeLifbmn32.exeNgneph32.exeQjhmfekp.exeDbncjf32.exePggdejno.exeOioggmmc.exeMfmndn32.exeAjmijmnn.exeAlqnah32.exeGcglec32.exedescription ioc process File created C:\Windows\SysWOW64\Pboepn32.dll Enlglnci.exe File created C:\Windows\SysWOW64\Fckada32.dll Knnkpobc.exe File opened for modification C:\Windows\SysWOW64\Pkdihhag.exe Pciddedl.exe File opened for modification C:\Windows\SysWOW64\Bmcnqama.exe Behilopf.exe File created C:\Windows\SysWOW64\Fqdiga32.exe Fdmhbplb.exe File opened for modification C:\Windows\SysWOW64\Ffaaoh32.exe Fqdiga32.exe File opened for modification C:\Windows\SysWOW64\Biafnecn.exe Becnhgmg.exe File opened for modification C:\Windows\SysWOW64\Ckiigmcd.exe Bhfcpb32.exe File opened for modification C:\Windows\SysWOW64\Pdgkco32.exe Pojbkh32.exe File opened for modification C:\Windows\SysWOW64\Melifl32.exe Mejlalji.exe File created C:\Windows\SysWOW64\Gqahqd32.exe Goplilpf.exe File created C:\Windows\SysWOW64\Ihmpobck.exe Hapklimq.exe File created C:\Windows\SysWOW64\Kcopdb32.exe Jlckbh32.exe File created C:\Windows\SysWOW64\Biolanld.exe Bbeded32.exe File created C:\Windows\SysWOW64\Nebhgckp.dll Edfbaabj.exe File opened for modification C:\Windows\SysWOW64\Bniajoic.exe Bdqlajbb.exe File created C:\Windows\SysWOW64\Dhiakc32.dll Dobdqo32.exe File created C:\Windows\SysWOW64\Phgjdk32.dll Ieagbm32.exe File opened for modification C:\Windows\SysWOW64\Jpigma32.exe Imahkg32.exe File created C:\Windows\SysWOW64\Bbonei32.exe Bfhmqhkd.exe File created C:\Windows\SysWOW64\Njifbl32.dll Ckahkk32.exe File opened for modification C:\Windows\SysWOW64\Akncimmh.exe Accnekon.exe File created C:\Windows\SysWOW64\Piqpkpml.exe Poklngnf.exe File opened for modification C:\Windows\SysWOW64\Gfcnegnk.exe Ffaaoh32.exe File created C:\Windows\SysWOW64\Ompefj32.exe Oplelf32.exe File created C:\Windows\SysWOW64\Phbgcnig.exe Pdgkco32.exe File created C:\Windows\SysWOW64\Lkfddc32.exe Ljghjpfe.exe File created C:\Windows\SysWOW64\Fdgibphb.dll Idicbbpi.exe File created C:\Windows\SysWOW64\Pofkha32.exe Oabkom32.exe File opened for modification C:\Windows\SysWOW64\Ioliqbjn.exe Ihbqdh32.exe File created C:\Windows\SysWOW64\Knbbpakg.dll Kklkcn32.exe File opened for modification C:\Windows\SysWOW64\Kkileele.exe Kbaglpee.exe File created C:\Windows\SysWOW64\Knmamp32.exe Kmmebm32.exe File created C:\Windows\SysWOW64\Bfhmqhkd.exe Bjallg32.exe File opened for modification C:\Windows\SysWOW64\Eoompl32.exe Dakmfh32.exe File opened for modification C:\Windows\SysWOW64\Ilnomp32.exe Ieajkfmd.exe File created C:\Windows\SysWOW64\Ocdneocc.dll Oopfakpa.exe File created C:\Windows\SysWOW64\Mgjcep32.dll Afkdakjb.exe File created C:\Windows\SysWOW64\Geoonjeg.exe Gppipc32.exe File opened for modification C:\Windows\SysWOW64\Onocmadb.exe Oklnff32.exe File created C:\Windows\SysWOW64\Pqnlhpfb.exe Pkacpihj.exe File created C:\Windows\SysWOW64\Oijjka32.exe Ohhmcinf.exe File created C:\Windows\SysWOW64\Fdeeaobo.dll Knmamp32.exe File opened for modification C:\Windows\SysWOW64\Qjhmfekp.exe Pqphnp32.exe File created C:\Windows\SysWOW64\Clojhf32.exe Ceebklai.exe File opened for modification C:\Windows\SysWOW64\Jcjnfdbp.exe Jhdihkcj.exe File created C:\Windows\SysWOW64\Jkjlciol.dll Cifelgmd.exe File created C:\Windows\SysWOW64\Dkadjn32.exe Dhbhmb32.exe File created C:\Windows\SysWOW64\Gnmifk32.exe Gqiimfam.exe File opened for modification C:\Windows\SysWOW64\Gjdjklek.exe Gnmifk32.exe File opened for modification C:\Windows\SysWOW64\Pgpgjepk.exe Pmgbao32.exe File created C:\Windows\SysWOW64\Jpigma32.exe Imahkg32.exe File created C:\Windows\SysWOW64\Deokbacp.dll Becnhgmg.exe File opened for modification C:\Windows\SysWOW64\Clooiddm.exe Cddjebgb.exe File created C:\Windows\SysWOW64\Fhioaa32.dll Lifbmn32.exe File created C:\Windows\SysWOW64\Nadimacd.exe Ngneph32.exe File created C:\Windows\SysWOW64\Qglmpi32.exe Qjhmfekp.exe File opened for modification C:\Windows\SysWOW64\Doecog32.exe Dbncjf32.exe File created C:\Windows\SysWOW64\Pnalad32.exe Pggdejno.exe File created C:\Windows\SysWOW64\Ndmcdl32.dll Oioggmmc.exe File opened for modification C:\Windows\SysWOW64\Mpebmc32.exe Mfmndn32.exe File created C:\Windows\SysWOW64\Dkppib32.dll Ajmijmnn.exe File opened for modification C:\Windows\SysWOW64\Ahgofi32.exe Alqnah32.exe File created C:\Windows\SysWOW64\Gfgegnbb.exe Gcglec32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4344 4296 WerFault.exe Dpapaj32.exe -
Modifies registry class 64 IoCs
Processes:
Ooclji32.exePofkha32.exeLfjcfb32.exeBehilopf.exeJlhhndno.exeQhjfgl32.exeFfaaoh32.exeHcdnhoac.exePmjqcc32.exeJcgapdeb.exePkacpihj.exeAkncimmh.exeIpokcdjn.exeOmpefj32.exeLfhfab32.exeNaopaa32.exeJnfomn32.exeLkgkoiqc.exeFilgbdfd.exeDgdpfp32.exeKcopdb32.exeEejopecj.exeAlqnah32.exeOkanklik.exeHfbhkb32.exeHmaick32.exeCkolek32.exeDiaaeepi.exeGolbnm32.exeHihlqeib.exeBhjlli32.exeMfllkece.exeClojhf32.exeQkkmqnck.exeNeqnqofm.exeClbnhmjo.exeHgbfnngi.exeNdqkleln.exeKbaglpee.exeDakmfh32.exeEabcggll.exeDgbeiiqe.exeAfffenbp.exeJpfhoi32.exeKncofa32.exeNadimacd.exeBkegah32.exeGcglec32.exeIhmgiiff.exeQglmpi32.exeFjdnlhco.exeKbdmeoob.exeKdhcli32.exeFncpef32.exeJlckbh32.exeBmcnqama.exeMmdjkhdh.exeEjehgkdp.exeEjjbbkpj.exeIhbqdh32.exeLipecm32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ooclji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pofkha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nahlmpdg.dll" Lfjcfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Behilopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aopjkjhh.dll" Jlhhndno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qhjfgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hedbmpnc.dll" Ffaaoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbihfb32.dll" Hcdnhoac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmjqcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcgapdeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egnkbn32.dll" Pkacpihj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akncimmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ipokcdjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ompefj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfhfab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naopaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnfomn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkgkoiqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfpkkdgb.dll" Lkgkoiqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dllgcqbk.dll" Filgbdfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgdpfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcopdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gklodf32.dll" Eejopecj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eoobfoke.dll" Alqnah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oflcmqaa.dll" Okanklik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgqabcec.dll" Hfbhkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmbjddfk.dll" Hmaick32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckolek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Diaaeepi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Golbnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hihlqeib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcojqm32.dll" Bhjlli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfllkece.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clojhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkkmqnck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Neqnqofm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clbnhmjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgbfnngi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oomgdcce.dll" Ndqkleln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oedcmfgb.dll" Kbaglpee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfgbgqka.dll" Dakmfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eabcggll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbeiiqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qoblpdnf.dll" Afffenbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpgpdf32.dll" Jpfhoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhhdho32.dll" Kncofa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nadimacd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajaclncd.dll" Bkegah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcglec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihmgiiff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbaglpee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qglmpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njekpl32.dll" Fjdnlhco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekaggl32.dll" Kbdmeoob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdhcli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmfpeb32.dll" Fncpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jlckbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmcnqama.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fncpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmdjkhdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejehgkdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nflpljfn.dll" Ejjbbkpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihbqdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lipecm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exeOkanklik.exeOopfakpa.exePmjqcc32.exePokieo32.exePqjfoa32.exePbnoliap.exeQgmdjp32.exeQkkmqnck.exeAchojp32.exeAgfgqo32.exeAfkdakjb.exeAfnagk32.exeBecnhgmg.exeBiafnecn.exeBhfcpb32.exedescription pid process target process PID 2208 wrote to memory of 2416 2208 5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe Okanklik.exe PID 2208 wrote to memory of 2416 2208 5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe Okanklik.exe PID 2208 wrote to memory of 2416 2208 5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe Okanklik.exe PID 2208 wrote to memory of 2416 2208 5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe Okanklik.exe PID 2416 wrote to memory of 2052 2416 Okanklik.exe Oopfakpa.exe PID 2416 wrote to memory of 2052 2416 Okanklik.exe Oopfakpa.exe PID 2416 wrote to memory of 2052 2416 Okanklik.exe Oopfakpa.exe PID 2416 wrote to memory of 2052 2416 Okanklik.exe Oopfakpa.exe PID 2052 wrote to memory of 2948 2052 Oopfakpa.exe Pmjqcc32.exe PID 2052 wrote to memory of 2948 2052 Oopfakpa.exe Pmjqcc32.exe PID 2052 wrote to memory of 2948 2052 Oopfakpa.exe Pmjqcc32.exe PID 2052 wrote to memory of 2948 2052 Oopfakpa.exe Pmjqcc32.exe PID 2948 wrote to memory of 2656 2948 Pmjqcc32.exe Pokieo32.exe PID 2948 wrote to memory of 2656 2948 Pmjqcc32.exe Pokieo32.exe PID 2948 wrote to memory of 2656 2948 Pmjqcc32.exe Pokieo32.exe PID 2948 wrote to memory of 2656 2948 Pmjqcc32.exe Pokieo32.exe PID 2656 wrote to memory of 1520 2656 Pokieo32.exe Pqjfoa32.exe PID 2656 wrote to memory of 1520 2656 Pokieo32.exe Pqjfoa32.exe PID 2656 wrote to memory of 1520 2656 Pokieo32.exe Pqjfoa32.exe PID 2656 wrote to memory of 1520 2656 Pokieo32.exe Pqjfoa32.exe PID 1520 wrote to memory of 2540 1520 Pqjfoa32.exe Pbnoliap.exe PID 1520 wrote to memory of 2540 1520 Pqjfoa32.exe Pbnoliap.exe PID 1520 wrote to memory of 2540 1520 Pqjfoa32.exe Pbnoliap.exe PID 1520 wrote to memory of 2540 1520 Pqjfoa32.exe Pbnoliap.exe PID 2540 wrote to memory of 648 2540 Pbnoliap.exe Qgmdjp32.exe PID 2540 wrote to memory of 648 2540 Pbnoliap.exe Qgmdjp32.exe PID 2540 wrote to memory of 648 2540 Pbnoliap.exe Qgmdjp32.exe PID 2540 wrote to memory of 648 2540 Pbnoliap.exe Qgmdjp32.exe PID 648 wrote to memory of 1184 648 Qgmdjp32.exe Qkkmqnck.exe PID 648 wrote to memory of 1184 648 Qgmdjp32.exe Qkkmqnck.exe PID 648 wrote to memory of 1184 648 Qgmdjp32.exe Qkkmqnck.exe PID 648 wrote to memory of 1184 648 Qgmdjp32.exe Qkkmqnck.exe PID 1184 wrote to memory of 2856 1184 Qkkmqnck.exe Achojp32.exe PID 1184 wrote to memory of 2856 1184 Qkkmqnck.exe Achojp32.exe PID 1184 wrote to memory of 2856 1184 Qkkmqnck.exe Achojp32.exe PID 1184 wrote to memory of 2856 1184 Qkkmqnck.exe Achojp32.exe PID 2856 wrote to memory of 2804 2856 Achojp32.exe Agfgqo32.exe PID 2856 wrote to memory of 2804 2856 Achojp32.exe Agfgqo32.exe PID 2856 wrote to memory of 2804 2856 Achojp32.exe Agfgqo32.exe PID 2856 wrote to memory of 2804 2856 Achojp32.exe Agfgqo32.exe PID 2804 wrote to memory of 1052 2804 Agfgqo32.exe Afkdakjb.exe PID 2804 wrote to memory of 1052 2804 Agfgqo32.exe Afkdakjb.exe PID 2804 wrote to memory of 1052 2804 Agfgqo32.exe Afkdakjb.exe PID 2804 wrote to memory of 1052 2804 Agfgqo32.exe Afkdakjb.exe PID 1052 wrote to memory of 1932 1052 Afkdakjb.exe Afnagk32.exe PID 1052 wrote to memory of 1932 1052 Afkdakjb.exe Afnagk32.exe PID 1052 wrote to memory of 1932 1052 Afkdakjb.exe Afnagk32.exe PID 1052 wrote to memory of 1932 1052 Afkdakjb.exe Afnagk32.exe PID 1932 wrote to memory of 3068 1932 Afnagk32.exe Becnhgmg.exe PID 1932 wrote to memory of 3068 1932 Afnagk32.exe Becnhgmg.exe PID 1932 wrote to memory of 3068 1932 Afnagk32.exe Becnhgmg.exe PID 1932 wrote to memory of 3068 1932 Afnagk32.exe Becnhgmg.exe PID 3068 wrote to memory of 1740 3068 Becnhgmg.exe Biafnecn.exe PID 3068 wrote to memory of 1740 3068 Becnhgmg.exe Biafnecn.exe PID 3068 wrote to memory of 1740 3068 Becnhgmg.exe Biafnecn.exe PID 3068 wrote to memory of 1740 3068 Becnhgmg.exe Biafnecn.exe PID 1740 wrote to memory of 2312 1740 Biafnecn.exe Bhfcpb32.exe PID 1740 wrote to memory of 2312 1740 Biafnecn.exe Bhfcpb32.exe PID 1740 wrote to memory of 2312 1740 Biafnecn.exe Bhfcpb32.exe PID 1740 wrote to memory of 2312 1740 Biafnecn.exe Bhfcpb32.exe PID 2312 wrote to memory of 2204 2312 Bhfcpb32.exe Ckiigmcd.exe PID 2312 wrote to memory of 2204 2312 Bhfcpb32.exe Ckiigmcd.exe PID 2312 wrote to memory of 2204 2312 Bhfcpb32.exe Ckiigmcd.exe PID 2312 wrote to memory of 2204 2312 Bhfcpb32.exe Ckiigmcd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5eb52bd04b44ca1856f677e43f90af476f84ff530773684656e69b67ffa7ba7e_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Okanklik.exeC:\Windows\system32\Okanklik.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oopfakpa.exeC:\Windows\system32\Oopfakpa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pmjqcc32.exeC:\Windows\system32\Pmjqcc32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pokieo32.exeC:\Windows\system32\Pokieo32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pqjfoa32.exeC:\Windows\system32\Pqjfoa32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pbnoliap.exeC:\Windows\system32\Pbnoliap.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qgmdjp32.exeC:\Windows\system32\Qgmdjp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qkkmqnck.exeC:\Windows\system32\Qkkmqnck.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Achojp32.exeC:\Windows\system32\Achojp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Agfgqo32.exeC:\Windows\system32\Agfgqo32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Afkdakjb.exeC:\Windows\system32\Afkdakjb.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Afnagk32.exeC:\Windows\system32\Afnagk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Becnhgmg.exeC:\Windows\system32\Becnhgmg.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Biafnecn.exeC:\Windows\system32\Biafnecn.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bhfcpb32.exeC:\Windows\system32\Bhfcpb32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ckiigmcd.exeC:\Windows\system32\Ckiigmcd.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Cgpjlnhh.exeC:\Windows\system32\Cgpjlnhh.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Cddjebgb.exeC:\Windows\system32\Cddjebgb.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Clooiddm.exeC:\Windows\system32\Clooiddm.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dobdqo32.exeC:\Windows\system32\Dobdqo32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ddomif32.exeC:\Windows\system32\Ddomif32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dgbcpq32.exeC:\Windows\system32\Dgbcpq32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dgdpfp32.exeC:\Windows\system32\Dgdpfp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ejehgkdp.exeC:\Windows\system32\Ejehgkdp.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ejgemkbm.exeC:\Windows\system32\Ejgemkbm.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ejjbbkpj.exeC:\Windows\system32\Ejjbbkpj.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ehoocgeb.exeC:\Windows\system32\Ehoocgeb.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Enlglnci.exeC:\Windows\system32\Enlglnci.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fgfhjcgg.exeC:\Windows\system32\Fgfhjcgg.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fjlkgn32.exeC:\Windows\system32\Fjlkgn32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fbgpkpnn.exeC:\Windows\system32\Fbgpkpnn.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gcglec32.exeC:\Windows\system32\Gcglec32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Gfgegnbb.exeC:\Windows\system32\Gfgegnbb.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gppipc32.exeC:\Windows\system32\Gppipc32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Geoonjeg.exeC:\Windows\system32\Geoonjeg.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gngcgp32.exeC:\Windows\system32\Gngcgp32.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hfbhkb32.exeC:\Windows\system32\Hfbhkb32.exe38⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hjqqap32.exeC:\Windows\system32\Hjqqap32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hmaick32.exeC:\Windows\system32\Hmaick32.exe40⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hpbbdfik.exeC:\Windows\system32\Hpbbdfik.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ihmgiiff.exeC:\Windows\system32\Ihmgiiff.exe42⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ieagbm32.exeC:\Windows\system32\Ieagbm32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ihbqdh32.exeC:\Windows\system32\Ihbqdh32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Ioliqbjn.exeC:\Windows\system32\Ioliqbjn.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iggned32.exeC:\Windows\system32\Iggned32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iamabm32.exeC:\Windows\system32\Iamabm32.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Idmkdh32.exeC:\Windows\system32\Idmkdh32.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jnfomn32.exeC:\Windows\system32\Jnfomn32.exe49⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jeadap32.exeC:\Windows\system32\Jeadap32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jpfhoi32.exeC:\Windows\system32\Jpfhoi32.exe51⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jpiedieo.exeC:\Windows\system32\Jpiedieo.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jcgapdeb.exeC:\Windows\system32\Jcgapdeb.exe53⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jhdihkcj.exeC:\Windows\system32\Jhdihkcj.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jcjnfdbp.exeC:\Windows\system32\Jcjnfdbp.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kncofa32.exeC:\Windows\system32\Kncofa32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kglcogeo.exeC:\Windows\system32\Kglcogeo.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kbaglpee.exeC:\Windows\system32\Kbaglpee.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kkileele.exeC:\Windows\system32\Kkileele.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kdbpnk32.exeC:\Windows\system32\Kdbpnk32.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kklikejc.exeC:\Windows\system32\Kklikejc.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kmmebm32.exeC:\Windows\system32\Kmmebm32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Knmamp32.exeC:\Windows\system32\Knmamp32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lfhfab32.exeC:\Windows\system32\Lfhfab32.exe64⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Lifbmn32.exeC:\Windows\system32\Lifbmn32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lfjcfb32.exeC:\Windows\system32\Lfjcfb32.exe66⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lkgkoiqc.exeC:\Windows\system32\Lkgkoiqc.exe67⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lmfhil32.exeC:\Windows\system32\Lmfhil32.exe68⤵
-
C:\Windows\SysWOW64\Lgpiij32.exeC:\Windows\system32\Lgpiij32.exe69⤵
-
C:\Windows\SysWOW64\Lipecm32.exeC:\Windows\system32\Lipecm32.exe70⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Meffhnal.exeC:\Windows\system32\Meffhnal.exe71⤵
-
C:\Windows\SysWOW64\Mclcijfd.exeC:\Windows\system32\Mclcijfd.exe72⤵
-
C:\Windows\SysWOW64\Mmdgbp32.exeC:\Windows\system32\Mmdgbp32.exe73⤵
-
C:\Windows\SysWOW64\Mfllkece.exeC:\Windows\system32\Mfllkece.exe74⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mabphn32.exeC:\Windows\system32\Mabphn32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mlkail32.exeC:\Windows\system32\Mlkail32.exe76⤵
-
C:\Windows\SysWOW64\Mdbiji32.exeC:\Windows\system32\Mdbiji32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nmkncofl.exeC:\Windows\system32\Nmkncofl.exe78⤵
-
C:\Windows\SysWOW64\Nbhfke32.exeC:\Windows\system32\Nbhfke32.exe79⤵
-
C:\Windows\SysWOW64\Nhdocl32.exeC:\Windows\system32\Nhdocl32.exe80⤵
-
C:\Windows\SysWOW64\Namclbil.exeC:\Windows\system32\Namclbil.exe81⤵
-
C:\Windows\SysWOW64\Nlbgikia.exeC:\Windows\system32\Nlbgikia.exe82⤵
-
C:\Windows\SysWOW64\Naopaa32.exeC:\Windows\system32\Naopaa32.exe83⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nhiholof.exeC:\Windows\system32\Nhiholof.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nemhhpmp.exeC:\Windows\system32\Nemhhpmp.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ngneph32.exeC:\Windows\system32\Ngneph32.exe86⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nadimacd.exeC:\Windows\system32\Nadimacd.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Oklnff32.exeC:\Windows\system32\Oklnff32.exe88⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Onocmadb.exeC:\Windows\system32\Onocmadb.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Oghhfg32.exeC:\Windows\system32\Oghhfg32.exe90⤵
-
C:\Windows\SysWOW64\Oldpnn32.exeC:\Windows\system32\Oldpnn32.exe91⤵
-
C:\Windows\SysWOW64\Ooclji32.exeC:\Windows\system32\Ooclji32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Oihqgbhd.exeC:\Windows\system32\Oihqgbhd.exe93⤵
-
C:\Windows\SysWOW64\Phnnho32.exeC:\Windows\system32\Phnnho32.exe94⤵
-
C:\Windows\SysWOW64\Pnjfae32.exeC:\Windows\system32\Pnjfae32.exe95⤵
-
C:\Windows\SysWOW64\Pddnnp32.exeC:\Windows\system32\Pddnnp32.exe96⤵
-
C:\Windows\SysWOW64\Pojbkh32.exeC:\Windows\system32\Pojbkh32.exe97⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pdgkco32.exeC:\Windows\system32\Pdgkco32.exe98⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Phbgcnig.exeC:\Windows\system32\Phbgcnig.exe99⤵
-
C:\Windows\SysWOW64\Pkacpihj.exeC:\Windows\system32\Pkacpihj.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Pqnlhpfb.exeC:\Windows\system32\Pqnlhpfb.exe101⤵
-
C:\Windows\SysWOW64\Pggdejno.exeC:\Windows\system32\Pggdejno.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pnalad32.exeC:\Windows\system32\Pnalad32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pqphnp32.exeC:\Windows\system32\Pqphnp32.exe104⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qjhmfekp.exeC:\Windows\system32\Qjhmfekp.exe105⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qglmpi32.exeC:\Windows\system32\Qglmpi32.exe106⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Qjkjle32.exeC:\Windows\system32\Qjkjle32.exe107⤵
-
C:\Windows\SysWOW64\Accnekon.exeC:\Windows\system32\Accnekon.exe108⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Akncimmh.exeC:\Windows\system32\Akncimmh.exe109⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Afdgfelo.exeC:\Windows\system32\Afdgfelo.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Affdle32.exeC:\Windows\system32\Affdle32.exe111⤵
-
C:\Windows\SysWOW64\Aidphq32.exeC:\Windows\system32\Aidphq32.exe112⤵
-
C:\Windows\SysWOW64\Aekqmbod.exeC:\Windows\system32\Aekqmbod.exe113⤵
-
C:\Windows\SysWOW64\Akeijlfq.exeC:\Windows\system32\Akeijlfq.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Akhfoldn.exeC:\Windows\system32\Akhfoldn.exe115⤵
-
C:\Windows\SysWOW64\Badnhbce.exeC:\Windows\system32\Badnhbce.exe116⤵
-
C:\Windows\SysWOW64\Bjmbqhif.exeC:\Windows\system32\Bjmbqhif.exe117⤵
-
C:\Windows\SysWOW64\Bgqcjlhp.exeC:\Windows\system32\Bgqcjlhp.exe118⤵
-
C:\Windows\SysWOW64\Baigca32.exeC:\Windows\system32\Baigca32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bjallg32.exeC:\Windows\system32\Bjallg32.exe120⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bfhmqhkd.exeC:\Windows\system32\Bfhmqhkd.exe121⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bbonei32.exeC:\Windows\system32\Bbonei32.exe122⤵
-
C:\Windows\SysWOW64\Clgbno32.exeC:\Windows\system32\Clgbno32.exe123⤵
-
C:\Windows\SysWOW64\Cbajkiof.exeC:\Windows\system32\Cbajkiof.exe124⤵
-
C:\Windows\SysWOW64\Cdecha32.exeC:\Windows\system32\Cdecha32.exe125⤵
-
C:\Windows\SysWOW64\Ckolek32.exeC:\Windows\system32\Ckolek32.exe126⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Chcloo32.exeC:\Windows\system32\Chcloo32.exe127⤵
-
C:\Windows\SysWOW64\Ckahkk32.exeC:\Windows\system32\Ckahkk32.exe128⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Cfhiplmp.exeC:\Windows\system32\Cfhiplmp.exe129⤵
-
C:\Windows\SysWOW64\Cifelgmd.exeC:\Windows\system32\Cifelgmd.exe130⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dljkcb32.exeC:\Windows\system32\Dljkcb32.exe131⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dhbhmb32.exeC:\Windows\system32\Dhbhmb32.exe132⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dkadjn32.exeC:\Windows\system32\Dkadjn32.exe133⤵
-
C:\Windows\SysWOW64\Dakmfh32.exeC:\Windows\system32\Dakmfh32.exe134⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Eoompl32.exeC:\Windows\system32\Eoompl32.exe135⤵
-
C:\Windows\SysWOW64\Ehgbhbgn.exeC:\Windows\system32\Ehgbhbgn.exe136⤵
-
C:\Windows\SysWOW64\Ehjona32.exeC:\Windows\system32\Ehjona32.exe137⤵
-
C:\Windows\SysWOW64\Eabcggll.exeC:\Windows\system32\Eabcggll.exe138⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ejmhkiig.exeC:\Windows\system32\Ejmhkiig.exe139⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ecfldoph.exeC:\Windows\system32\Ecfldoph.exe140⤵
-
C:\Windows\SysWOW64\Fgcejm32.exeC:\Windows\system32\Fgcejm32.exe141⤵
-
C:\Windows\SysWOW64\Foojop32.exeC:\Windows\system32\Foojop32.exe142⤵
-
C:\Windows\SysWOW64\Fjdnlhco.exeC:\Windows\system32\Fjdnlhco.exe143⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ffkoai32.exeC:\Windows\system32\Ffkoai32.exe144⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fbbofjnh.exeC:\Windows\system32\Fbbofjnh.exe145⤵
-
C:\Windows\SysWOW64\Filgbdfd.exeC:\Windows\system32\Filgbdfd.exe146⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fbdlkj32.exeC:\Windows\system32\Fbdlkj32.exe147⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fdbhge32.exeC:\Windows\system32\Fdbhge32.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gqiimfam.exeC:\Windows\system32\Gqiimfam.exe149⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gnmifk32.exeC:\Windows\system32\Gnmifk32.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gjdjklek.exeC:\Windows\system32\Gjdjklek.exe151⤵
-
C:\Windows\SysWOW64\Hdlkcdog.exeC:\Windows\system32\Hdlkcdog.exe152⤵
-
C:\Windows\SysWOW64\Hapklimq.exeC:\Windows\system32\Hapklimq.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ihmpobck.exeC:\Windows\system32\Ihmpobck.exe154⤵
-
C:\Windows\SysWOW64\Ibfaopoi.exeC:\Windows\system32\Ibfaopoi.exe155⤵
-
C:\Windows\SysWOW64\Ipjahd32.exeC:\Windows\system32\Ipjahd32.exe156⤵
-
C:\Windows\SysWOW64\Iegjqk32.exeC:\Windows\system32\Iegjqk32.exe157⤵
-
C:\Windows\SysWOW64\Ioooiack.exeC:\Windows\system32\Ioooiack.exe158⤵
-
C:\Windows\SysWOW64\Ipokcdjn.exeC:\Windows\system32\Ipokcdjn.exe159⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jodhdp32.exeC:\Windows\system32\Jodhdp32.exe160⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jlhhndno.exeC:\Windows\system32\Jlhhndno.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Jdcmbgkj.exeC:\Windows\system32\Jdcmbgkj.exe162⤵
-
C:\Windows\SysWOW64\Jgaiobjn.exeC:\Windows\system32\Jgaiobjn.exe163⤵
-
C:\Windows\SysWOW64\Jhafhe32.exeC:\Windows\system32\Jhafhe32.exe164⤵
-
C:\Windows\SysWOW64\Jlckbh32.exeC:\Windows\system32\Jlckbh32.exe165⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kcopdb32.exeC:\Windows\system32\Kcopdb32.exe166⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kofaicon.exeC:\Windows\system32\Kofaicon.exe167⤵
-
C:\Windows\SysWOW64\Kbdmeoob.exeC:\Windows\system32\Kbdmeoob.exe168⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kljabgnh.exeC:\Windows\system32\Kljabgnh.exe169⤵
-
C:\Windows\SysWOW64\Kdefgj32.exeC:\Windows\system32\Kdefgj32.exe170⤵
-
C:\Windows\SysWOW64\Knnkpobc.exeC:\Windows\system32\Knnkpobc.exe171⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kdhcli32.exeC:\Windows\system32\Kdhcli32.exe172⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lnpgeopa.exeC:\Windows\system32\Lnpgeopa.exe173⤵
-
C:\Windows\SysWOW64\Ljghjpfe.exeC:\Windows\system32\Ljghjpfe.exe174⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lkfddc32.exeC:\Windows\system32\Lkfddc32.exe175⤵
-
C:\Windows\SysWOW64\Lgmeid32.exeC:\Windows\system32\Lgmeid32.exe176⤵
-
C:\Windows\SysWOW64\Lmjnak32.exeC:\Windows\system32\Lmjnak32.exe177⤵
-
C:\Windows\SysWOW64\Lcdfnehp.exeC:\Windows\system32\Lcdfnehp.exe178⤵
-
C:\Windows\SysWOW64\Lbicoamh.exeC:\Windows\system32\Lbicoamh.exe179⤵
-
C:\Windows\SysWOW64\Mmogmjmn.exeC:\Windows\system32\Mmogmjmn.exe180⤵
-
C:\Windows\SysWOW64\Mejlalji.exeC:\Windows\system32\Mejlalji.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Melifl32.exeC:\Windows\system32\Melifl32.exe182⤵
-
C:\Windows\SysWOW64\Mpamde32.exeC:\Windows\system32\Mpamde32.exe183⤵
-
C:\Windows\SysWOW64\Meoell32.exeC:\Windows\system32\Meoell32.exe184⤵
-
C:\Windows\SysWOW64\Mngjeamd.exeC:\Windows\system32\Mngjeamd.exe185⤵
-
C:\Windows\SysWOW64\Meabakda.exeC:\Windows\system32\Meabakda.exe186⤵
-
C:\Windows\SysWOW64\Mjnjjbbh.exeC:\Windows\system32\Mjnjjbbh.exe187⤵
-
C:\Windows\SysWOW64\Ncfoch32.exeC:\Windows\system32\Ncfoch32.exe188⤵
-
C:\Windows\SysWOW64\Nnkcpq32.exeC:\Windows\system32\Nnkcpq32.exe189⤵
-
C:\Windows\SysWOW64\Nhdhif32.exeC:\Windows\system32\Nhdhif32.exe190⤵
-
C:\Windows\SysWOW64\Nbniid32.exeC:\Windows\system32\Nbniid32.exe191⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Npaich32.exeC:\Windows\system32\Npaich32.exe192⤵
-
C:\Windows\SysWOW64\Nlhjhi32.exeC:\Windows\system32\Nlhjhi32.exe193⤵
-
C:\Windows\SysWOW64\Neqnqofm.exeC:\Windows\system32\Neqnqofm.exe194⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Olkfmi32.exeC:\Windows\system32\Olkfmi32.exe195⤵
-
C:\Windows\SysWOW64\Oioggmmc.exeC:\Windows\system32\Oioggmmc.exe196⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Obgkpb32.exeC:\Windows\system32\Obgkpb32.exe197⤵
-
C:\Windows\SysWOW64\Ohcdhi32.exeC:\Windows\system32\Ohcdhi32.exe198⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Oehdan32.exeC:\Windows\system32\Oehdan32.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Omcifpnp.exeC:\Windows\system32\Omcifpnp.exe200⤵
-
C:\Windows\SysWOW64\Ohhmcinf.exeC:\Windows\system32\Ohhmcinf.exe201⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oijjka32.exeC:\Windows\system32\Oijjka32.exe202⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pmgbao32.exeC:\Windows\system32\Pmgbao32.exe203⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pgpgjepk.exeC:\Windows\system32\Pgpgjepk.exe204⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Poklngnf.exeC:\Windows\system32\Poklngnf.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Piqpkpml.exeC:\Windows\system32\Piqpkpml.exe206⤵
-
C:\Windows\SysWOW64\Pciddedl.exeC:\Windows\system32\Pciddedl.exe207⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pkdihhag.exeC:\Windows\system32\Pkdihhag.exe208⤵
-
C:\Windows\SysWOW64\Pldebkhj.exeC:\Windows\system32\Pldebkhj.exe209⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Qnebjc32.exeC:\Windows\system32\Qnebjc32.exe210⤵
-
C:\Windows\SysWOW64\Qhjfgl32.exeC:\Windows\system32\Qhjfgl32.exe211⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Afjjed32.exeC:\Windows\system32\Afjjed32.exe212⤵
-
C:\Windows\SysWOW64\Aqonbm32.exeC:\Windows\system32\Aqonbm32.exe213⤵
-
C:\Windows\SysWOW64\Acnjnh32.exeC:\Windows\system32\Acnjnh32.exe214⤵
-
C:\Windows\SysWOW64\Bbbgod32.exeC:\Windows\system32\Bbbgod32.exe215⤵
-
C:\Windows\SysWOW64\Bmhkmm32.exeC:\Windows\system32\Bmhkmm32.exe216⤵
-
C:\Windows\SysWOW64\Bbeded32.exeC:\Windows\system32\Bbeded32.exe217⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Biolanld.exeC:\Windows\system32\Biolanld.exe218⤵
-
C:\Windows\SysWOW64\Bajqfq32.exeC:\Windows\system32\Bajqfq32.exe219⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bkpeci32.exeC:\Windows\system32\Bkpeci32.exe220⤵
-
C:\Windows\SysWOW64\Behilopf.exeC:\Windows\system32\Behilopf.exe221⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bmcnqama.exeC:\Windows\system32\Bmcnqama.exe222⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Bcmfmlen.exeC:\Windows\system32\Bcmfmlen.exe223⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bflbigdb.exeC:\Windows\system32\Bflbigdb.exe224⤵
-
C:\Windows\SysWOW64\Caaggpdh.exeC:\Windows\system32\Caaggpdh.exe225⤵
-
C:\Windows\SysWOW64\Cfnoogbo.exeC:\Windows\system32\Cfnoogbo.exe226⤵
-
C:\Windows\SysWOW64\Cacclpae.exeC:\Windows\system32\Cacclpae.exe227⤵
-
C:\Windows\SysWOW64\Cjlheehe.exeC:\Windows\system32\Cjlheehe.exe228⤵
-
C:\Windows\SysWOW64\Cbgmigeq.exeC:\Windows\system32\Cbgmigeq.exe229⤵
-
C:\Windows\SysWOW64\Cfeepelg.exeC:\Windows\system32\Cfeepelg.exe230⤵
-
C:\Windows\SysWOW64\Clbnhmjo.exeC:\Windows\system32\Clbnhmjo.exe231⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cblfdg32.exeC:\Windows\system32\Cblfdg32.exe232⤵
-
C:\Windows\SysWOW64\Dhiomn32.exeC:\Windows\system32\Dhiomn32.exe233⤵
-
C:\Windows\SysWOW64\Dbncjf32.exeC:\Windows\system32\Dbncjf32.exe234⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Doecog32.exeC:\Windows\system32\Doecog32.exe235⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Dhmhhmlm.exeC:\Windows\system32\Dhmhhmlm.exe236⤵
-
C:\Windows\SysWOW64\Dphmloih.exeC:\Windows\system32\Dphmloih.exe237⤵
-
C:\Windows\SysWOW64\Dgbeiiqe.exeC:\Windows\system32\Dgbeiiqe.exe238⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Diaaeepi.exeC:\Windows\system32\Diaaeepi.exe239⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dkqnoh32.exeC:\Windows\system32\Dkqnoh32.exe240⤵
-
C:\Windows\SysWOW64\Eejopecj.exeC:\Windows\system32\Eejopecj.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class