Analysis
-
max time kernel
158s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 01:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe
-
Size
320KB
-
MD5
c1a74b1b6a507a4f9fee88153a546800
-
SHA1
f59064ff3d67e066fb19d7e864394155f87e6c2c
-
SHA256
48cfb7ebd68a18b0af21ae3d8499ba4d041c42e34b7ab62195ec56229c169051
-
SHA512
c70b2f2086261475874665922e41a32e64d1130cd974699994a0c0874d92336b1955acab8b357133c292d2f92766dd8a82daa733d71aa6f520bdadc09156a3e4
-
SSDEEP
6144:T0u+YJw7p8Kmsl7Pz/CV+tbFOLM77OLnFe3HCqxNRmJ4PavntPRD:yYomEL7tsNePmjvtPRD
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbpeghpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cjfaon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fdamph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Foocegea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Papnhbgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmlckhig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkdmpl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cggifn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dafpjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahdpea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gdkgam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qopbjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnmojp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fihecici.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Poliog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfkqcb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baanhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgeiokao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odidld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bngdndfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgiojf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibdiln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Embkhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Neafdjak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oeccijoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Didjqoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obqopddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dqhpjohb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahdpea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omegdebp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hahcfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cobkbhgk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmndjf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pacojc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjemle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aified32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbfglg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ifihckmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Glgckl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efafqolp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgaqphgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dagiba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbddmejf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ilbnkiba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbpeghpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdopkhfk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbqpbbfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hddbmedc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhgneqha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hokgmpkl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhofjbnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkfkod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ipkneh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbihmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paomog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kfanen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohkkanbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aokkknbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhhnipbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgakkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Edqdij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfigib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nbljaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emhahiep.exe -
Executes dropped EXE 64 IoCs
pid Process 912 Nehjmnei.exe 4928 Bbpeghpe.exe 1164 Blkgen32.exe 2960 Cbihmg32.exe 3160 Cihjeq32.exe 3720 Didjqoae.exe 4812 Eikpan32.exe 2464 Eimlgnij.exe 3212 Fempbm32.exe 1548 Ggoiap32.exe 964 Hcommoin.exe 4328 Hokgmpkl.exe 1504 Hjbhph32.exe 4656 Jcgldl32.exe 2484 Jjemle32.exe 4496 Kcehejic.exe 872 Mpnngh32.exe 2124 Mfmpob32.exe 4412 Nfdfoala.exe 4376 Opfnne32.exe 1816 Paomog32.exe 1376 Ahgamo32.exe 4516 Ahpdcn32.exe 1180 Cgaqphgl.exe 1708 Ikechced.exe 1184 Ilglgfjd.exe 3684 Kaaaak32.exe 968 Lmeapbpa.exe 1064 Mnndhi32.exe 4080 Nbiioe32.exe 3844 Obqopddf.exe 4384 Olpjii32.exe 2136 Pldcdhpi.exe 3544 Pikqcl32.exe 3344 Pimmil32.exe 4916 Aploae32.exe 3580 Apnkfelb.exe 3648 Bcfkiock.exe 804 Bleebc32.exe 2216 Dqhpjohb.exe 1020 Hdlhoefk.exe 4944 Hjimaole.exe 4296 Hjkigojc.exe 2580 Ialhdh32.exe 2280 Jmlkpgia.exe 1964 Kpfggang.exe 884 Kgeiokao.exe 2980 Laofhbmp.exe 952 Lkgkqh32.exe 1652 Lkjhfh32.exe 4704 Ongijo32.exe 640 Olmficce.exe 644 Plfipakk.exe 4028 Qhofjbnl.exe 3968 Qpikao32.exe 3660 Ahdpea32.exe 3992 Aified32.exe 1392 Aihfjd32.exe 4504 Aikbpckb.exe 2028 Bimoecio.exe 964 Bbjmih32.exe 5100 Bocjdiol.exe 2104 Coegih32.exe 2724 Cccppgcp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Glndff32.dll Hmhmko32.exe File opened for modification C:\Windows\SysWOW64\Dnajjfjo.exe Dqmjqb32.exe File created C:\Windows\SysWOW64\Olpjii32.exe Obqopddf.exe File created C:\Windows\SysWOW64\Plkdkcqg.dll Jmlkpgia.exe File created C:\Windows\SysWOW64\Dlpgiebo.exe Coijja32.exe File created C:\Windows\SysWOW64\Jgngkmkf.exe Jglkfmmi.exe File opened for modification C:\Windows\SysWOW64\Ckhlgilp.exe Cobkbhgk.exe File created C:\Windows\SysWOW64\Nehjmnei.exe c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe File created C:\Windows\SysWOW64\Aegidp32.exe Aeemop32.exe File opened for modification C:\Windows\SysWOW64\Dhhnipbe.exe Dkdmpl32.exe File created C:\Windows\SysWOW64\Ehlhbn32.exe Ehikmohb.exe File opened for modification C:\Windows\SysWOW64\Laofhbmp.exe Kgeiokao.exe File created C:\Windows\SysWOW64\Pkhnna32.dll Cabfagee.exe File opened for modification C:\Windows\SysWOW64\Dclknkfp.exe Dpnbhl32.exe File created C:\Windows\SysWOW64\Pciidjdb.dll Onfbpi32.exe File created C:\Windows\SysWOW64\Ldakbepc.dll Oagpne32.exe File created C:\Windows\SysWOW64\Pecefa32.exe Phodlm32.exe File created C:\Windows\SysWOW64\Jdhllo32.dll Nfeekgjo.exe File opened for modification C:\Windows\SysWOW64\Kokkqbog.exe Jgfcfajg.exe File created C:\Windows\SysWOW64\Oimlagii.dll Nnfpbcbf.exe File created C:\Windows\SysWOW64\Kcehejic.exe Jjemle32.exe File created C:\Windows\SysWOW64\Iobilpno.dll Ahpdcn32.exe File created C:\Windows\SysWOW64\Ifihckmi.exe Iiehjgnp.exe File created C:\Windows\SysWOW64\Ppemkhaa.dll Bfenncdp.exe File created C:\Windows\SysWOW64\Iaepea32.dll Cmabpmjj.exe File created C:\Windows\SysWOW64\Gcedcl32.dll Ealkcm32.exe File created C:\Windows\SysWOW64\Anjifbpg.exe Aeodapcl.exe File created C:\Windows\SysWOW64\Hihbma32.dll Nnojad32.exe File opened for modification C:\Windows\SysWOW64\Ggoiap32.exe Fempbm32.exe File created C:\Windows\SysWOW64\Bedcpnmi.dll Akiijq32.exe File opened for modification C:\Windows\SysWOW64\Obqopddf.exe Nbiioe32.exe File created C:\Windows\SysWOW64\Gjiipife.dll Babmjj32.exe File created C:\Windows\SysWOW64\Eibfmp32.exe Eipigqop.exe File created C:\Windows\SysWOW64\Kckqlpck.exe Kjblcj32.exe File created C:\Windows\SysWOW64\Lcimmn32.exe Lnldeg32.exe File created C:\Windows\SysWOW64\Onaieifh.exe Odidld32.exe File opened for modification C:\Windows\SysWOW64\Hbhbie32.exe Hedaoa32.exe File opened for modification C:\Windows\SysWOW64\Kckqlpck.exe Kjblcj32.exe File opened for modification C:\Windows\SysWOW64\Nfdfoala.exe Mfmpob32.exe File created C:\Windows\SysWOW64\Nbljaf32.exe Mlipomli.exe File created C:\Windows\SysWOW64\Ajqfhdik.dll Chibfa32.exe File created C:\Windows\SysWOW64\Dfahjm32.dll Plfipakk.exe File created C:\Windows\SysWOW64\Aappdj32.exe Afjlgafe.exe File opened for modification C:\Windows\SysWOW64\Fmancbji.exe Efnbqi32.exe File created C:\Windows\SysWOW64\Hibape32.exe Hpjlgp32.exe File opened for modification C:\Windows\SysWOW64\Chebcmna.exe Clnanlhn.exe File opened for modification C:\Windows\SysWOW64\Qbbggeli.exe Papnhbgi.exe File created C:\Windows\SysWOW64\Kceail32.dll Qjmeaafi.exe File opened for modification C:\Windows\SysWOW64\Dcgackke.exe Dgqqnjea.exe File opened for modification C:\Windows\SysWOW64\Dpnbhl32.exe Dcgackke.exe File opened for modification C:\Windows\SysWOW64\Qhofjbnl.exe Plfipakk.exe File opened for modification C:\Windows\SysWOW64\Pbfglg32.exe Obdkfg32.exe File created C:\Windows\SysWOW64\Adelne32.dll Kkhpmigp.exe File created C:\Windows\SysWOW64\Encgofhl.exe Dnajjfjo.exe File opened for modification C:\Windows\SysWOW64\Cccppgcp.exe Coegih32.exe File created C:\Windows\SysWOW64\Gbjhelnp.exe Ffekom32.exe File created C:\Windows\SysWOW64\Dpnbhl32.exe Dcgackke.exe File opened for modification C:\Windows\SysWOW64\Lbinkb32.exe Lgcjmjho.exe File opened for modification C:\Windows\SysWOW64\Hmhmko32.exe Gmfpeoga.exe File opened for modification C:\Windows\SysWOW64\Hcommoin.exe Ggoiap32.exe File created C:\Windows\SysWOW64\Lacioppf.dll Qbddmejf.exe File created C:\Windows\SysWOW64\Dapeapja.dll Cimckcoe.exe File opened for modification C:\Windows\SysWOW64\Hoaocf32.exe Hehkjpod.exe File created C:\Windows\SysWOW64\Fqpomo32.exe Foocegea.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 6552 5528 WerFault.exe 449 5272 5528 WerFault.exe 449 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lmeapbpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bffkcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjngml32.dll" Epdaneff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dnpdom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kjblcj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jgngkmkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kfjjhc32.dll" Igmqpbab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfemoei.dll" Eikpan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ilglgfjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pldcdhpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pimmil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfcgkj32.dll" Bagfeioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Peimcaae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egbgim32.dll" Hmfkin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igdnkhoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpmmdl32.dll" Agbgda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpjfikkn.dll" Enkmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ohkkanbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Glgckl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkeehp32.dll" Chebcmna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lqmmgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbdgkich.dll" Cdaigi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kceail32.dll" Qjmeaafi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckpghq32.dll" Jnifbmfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Knoonphp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnojad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldkldmdj.dll" Igpkjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dbikdbnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oiejckcq.dll" Hfoflj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kgenlldo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbpclq32.dll" Laiaqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fdccka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hedaoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpmhjfli.dll" Bcfkiock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lgcjmjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofdgji32.dll" Igkkdigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmqdmd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lnldeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eikpan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obqopddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qbddmejf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Foekbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gbjlbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Onfbpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fjjnblhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcmkdd32.dll" Lnldeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ilglgfjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imdgjlgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eclkpa32.dll" Mdhdkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Laiaqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdlgjg32.dll" Iocliecb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jncfmgfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnemabne.dll" Ckhlgilp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbjlbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojjhopbg.dll" Hlpfak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ilglbjbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nlglpkpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbnbgcei.dll" Gbjlbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bklfqd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Llhnpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfmcgm32.dll" Hcommoin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgnkpfji.dll" Gbjhelnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoilao32.dll" Cfaddg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdhllo32.dll" Nfeekgjo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 912 392 c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe 92 PID 392 wrote to memory of 912 392 c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe 92 PID 392 wrote to memory of 912 392 c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe 92 PID 912 wrote to memory of 4928 912 Nehjmnei.exe 93 PID 912 wrote to memory of 4928 912 Nehjmnei.exe 93 PID 912 wrote to memory of 4928 912 Nehjmnei.exe 93 PID 4928 wrote to memory of 1164 4928 Bbpeghpe.exe 94 PID 4928 wrote to memory of 1164 4928 Bbpeghpe.exe 94 PID 4928 wrote to memory of 1164 4928 Bbpeghpe.exe 94 PID 1164 wrote to memory of 2960 1164 Blkgen32.exe 95 PID 1164 wrote to memory of 2960 1164 Blkgen32.exe 95 PID 1164 wrote to memory of 2960 1164 Blkgen32.exe 95 PID 2960 wrote to memory of 3160 2960 Cbihmg32.exe 96 PID 2960 wrote to memory of 3160 2960 Cbihmg32.exe 96 PID 2960 wrote to memory of 3160 2960 Cbihmg32.exe 96 PID 3160 wrote to memory of 3720 3160 Cihjeq32.exe 97 PID 3160 wrote to memory of 3720 3160 Cihjeq32.exe 97 PID 3160 wrote to memory of 3720 3160 Cihjeq32.exe 97 PID 3720 wrote to memory of 4812 3720 Didjqoae.exe 98 PID 3720 wrote to memory of 4812 3720 Didjqoae.exe 98 PID 3720 wrote to memory of 4812 3720 Didjqoae.exe 98 PID 4812 wrote to memory of 2464 4812 Eikpan32.exe 100 PID 4812 wrote to memory of 2464 4812 Eikpan32.exe 100 PID 4812 wrote to memory of 2464 4812 Eikpan32.exe 100 PID 2464 wrote to memory of 3212 2464 Eimlgnij.exe 102 PID 2464 wrote to memory of 3212 2464 Eimlgnij.exe 102 PID 2464 wrote to memory of 3212 2464 Eimlgnij.exe 102 PID 3212 wrote to memory of 1548 3212 Fempbm32.exe 103 PID 3212 wrote to memory of 1548 3212 Fempbm32.exe 103 PID 3212 wrote to memory of 1548 3212 Fempbm32.exe 103 PID 1548 wrote to memory of 964 1548 Ggoiap32.exe 104 PID 1548 wrote to memory of 964 1548 Ggoiap32.exe 104 PID 1548 wrote to memory of 964 1548 Ggoiap32.exe 104 PID 964 wrote to memory of 4328 964 Hcommoin.exe 105 PID 964 wrote to memory of 4328 964 Hcommoin.exe 105 PID 964 wrote to memory of 4328 964 Hcommoin.exe 105 PID 4328 wrote to memory of 1504 4328 Hokgmpkl.exe 106 PID 4328 wrote to memory of 1504 4328 Hokgmpkl.exe 106 PID 4328 wrote to memory of 1504 4328 Hokgmpkl.exe 106 PID 1504 wrote to memory of 4656 1504 Hjbhph32.exe 107 PID 1504 wrote to memory of 4656 1504 Hjbhph32.exe 107 PID 1504 wrote to memory of 4656 1504 Hjbhph32.exe 107 PID 4656 wrote to memory of 2484 4656 Jcgldl32.exe 108 PID 4656 wrote to memory of 2484 4656 Jcgldl32.exe 108 PID 4656 wrote to memory of 2484 4656 Jcgldl32.exe 108 PID 2484 wrote to memory of 4496 2484 Jjemle32.exe 109 PID 2484 wrote to memory of 4496 2484 Jjemle32.exe 109 PID 2484 wrote to memory of 4496 2484 Jjemle32.exe 109 PID 4496 wrote to memory of 872 4496 Kcehejic.exe 110 PID 4496 wrote to memory of 872 4496 Kcehejic.exe 110 PID 4496 wrote to memory of 872 4496 Kcehejic.exe 110 PID 872 wrote to memory of 2124 872 Mpnngh32.exe 111 PID 872 wrote to memory of 2124 872 Mpnngh32.exe 111 PID 872 wrote to memory of 2124 872 Mpnngh32.exe 111 PID 2124 wrote to memory of 4412 2124 Mfmpob32.exe 112 PID 2124 wrote to memory of 4412 2124 Mfmpob32.exe 112 PID 2124 wrote to memory of 4412 2124 Mfmpob32.exe 112 PID 4412 wrote to memory of 4376 4412 Nfdfoala.exe 113 PID 4412 wrote to memory of 4376 4412 Nfdfoala.exe 113 PID 4412 wrote to memory of 4376 4412 Nfdfoala.exe 113 PID 4376 wrote to memory of 1816 4376 Opfnne32.exe 114 PID 4376 wrote to memory of 1816 4376 Opfnne32.exe 114 PID 4376 wrote to memory of 1816 4376 Opfnne32.exe 114 PID 1816 wrote to memory of 1376 1816 Paomog32.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\c1a74b1b6a507a4f9fee88153a546800_NEIKI.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\Nehjmnei.exeC:\Windows\system32\Nehjmnei.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\Bbpeghpe.exeC:\Windows\system32\Bbpeghpe.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\Blkgen32.exeC:\Windows\system32\Blkgen32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\Cbihmg32.exeC:\Windows\system32\Cbihmg32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Cihjeq32.exeC:\Windows\system32\Cihjeq32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\Didjqoae.exeC:\Windows\system32\Didjqoae.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\Eikpan32.exeC:\Windows\system32\Eikpan32.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Eimlgnij.exeC:\Windows\system32\Eimlgnij.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Fempbm32.exeC:\Windows\system32\Fempbm32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Ggoiap32.exeC:\Windows\system32\Ggoiap32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Hcommoin.exeC:\Windows\system32\Hcommoin.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\Hokgmpkl.exeC:\Windows\system32\Hokgmpkl.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\Hjbhph32.exeC:\Windows\system32\Hjbhph32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Jcgldl32.exeC:\Windows\system32\Jcgldl32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Jjemle32.exeC:\Windows\system32\Jjemle32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Kcehejic.exeC:\Windows\system32\Kcehejic.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\Mpnngh32.exeC:\Windows\system32\Mpnngh32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\Mfmpob32.exeC:\Windows\system32\Mfmpob32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Nfdfoala.exeC:\Windows\system32\Nfdfoala.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\Opfnne32.exeC:\Windows\system32\Opfnne32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\Paomog32.exeC:\Windows\system32\Paomog32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Ahgamo32.exeC:\Windows\system32\Ahgamo32.exe23⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\Ahpdcn32.exeC:\Windows\system32\Ahpdcn32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4516 -
C:\Windows\SysWOW64\Cgaqphgl.exeC:\Windows\system32\Cgaqphgl.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\Ikechced.exeC:\Windows\system32\Ikechced.exe26⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Ilglgfjd.exeC:\Windows\system32\Ilglgfjd.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\Kaaaak32.exeC:\Windows\system32\Kaaaak32.exe28⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\Lmeapbpa.exeC:\Windows\system32\Lmeapbpa.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\Mnndhi32.exeC:\Windows\system32\Mnndhi32.exe30⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\Nbiioe32.exeC:\Windows\system32\Nbiioe32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4080 -
C:\Windows\SysWOW64\Obqopddf.exeC:\Windows\system32\Obqopddf.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3844 -
C:\Windows\SysWOW64\Olpjii32.exeC:\Windows\system32\Olpjii32.exe33⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Pldcdhpi.exeC:\Windows\system32\Pldcdhpi.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Pikqcl32.exeC:\Windows\system32\Pikqcl32.exe35⤵
- Executes dropped EXE
PID:3544 -
C:\Windows\SysWOW64\Pimmil32.exeC:\Windows\system32\Pimmil32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:3344 -
C:\Windows\SysWOW64\Aploae32.exeC:\Windows\system32\Aploae32.exe37⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\Apnkfelb.exeC:\Windows\system32\Apnkfelb.exe38⤵
- Executes dropped EXE
PID:3580 -
C:\Windows\SysWOW64\Bcfkiock.exeC:\Windows\system32\Bcfkiock.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:3648 -
C:\Windows\SysWOW64\Bleebc32.exeC:\Windows\system32\Bleebc32.exe40⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\Dqhpjohb.exeC:\Windows\system32\Dqhpjohb.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\Hdlhoefk.exeC:\Windows\system32\Hdlhoefk.exe42⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Hjimaole.exeC:\Windows\system32\Hjimaole.exe43⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\Hjkigojc.exeC:\Windows\system32\Hjkigojc.exe44⤵
- Executes dropped EXE
PID:4296 -
C:\Windows\SysWOW64\Ialhdh32.exeC:\Windows\system32\Ialhdh32.exe45⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\Jmlkpgia.exeC:\Windows\system32\Jmlkpgia.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2280 -
C:\Windows\SysWOW64\Kpfggang.exeC:\Windows\system32\Kpfggang.exe47⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\Kgeiokao.exeC:\Windows\system32\Kgeiokao.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\Laofhbmp.exeC:\Windows\system32\Laofhbmp.exe49⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Lkgkqh32.exeC:\Windows\system32\Lkgkqh32.exe50⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\Lkjhfh32.exeC:\Windows\system32\Lkjhfh32.exe51⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Ongijo32.exeC:\Windows\system32\Ongijo32.exe52⤵
- Executes dropped EXE
PID:4704 -
C:\Windows\SysWOW64\Olmficce.exeC:\Windows\system32\Olmficce.exe53⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\Plfipakk.exeC:\Windows\system32\Plfipakk.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:644 -
C:\Windows\SysWOW64\Qhofjbnl.exeC:\Windows\system32\Qhofjbnl.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\Qpikao32.exeC:\Windows\system32\Qpikao32.exe56⤵
- Executes dropped EXE
PID:3968 -
C:\Windows\SysWOW64\Ahdpea32.exeC:\Windows\system32\Ahdpea32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3660 -
C:\Windows\SysWOW64\Aified32.exeC:\Windows\system32\Aified32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\Aihfjd32.exeC:\Windows\system32\Aihfjd32.exe59⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Aikbpckb.exeC:\Windows\system32\Aikbpckb.exe60⤵
- Executes dropped EXE
PID:4504 -
C:\Windows\SysWOW64\Bimoecio.exeC:\Windows\system32\Bimoecio.exe61⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Bbjmih32.exeC:\Windows\system32\Bbjmih32.exe62⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Bocjdiol.exeC:\Windows\system32\Bocjdiol.exe63⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\Coegih32.exeC:\Windows\system32\Coegih32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\Cccppgcp.exeC:\Windows\system32\Cccppgcp.exe65⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\Clnanlhn.exeC:\Windows\system32\Clnanlhn.exe66⤵
- Drops file in System32 directory
PID:4640 -
C:\Windows\SysWOW64\Chebcmna.exeC:\Windows\system32\Chebcmna.exe67⤵
- Modifies registry class
PID:468 -
C:\Windows\SysWOW64\Dadlmanj.exeC:\Windows\system32\Dadlmanj.exe68⤵PID:2532
-
C:\Windows\SysWOW64\Dagiba32.exeC:\Windows\system32\Dagiba32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1080 -
C:\Windows\SysWOW64\Fiajfi32.exeC:\Windows\system32\Fiajfi32.exe70⤵PID:2760
-
C:\Windows\SysWOW64\Ffekom32.exeC:\Windows\system32\Ffekom32.exe71⤵
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\Gbjhelnp.exeC:\Windows\system32\Gbjhelnp.exe72⤵
- Modifies registry class
PID:4044 -
C:\Windows\SysWOW64\Hakhcd32.exeC:\Windows\system32\Hakhcd32.exe73⤵PID:1016
-
C:\Windows\SysWOW64\Hfoflj32.exeC:\Windows\system32\Hfoflj32.exe74⤵
- Modifies registry class
PID:3972 -
C:\Windows\SysWOW64\Hfacai32.exeC:\Windows\system32\Hfacai32.exe75⤵PID:1588
-
C:\Windows\SysWOW64\Jdcplkoe.exeC:\Windows\system32\Jdcplkoe.exe76⤵PID:4548
-
C:\Windows\SysWOW64\Kigoeagd.exeC:\Windows\system32\Kigoeagd.exe77⤵PID:2692
-
C:\Windows\SysWOW64\Kkfkod32.exeC:\Windows\system32\Kkfkod32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3976 -
C:\Windows\SysWOW64\Mphfjhjf.exeC:\Windows\system32\Mphfjhjf.exe79⤵PID:3784
-
C:\Windows\SysWOW64\Majoikof.exeC:\Windows\system32\Majoikof.exe80⤵PID:1076
-
C:\Windows\SysWOW64\Odidld32.exeC:\Windows\system32\Odidld32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\Onaieifh.exeC:\Windows\system32\Onaieifh.exe82⤵PID:1644
-
C:\Windows\SysWOW64\Ojhijjll.exeC:\Windows\system32\Ojhijjll.exe83⤵PID:5064
-
C:\Windows\SysWOW64\Onfbpi32.exeC:\Windows\system32\Onfbpi32.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Occkhp32.exeC:\Windows\system32\Occkhp32.exe85⤵PID:2056
-
C:\Windows\SysWOW64\Obdkfg32.exeC:\Windows\system32\Obdkfg32.exe86⤵
- Drops file in System32 directory
PID:3804 -
C:\Windows\SysWOW64\Pbfglg32.exeC:\Windows\system32\Pbfglg32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2824 -
C:\Windows\SysWOW64\Pgemimck.exeC:\Windows\system32\Pgemimck.exe88⤵PID:2540
-
C:\Windows\SysWOW64\Peimcaae.exeC:\Windows\system32\Peimcaae.exe89⤵
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\Papnhbgi.exeC:\Windows\system32\Papnhbgi.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\Qbbggeli.exeC:\Windows\system32\Qbbggeli.exe91⤵PID:3556
-
C:\Windows\SysWOW64\Qbddmejf.exeC:\Windows\system32\Qbddmejf.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Aeemop32.exeC:\Windows\system32\Aeemop32.exe93⤵
- Drops file in System32 directory
PID:3220 -
C:\Windows\SysWOW64\Aegidp32.exeC:\Windows\system32\Aegidp32.exe94⤵PID:1776
-
C:\Windows\SysWOW64\Bngdndfn.exeC:\Windows\system32\Bngdndfn.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3548 -
C:\Windows\SysWOW64\Blmamh32.exeC:\Windows\system32\Blmamh32.exe96⤵PID:2180
-
C:\Windows\SysWOW64\Bonjnc32.exeC:\Windows\system32\Bonjnc32.exe97⤵PID:4816
-
C:\Windows\SysWOW64\Bhfogiff.exeC:\Windows\system32\Bhfogiff.exe98⤵PID:5016
-
C:\Windows\SysWOW64\Ckghid32.exeC:\Windows\system32\Ckghid32.exe99⤵PID:4992
-
C:\Windows\SysWOW64\Cellfm32.exeC:\Windows\system32\Cellfm32.exe100⤵PID:4812
-
C:\Windows\SysWOW64\Cdaigi32.exeC:\Windows\system32\Cdaigi32.exe101⤵
- Modifies registry class
PID:4592 -
C:\Windows\SysWOW64\Ceaealoh.exeC:\Windows\system32\Ceaealoh.exe102⤵PID:776
-
C:\Windows\SysWOW64\Coijja32.exeC:\Windows\system32\Coijja32.exe103⤵
- Drops file in System32 directory
PID:4604 -
C:\Windows\SysWOW64\Dlpgiebo.exeC:\Windows\system32\Dlpgiebo.exe104⤵PID:2256
-
C:\Windows\SysWOW64\Fdiafc32.exeC:\Windows\system32\Fdiafc32.exe105⤵PID:5140
-
C:\Windows\SysWOW64\Hoakpi32.exeC:\Windows\system32\Hoakpi32.exe106⤵PID:5188
-
C:\Windows\SysWOW64\Hmfkin32.exeC:\Windows\system32\Hmfkin32.exe107⤵
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Hillnoif.exeC:\Windows\system32\Hillnoif.exe108⤵PID:5280
-
C:\Windows\SysWOW64\Ibeqgdpf.exeC:\Windows\system32\Ibeqgdpf.exe109⤵PID:5324
-
C:\Windows\SysWOW64\Icdmqg32.exeC:\Windows\system32\Icdmqg32.exe110⤵PID:5372
-
C:\Windows\SysWOW64\Ipkneh32.exeC:\Windows\system32\Ipkneh32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5420 -
C:\Windows\SysWOW64\Ilbnkiba.exeC:\Windows\system32\Ilbnkiba.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5464 -
C:\Windows\SysWOW64\Ibncmchl.exeC:\Windows\system32\Ibncmchl.exe113⤵PID:5508
-
C:\Windows\SysWOW64\Imdgjlgb.exeC:\Windows\system32\Imdgjlgb.exe114⤵
- Modifies registry class
PID:5552 -
C:\Windows\SysWOW64\Jbqpbbfi.exeC:\Windows\system32\Jbqpbbfi.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5636 -
C:\Windows\SysWOW64\Kfanen32.exeC:\Windows\system32\Kfanen32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5720 -
C:\Windows\SysWOW64\Lpcedbjp.exeC:\Windows\system32\Lpcedbjp.exe117⤵PID:5768
-
C:\Windows\SysWOW64\Lepnli32.exeC:\Windows\system32\Lepnli32.exe118⤵PID:5848
-
C:\Windows\SysWOW64\Mdhdkp32.exeC:\Windows\system32\Mdhdkp32.exe119⤵
- Modifies registry class
PID:5916 -
C:\Windows\SysWOW64\Pqhammje.exeC:\Windows\system32\Pqhammje.exe120⤵PID:5980
-
C:\Windows\SysWOW64\Pfeiedhm.exeC:\Windows\system32\Pfeiedhm.exe121⤵PID:6024
-
C:\Windows\SysWOW64\Pgefogop.exeC:\Windows\system32\Pgefogop.exe122⤵PID:6064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-