Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 07:30
Behavioral task
behavioral1
Sample
48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe
-
Size
229KB
-
MD5
48eb13a2d934467825d8e2340de159c0
-
SHA1
bc08ccd54e11f8b0e531b06b8d6ddbb9e17c5ddb
-
SHA256
9655bf1b05c744364013cb6cef7b939c7ff61eeab5b6c140a5fc1db411cdb01d
-
SHA512
3fe75dede0cd4d1b6914d7581111876874c0e78ad4d0c2ceea8789e086d79647a23073cac1ad6bafd35a0ddac299e3155be48a7922bb4abca6d886d7d07d9325
-
SSDEEP
6144:/CYgKuo0Y271+HZ/pvkym/89bYEwPhCKvav:/CYg1o+7AIfFfvav
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kanopipl.exeAnkdiqih.exeIbocjk32.exeJmdcfg32.exeLmkfei32.exeMhlmgf32.exeAmbmpmln.exeBalijo32.exeFjlhneio.exeJbfijjkl.exeBkdmcdoe.exeKpemgbqf.exeOnmkio32.exeQagcpljo.exeAdhlaggp.exeOcajbekl.exeAdeplhib.exeAmndem32.exeIbapoj32.exeGonnhhln.exeComimg32.exeClaifkkf.exeCngcjo32.exeEnkece32.exeLkfciogm.exeMepnpj32.exeDoobajme.exeMcmhiojk.exeEeempocb.exeGldkfl32.exeImkdqe32.exePaejki32.exeGloblmmj.exeFedplc32.exeDqlafm32.exeIfdiijpe.exeJfhocmnk.exePbiciana.exePfflopdh.exeIeqeidnl.exeHgolhn32.exeIenoff32.exeHaogkgoh.exeFikcacgl.exeGangic32.exeDjbiicon.exeEnnaieib.exeFjdbnf32.exeFeeiob32.exeGmgdddmq.exeHjhhocjj.exeKfaajlfp.exeBgknheej.exeFppbbnbo.exeMkmfhacp.exeGkgkbipp.exeFdoclk32.exeGacpdbej.exeHnagjbdf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kanopipl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ankdiqih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibocjk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmdcfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmkfei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhlmgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ambmpmln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Balijo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjlhneio.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbfijjkl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmkfei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bkdmcdoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kpemgbqf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onmkio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qagcpljo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adhlaggp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocajbekl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Adeplhib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amndem32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibapoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gonnhhln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Comimg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Claifkkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cngcjo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enkece32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lkfciogm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mepnpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Doobajme.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcmhiojk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doobajme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Enkece32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eeempocb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gldkfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imkdqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ankdiqih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paejki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Globlmmj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fedplc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dqlafm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifdiijpe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfhocmnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbiciana.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pfflopdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieqeidnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hgolhn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ienoff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Haogkgoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ibapoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fikcacgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gangic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djbiicon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ennaieib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjdbnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Feeiob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmgdddmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kfaajlfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bgknheej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fppbbnbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkmfhacp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkgkbipp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdoclk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gacpdbej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hnagjbdf.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Dcpbhkbi.exe family_berbew C:\Windows\SysWOW64\Dimjqapa.exe family_berbew \Windows\SysWOW64\Djmgkdgc.exe family_berbew \Windows\SysWOW64\Dkncbm32.exe family_berbew \Windows\SysWOW64\Dfchpe32.exe family_berbew C:\Windows\SysWOW64\Dkpphl32.exe family_berbew \Windows\SysWOW64\Dffdeeke.exe family_berbew \Windows\SysWOW64\Dlbmnlim.exe family_berbew \Windows\SysWOW64\Dekafa32.exe family_berbew \Windows\SysWOW64\Ejhjoh32.exe family_berbew \Windows\SysWOW64\Eemnlanj.exe family_berbew \Windows\SysWOW64\Ejjfdhlb.exe family_berbew \Windows\SysWOW64\Eepkaalh.exe family_berbew C:\Windows\SysWOW64\Efagii32.exe family_berbew \Windows\SysWOW64\Eafkfb32.exe family_berbew \Windows\SysWOW64\Ecehbm32.exe family_berbew C:\Windows\SysWOW64\Eplhgn32.exe family_berbew C:\Windows\SysWOW64\Efeqdhnq.exe family_berbew C:\Windows\SysWOW64\Fpnemn32.exe family_berbew C:\Windows\SysWOW64\Ffhmjhln.exe family_berbew C:\Windows\SysWOW64\Fififc32.exe family_berbew C:\Windows\SysWOW64\Fppbbnbo.exe family_berbew C:\Windows\SysWOW64\Fiifkc32.exe family_berbew C:\Windows\SysWOW64\Fpbohmpl.exe family_berbew C:\Windows\SysWOW64\Fikcacgl.exe family_berbew behavioral1/memory/2096-306-0x0000000000250000-0x0000000000292000-memory.dmp family_berbew behavioral1/memory/2096-307-0x0000000000250000-0x0000000000292000-memory.dmp family_berbew C:\Windows\SysWOW64\Fklpik32.exe family_berbew C:\Windows\SysWOW64\Fbcgjh32.exe family_berbew C:\Windows\SysWOW64\Flllcndm.exe family_berbew C:\Windows\SysWOW64\Fmmhjf32.exe family_berbew C:\Windows\SysWOW64\Fedplc32.exe family_berbew C:\Windows\SysWOW64\Gomedi32.exe family_berbew behavioral1/memory/2748-373-0x0000000001FA0000-0x0000000001FE2000-memory.dmp family_berbew behavioral1/memory/2748-372-0x0000000001FA0000-0x0000000001FE2000-memory.dmp family_berbew C:\Windows\SysWOW64\Gpnalagm.exe family_berbew behavioral1/memory/2752-383-0x00000000002E0000-0x0000000000322000-memory.dmp family_berbew C:\Windows\SysWOW64\Gghjil32.exe family_berbew C:\Windows\SysWOW64\Gamnfd32.exe family_berbew behavioral1/memory/2160-405-0x0000000000250000-0x0000000000292000-memory.dmp family_berbew C:\Windows\SysWOW64\Gdljbp32.exe family_berbew behavioral1/memory/2676-416-0x0000000000280000-0x00000000002C2000-memory.dmp family_berbew C:\Windows\SysWOW64\Gihbjfkj.exe family_berbew C:\Windows\SysWOW64\Glgofbjn.exe family_berbew C:\Windows\SysWOW64\Gglcdkjd.exe family_berbew C:\Windows\SysWOW64\Gnfkqe32.exe family_berbew C:\Windows\SysWOW64\Gohhhmgo.exe family_berbew C:\Windows\SysWOW64\Ggopijha.exe family_berbew C:\Windows\SysWOW64\Gllhaa32.exe family_berbew C:\Windows\SysWOW64\Gojdnm32.exe family_berbew C:\Windows\SysWOW64\Hedmkgmi.exe family_berbew C:\Windows\SysWOW64\Hakmph32.exe family_berbew C:\Windows\SysWOW64\Hdijlc32.exe family_berbew C:\Windows\SysWOW64\Hlpamq32.exe family_berbew C:\Windows\SysWOW64\Hnandi32.exe family_berbew C:\Windows\SysWOW64\Hamjehqk.exe family_berbew C:\Windows\SysWOW64\Hhgbba32.exe family_berbew C:\Windows\SysWOW64\Hgjbmoob.exe family_berbew C:\Windows\SysWOW64\Hndkji32.exe family_berbew C:\Windows\SysWOW64\Haogkgoh.exe family_berbew C:\Windows\SysWOW64\Hhioga32.exe family_berbew C:\Windows\SysWOW64\Hkhkcm32.exe family_berbew C:\Windows\SysWOW64\Hbbcpg32.exe family_berbew C:\Windows\SysWOW64\Hdpplb32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Dcpbhkbi.exeDimjqapa.exeDjmgkdgc.exeDkncbm32.exeDfchpe32.exeDkpphl32.exeDffdeeke.exeDlbmnlim.exeDekafa32.exeEjhjoh32.exeEemnlanj.exeEjjfdhlb.exeEepkaalh.exeEfagii32.exeEafkfb32.exeEcehbm32.exeEplhgn32.exeEfeqdhnq.exeFpnemn32.exeFfhmjhln.exeFififc32.exeFppbbnbo.exeFiifkc32.exeFpbohmpl.exeFikcacgl.exeFklpik32.exeFbcgjh32.exeFlllcndm.exeFmmhjf32.exeFedplc32.exeGomedi32.exeGpnalagm.exeGghjil32.exeGamnfd32.exeGdljbp32.exeGihbjfkj.exeGlgofbjn.exeGglcdkjd.exeGnfkqe32.exeGohhhmgo.exeGgopijha.exeGllhaa32.exeGojdnm32.exeHedmkgmi.exeHakmph32.exeHdijlc32.exeHlpamq32.exeHnandi32.exeHamjehqk.exeHhgbba32.exeHgjbmoob.exeHndkji32.exeHaogkgoh.exeHhioga32.exeHkhkcm32.exeHbbcpg32.exeHdpplb32.exeHgolhn32.exeHjmhdi32.exeImkdqe32.exeIqgqacam.exeIcemmopa.exeIfdiijpe.exeIjoeji32.exepid process 1724 Dcpbhkbi.exe 2588 Dimjqapa.exe 2708 Djmgkdgc.exe 2816 Dkncbm32.exe 2916 Dfchpe32.exe 2548 Dkpphl32.exe 2944 Dffdeeke.exe 320 Dlbmnlim.exe 2940 Dekafa32.exe 2800 Ejhjoh32.exe 1428 Eemnlanj.exe 2904 Ejjfdhlb.exe 2936 Eepkaalh.exe 3020 Efagii32.exe 1272 Eafkfb32.exe 1880 Ecehbm32.exe 1048 Eplhgn32.exe 1208 Efeqdhnq.exe 1872 Fpnemn32.exe 1212 Ffhmjhln.exe 2060 Fififc32.exe 2144 Fppbbnbo.exe 1020 Fiifkc32.exe 2096 Fpbohmpl.exe 880 Fikcacgl.exe 1672 Fklpik32.exe 1712 Fbcgjh32.exe 2600 Flllcndm.exe 2596 Fmmhjf32.exe 2748 Fedplc32.exe 2752 Gomedi32.exe 2508 Gpnalagm.exe 2160 Gghjil32.exe 2676 Gamnfd32.exe 2732 Gdljbp32.exe 1096 Gihbjfkj.exe 2880 Glgofbjn.exe 1372 Gglcdkjd.exe 1988 Gnfkqe32.exe 324 Gohhhmgo.exe 764 Ggopijha.exe 1968 Gllhaa32.exe 1740 Gojdnm32.exe 2192 Hedmkgmi.exe 1960 Hakmph32.exe 908 Hdijlc32.exe 888 Hlpamq32.exe 2976 Hnandi32.exe 2044 Hamjehqk.exe 2092 Hhgbba32.exe 2180 Hgjbmoob.exe 1804 Hndkji32.exe 2744 Haogkgoh.exe 2616 Hhioga32.exe 1080 Hkhkcm32.exe 2536 Hbbcpg32.exe 2112 Hdpplb32.exe 2724 Hgolhn32.exe 1364 Hjmhdi32.exe 2668 Imkdqe32.exe 1560 Iqgqacam.exe 1296 Icemmopa.exe 1956 Ifdiijpe.exe 2188 Ijoeji32.exe -
Loads dropped DLL 64 IoCs
Processes:
48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exeDcpbhkbi.exeDimjqapa.exeDjmgkdgc.exeDkncbm32.exeDfchpe32.exeDkpphl32.exeDffdeeke.exeDlbmnlim.exeDekafa32.exeEjhjoh32.exeEemnlanj.exeEjjfdhlb.exeEepkaalh.exeEfagii32.exeEafkfb32.exeEcehbm32.exeEplhgn32.exeEfeqdhnq.exeFpnemn32.exeFfhmjhln.exeFififc32.exeFppbbnbo.exeFiifkc32.exeFpbohmpl.exeFikcacgl.exeFklpik32.exeFbcgjh32.exeFlllcndm.exeFmmhjf32.exeFedplc32.exeGomedi32.exepid process 2468 48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe 2468 48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe 1724 Dcpbhkbi.exe 1724 Dcpbhkbi.exe 2588 Dimjqapa.exe 2588 Dimjqapa.exe 2708 Djmgkdgc.exe 2708 Djmgkdgc.exe 2816 Dkncbm32.exe 2816 Dkncbm32.exe 2916 Dfchpe32.exe 2916 Dfchpe32.exe 2548 Dkpphl32.exe 2548 Dkpphl32.exe 2944 Dffdeeke.exe 2944 Dffdeeke.exe 320 Dlbmnlim.exe 320 Dlbmnlim.exe 2940 Dekafa32.exe 2940 Dekafa32.exe 2800 Ejhjoh32.exe 2800 Ejhjoh32.exe 1428 Eemnlanj.exe 1428 Eemnlanj.exe 2904 Ejjfdhlb.exe 2904 Ejjfdhlb.exe 2936 Eepkaalh.exe 2936 Eepkaalh.exe 3020 Efagii32.exe 3020 Efagii32.exe 1272 Eafkfb32.exe 1272 Eafkfb32.exe 1880 Ecehbm32.exe 1880 Ecehbm32.exe 1048 Eplhgn32.exe 1048 Eplhgn32.exe 1208 Efeqdhnq.exe 1208 Efeqdhnq.exe 1872 Fpnemn32.exe 1872 Fpnemn32.exe 1212 Ffhmjhln.exe 1212 Ffhmjhln.exe 2060 Fififc32.exe 2060 Fififc32.exe 2144 Fppbbnbo.exe 2144 Fppbbnbo.exe 1020 Fiifkc32.exe 1020 Fiifkc32.exe 2096 Fpbohmpl.exe 2096 Fpbohmpl.exe 880 Fikcacgl.exe 880 Fikcacgl.exe 1672 Fklpik32.exe 1672 Fklpik32.exe 1712 Fbcgjh32.exe 1712 Fbcgjh32.exe 2600 Flllcndm.exe 2600 Flllcndm.exe 2596 Fmmhjf32.exe 2596 Fmmhjf32.exe 2748 Fedplc32.exe 2748 Fedplc32.exe 2752 Gomedi32.exe 2752 Gomedi32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Qbbfopeg.exeKmgpkfab.exePenfelgm.exeAjbdna32.exeNjdpomfe.exePjmodopf.exeCllpkl32.exeGaqcoc32.exeJkjdhpea.exeKbalnnam.exeLodlom32.exeNnnojlpa.exeNhlifi32.exeNlgefh32.exeKlqfhbbe.exeLkfciogm.exeGhkllmoi.exeBcaomf32.exeFejgko32.exeIenoff32.exeQmlgonbe.exeDkhcmgnl.exeDekafa32.exeLdnhad32.exeFphafl32.exeInljnfkg.exeOndajnme.exeKinaqg32.exeLmdpejfq.exePaggai32.exeDqelenlc.exeHpocfncj.exeHkhkcm32.exeMkmfhacp.exeDffdeeke.exeLganiohl.exeCckace32.exeDqhhknjp.exeEnihne32.exeElmigj32.exeGlaoalkh.exeDjmgkdgc.exeEjhjoh32.exeKappfeln.exeLgoacojo.exeDdagfm32.exeGloblmmj.exeHkkalk32.exeEafkfb32.exeJeplkf32.exeAnkdiqih.exeDnilobkm.exeBhcdaibd.exeClaifkkf.exeFeeiob32.exeFmlapp32.exeLdenbcge.exeMoalhq32.exedescription ioc process File created C:\Windows\SysWOW64\Pofgpn32.dll Qbbfopeg.exe File created C:\Windows\SysWOW64\Djdbmo32.dll Kmgpkfab.exe File created C:\Windows\SysWOW64\Pijbfj32.exe Penfelgm.exe File opened for modification C:\Windows\SysWOW64\Aiedjneg.exe Ajbdna32.exe File created C:\Windows\SysWOW64\Aljkjq32.dll Njdpomfe.exe File opened for modification C:\Windows\SysWOW64\Pipopl32.exe Pjmodopf.exe File created C:\Windows\SysWOW64\Kddjlc32.dll Cllpkl32.exe File created C:\Windows\SysWOW64\Ghkllmoi.exe Gaqcoc32.exe File created C:\Windows\SysWOW64\Jbdlejmn.exe Jkjdhpea.exe File created C:\Windows\SysWOW64\Ehgeib32.dll Kbalnnam.exe File created C:\Windows\SysWOW64\Llkjofpc.dll Lodlom32.exe File opened for modification C:\Windows\SysWOW64\Nplkfgoe.exe Nnnojlpa.exe File created C:\Windows\SysWOW64\Nlblkhei.exe Njdpomfe.exe File opened for modification C:\Windows\SysWOW64\Nlgefh32.exe Nhlifi32.exe File opened for modification C:\Windows\SysWOW64\Nofabc32.exe Nlgefh32.exe File opened for modification C:\Windows\SysWOW64\Pijbfj32.exe Penfelgm.exe File created C:\Windows\SysWOW64\Kjcgco32.exe Klqfhbbe.exe File opened for modification C:\Windows\SysWOW64\Lmdpejfq.exe Lkfciogm.exe File created C:\Windows\SysWOW64\Gkihhhnm.exe Ghkllmoi.exe File created C:\Windows\SysWOW64\Aiabof32.dll Bcaomf32.exe File opened for modification C:\Windows\SysWOW64\Fcmgfkeg.exe Fejgko32.exe File opened for modification C:\Windows\SysWOW64\Imeggc32.exe Ienoff32.exe File created C:\Windows\SysWOW64\Qagcpljo.exe Qmlgonbe.exe File created C:\Windows\SysWOW64\Cbolpc32.dll Dkhcmgnl.exe File created C:\Windows\SysWOW64\Ejhjoh32.exe Dekafa32.exe File opened for modification C:\Windows\SysWOW64\Lfmdnp32.exe Ldnhad32.exe File created C:\Windows\SysWOW64\Ffbicfoc.exe Fphafl32.exe File created C:\Windows\SysWOW64\Gjenmobn.dll Inljnfkg.exe File opened for modification C:\Windows\SysWOW64\Oqcnfjli.exe Ondajnme.exe File created C:\Windows\SysWOW64\Ebbjqa32.dll Penfelgm.exe File created C:\Windows\SysWOW64\Jfidpmmf.dll Kinaqg32.exe File created C:\Windows\SysWOW64\Lekhfgfc.exe Lmdpejfq.exe File created C:\Windows\SysWOW64\Hbkdjjal.dll Paggai32.exe File opened for modification C:\Windows\SysWOW64\Ddagfm32.exe Dqelenlc.exe File opened for modification C:\Windows\SysWOW64\Hobcak32.exe Hpocfncj.exe File opened for modification C:\Windows\SysWOW64\Hbbcpg32.exe Hkhkcm32.exe File opened for modification C:\Windows\SysWOW64\Jbdlejmn.exe Jkjdhpea.exe File created C:\Windows\SysWOW64\Agkjoj32.dll Mkmfhacp.exe File created C:\Windows\SysWOW64\Dlbmnlim.exe Dffdeeke.exe File created C:\Windows\SysWOW64\Lmkfei32.exe Lganiohl.exe File created C:\Windows\SysWOW64\Lgeceh32.dll Cckace32.exe File created C:\Windows\SysWOW64\Fkahhbbj.dll Dqhhknjp.exe File created C:\Windows\SysWOW64\Hkabadei.dll Enihne32.exe File opened for modification C:\Windows\SysWOW64\Enkece32.exe Elmigj32.exe File created C:\Windows\SysWOW64\Gopkmhjk.exe Glaoalkh.exe File created C:\Windows\SysWOW64\Hlaidabp.dll Djmgkdgc.exe File created C:\Windows\SysWOW64\Eebfei32.dll Ejhjoh32.exe File opened for modification C:\Windows\SysWOW64\Kcolba32.exe Kappfeln.exe File opened for modification C:\Windows\SysWOW64\Ladeqhjd.exe Lgoacojo.exe File created C:\Windows\SysWOW64\Dgodbh32.exe Ddagfm32.exe File created C:\Windows\SysWOW64\Gonnhhln.exe Globlmmj.exe File created C:\Windows\SysWOW64\Icbimi32.exe Hkkalk32.exe File created C:\Windows\SysWOW64\Oplgihma.dll Eafkfb32.exe File created C:\Windows\SysWOW64\Jgnhga32.exe Jeplkf32.exe File created C:\Windows\SysWOW64\Ipghqomc.dll Ankdiqih.exe File created C:\Windows\SysWOW64\Ahcfok32.dll Dnilobkm.exe File created C:\Windows\SysWOW64\Pcfcmd32.exe Paggai32.exe File opened for modification C:\Windows\SysWOW64\Bloqah32.exe Bhcdaibd.exe File opened for modification C:\Windows\SysWOW64\Ckdjbh32.exe Claifkkf.exe File created C:\Windows\SysWOW64\Fmlapp32.exe Feeiob32.exe File created C:\Windows\SysWOW64\Globlmmj.exe Fmlapp32.exe File created C:\Windows\SysWOW64\Maocanob.dll Dffdeeke.exe File created C:\Windows\SysWOW64\Cddjolah.dll Ldenbcge.exe File created C:\Windows\SysWOW64\Mcmhiojk.exe Moalhq32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4716 4272 WerFault.exe Iagfoe32.exe -
Modifies registry class 64 IoCs
Processes:
Fjdbnf32.exeHhioga32.exeCpeofk32.exeKcolba32.exePbpjiphi.exePpoqge32.exeBommnc32.exeBpafkknm.exeFehjeo32.exeDcpbhkbi.exeOqndkj32.exeEmcbkn32.exeDekafa32.exeJmpjkggj.exeBdooajdc.exeNkmbgdfl.exeBcaomf32.exeFppbbnbo.exeKcahhq32.exeHdpplb32.exeFiifkc32.exeHndkji32.exeOgjimd32.exeBnefdp32.exeEbinic32.exeMoalhq32.exeMekdekin.exeHhgbba32.exeNgfcca32.exeNnbhek32.exeFmlapp32.exeHejoiedd.exeGacpdbej.exeMgajhbkg.exeDjpmccqq.exeHdijlc32.exeDbpodagk.exeHiqbndpb.exeGamnfd32.exeMgfgdn32.exeFeeiob32.exeJeplkf32.exePelipl32.exeDqelenlc.exeEbedndfa.exeNqqdag32.exeDkhcmgnl.exeIbocjk32.exeLganiohl.exeNplkfgoe.exeNccjhafn.exeOkoomd32.exeQbbfopeg.exeEjjfdhlb.exeIchico32.exeHodpgjha.exeDdokpmfo.exeBhahlj32.exeKegnkh32.exeMagnek32.exePccfge32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fjdbnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hhioga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cpeofk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kcolba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pbpjiphi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ppoqge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bommnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bpafkknm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fehjeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dcpbhkbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Piddlm32.dll" Oqndkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emcbkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dekafa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jmpjkggj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bdooajdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nkmbgdfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bcaomf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fppbbnbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kcahhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghhfge32.dll" Hdpplb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fiifkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hndkji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogjimd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bnefdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlgohm32.dll" Ebinic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Moalhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhegaocb.dll" Mekdekin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hhgbba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ngfcca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnbhek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpqpdnop.dll" Fmlapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Moalhq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gacpdbej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mgajhbkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naeqjnho.dll" Djpmccqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbdpdipp.dll" Hdijlc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dbpodagk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hiqbndpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gamnfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mgfgdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Feeiob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Palbmbbp.dll" Jeplkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldhebk32.dll" Pelipl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njcbaa32.dll" Dqelenlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djpmccqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lanfmb32.dll" Ebedndfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nqqdag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dkhcmgnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnogjahn.dll" Ibocjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amclfbco.dll" Lganiohl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfcngp32.dll" Nplkfgoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nccjhafn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Okoomd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qbbfopeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ejjfdhlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ichico32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hodpgjha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfbenjka.dll" Ddokpmfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ebinic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhahlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kegnkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Magnek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfdaihk.dll" Pccfge32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exeDcpbhkbi.exeDimjqapa.exeDjmgkdgc.exeDkncbm32.exeDfchpe32.exeDkpphl32.exeDffdeeke.exeDlbmnlim.exeDekafa32.exeEjhjoh32.exeEemnlanj.exeEjjfdhlb.exeEepkaalh.exeEfagii32.exeEafkfb32.exedescription pid process target process PID 2468 wrote to memory of 1724 2468 48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe Dcpbhkbi.exe PID 2468 wrote to memory of 1724 2468 48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe Dcpbhkbi.exe PID 2468 wrote to memory of 1724 2468 48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe Dcpbhkbi.exe PID 2468 wrote to memory of 1724 2468 48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe Dcpbhkbi.exe PID 1724 wrote to memory of 2588 1724 Dcpbhkbi.exe Dimjqapa.exe PID 1724 wrote to memory of 2588 1724 Dcpbhkbi.exe Dimjqapa.exe PID 1724 wrote to memory of 2588 1724 Dcpbhkbi.exe Dimjqapa.exe PID 1724 wrote to memory of 2588 1724 Dcpbhkbi.exe Dimjqapa.exe PID 2588 wrote to memory of 2708 2588 Dimjqapa.exe Djmgkdgc.exe PID 2588 wrote to memory of 2708 2588 Dimjqapa.exe Djmgkdgc.exe PID 2588 wrote to memory of 2708 2588 Dimjqapa.exe Djmgkdgc.exe PID 2588 wrote to memory of 2708 2588 Dimjqapa.exe Djmgkdgc.exe PID 2708 wrote to memory of 2816 2708 Djmgkdgc.exe Dkncbm32.exe PID 2708 wrote to memory of 2816 2708 Djmgkdgc.exe Dkncbm32.exe PID 2708 wrote to memory of 2816 2708 Djmgkdgc.exe Dkncbm32.exe PID 2708 wrote to memory of 2816 2708 Djmgkdgc.exe Dkncbm32.exe PID 2816 wrote to memory of 2916 2816 Dkncbm32.exe Dfchpe32.exe PID 2816 wrote to memory of 2916 2816 Dkncbm32.exe Dfchpe32.exe PID 2816 wrote to memory of 2916 2816 Dkncbm32.exe Dfchpe32.exe PID 2816 wrote to memory of 2916 2816 Dkncbm32.exe Dfchpe32.exe PID 2916 wrote to memory of 2548 2916 Dfchpe32.exe Dkpphl32.exe PID 2916 wrote to memory of 2548 2916 Dfchpe32.exe Dkpphl32.exe PID 2916 wrote to memory of 2548 2916 Dfchpe32.exe Dkpphl32.exe PID 2916 wrote to memory of 2548 2916 Dfchpe32.exe Dkpphl32.exe PID 2548 wrote to memory of 2944 2548 Dkpphl32.exe Dffdeeke.exe PID 2548 wrote to memory of 2944 2548 Dkpphl32.exe Dffdeeke.exe PID 2548 wrote to memory of 2944 2548 Dkpphl32.exe Dffdeeke.exe PID 2548 wrote to memory of 2944 2548 Dkpphl32.exe Dffdeeke.exe PID 2944 wrote to memory of 320 2944 Dffdeeke.exe Dlbmnlim.exe PID 2944 wrote to memory of 320 2944 Dffdeeke.exe Dlbmnlim.exe PID 2944 wrote to memory of 320 2944 Dffdeeke.exe Dlbmnlim.exe PID 2944 wrote to memory of 320 2944 Dffdeeke.exe Dlbmnlim.exe PID 320 wrote to memory of 2940 320 Dlbmnlim.exe Dekafa32.exe PID 320 wrote to memory of 2940 320 Dlbmnlim.exe Dekafa32.exe PID 320 wrote to memory of 2940 320 Dlbmnlim.exe Dekafa32.exe PID 320 wrote to memory of 2940 320 Dlbmnlim.exe Dekafa32.exe PID 2940 wrote to memory of 2800 2940 Dekafa32.exe Ejhjoh32.exe PID 2940 wrote to memory of 2800 2940 Dekafa32.exe Ejhjoh32.exe PID 2940 wrote to memory of 2800 2940 Dekafa32.exe Ejhjoh32.exe PID 2940 wrote to memory of 2800 2940 Dekafa32.exe Ejhjoh32.exe PID 2800 wrote to memory of 1428 2800 Ejhjoh32.exe Eemnlanj.exe PID 2800 wrote to memory of 1428 2800 Ejhjoh32.exe Eemnlanj.exe PID 2800 wrote to memory of 1428 2800 Ejhjoh32.exe Eemnlanj.exe PID 2800 wrote to memory of 1428 2800 Ejhjoh32.exe Eemnlanj.exe PID 1428 wrote to memory of 2904 1428 Eemnlanj.exe Ejjfdhlb.exe PID 1428 wrote to memory of 2904 1428 Eemnlanj.exe Ejjfdhlb.exe PID 1428 wrote to memory of 2904 1428 Eemnlanj.exe Ejjfdhlb.exe PID 1428 wrote to memory of 2904 1428 Eemnlanj.exe Ejjfdhlb.exe PID 2904 wrote to memory of 2936 2904 Ejjfdhlb.exe Eepkaalh.exe PID 2904 wrote to memory of 2936 2904 Ejjfdhlb.exe Eepkaalh.exe PID 2904 wrote to memory of 2936 2904 Ejjfdhlb.exe Eepkaalh.exe PID 2904 wrote to memory of 2936 2904 Ejjfdhlb.exe Eepkaalh.exe PID 2936 wrote to memory of 3020 2936 Eepkaalh.exe Efagii32.exe PID 2936 wrote to memory of 3020 2936 Eepkaalh.exe Efagii32.exe PID 2936 wrote to memory of 3020 2936 Eepkaalh.exe Efagii32.exe PID 2936 wrote to memory of 3020 2936 Eepkaalh.exe Efagii32.exe PID 3020 wrote to memory of 1272 3020 Efagii32.exe Eafkfb32.exe PID 3020 wrote to memory of 1272 3020 Efagii32.exe Eafkfb32.exe PID 3020 wrote to memory of 1272 3020 Efagii32.exe Eafkfb32.exe PID 3020 wrote to memory of 1272 3020 Efagii32.exe Eafkfb32.exe PID 1272 wrote to memory of 1880 1272 Eafkfb32.exe Ecehbm32.exe PID 1272 wrote to memory of 1880 1272 Eafkfb32.exe Ecehbm32.exe PID 1272 wrote to memory of 1880 1272 Eafkfb32.exe Ecehbm32.exe PID 1272 wrote to memory of 1880 1272 Eafkfb32.exe Ecehbm32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\48eb13a2d934467825d8e2340de159c0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Dcpbhkbi.exeC:\Windows\system32\Dcpbhkbi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Dimjqapa.exeC:\Windows\system32\Dimjqapa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Djmgkdgc.exeC:\Windows\system32\Djmgkdgc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\Dkncbm32.exeC:\Windows\system32\Dkncbm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Dfchpe32.exeC:\Windows\system32\Dfchpe32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Dkpphl32.exeC:\Windows\system32\Dkpphl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\Dffdeeke.exeC:\Windows\system32\Dffdeeke.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Dlbmnlim.exeC:\Windows\system32\Dlbmnlim.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\Dekafa32.exeC:\Windows\system32\Dekafa32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\Ejhjoh32.exeC:\Windows\system32\Ejhjoh32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Eemnlanj.exeC:\Windows\system32\Eemnlanj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\Ejjfdhlb.exeC:\Windows\system32\Ejjfdhlb.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Eepkaalh.exeC:\Windows\system32\Eepkaalh.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Efagii32.exeC:\Windows\system32\Efagii32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Eafkfb32.exeC:\Windows\system32\Eafkfb32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Ecehbm32.exeC:\Windows\system32\Ecehbm32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Windows\SysWOW64\Eplhgn32.exeC:\Windows\system32\Eplhgn32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1048 -
C:\Windows\SysWOW64\Efeqdhnq.exeC:\Windows\system32\Efeqdhnq.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208 -
C:\Windows\SysWOW64\Fpnemn32.exeC:\Windows\system32\Fpnemn32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1872 -
C:\Windows\SysWOW64\Ffhmjhln.exeC:\Windows\system32\Ffhmjhln.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212 -
C:\Windows\SysWOW64\Fififc32.exeC:\Windows\system32\Fififc32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\Windows\SysWOW64\Fppbbnbo.exeC:\Windows\system32\Fppbbnbo.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Fiifkc32.exeC:\Windows\system32\Fiifkc32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1020 -
C:\Windows\SysWOW64\Fpbohmpl.exeC:\Windows\system32\Fpbohmpl.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2096 -
C:\Windows\SysWOW64\Fikcacgl.exeC:\Windows\system32\Fikcacgl.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:880 -
C:\Windows\SysWOW64\Fklpik32.exeC:\Windows\system32\Fklpik32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Windows\SysWOW64\Fbcgjh32.exeC:\Windows\system32\Fbcgjh32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Windows\SysWOW64\Flllcndm.exeC:\Windows\system32\Flllcndm.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Windows\SysWOW64\Fmmhjf32.exeC:\Windows\system32\Fmmhjf32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596 -
C:\Windows\SysWOW64\Fedplc32.exeC:\Windows\system32\Fedplc32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Windows\SysWOW64\Gomedi32.exeC:\Windows\system32\Gomedi32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2752 -
C:\Windows\SysWOW64\Gpnalagm.exeC:\Windows\system32\Gpnalagm.exe33⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\Gghjil32.exeC:\Windows\system32\Gghjil32.exe34⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\Gamnfd32.exeC:\Windows\system32\Gamnfd32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Gdljbp32.exeC:\Windows\system32\Gdljbp32.exe36⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Gihbjfkj.exeC:\Windows\system32\Gihbjfkj.exe37⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\Glgofbjn.exeC:\Windows\system32\Glgofbjn.exe38⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\Gglcdkjd.exeC:\Windows\system32\Gglcdkjd.exe39⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\Gnfkqe32.exeC:\Windows\system32\Gnfkqe32.exe40⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Gohhhmgo.exeC:\Windows\system32\Gohhhmgo.exe41⤵
- Executes dropped EXE
PID:324 -
C:\Windows\SysWOW64\Ggopijha.exeC:\Windows\system32\Ggopijha.exe42⤵
- Executes dropped EXE
PID:764 -
C:\Windows\SysWOW64\Gllhaa32.exeC:\Windows\system32\Gllhaa32.exe43⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Gojdnm32.exeC:\Windows\system32\Gojdnm32.exe44⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Hedmkgmi.exeC:\Windows\system32\Hedmkgmi.exe45⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Hakmph32.exeC:\Windows\system32\Hakmph32.exe46⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Hdijlc32.exeC:\Windows\system32\Hdijlc32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:908 -
C:\Windows\SysWOW64\Hlpamq32.exeC:\Windows\system32\Hlpamq32.exe48⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\Hnandi32.exeC:\Windows\system32\Hnandi32.exe49⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Hamjehqk.exeC:\Windows\system32\Hamjehqk.exe50⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Hhgbba32.exeC:\Windows\system32\Hhgbba32.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:2092 -
C:\Windows\SysWOW64\Hgjbmoob.exeC:\Windows\system32\Hgjbmoob.exe52⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\Hndkji32.exeC:\Windows\system32\Hndkji32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:1804 -
C:\Windows\SysWOW64\Haogkgoh.exeC:\Windows\system32\Haogkgoh.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\Hhioga32.exeC:\Windows\system32\Hhioga32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Hkhkcm32.exeC:\Windows\system32\Hkhkcm32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1080 -
C:\Windows\SysWOW64\Hbbcpg32.exeC:\Windows\system32\Hbbcpg32.exe57⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\Hdpplb32.exeC:\Windows\system32\Hdpplb32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:2112 -
C:\Windows\SysWOW64\Hgolhn32.exeC:\Windows\system32\Hgolhn32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\Hjmhdi32.exeC:\Windows\system32\Hjmhdi32.exe60⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Imkdqe32.exeC:\Windows\system32\Imkdqe32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\Iqgqacam.exeC:\Windows\system32\Iqgqacam.exe62⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\Icemmopa.exeC:\Windows\system32\Icemmopa.exe63⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Ifdiijpe.exeC:\Windows\system32\Ifdiijpe.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Ijoeji32.exeC:\Windows\system32\Ijoeji32.exe65⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Iqimgc32.exeC:\Windows\system32\Iqimgc32.exe66⤵PID:1456
-
C:\Windows\SysWOW64\Ichico32.exeC:\Windows\system32\Ichico32.exe67⤵
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Igcecmfg.exeC:\Windows\system32\Igcecmfg.exe68⤵PID:2220
-
C:\Windows\SysWOW64\Iidbke32.exeC:\Windows\system32\Iidbke32.exe69⤵PID:1544
-
C:\Windows\SysWOW64\Ioojhpdb.exeC:\Windows\system32\Ioojhpdb.exe70⤵PID:956
-
C:\Windows\SysWOW64\Ifhbdj32.exeC:\Windows\system32\Ifhbdj32.exe71⤵PID:2012
-
C:\Windows\SysWOW64\Ijdnehci.exeC:\Windows\system32\Ijdnehci.exe72⤵PID:2696
-
C:\Windows\SysWOW64\Ikekmq32.exeC:\Windows\system32\Ikekmq32.exe73⤵PID:1888
-
C:\Windows\SysWOW64\Ioagno32.exeC:\Windows\system32\Ioagno32.exe74⤵PID:2544
-
C:\Windows\SysWOW64\Ibocjk32.exeC:\Windows\system32\Ibocjk32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2584 -
C:\Windows\SysWOW64\Ienoff32.exeC:\Windows\system32\Ienoff32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\Imeggc32.exeC:\Windows\system32\Imeggc32.exe77⤵PID:2848
-
C:\Windows\SysWOW64\Ioccco32.exeC:\Windows\system32\Ioccco32.exe78⤵PID:3040
-
C:\Windows\SysWOW64\Ibapoj32.exeC:\Windows\system32\Ibapoj32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3044 -
C:\Windows\SysWOW64\Jeplkf32.exeC:\Windows\system32\Jeplkf32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:620 -
C:\Windows\SysWOW64\Jgnhga32.exeC:\Windows\system32\Jgnhga32.exe81⤵PID:1452
-
C:\Windows\SysWOW64\Jkjdhpea.exeC:\Windows\system32\Jkjdhpea.exe82⤵
- Drops file in System32 directory
PID:1120 -
C:\Windows\SysWOW64\Jbdlejmn.exeC:\Windows\system32\Jbdlejmn.exe83⤵PID:288
-
C:\Windows\SysWOW64\Jagmpg32.exeC:\Windows\system32\Jagmpg32.exe84⤵PID:2272
-
C:\Windows\SysWOW64\Jinead32.exeC:\Windows\system32\Jinead32.exe85⤵PID:2244
-
C:\Windows\SysWOW64\Jklanp32.exeC:\Windows\system32\Jklanp32.exe86⤵PID:1928
-
C:\Windows\SysWOW64\Jbfijjkl.exeC:\Windows\system32\Jbfijjkl.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2640 -
C:\Windows\SysWOW64\Jaiiff32.exeC:\Windows\system32\Jaiiff32.exe88⤵PID:2520
-
C:\Windows\SysWOW64\Jgcabqic.exeC:\Windows\system32\Jgcabqic.exe89⤵PID:2496
-
C:\Windows\SysWOW64\Jjanolhg.exeC:\Windows\system32\Jjanolhg.exe90⤵PID:2856
-
C:\Windows\SysWOW64\Jmpjkggj.exeC:\Windows\system32\Jmpjkggj.exe91⤵PID:1300
-
C:\Windows\SysWOW64\Jmpjkggj.exeC:\Windows\system32\Jmpjkggj.exe92⤵
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Jegble32.exeC:\Windows\system32\Jegble32.exe93⤵PID:2872
-
C:\Windows\SysWOW64\Jcjbgaog.exeC:\Windows\system32\Jcjbgaog.exe94⤵PID:1944
-
C:\Windows\SysWOW64\Jfhocmnk.exeC:\Windows\system32\Jfhocmnk.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2084 -
C:\Windows\SysWOW64\Jnofejom.exeC:\Windows\system32\Jnofejom.exe96⤵PID:2860
-
C:\Windows\SysWOW64\Jmbgpg32.exeC:\Windows\system32\Jmbgpg32.exe97⤵PID:1268
-
C:\Windows\SysWOW64\Jghknp32.exeC:\Windows\system32\Jghknp32.exe98⤵PID:644
-
C:\Windows\SysWOW64\Jjfgjk32.exeC:\Windows\system32\Jjfgjk32.exe99⤵PID:904
-
C:\Windows\SysWOW64\Jmdcfg32.exeC:\Windows\system32\Jmdcfg32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:776 -
C:\Windows\SysWOW64\Kappfeln.exeC:\Windows\system32\Kappfeln.exe101⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\Kcolba32.exeC:\Windows\system32\Kcolba32.exe102⤵
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\Kbalnnam.exeC:\Windows\system32\Kbalnnam.exe103⤵
- Drops file in System32 directory
PID:1792 -
C:\Windows\SysWOW64\Kfmhol32.exeC:\Windows\system32\Kfmhol32.exe104⤵PID:2656
-
C:\Windows\SysWOW64\Kikdkh32.exeC:\Windows\system32\Kikdkh32.exe105⤵PID:2664
-
C:\Windows\SysWOW64\Kmgpkfab.exeC:\Windows\system32\Kmgpkfab.exe106⤵
- Drops file in System32 directory
PID:1244 -
C:\Windows\SysWOW64\Kpemgbqf.exeC:\Windows\system32\Kpemgbqf.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3032 -
C:\Windows\SysWOW64\Kcahhq32.exeC:\Windows\system32\Kcahhq32.exe108⤵
- Modifies registry class
PID:1236 -
C:\Windows\SysWOW64\Kinaqg32.exeC:\Windows\system32\Kinaqg32.exe109⤵
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\Kllmmc32.exeC:\Windows\system32\Kllmmc32.exe110⤵PID:1228
-
C:\Windows\SysWOW64\Kphimanc.exeC:\Windows\system32\Kphimanc.exe111⤵PID:1668
-
C:\Windows\SysWOW64\Knjiin32.exeC:\Windows\system32\Knjiin32.exe112⤵PID:1604
-
C:\Windows\SysWOW64\Kfaajlfp.exeC:\Windows\system32\Kfaajlfp.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2700 -
C:\Windows\SysWOW64\Kipnfged.exeC:\Windows\system32\Kipnfged.exe114⤵PID:2568
-
C:\Windows\SysWOW64\Klnjbbdh.exeC:\Windows\system32\Klnjbbdh.exe115⤵PID:2448
-
C:\Windows\SysWOW64\Komfnnck.exeC:\Windows\system32\Komfnnck.exe116⤵PID:1352
-
C:\Windows\SysWOW64\Kegnkh32.exeC:\Windows\system32\Kegnkh32.exe117⤵
- Modifies registry class
PID:636 -
C:\Windows\SysWOW64\Kibjkgca.exeC:\Windows\system32\Kibjkgca.exe118⤵PID:472
-
C:\Windows\SysWOW64\Klqfhbbe.exeC:\Windows\system32\Klqfhbbe.exe119⤵
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\Kjcgco32.exeC:\Windows\system32\Kjcgco32.exe120⤵PID:1984
-
C:\Windows\SysWOW64\Kbkodl32.exeC:\Windows\system32\Kbkodl32.exe121⤵PID:1592
-
C:\Windows\SysWOW64\Kanopipl.exeC:\Windows\system32\Kanopipl.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-