Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 01:38
Behavioral task
behavioral1
Sample
4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe
-
Size
164KB
-
MD5
4aa315bd600f307ccc8bf927d3978df0
-
SHA1
693fcfcf5416e6b99bab646040045da8dd7913d1
-
SHA256
06a65d0592fe83b26ecf84ed267dac30f6bdf7fe8b6bdc1d550f88dadf863c7c
-
SHA512
f186475468074c6f91d0443de3ad72f270fae6ffa2c8a3abca367ad4cb094ec786080f8c1781bdc8e5024f41a62bbf020d6b2293b5c8e9bf388daa24c249cec5
-
SSDEEP
3072:xB8LRzpnXo07gY2vKTtlYprq08uFafmHURHAVgnvedh6DRyU:xA9pnXo07gYwq08uF8YU8gnve7GR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fmjejphb.exeObojhlbq.exeOhhkjp32.exeOnecbg32.exeEnnaieib.exeLeajdfnm.exeLlkbap32.exeNocnbmoo.exeJcbellac.exeKeanebkb.exeGdniqh32.exeJqilooij.exeMencccop.exeAmelne32.exeNdpfkdmf.exeKnpemf32.exeGejcjbah.exePnlqnl32.exeEplkpgnh.exeNadpgggp.exeOghopm32.exeGdamqndn.exeOcimgp32.exeNmnace32.exeOjigbhlp.exeMlmlecec.exeNefpnhlc.exeNaajoinb.exeBbdallnd.exeApimacnn.exeIpllekdl.exeJqgoiokm.exeMeijhc32.exeCpceidcn.exeFbgmbg32.exeGelppaof.exeGhelfg32.exeJdehon32.exeMofglh32.exeOhendqhd.exeBlaopqpo.exeKkijmm32.exeAoepcn32.exeAnlfbi32.exePogclp32.exeQcpofbjl.exeAlegac32.exeHeglio32.exeHiknhbcg.exeLbfdaigg.exeAganeoip.exeGbnccfpb.exeOclilp32.exeBlbfjg32.exeLlohjo32.exeDdcdkl32.exeHhjhkq32.exeNdbcpd32.exeHipkdnmf.exeIgchlf32.exeAmqccfed.exeFpfdalii.exeMihiih32.exeDpbheh32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmjejphb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obojhlbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohhkjp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onecbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ennaieib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leajdfnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Llkbap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nocnbmoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcbellac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Keanebkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdniqh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqilooij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mencccop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amelne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndpfkdmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knpemf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gejcjbah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnlqnl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eplkpgnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nadpgggp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oghopm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gdamqndn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocimgp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmnace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojigbhlp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlmlecec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nefpnhlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Naajoinb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apimacnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipllekdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jqgoiokm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Meijhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpceidcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbgmbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gelppaof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghelfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdehon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mofglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohendqhd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blaopqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkijmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aoepcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anlfbi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pogclp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qcpofbjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Alegac32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heglio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hiknhbcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbfdaigg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aganeoip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbnccfpb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oclilp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blbfjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llohjo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddcdkl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhjhkq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndbcpd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hipkdnmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igchlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amqccfed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fpfdalii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mihiih32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpbheh32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Cfeddafl.exe family_berbew \Windows\SysWOW64\Cbkeib32.exe family_berbew \Windows\SysWOW64\Cjbmjplb.exe family_berbew C:\Windows\SysWOW64\Cdlnkmha.exe family_berbew \Windows\SysWOW64\Cobbhfhg.exe family_berbew \Windows\SysWOW64\Dflkdp32.exe family_berbew \Windows\SysWOW64\Dodonf32.exe family_berbew C:\Windows\SysWOW64\Dqelenlc.exe family_berbew \Windows\SysWOW64\Djnpnc32.exe family_berbew \Windows\SysWOW64\Ddcdkl32.exe family_berbew \Windows\SysWOW64\Dnlidb32.exe family_berbew \Windows\SysWOW64\Dchali32.exe family_berbew \Windows\SysWOW64\Dmafennb.exe family_berbew \Windows\SysWOW64\Dcknbh32.exe family_berbew \Windows\SysWOW64\Emcbkn32.exe family_berbew C:\Windows\SysWOW64\Ebpkce32.exe family_berbew C:\Windows\SysWOW64\Ekholjqg.exe family_berbew C:\Windows\SysWOW64\Ecpgmhai.exe family_berbew C:\Windows\SysWOW64\Emhlfmgj.exe family_berbew behavioral1/memory/1488-246-0x0000000000250000-0x0000000000295000-memory.dmp family_berbew C:\Windows\SysWOW64\Enihne32.exe family_berbew C:\Windows\SysWOW64\Elmigj32.exe family_berbew C:\Windows\SysWOW64\Eajaoq32.exe family_berbew behavioral1/memory/2920-291-0x0000000000290000-0x00000000002D5000-memory.dmp family_berbew behavioral1/memory/2920-290-0x0000000000290000-0x00000000002D5000-memory.dmp family_berbew C:\Windows\SysWOW64\Eiaiqn32.exe family_berbew C:\Windows\SysWOW64\Ennaieib.exe family_berbew C:\Windows\SysWOW64\Fckjalhj.exe family_berbew C:\Windows\SysWOW64\Fnpnndgp.exe family_berbew C:\Windows\SysWOW64\Fnbkddem.exe family_berbew C:\Windows\SysWOW64\Faagpp32.exe family_berbew C:\Windows\SysWOW64\Fmhheqje.exe family_berbew C:\Windows\SysWOW64\Fpfdalii.exe family_berbew C:\Windows\SysWOW64\Fmjejphb.exe family_berbew C:\Windows\SysWOW64\Flmefm32.exe family_berbew C:\Windows\SysWOW64\Fbgmbg32.exe family_berbew C:\Windows\SysWOW64\Fmlapp32.exe family_berbew C:\Windows\SysWOW64\Gegfdb32.exe family_berbew C:\Windows\SysWOW64\Gicbeald.exe family_berbew C:\Windows\SysWOW64\Gejcjbah.exe family_berbew behavioral1/memory/772-444-0x0000000000280000-0x00000000002C5000-memory.dmp family_berbew C:\Windows\SysWOW64\Gbnccfpb.exe family_berbew C:\Windows\SysWOW64\Gelppaof.exe family_berbew C:\Windows\SysWOW64\Gkihhhnm.exe family_berbew C:\Windows\SysWOW64\Gdamqndn.exe family_berbew C:\Windows\SysWOW64\Ghmiam32.exe family_berbew C:\Windows\SysWOW64\Gmjaic32.exe family_berbew C:\Windows\SysWOW64\Gaemjbcg.exe family_berbew C:\Windows\SysWOW64\Gddifnbk.exe family_berbew C:\Windows\SysWOW64\Hknach32.exe family_berbew C:\Windows\SysWOW64\Hiqbndpb.exe family_berbew C:\Windows\SysWOW64\Hdfflm32.exe family_berbew C:\Windows\SysWOW64\Hicodd32.exe family_berbew C:\Windows\SysWOW64\Hnojdcfi.exe family_berbew C:\Windows\SysWOW64\Hdhbam32.exe family_berbew C:\Windows\SysWOW64\Hckcmjep.exe family_berbew C:\Windows\SysWOW64\Hejoiedd.exe family_berbew C:\Windows\SysWOW64\Hlcgeo32.exe family_berbew C:\Windows\SysWOW64\Hpocfncj.exe family_berbew C:\Windows\SysWOW64\Hellne32.exe family_berbew C:\Windows\SysWOW64\Hhjhkq32.exe family_berbew C:\Windows\SysWOW64\Hpapln32.exe family_berbew C:\Windows\SysWOW64\Hcplhi32.exe family_berbew C:\Windows\SysWOW64\Hjjddchg.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Cfeddafl.exeCbkeib32.exeCjbmjplb.exeCdlnkmha.exeCobbhfhg.exeDflkdp32.exeDodonf32.exeDqelenlc.exeDjnpnc32.exeDdcdkl32.exeDnlidb32.exeDchali32.exeDmafennb.exeDcknbh32.exeEmcbkn32.exeEbpkce32.exeEkholjqg.exeEcpgmhai.exeEmhlfmgj.exeEnihne32.exeElmigj32.exeEajaoq32.exeEiaiqn32.exeEnnaieib.exeFckjalhj.exeFnpnndgp.exeFnbkddem.exeFaagpp32.exeFmhheqje.exeFpfdalii.exeFmjejphb.exeFlmefm32.exeFbgmbg32.exeFmlapp32.exeGegfdb32.exeGicbeald.exeGejcjbah.exeGbnccfpb.exeGelppaof.exeGkihhhnm.exeGdamqndn.exeGhmiam32.exeGmjaic32.exeGaemjbcg.exeGddifnbk.exeHknach32.exeHiqbndpb.exeHdfflm32.exeHicodd32.exeHnojdcfi.exeHdhbam32.exeHckcmjep.exeHejoiedd.exeHlcgeo32.exeHpocfncj.exeHellne32.exeHhjhkq32.exeHpapln32.exeHcplhi32.exeHjjddchg.exeHlhaqogk.exeHogmmjfo.exeIcbimi32.exeIdceea32.exepid process 3064 Cfeddafl.exe 2640 Cbkeib32.exe 2656 Cjbmjplb.exe 2784 Cdlnkmha.exe 2432 Cobbhfhg.exe 2584 Dflkdp32.exe 816 Dodonf32.exe 2852 Dqelenlc.exe 3004 Djnpnc32.exe 1984 Ddcdkl32.exe 1808 Dnlidb32.exe 2552 Dchali32.exe 1516 Dmafennb.exe 1512 Dcknbh32.exe 2080 Emcbkn32.exe 2260 Ebpkce32.exe 752 Ekholjqg.exe 1488 Ecpgmhai.exe 1864 Emhlfmgj.exe 1616 Enihne32.exe 1604 Elmigj32.exe 2920 Eajaoq32.exe 1732 Eiaiqn32.exe 1152 Ennaieib.exe 3036 Fckjalhj.exe 1580 Fnpnndgp.exe 2060 Fnbkddem.exe 2712 Faagpp32.exe 2644 Fmhheqje.exe 2728 Fpfdalii.exe 2760 Fmjejphb.exe 2680 Flmefm32.exe 1932 Fbgmbg32.exe 2796 Fmlapp32.exe 2996 Gegfdb32.exe 772 Gicbeald.exe 1816 Gejcjbah.exe 2488 Gbnccfpb.exe 1564 Gelppaof.exe 1772 Gkihhhnm.exe 2320 Gdamqndn.exe 2904 Ghmiam32.exe 780 Gmjaic32.exe 1752 Gaemjbcg.exe 1496 Gddifnbk.exe 2480 Hknach32.exe 112 Hiqbndpb.exe 1960 Hdfflm32.exe 1340 Hicodd32.exe 908 Hnojdcfi.exe 1552 Hdhbam32.exe 1260 Hckcmjep.exe 2736 Hejoiedd.exe 2788 Hlcgeo32.exe 2560 Hpocfncj.exe 2968 Hellne32.exe 2824 Hhjhkq32.exe 2804 Hpapln32.exe 352 Hcplhi32.exe 492 Hjjddchg.exe 2776 Hlhaqogk.exe 1092 Hogmmjfo.exe 1280 Icbimi32.exe 2192 Idceea32.exe -
Loads dropped DLL 64 IoCs
Processes:
4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exeCfeddafl.exeCbkeib32.exeCjbmjplb.exeCdlnkmha.exeCobbhfhg.exeDflkdp32.exeDodonf32.exeDqelenlc.exeDjnpnc32.exeDdcdkl32.exeDnlidb32.exeDchali32.exeDmafennb.exeDcknbh32.exeEmcbkn32.exeEbpkce32.exeEkholjqg.exeEcpgmhai.exeEmhlfmgj.exeEnihne32.exeElmigj32.exeEajaoq32.exeEiaiqn32.exeEnnaieib.exeFckjalhj.exeFnpnndgp.exeFnbkddem.exeFaagpp32.exeFmhheqje.exeFpfdalii.exeFmjejphb.exepid process 1728 4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe 1728 4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe 3064 Cfeddafl.exe 3064 Cfeddafl.exe 2640 Cbkeib32.exe 2640 Cbkeib32.exe 2656 Cjbmjplb.exe 2656 Cjbmjplb.exe 2784 Cdlnkmha.exe 2784 Cdlnkmha.exe 2432 Cobbhfhg.exe 2432 Cobbhfhg.exe 2584 Dflkdp32.exe 2584 Dflkdp32.exe 816 Dodonf32.exe 816 Dodonf32.exe 2852 Dqelenlc.exe 2852 Dqelenlc.exe 3004 Djnpnc32.exe 3004 Djnpnc32.exe 1984 Ddcdkl32.exe 1984 Ddcdkl32.exe 1808 Dnlidb32.exe 1808 Dnlidb32.exe 2552 Dchali32.exe 2552 Dchali32.exe 1516 Dmafennb.exe 1516 Dmafennb.exe 1512 Dcknbh32.exe 1512 Dcknbh32.exe 2080 Emcbkn32.exe 2080 Emcbkn32.exe 2260 Ebpkce32.exe 2260 Ebpkce32.exe 752 Ekholjqg.exe 752 Ekholjqg.exe 1488 Ecpgmhai.exe 1488 Ecpgmhai.exe 1864 Emhlfmgj.exe 1864 Emhlfmgj.exe 1616 Enihne32.exe 1616 Enihne32.exe 1604 Elmigj32.exe 1604 Elmigj32.exe 2920 Eajaoq32.exe 2920 Eajaoq32.exe 1732 Eiaiqn32.exe 1732 Eiaiqn32.exe 1152 Ennaieib.exe 1152 Ennaieib.exe 3036 Fckjalhj.exe 3036 Fckjalhj.exe 1580 Fnpnndgp.exe 1580 Fnpnndgp.exe 2060 Fnbkddem.exe 2060 Fnbkddem.exe 2712 Faagpp32.exe 2712 Faagpp32.exe 2644 Fmhheqje.exe 2644 Fmhheqje.exe 2728 Fpfdalii.exe 2728 Fpfdalii.exe 2760 Fmjejphb.exe 2760 Fmjejphb.exe -
Drops file in System32 directory 64 IoCs
Processes:
Nncahjgl.exeEdpmjj32.exeBphbeplm.exeJghmfhmb.exeNenobfak.exeCfnmfn32.exeDflkdp32.exeKifpdelo.exeMhjbjopf.exeAnnbhi32.exeAbbeflpf.exeDdcdkl32.exeGicbeald.exeEjhlgaeh.exePmlmic32.exeCpceidcn.exeDkcofe32.exeOqkqkdne.exeCeaadk32.exeOancnfoe.exeBbdallnd.exeFpfdalii.exeIjeghgoh.exeDkqbaecc.exeIgchlf32.exeKegqdqbl.exeBbjbaa32.exeChnqkg32.exeEnhacojl.exeGepehphc.exeQflhbhgg.exeAbmbhn32.exeKjifhc32.exeMgalqkbk.exeBajomhbl.exeLoeebl32.exeLijjoe32.exeLfdmggnm.exeNljddpfe.exeOhaeia32.exePqkmjh32.exeDfoqmo32.exeNpojdpef.exeFnpnndgp.exeCdikkg32.exeNhllob32.exeBaadng32.exeMeijhc32.exeKnpemf32.exeLcagpl32.exeIdceea32.exeIokfhi32.exeMlibjc32.exeJhljdm32.exeIompkh32.exeAnlfbi32.exeFckjalhj.exePgplkb32.exeQlkdkd32.exedescription ioc process File created C:\Windows\SysWOW64\Naoniipe.exe Nncahjgl.exe File opened for modification C:\Windows\SysWOW64\Efaibbij.exe Edpmjj32.exe File created C:\Windows\SysWOW64\Nodmbemj.dll Bphbeplm.exe File opened for modification C:\Windows\SysWOW64\Jfknbe32.exe Jghmfhmb.exe File created C:\Windows\SysWOW64\Fhhiii32.dll Nenobfak.exe File opened for modification C:\Windows\SysWOW64\Ckiigmcd.exe Cfnmfn32.exe File opened for modification C:\Windows\SysWOW64\Dodonf32.exe Dflkdp32.exe File opened for modification C:\Windows\SysWOW64\Kmaled32.exe Kifpdelo.exe File opened for modification C:\Windows\SysWOW64\Mkhofjoj.exe Mhjbjopf.exe File created C:\Windows\SysWOW64\Amqccfed.exe Annbhi32.exe File opened for modification C:\Windows\SysWOW64\Afnagk32.exe Abbeflpf.exe File created C:\Windows\SysWOW64\Dnlidb32.exe Ddcdkl32.exe File created C:\Windows\SysWOW64\Ldahol32.dll Gicbeald.exe File created C:\Windows\SysWOW64\Aabagnfc.dll Ejhlgaeh.exe File created C:\Windows\SysWOW64\Pokieo32.exe Pmlmic32.exe File created C:\Windows\SysWOW64\Mabanhgg.dll Cpceidcn.exe File opened for modification C:\Windows\SysWOW64\Dookgcij.exe Dkcofe32.exe File opened for modification C:\Windows\SysWOW64\Ocimgp32.exe Oqkqkdne.exe File created C:\Windows\SysWOW64\Cgcmlcja.exe Ceaadk32.exe File opened for modification C:\Windows\SysWOW64\Odlojanh.exe Oancnfoe.exe File opened for modification C:\Windows\SysWOW64\Bfpnmj32.exe Bbdallnd.exe File created C:\Windows\SysWOW64\Cakqnc32.dll Fpfdalii.exe File created C:\Windows\SysWOW64\Bjlcgibn.dll Ijeghgoh.exe File created C:\Windows\SysWOW64\Dnoomqbg.exe Dkqbaecc.exe File created C:\Windows\SysWOW64\Fdebncjd.dll Igchlf32.exe File created C:\Windows\SysWOW64\Kicmdo32.exe Kegqdqbl.exe File created C:\Windows\SysWOW64\Mclgfa32.dll Bbjbaa32.exe File created C:\Windows\SysWOW64\Dpiddoma.dll Chnqkg32.exe File created C:\Windows\SysWOW64\Cgllco32.dll Enhacojl.exe File created C:\Windows\SysWOW64\Gljnej32.exe Gepehphc.exe File created C:\Windows\SysWOW64\Doojhgfa.dll Qflhbhgg.exe File created C:\Windows\SysWOW64\Ippdhfji.dll Abmbhn32.exe File created C:\Windows\SysWOW64\Kmgbdo32.exe Kjifhc32.exe File created C:\Windows\SysWOW64\Mjkacaml.dll Mgalqkbk.exe File opened for modification C:\Windows\SysWOW64\Bhdgjb32.exe Bajomhbl.exe File created C:\Windows\SysWOW64\Pnlilc32.dll Loeebl32.exe File opened for modification C:\Windows\SysWOW64\Logbhl32.exe Lijjoe32.exe File created C:\Windows\SysWOW64\Kbelde32.dll Lfdmggnm.exe File created C:\Windows\SysWOW64\Hanedg32.dll Nljddpfe.exe File opened for modification C:\Windows\SysWOW64\Icdleb32.dll Ohaeia32.exe File created C:\Windows\SysWOW64\Pefijfii.exe Pqkmjh32.exe File created C:\Windows\SysWOW64\Dhnmij32.exe Dfoqmo32.exe File created C:\Windows\SysWOW64\Ndjfeo32.exe Npojdpef.exe File created C:\Windows\SysWOW64\Fnbkddem.exe Fnpnndgp.exe File created C:\Windows\SysWOW64\Cghggc32.exe Cdikkg32.exe File created C:\Windows\SysWOW64\Npccpo32.exe Nhllob32.exe File opened for modification C:\Windows\SysWOW64\Cpceidcn.exe Baadng32.exe File created C:\Windows\SysWOW64\Mhhfdo32.exe Meijhc32.exe File created C:\Windows\SysWOW64\Ggfblnnh.dll Meijhc32.exe File created C:\Windows\SysWOW64\Bjpdmqog.dll Cfnmfn32.exe File created C:\Windows\SysWOW64\Lanaiahq.exe Knpemf32.exe File created C:\Windows\SysWOW64\Ogikcfnb.dll Lcagpl32.exe File created C:\Windows\SysWOW64\Jhgkeald.dll Bbdallnd.exe File created C:\Windows\SysWOW64\Pdpfph32.dll Idceea32.exe File opened for modification C:\Windows\SysWOW64\Iqmcpahh.exe Iokfhi32.exe File opened for modification C:\Windows\SysWOW64\Mdpjlajk.exe Mlibjc32.exe File opened for modification C:\Windows\SysWOW64\Pefijfii.exe Pqkmjh32.exe File created C:\Windows\SysWOW64\Jkjfah32.exe Jhljdm32.exe File created C:\Windows\SysWOW64\Igchlf32.exe Iompkh32.exe File created C:\Windows\SysWOW64\Qniedg32.dll Anlfbi32.exe File opened for modification C:\Windows\SysWOW64\Cfnmfn32.exe Cpceidcn.exe File created C:\Windows\SysWOW64\Fnpnndgp.exe Fckjalhj.exe File created C:\Windows\SysWOW64\Pbqpqcoj.dll Pgplkb32.exe File created C:\Windows\SysWOW64\Qpgpkcpp.exe Qlkdkd32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7128 7104 WerFault.exe Ceegmj32.exe -
Modifies registry class 64 IoCs
Processes:
Pnlqnl32.exeQimhoi32.exeIgchlf32.exeKebgia32.exeLjibgg32.exeNpccpo32.exeDnlidb32.exeNaajoinb.exeCpceidcn.exeEcqqpgli.exeJhngjmlo.exeLfdmggnm.exeNkpegi32.exeKpkofpgq.exeOhfeog32.exeEmnndlod.exeKegqdqbl.exeOhaeia32.exeGepehphc.exeFaagpp32.exeFbamma32.exeGpncej32.exePmlmic32.exeBhdgjb32.exeKfbkmk32.exeNefpnhlc.exeAadloj32.exeEjobhppq.exeLpekon32.exeCkiigmcd.exeObafnlpn.exePkndaa32.exeFpqdkf32.exeMlcbenjb.exeCddjebgb.exeIcpigm32.exeLoeebl32.exeEbpkce32.exeGffoldhp.exeOfhick32.exeGmbdnn32.exeHpapln32.exeGdniqh32.exeAamfnkai.exeAbmbhn32.exeMbpgggol.exeBbdallnd.exeGegfdb32.exeMmhodf32.exeKmopod32.exeObojhlbq.exeBiicik32.exeBajomhbl.exeEajaoq32.exeIgdogl32.exeOobjaqaj.exeOcalkn32.exeIjgdngmf.exeEgafleqm.exeHgjefg32.exeCmgechbh.exeGicbeald.exeIfcbodli.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pnlqnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpioaoic.dll" Qimhoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdebncjd.dll" Igchlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kebgia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ljibgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Npccpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dnlidb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Naajoinb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cpceidcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ecqqpgli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpfdhnai.dll" Jhngjmlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lfdmggnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fibkpd32.dll" Nkpegi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kpkofpgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ohfeog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Emnndlod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kegqdqbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ohaeia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gepehphc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Faagpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fbamma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gpncej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmomkh32.dll" Pmlmic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bhdgjb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kfbkmk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nefpnhlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aadloj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ejobhppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djmffb32.dll" Lpekon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ckiigmcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obafnlpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pkndaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fpqdkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlcbenjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cddjebgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icpigm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Loeebl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ebpkce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obknqjig.dll" Gffoldhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inkaippf.dll" Ofhick32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggeiabkc.dll" Gmbdnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gdniqh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aamfnkai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Abmbhn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mbpgggol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbdallnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kleiio32.dll" Gegfdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofbjgh32.dll" Mmhodf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kmopod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Obojhlbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Biicik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbodgd32.dll" Bajomhbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eajaoq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Igdogl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nchnel32.dll" Oobjaqaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ocalkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ijgdngmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ohfeog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Egafleqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hgjefg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqcngnae.dll" Cmgechbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gicbeald.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ifcbodli.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exeCfeddafl.exeCbkeib32.exeCjbmjplb.exeCdlnkmha.exeCobbhfhg.exeDflkdp32.exeDodonf32.exeDqelenlc.exeDjnpnc32.exeDdcdkl32.exeDnlidb32.exeDchali32.exeDmafennb.exeDcknbh32.exeEmcbkn32.exedescription pid process target process PID 1728 wrote to memory of 3064 1728 4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe Cfeddafl.exe PID 1728 wrote to memory of 3064 1728 4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe Cfeddafl.exe PID 1728 wrote to memory of 3064 1728 4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe Cfeddafl.exe PID 1728 wrote to memory of 3064 1728 4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe Cfeddafl.exe PID 3064 wrote to memory of 2640 3064 Cfeddafl.exe Cbkeib32.exe PID 3064 wrote to memory of 2640 3064 Cfeddafl.exe Cbkeib32.exe PID 3064 wrote to memory of 2640 3064 Cfeddafl.exe Cbkeib32.exe PID 3064 wrote to memory of 2640 3064 Cfeddafl.exe Cbkeib32.exe PID 2640 wrote to memory of 2656 2640 Cbkeib32.exe Cjbmjplb.exe PID 2640 wrote to memory of 2656 2640 Cbkeib32.exe Cjbmjplb.exe PID 2640 wrote to memory of 2656 2640 Cbkeib32.exe Cjbmjplb.exe PID 2640 wrote to memory of 2656 2640 Cbkeib32.exe Cjbmjplb.exe PID 2656 wrote to memory of 2784 2656 Cjbmjplb.exe Cdlnkmha.exe PID 2656 wrote to memory of 2784 2656 Cjbmjplb.exe Cdlnkmha.exe PID 2656 wrote to memory of 2784 2656 Cjbmjplb.exe Cdlnkmha.exe PID 2656 wrote to memory of 2784 2656 Cjbmjplb.exe Cdlnkmha.exe PID 2784 wrote to memory of 2432 2784 Cdlnkmha.exe Cobbhfhg.exe PID 2784 wrote to memory of 2432 2784 Cdlnkmha.exe Cobbhfhg.exe PID 2784 wrote to memory of 2432 2784 Cdlnkmha.exe Cobbhfhg.exe PID 2784 wrote to memory of 2432 2784 Cdlnkmha.exe Cobbhfhg.exe PID 2432 wrote to memory of 2584 2432 Cobbhfhg.exe Dflkdp32.exe PID 2432 wrote to memory of 2584 2432 Cobbhfhg.exe Dflkdp32.exe PID 2432 wrote to memory of 2584 2432 Cobbhfhg.exe Dflkdp32.exe PID 2432 wrote to memory of 2584 2432 Cobbhfhg.exe Dflkdp32.exe PID 2584 wrote to memory of 816 2584 Dflkdp32.exe Dodonf32.exe PID 2584 wrote to memory of 816 2584 Dflkdp32.exe Dodonf32.exe PID 2584 wrote to memory of 816 2584 Dflkdp32.exe Dodonf32.exe PID 2584 wrote to memory of 816 2584 Dflkdp32.exe Dodonf32.exe PID 816 wrote to memory of 2852 816 Dodonf32.exe Dqelenlc.exe PID 816 wrote to memory of 2852 816 Dodonf32.exe Dqelenlc.exe PID 816 wrote to memory of 2852 816 Dodonf32.exe Dqelenlc.exe PID 816 wrote to memory of 2852 816 Dodonf32.exe Dqelenlc.exe PID 2852 wrote to memory of 3004 2852 Dqelenlc.exe Djnpnc32.exe PID 2852 wrote to memory of 3004 2852 Dqelenlc.exe Djnpnc32.exe PID 2852 wrote to memory of 3004 2852 Dqelenlc.exe Djnpnc32.exe PID 2852 wrote to memory of 3004 2852 Dqelenlc.exe Djnpnc32.exe PID 3004 wrote to memory of 1984 3004 Djnpnc32.exe Ddcdkl32.exe PID 3004 wrote to memory of 1984 3004 Djnpnc32.exe Ddcdkl32.exe PID 3004 wrote to memory of 1984 3004 Djnpnc32.exe Ddcdkl32.exe PID 3004 wrote to memory of 1984 3004 Djnpnc32.exe Ddcdkl32.exe PID 1984 wrote to memory of 1808 1984 Ddcdkl32.exe Dnlidb32.exe PID 1984 wrote to memory of 1808 1984 Ddcdkl32.exe Dnlidb32.exe PID 1984 wrote to memory of 1808 1984 Ddcdkl32.exe Dnlidb32.exe PID 1984 wrote to memory of 1808 1984 Ddcdkl32.exe Dnlidb32.exe PID 1808 wrote to memory of 2552 1808 Dnlidb32.exe Dchali32.exe PID 1808 wrote to memory of 2552 1808 Dnlidb32.exe Dchali32.exe PID 1808 wrote to memory of 2552 1808 Dnlidb32.exe Dchali32.exe PID 1808 wrote to memory of 2552 1808 Dnlidb32.exe Dchali32.exe PID 2552 wrote to memory of 1516 2552 Dchali32.exe Dmafennb.exe PID 2552 wrote to memory of 1516 2552 Dchali32.exe Dmafennb.exe PID 2552 wrote to memory of 1516 2552 Dchali32.exe Dmafennb.exe PID 2552 wrote to memory of 1516 2552 Dchali32.exe Dmafennb.exe PID 1516 wrote to memory of 1512 1516 Dmafennb.exe Dcknbh32.exe PID 1516 wrote to memory of 1512 1516 Dmafennb.exe Dcknbh32.exe PID 1516 wrote to memory of 1512 1516 Dmafennb.exe Dcknbh32.exe PID 1516 wrote to memory of 1512 1516 Dmafennb.exe Dcknbh32.exe PID 1512 wrote to memory of 2080 1512 Dcknbh32.exe Emcbkn32.exe PID 1512 wrote to memory of 2080 1512 Dcknbh32.exe Emcbkn32.exe PID 1512 wrote to memory of 2080 1512 Dcknbh32.exe Emcbkn32.exe PID 1512 wrote to memory of 2080 1512 Dcknbh32.exe Emcbkn32.exe PID 2080 wrote to memory of 2260 2080 Emcbkn32.exe Ebpkce32.exe PID 2080 wrote to memory of 2260 2080 Emcbkn32.exe Ebpkce32.exe PID 2080 wrote to memory of 2260 2080 Emcbkn32.exe Ebpkce32.exe PID 2080 wrote to memory of 2260 2080 Emcbkn32.exe Ebpkce32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4aa315bd600f307ccc8bf927d3978df0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\Cfeddafl.exeC:\Windows\system32\Cfeddafl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Cbkeib32.exeC:\Windows\system32\Cbkeib32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Cjbmjplb.exeC:\Windows\system32\Cjbmjplb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Cobbhfhg.exeC:\Windows\system32\Cobbhfhg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Dflkdp32.exeC:\Windows\system32\Dflkdp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Dodonf32.exeC:\Windows\system32\Dodonf32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\Dqelenlc.exeC:\Windows\system32\Dqelenlc.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Djnpnc32.exeC:\Windows\system32\Djnpnc32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\Ddcdkl32.exeC:\Windows\system32\Ddcdkl32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Dnlidb32.exeC:\Windows\system32\Dnlidb32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Dchali32.exeC:\Windows\system32\Dchali32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Dmafennb.exeC:\Windows\system32\Dmafennb.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\Dcknbh32.exeC:\Windows\system32\Dcknbh32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Emcbkn32.exeC:\Windows\system32\Emcbkn32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Ebpkce32.exeC:\Windows\system32\Ebpkce32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2260 -
C:\Windows\SysWOW64\Ekholjqg.exeC:\Windows\system32\Ekholjqg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:752 -
C:\Windows\SysWOW64\Ecpgmhai.exeC:\Windows\system32\Ecpgmhai.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864 -
C:\Windows\SysWOW64\Enihne32.exeC:\Windows\system32\Enihne32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Windows\SysWOW64\Elmigj32.exeC:\Windows\system32\Elmigj32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Windows\SysWOW64\Eajaoq32.exeC:\Windows\system32\Eajaoq32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732 -
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\Fnpnndgp.exeC:\Windows\system32\Fnpnndgp.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\Fnbkddem.exeC:\Windows\system32\Fnbkddem.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\Windows\SysWOW64\Faagpp32.exeC:\Windows\system32\Faagpp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Fmhheqje.exeC:\Windows\system32\Fmhheqje.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Windows\SysWOW64\Fpfdalii.exeC:\Windows\system32\Fpfdalii.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2728 -
C:\Windows\SysWOW64\Fmjejphb.exeC:\Windows\system32\Fmjejphb.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe33⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe35⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Gegfdb32.exeC:\Windows\system32\Gegfdb32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2996 -
C:\Windows\SysWOW64\Gicbeald.exeC:\Windows\system32\Gicbeald.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:772 -
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Gbnccfpb.exeC:\Windows\system32\Gbnccfpb.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\Gkihhhnm.exeC:\Windows\system32\Gkihhhnm.exe41⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Gdamqndn.exeC:\Windows\system32\Gdamqndn.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe43⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\Gmjaic32.exeC:\Windows\system32\Gmjaic32.exe44⤵
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\Gaemjbcg.exeC:\Windows\system32\Gaemjbcg.exe45⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\Gddifnbk.exeC:\Windows\system32\Gddifnbk.exe46⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe47⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\Hiqbndpb.exeC:\Windows\system32\Hiqbndpb.exe48⤵
- Executes dropped EXE
PID:112 -
C:\Windows\SysWOW64\Hdfflm32.exeC:\Windows\system32\Hdfflm32.exe49⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe50⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Hnojdcfi.exeC:\Windows\system32\Hnojdcfi.exe51⤵
- Executes dropped EXE
PID:908 -
C:\Windows\SysWOW64\Hdhbam32.exeC:\Windows\system32\Hdhbam32.exe52⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe53⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe54⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\Hlcgeo32.exeC:\Windows\system32\Hlcgeo32.exe55⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe56⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe57⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Hpapln32.exeC:\Windows\system32\Hpapln32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Hcplhi32.exeC:\Windows\system32\Hcplhi32.exe60⤵
- Executes dropped EXE
PID:352 -
C:\Windows\SysWOW64\Hjjddchg.exeC:\Windows\system32\Hjjddchg.exe61⤵
- Executes dropped EXE
PID:492 -
C:\Windows\SysWOW64\Hlhaqogk.exeC:\Windows\system32\Hlhaqogk.exe62⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe63⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe64⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Ilknfn32.exeC:\Windows\system32\Ilknfn32.exe66⤵PID:824
-
C:\Windows\SysWOW64\Inljnfkg.exeC:\Windows\system32\Inljnfkg.exe67⤵PID:576
-
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe68⤵
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\Ihankokm.exeC:\Windows\system32\Ihankokm.exe69⤵PID:2096
-
C:\Windows\SysWOW64\Igdogl32.exeC:\Windows\system32\Igdogl32.exe70⤵
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe71⤵
- Drops file in System32 directory
PID:1912 -
C:\Windows\SysWOW64\Iqmcpahh.exeC:\Windows\system32\Iqmcpahh.exe72⤵PID:2064
-
C:\Windows\SysWOW64\Ikbgmj32.exeC:\Windows\system32\Ikbgmj32.exe73⤵PID:2700
-
C:\Windows\SysWOW64\Ijeghgoh.exeC:\Windows\system32\Ijeghgoh.exe74⤵
- Drops file in System32 directory
PID:2792 -
C:\Windows\SysWOW64\Iqopea32.exeC:\Windows\system32\Iqopea32.exe75⤵PID:2516
-
C:\Windows\SysWOW64\Idklfpon.exeC:\Windows\system32\Idklfpon.exe76⤵PID:2068
-
C:\Windows\SysWOW64\Ikddbj32.exeC:\Windows\system32\Ikddbj32.exe77⤵PID:3024
-
C:\Windows\SysWOW64\Ijgdngmf.exeC:\Windows\system32\Ijgdngmf.exe78⤵
- Modifies registry class
PID:1804 -
C:\Windows\SysWOW64\Imfqjbli.exeC:\Windows\system32\Imfqjbli.exe79⤵PID:2612
-
C:\Windows\SysWOW64\Icpigm32.exeC:\Windows\system32\Icpigm32.exe80⤵
- Modifies registry class
PID:1544 -
C:\Windows\SysWOW64\Igkdgk32.exeC:\Windows\system32\Igkdgk32.exe81⤵PID:2772
-
C:\Windows\SysWOW64\Jjjacf32.exeC:\Windows\system32\Jjjacf32.exe82⤵PID:680
-
C:\Windows\SysWOW64\Jmhmpb32.exeC:\Windows\system32\Jmhmpb32.exe83⤵PID:1108
-
C:\Windows\SysWOW64\Jofiln32.exeC:\Windows\system32\Jofiln32.exe84⤵PID:1868
-
C:\Windows\SysWOW64\Jcbellac.exeC:\Windows\system32\Jcbellac.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:924 -
C:\Windows\SysWOW64\Jjlnif32.exeC:\Windows\system32\Jjlnif32.exe86⤵PID:1584
-
C:\Windows\SysWOW64\Jmjjea32.exeC:\Windows\system32\Jmjjea32.exe87⤵PID:2056
-
C:\Windows\SysWOW64\Jqfffqpm.exeC:\Windows\system32\Jqfffqpm.exe88⤵PID:1568
-
C:\Windows\SysWOW64\Jbgbni32.exeC:\Windows\system32\Jbgbni32.exe89⤵PID:2884
-
C:\Windows\SysWOW64\Jjojofgn.exeC:\Windows\system32\Jjojofgn.exe90⤵PID:2672
-
C:\Windows\SysWOW64\Jkpgfn32.exeC:\Windows\system32\Jkpgfn32.exe91⤵PID:2512
-
C:\Windows\SysWOW64\Jcgogk32.exeC:\Windows\system32\Jcgogk32.exe92⤵PID:2256
-
C:\Windows\SysWOW64\Jehkodcm.exeC:\Windows\system32\Jehkodcm.exe93⤵PID:2952
-
C:\Windows\SysWOW64\Jmocpado.exeC:\Windows\system32\Jmocpado.exe94⤵PID:376
-
C:\Windows\SysWOW64\Jnqphi32.exeC:\Windows\system32\Jnqphi32.exe95⤵PID:2444
-
C:\Windows\SysWOW64\Jbllihbf.exeC:\Windows\system32\Jbllihbf.exe96⤵PID:1836
-
C:\Windows\SysWOW64\Jifdebic.exeC:\Windows\system32\Jifdebic.exe97⤵PID:588
-
C:\Windows\SysWOW64\Jgidao32.exeC:\Windows\system32\Jgidao32.exe98⤵PID:480
-
C:\Windows\SysWOW64\Joplbl32.exeC:\Windows\system32\Joplbl32.exe99⤵PID:1536
-
C:\Windows\SysWOW64\Jnclnihj.exeC:\Windows\system32\Jnclnihj.exe100⤵PID:1648
-
C:\Windows\SysWOW64\Kemejc32.exeC:\Windows\system32\Kemejc32.exe101⤵PID:2448
-
C:\Windows\SysWOW64\Kihqkagp.exeC:\Windows\system32\Kihqkagp.exe102⤵PID:1760
-
C:\Windows\SysWOW64\Kjjmbj32.exeC:\Windows\system32\Kjjmbj32.exe103⤵PID:2420
-
C:\Windows\SysWOW64\Kbqecg32.exeC:\Windows\system32\Kbqecg32.exe104⤵PID:2652
-
C:\Windows\SysWOW64\Keoapb32.exeC:\Windows\system32\Keoapb32.exe105⤵PID:2780
-
C:\Windows\SysWOW64\Kkijmm32.exeC:\Windows\system32\Kkijmm32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2832 -
C:\Windows\SysWOW64\Kmjfdejp.exeC:\Windows\system32\Kmjfdejp.exe107⤵PID:2808
-
C:\Windows\SysWOW64\Keanebkb.exeC:\Windows\system32\Keanebkb.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1328 -
C:\Windows\SysWOW64\Kfbkmk32.exeC:\Windows\system32\Kfbkmk32.exe109⤵
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Kjnfniii.exeC:\Windows\system32\Kjnfniii.exe110⤵PID:1952
-
C:\Windows\SysWOW64\Kmmcjehm.exeC:\Windows\system32\Kmmcjehm.exe111⤵PID:552
-
C:\Windows\SysWOW64\Kpkofpgq.exeC:\Windows\system32\Kpkofpgq.exe112⤵
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Kiccofna.exeC:\Windows\system32\Kiccofna.exe113⤵PID:3040
-
C:\Windows\SysWOW64\Kmopod32.exeC:\Windows\system32\Kmopod32.exe114⤵
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Kpmlkp32.exeC:\Windows\system32\Kpmlkp32.exe115⤵PID:2140
-
C:\Windows\SysWOW64\Kblhgk32.exeC:\Windows\system32\Kblhgk32.exe116⤵PID:2628
-
C:\Windows\SysWOW64\Kifpdelo.exeC:\Windows\system32\Kifpdelo.exe117⤵
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\Kmaled32.exeC:\Windows\system32\Kmaled32.exe118⤵PID:1672
-
C:\Windows\SysWOW64\Lckdanld.exeC:\Windows\system32\Lckdanld.exe119⤵PID:348
-
C:\Windows\SysWOW64\Lbnemk32.exeC:\Windows\system32\Lbnemk32.exe120⤵PID:1128
-
C:\Windows\SysWOW64\Lemaif32.exeC:\Windows\system32\Lemaif32.exe121⤵PID:1508
-
C:\Windows\SysWOW64\Lihmjejl.exeC:\Windows\system32\Lihmjejl.exe122⤵PID:1636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-