Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 02:27
Behavioral task
behavioral1
Sample
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe
-
Size
664KB
-
MD5
52baf0723f9f35f901a0955048ed4e20
-
SHA1
115e43a9c627ae9478997a4dc9ec10d465b2070a
-
SHA256
22376047e86a694868f239cd4cf50209a00698ec07a2898cb663256cf10a6467
-
SHA512
45aad05214dda22fecd791b27d5ee2f207fcc048d5d25b0cf4042ceb3d1fe8b3bc5c368c5787b9eecb46d33a88b413a46a80a837928acf5ec5069c145460d872
-
SSDEEP
12288:nGqUUCpV6yYP4rbpV6yYPg058KpV6yYPNUir2MhNl6zX3w9As/xO23WM6tJmDYjF:n1UUCW4XWleKWNUir2MhNl6zX3w9As/8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Omfkke32.exeAdnopfoj.exeCkoilb32.exeNgdifkpi.exeCgpgce32.exeDngoibmo.exeGldkfl32.exeMhbped32.exeLdnhad32.exeDbpodagk.exeKmefooki.exeCnobnmpl.exeDkcofe32.exeGfmemc32.exeIfkacb32.exeBdjefj32.exeNehmdhja.exeBhndldcn.exeGebbnpfp.exeNlekia32.exeIefhhbef.exeLbiqfied.exeMbpgggol.exeDkmmhf32.exePefijfii.exeCppkph32.exeHkcdafqb.exeBommnc32.exeFjaonpnn.exePbfpik32.exeNkbalifo.exeBaildokg.exeFhffaj32.exeLbqabkql.exeLflmci32.exeGonnhhln.exeIqopea32.exeObafnlpn.exeJjdmmdnh.exeClcflkic.exeDjefobmk.exeJbllihbf.exeOmbapedi.exeMidcpj32.exeFfbicfoc.exeJbjochdi.exeLhbcfa32.exeNjdpomfe.exeGkkemh32.exeBfadgq32.exeFfklhqao.exeQjknnbed.exeDcenlceh.exeHeihnoph.exeNcmfqkdj.exeIaeiieeb.exeNnhkcj32.exePjhknm32.exeBmpfojmp.exeCdlnkmha.exeEfppoc32.exeKeanebkb.exePimkpfeh.exeLlfifq32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Omfkke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Adnopfoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckoilb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngdifkpi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgpgce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dngoibmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gldkfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhbped32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldnhad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbpodagk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmefooki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnobnmpl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkcofe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfmemc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ifkacb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdjefj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nehmdhja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhndldcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gebbnpfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlekia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iefhhbef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbiqfied.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mbpgggol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkmmhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pefijfii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cppkph32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkcdafqb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bommnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjaonpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pbfpik32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkbalifo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Baildokg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhffaj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbqabkql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lflmci32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gonnhhln.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqopea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obafnlpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jjdmmdnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clcflkic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jbllihbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ombapedi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Midcpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffbicfoc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbjochdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lhbcfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Njdpomfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkkemh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bfadgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ffklhqao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qjknnbed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dcenlceh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Heihnoph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ncmfqkdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iaeiieeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nnhkcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjhknm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmpfojmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdlnkmha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efppoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Keanebkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pimkpfeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Llfifq32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Ldnhad32.exe family_berbew \Windows\SysWOW64\Ldqegd32.exe family_berbew \Windows\SysWOW64\Lganiohl.exe family_berbew \Windows\SysWOW64\Lgdjnofi.exe family_berbew \Windows\SysWOW64\Midcpj32.exe family_berbew \Windows\SysWOW64\Moalhq32.exe family_berbew \Windows\SysWOW64\Mabejlob.exe family_berbew C:\Windows\SysWOW64\Mkjica32.exe family_berbew \Windows\SysWOW64\Mnkbdlbd.exe family_berbew \Windows\SysWOW64\Nnnojlpa.exe family_berbew C:\Windows\SysWOW64\Njdpomfe.exe family_berbew \Windows\SysWOW64\Npnhlg32.exe family_berbew \Windows\SysWOW64\Ngkmnacm.exe family_berbew \Windows\SysWOW64\Nhlifi32.exe family_berbew \Windows\SysWOW64\Nohnhc32.exe family_berbew C:\Windows\SysWOW64\Ohqbqhde.exe family_berbew C:\Windows\SysWOW64\Obkdonic.exe family_berbew C:\Windows\SysWOW64\Oiellh32.exe family_berbew C:\Windows\SysWOW64\Onbddoog.exe family_berbew C:\Windows\SysWOW64\Oelmai32.exe family_berbew C:\Windows\SysWOW64\Ocomlemo.exe family_berbew C:\Windows\SysWOW64\Ondajnme.exe family_berbew C:\Windows\SysWOW64\Oqcnfjli.exe family_berbew behavioral1/memory/1636-281-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew C:\Windows\SysWOW64\Ofpfnqjp.exe family_berbew behavioral1/memory/976-292-0x00000000002D0000-0x0000000000305000-memory.dmp family_berbew behavioral1/memory/976-291-0x00000000002D0000-0x0000000000305000-memory.dmp family_berbew C:\Windows\SysWOW64\Ongnonkb.exe family_berbew behavioral1/memory/1912-303-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew C:\Windows\SysWOW64\Pccfge32.exe family_berbew behavioral1/memory/2300-313-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew C:\Windows\SysWOW64\Pipopl32.exe family_berbew behavioral1/memory/1764-325-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew C:\Windows\SysWOW64\Ppjglfon.exe family_berbew behavioral1/memory/1940-336-0x00000000002D0000-0x0000000000305000-memory.dmp family_berbew C:\Windows\SysWOW64\Piblek32.exe family_berbew C:\Windows\SysWOW64\Pmnhfjmg.exe family_berbew C:\Windows\SysWOW64\Pbkpna32.exe family_berbew behavioral1/memory/2564-373-0x00000000002D0000-0x0000000000305000-memory.dmp family_berbew behavioral1/memory/2564-371-0x00000000002D0000-0x0000000000305000-memory.dmp family_berbew behavioral1/memory/2860-380-0x00000000002E0000-0x0000000000315000-memory.dmp family_berbew behavioral1/memory/2860-379-0x00000000002E0000-0x0000000000315000-memory.dmp family_berbew C:\Windows\SysWOW64\Pmqdkj32.exe family_berbew C:\Windows\SysWOW64\Pelipl32.exe family_berbew behavioral1/memory/2624-395-0x00000000002F0000-0x0000000000325000-memory.dmp family_berbew behavioral1/memory/2624-394-0x00000000002F0000-0x0000000000325000-memory.dmp family_berbew C:\Windows\SysWOW64\Plfamfpm.exe family_berbew behavioral1/memory/2464-402-0x0000000000280000-0x00000000002B5000-memory.dmp family_berbew behavioral1/memory/2464-401-0x0000000000280000-0x00000000002B5000-memory.dmp family_berbew C:\Windows\SysWOW64\Pndniaop.exe family_berbew C:\Windows\SysWOW64\Qhmbagfa.exe family_berbew behavioral1/memory/2964-427-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew C:\Windows\SysWOW64\Qjknnbed.exe family_berbew behavioral1/memory/2740-445-0x00000000002D0000-0x0000000000305000-memory.dmp family_berbew C:\Windows\SysWOW64\Qaefjm32.exe family_berbew C:\Windows\SysWOW64\Qdccfh32.exe family_berbew C:\Windows\SysWOW64\Qnigda32.exe family_berbew behavioral1/memory/2052-478-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew behavioral1/memory/2052-477-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew C:\Windows\SysWOW64\Ajphib32.exe family_berbew C:\Windows\SysWOW64\Aajpelhl.exe family_berbew C:\Windows\SysWOW64\Affhncfc.exe family_berbew behavioral1/memory/1144-504-0x0000000000360000-0x0000000000395000-memory.dmp family_berbew C:\Windows\SysWOW64\Apomfh32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Ldnhad32.exeLdqegd32.exeLganiohl.exeLgdjnofi.exeMidcpj32.exeMoalhq32.exeMabejlob.exeMkjica32.exeMnkbdlbd.exeNnnojlpa.exeNjdpomfe.exeNpnhlg32.exeNgkmnacm.exeNhlifi32.exeNohnhc32.exeOhqbqhde.exeObkdonic.exeOiellh32.exeOnbddoog.exeOelmai32.exeOcomlemo.exeOndajnme.exeOqcnfjli.exeOfpfnqjp.exeOngnonkb.exePccfge32.exePipopl32.exePpjglfon.exePiblek32.exePmnhfjmg.exePbkpna32.exePmqdkj32.exePelipl32.exePlfamfpm.exePndniaop.exeQhmbagfa.exeQjknnbed.exeQaefjm32.exeQdccfh32.exeQnigda32.exeAjphib32.exeAajpelhl.exeAffhncfc.exeApomfh32.exeAigaon32.exeAmbmpmln.exeAbpfhcje.exeAenbdoii.exeAmejeljk.exeAoffmd32.exeAepojo32.exeAhokfj32.exeAljgfioc.exeBbdocc32.exeBingpmnl.exeBlmdlhmp.exeBokphdld.exeBaildokg.exeBdhhqk32.exeBommnc32.exeBdjefj32.exeBhfagipa.exeBopicc32.exeBdlblj32.exepid process 2616 Ldnhad32.exe 3032 Ldqegd32.exe 2544 Lganiohl.exe 2588 Lgdjnofi.exe 2596 Midcpj32.exe 2492 Moalhq32.exe 1928 Mabejlob.exe 2604 Mkjica32.exe 856 Mnkbdlbd.exe 1948 Nnnojlpa.exe 2844 Njdpomfe.exe 1068 Npnhlg32.exe 1700 Ngkmnacm.exe 1868 Nhlifi32.exe 1860 Nohnhc32.exe 1508 Ohqbqhde.exe 532 Obkdonic.exe 404 Oiellh32.exe 2876 Onbddoog.exe 1672 Oelmai32.exe 1252 Ocomlemo.exe 1636 Ondajnme.exe 976 Oqcnfjli.exe 1912 Ofpfnqjp.exe 2300 Ongnonkb.exe 1764 Pccfge32.exe 1940 Pipopl32.exe 1624 Ppjglfon.exe 1424 Piblek32.exe 2564 Pmnhfjmg.exe 2860 Pbkpna32.exe 2624 Pmqdkj32.exe 2464 Pelipl32.exe 2508 Plfamfpm.exe 2964 Pndniaop.exe 1820 Qhmbagfa.exe 2740 Qjknnbed.exe 1632 Qaefjm32.exe 556 Qdccfh32.exe 2052 Qnigda32.exe 1772 Ajphib32.exe 1144 Aajpelhl.exe 788 Affhncfc.exe 1100 Apomfh32.exe 1488 Aigaon32.exe 2180 Ambmpmln.exe 1828 Abpfhcje.exe 2032 Aenbdoii.exe 896 Amejeljk.exe 1200 Aoffmd32.exe 3056 Aepojo32.exe 1956 Ahokfj32.exe 1612 Aljgfioc.exe 3016 Bbdocc32.exe 1208 Bingpmnl.exe 2672 Blmdlhmp.exe 2704 Bokphdld.exe 2556 Baildokg.exe 2788 Bdhhqk32.exe 2948 Bommnc32.exe 1472 Bdjefj32.exe 1088 Bhfagipa.exe 2252 Bopicc32.exe 1740 Bdlblj32.exe -
Loads dropped DLL 64 IoCs
Processes:
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exeLdnhad32.exeLdqegd32.exeLganiohl.exeLgdjnofi.exeMidcpj32.exeMoalhq32.exeMabejlob.exeMkjica32.exeMnkbdlbd.exeNnnojlpa.exeNjdpomfe.exeNpnhlg32.exeNgkmnacm.exeNhlifi32.exeNohnhc32.exeOhqbqhde.exeObkdonic.exeOiellh32.exeOnbddoog.exeOelmai32.exeOcomlemo.exeOndajnme.exeOqcnfjli.exeOfpfnqjp.exeOngnonkb.exePccfge32.exePipopl32.exePpjglfon.exePiblek32.exePmnhfjmg.exePbkpna32.exepid process 2392 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe 2392 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe 2616 Ldnhad32.exe 2616 Ldnhad32.exe 3032 Ldqegd32.exe 3032 Ldqegd32.exe 2544 Lganiohl.exe 2544 Lganiohl.exe 2588 Lgdjnofi.exe 2588 Lgdjnofi.exe 2596 Midcpj32.exe 2596 Midcpj32.exe 2492 Moalhq32.exe 2492 Moalhq32.exe 1928 Mabejlob.exe 1928 Mabejlob.exe 2604 Mkjica32.exe 2604 Mkjica32.exe 856 Mnkbdlbd.exe 856 Mnkbdlbd.exe 1948 Nnnojlpa.exe 1948 Nnnojlpa.exe 2844 Njdpomfe.exe 2844 Njdpomfe.exe 1068 Npnhlg32.exe 1068 Npnhlg32.exe 1700 Ngkmnacm.exe 1700 Ngkmnacm.exe 1868 Nhlifi32.exe 1868 Nhlifi32.exe 1860 Nohnhc32.exe 1860 Nohnhc32.exe 1508 Ohqbqhde.exe 1508 Ohqbqhde.exe 532 Obkdonic.exe 532 Obkdonic.exe 404 Oiellh32.exe 404 Oiellh32.exe 2876 Onbddoog.exe 2876 Onbddoog.exe 1672 Oelmai32.exe 1672 Oelmai32.exe 1252 Ocomlemo.exe 1252 Ocomlemo.exe 1636 Ondajnme.exe 1636 Ondajnme.exe 976 Oqcnfjli.exe 976 Oqcnfjli.exe 1912 Ofpfnqjp.exe 1912 Ofpfnqjp.exe 2300 Ongnonkb.exe 2300 Ongnonkb.exe 1764 Pccfge32.exe 1764 Pccfge32.exe 1940 Pipopl32.exe 1940 Pipopl32.exe 1624 Ppjglfon.exe 1624 Ppjglfon.exe 1424 Piblek32.exe 1424 Piblek32.exe 2564 Pmnhfjmg.exe 2564 Pmnhfjmg.exe 2860 Pbkpna32.exe 2860 Pbkpna32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Iajcde32.exeKbidgeci.exeNnennj32.exePefijfii.exeJmjjea32.exeKcbakpdo.exeBfadgq32.exeDoehqead.exeInljnfkg.exePpbfpd32.exeNkeelohh.exeCgpgce32.exeDjbiicon.exeLccdel32.exeOqcnfjli.exeCngcjo32.exeEfppoc32.exeNmbknddp.exeDfoqmo32.exeOikojfgk.exeOmfkke32.exeAenbdoii.exeOmdneebf.exeQjknnbed.exeNgnbgplj.exeLlfifq32.exeOjahnj32.exeIhoafpmp.exeMkjica32.exeBingpmnl.exePclfkc32.exeAhgnke32.exeFpcqaf32.exeJjdmmdnh.exeBokphdld.exeBhfagipa.exeIhgainbg.exeJnmlhchd.exeQdccfh32.exeAmbmpmln.exeKjjmbj32.exeBmpfojmp.exeNhdlkdkg.exeOklkmnbp.exeFjlhneio.exePamiog32.exeBlgpef32.exeJfnnha32.exeNjlockkm.exeNcpcfkbg.exeFejgko32.exeNhiffc32.exeLbiqfied.exeLibicbma.exeGphmeo32.exeAdpkee32.exeKconkibf.exeLnbbbffj.exeAajpelhl.exePjhknm32.exeCohigamf.exeJgagfi32.exeOgeigofa.exedescription ioc process File created C:\Windows\SysWOW64\Iqmcpahh.exe Iajcde32.exe File created C:\Windows\SysWOW64\Kegqdqbl.exe Kbidgeci.exe File created C:\Windows\SysWOW64\Npdjje32.exe Nnennj32.exe File created C:\Windows\SysWOW64\Pefijfii.exe Pefijfii.exe File created C:\Windows\SysWOW64\Jbgbni32.exe Jmjjea32.exe File created C:\Windows\SysWOW64\Mdnfbe32.dll Kcbakpdo.exe File created C:\Windows\SysWOW64\Oegjkb32.dll Bfadgq32.exe File created C:\Windows\SysWOW64\Mcfidhng.dll Doehqead.exe File created C:\Windows\SysWOW64\Ifcbodli.exe Inljnfkg.exe File created C:\Windows\SysWOW64\Pcnbablo.exe Ppbfpd32.exe File created C:\Windows\SysWOW64\Nejiih32.exe Nkeelohh.exe File created C:\Windows\SysWOW64\Fqpjbf32.dll Cgpgce32.exe File opened for modification C:\Windows\SysWOW64\Dmafennb.exe Djbiicon.exe File created C:\Windows\SysWOW64\Khqpfa32.dll Lccdel32.exe File created C:\Windows\SysWOW64\Gdcbnc32.dll Oqcnfjli.exe File created C:\Windows\SysWOW64\Cpeofk32.exe Cngcjo32.exe File opened for modification C:\Windows\SysWOW64\Eiomkn32.exe Efppoc32.exe File opened for modification C:\Windows\SysWOW64\Nlekia32.exe Nmbknddp.exe File opened for modification C:\Windows\SysWOW64\Dhnmij32.exe Dfoqmo32.exe File opened for modification C:\Windows\SysWOW64\Omfkke32.exe Oikojfgk.exe File created C:\Windows\SysWOW64\Egahmk32.dll Omfkke32.exe File created C:\Windows\SysWOW64\Hleajblp.dll Aenbdoii.exe File opened for modification C:\Windows\SysWOW64\Okgnab32.exe Omdneebf.exe File opened for modification C:\Windows\SysWOW64\Qaefjm32.exe Qjknnbed.exe File created C:\Windows\SysWOW64\Njlockkm.exe Ngnbgplj.exe File opened for modification C:\Windows\SysWOW64\Lbqabkql.exe Llfifq32.exe File created C:\Windows\SysWOW64\Olpdjf32.exe Ojahnj32.exe File opened for modification C:\Windows\SysWOW64\Ilknfn32.exe Ihoafpmp.exe File created C:\Windows\SysWOW64\Agkjoj32.dll Mkjica32.exe File opened for modification C:\Windows\SysWOW64\Blmdlhmp.exe Bingpmnl.exe File created C:\Windows\SysWOW64\Dfkjnkib.dll Pclfkc32.exe File created C:\Windows\SysWOW64\Pfioffab.dll Ahgnke32.exe File created C:\Windows\SysWOW64\Fepiimfg.exe Fpcqaf32.exe File opened for modification C:\Windows\SysWOW64\Jqnejn32.exe Jjdmmdnh.exe File created C:\Windows\SysWOW64\Baildokg.exe Bokphdld.exe File opened for modification C:\Windows\SysWOW64\Bopicc32.exe Bhfagipa.exe File created C:\Windows\SysWOW64\Icmegf32.exe Ihgainbg.exe File created C:\Windows\SysWOW64\Jgfqaiod.exe Jnmlhchd.exe File created C:\Windows\SysWOW64\Moealbej.dll Qdccfh32.exe File created C:\Windows\SysWOW64\Abpfhcje.exe Ambmpmln.exe File created C:\Windows\SysWOW64\Kcbakpdo.exe Kjjmbj32.exe File opened for modification C:\Windows\SysWOW64\Blbfjg32.exe Bmpfojmp.exe File created C:\Windows\SysWOW64\Fgaleqmc.dll Nhdlkdkg.exe File created C:\Windows\SysWOW64\Olmhdf32.exe Oklkmnbp.exe File created C:\Windows\SysWOW64\Cakqnc32.dll Fjlhneio.exe File opened for modification C:\Windows\SysWOW64\Pclfkc32.exe Pamiog32.exe File created C:\Windows\SysWOW64\Coelaaoi.exe Blgpef32.exe File opened for modification C:\Windows\SysWOW64\Jkjfah32.exe Jfnnha32.exe File created C:\Windows\SysWOW64\Nnhkcj32.exe Njlockkm.exe File created C:\Windows\SysWOW64\Ngkogj32.exe Ncpcfkbg.exe File opened for modification C:\Windows\SysWOW64\Ffkcbgek.exe Fejgko32.exe File opened for modification C:\Windows\SysWOW64\Nocnbmoo.exe Nhiffc32.exe File opened for modification C:\Windows\SysWOW64\Libicbma.exe Lbiqfied.exe File opened for modification C:\Windows\SysWOW64\Mmneda32.exe Libicbma.exe File created C:\Windows\SysWOW64\Hgbebiao.exe Gphmeo32.exe File created C:\Windows\SysWOW64\Afohaa32.exe Adpkee32.exe File created C:\Windows\SysWOW64\Kkjcplpa.exe Kconkibf.exe File created C:\Windows\SysWOW64\Leljop32.exe Lnbbbffj.exe File opened for modification C:\Windows\SysWOW64\Affhncfc.exe Aajpelhl.exe File created C:\Windows\SysWOW64\Qabcjgkh.exe Pjhknm32.exe File created C:\Windows\SysWOW64\Cafecmlj.exe Cohigamf.exe File created C:\Windows\SysWOW64\Jnkpbcjg.exe Jgagfi32.exe File opened for modification C:\Windows\SysWOW64\Nejiih32.exe Nkeelohh.exe File opened for modification C:\Windows\SysWOW64\Ohfeog32.exe Ogeigofa.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5368 5416 WerFault.exe Nlhgoqhh.exe -
Modifies registry class 64 IoCs
Processes:
Ambmpmln.exeKiccofna.exeCpnojioo.exeMkhofjoj.exeDjefobmk.exeGeolea32.exeIfcbodli.exeNcjqhmkm.exeAjejgp32.exeEbinic32.exeHnojdcfi.exeIccbqh32.exeNcmfqkdj.exeQjknnbed.exeFpfdalii.exeCkccgane.exeGfjhgdck.exeLnbbbffj.exeLmlhnagm.exeBopicc32.exeCohigamf.exeLmikibio.exeDnlidb32.exeDnoomqbg.exeLbiqfied.exePefijfii.exeDjbiicon.exeIqopea32.exeIdmhkpml.exeMoiklogi.exeGicbeald.exeKihqkagp.exeBommnc32.exeCpkbdiqb.exeJjdmmdnh.exeKnklagmb.exeOndajnme.exeAdpkee32.exeJqilooij.exeOhfeog32.exeEfppoc32.exeJbnhng32.exeDmafennb.exeFbdqmghm.exeMhbped32.exeCdikkg32.exeKbidgeci.exeOmfkke32.exePclfkc32.exeAidnohbk.exeAhgnke32.exeDgmglh32.exeBpiipf32.exeNhdlkdkg.exeBioqclil.exeJkoplhip.exeCoelaaoi.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ambmpmln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kiccofna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bebpkk32.dll" Cpnojioo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mkhofjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmqgncdn.dll" Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Geolea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ifcbodli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ncjqhmkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjchig32.dll" Ajejgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlgohm32.dll" Ebinic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hnojdcfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbbcbk32.dll" Iccbqh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ncmfqkdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qjknnbed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fpfdalii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhkdik32.dll" Ckccgane.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gfjhgdck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lnbbbffj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ncjqhmkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lmlhnagm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bopicc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cohigamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdbnmk32.dll" Lmikibio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naeqjnho.dll" Dnlidb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfgnhbba.dll" Cohigamf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Focnmm32.dll" Dnoomqbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lbiqfied.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pefijfii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Djbiicon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iqopea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Idmhkpml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpjbaocl.dll" Moiklogi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gicbeald.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kihqkagp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bommnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdjlnm32.dll" Cpkbdiqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jjdmmdnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Knklagmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ondajnme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnhijl32.dll" Adpkee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Adpkee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jqilooij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ohfeog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpbpbqda.dll" Djbiicon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Efppoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jbnhng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmafennb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fbdqmghm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mhbped32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dglpkenb.dll" Cdikkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihlfca32.dll" Kbidgeci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpmcnehn.dll" Idmhkpml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egahmk32.dll" Omfkke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pclfkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aidnohbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ahgnke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dgmglh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Djefobmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ligkin32.dll" Bpiipf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gfjhgdck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nhdlkdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbiaej32.dll" Bioqclil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jkoplhip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Coelaaoi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exeLdnhad32.exeLdqegd32.exeLganiohl.exeLgdjnofi.exeMidcpj32.exeMoalhq32.exeMabejlob.exeMkjica32.exeMnkbdlbd.exeNnnojlpa.exeNjdpomfe.exeNpnhlg32.exeNgkmnacm.exeNhlifi32.exeNohnhc32.exedescription pid process target process PID 2392 wrote to memory of 2616 2392 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe Ldnhad32.exe PID 2392 wrote to memory of 2616 2392 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe Ldnhad32.exe PID 2392 wrote to memory of 2616 2392 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe Ldnhad32.exe PID 2392 wrote to memory of 2616 2392 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe Ldnhad32.exe PID 2616 wrote to memory of 3032 2616 Ldnhad32.exe Ldqegd32.exe PID 2616 wrote to memory of 3032 2616 Ldnhad32.exe Ldqegd32.exe PID 2616 wrote to memory of 3032 2616 Ldnhad32.exe Ldqegd32.exe PID 2616 wrote to memory of 3032 2616 Ldnhad32.exe Ldqegd32.exe PID 3032 wrote to memory of 2544 3032 Ldqegd32.exe Lganiohl.exe PID 3032 wrote to memory of 2544 3032 Ldqegd32.exe Lganiohl.exe PID 3032 wrote to memory of 2544 3032 Ldqegd32.exe Lganiohl.exe PID 3032 wrote to memory of 2544 3032 Ldqegd32.exe Lganiohl.exe PID 2544 wrote to memory of 2588 2544 Lganiohl.exe Lgdjnofi.exe PID 2544 wrote to memory of 2588 2544 Lganiohl.exe Lgdjnofi.exe PID 2544 wrote to memory of 2588 2544 Lganiohl.exe Lgdjnofi.exe PID 2544 wrote to memory of 2588 2544 Lganiohl.exe Lgdjnofi.exe PID 2588 wrote to memory of 2596 2588 Lgdjnofi.exe Midcpj32.exe PID 2588 wrote to memory of 2596 2588 Lgdjnofi.exe Midcpj32.exe PID 2588 wrote to memory of 2596 2588 Lgdjnofi.exe Midcpj32.exe PID 2588 wrote to memory of 2596 2588 Lgdjnofi.exe Midcpj32.exe PID 2596 wrote to memory of 2492 2596 Midcpj32.exe Moalhq32.exe PID 2596 wrote to memory of 2492 2596 Midcpj32.exe Moalhq32.exe PID 2596 wrote to memory of 2492 2596 Midcpj32.exe Moalhq32.exe PID 2596 wrote to memory of 2492 2596 Midcpj32.exe Moalhq32.exe PID 2492 wrote to memory of 1928 2492 Moalhq32.exe Mabejlob.exe PID 2492 wrote to memory of 1928 2492 Moalhq32.exe Mabejlob.exe PID 2492 wrote to memory of 1928 2492 Moalhq32.exe Mabejlob.exe PID 2492 wrote to memory of 1928 2492 Moalhq32.exe Mabejlob.exe PID 1928 wrote to memory of 2604 1928 Mabejlob.exe Mkjica32.exe PID 1928 wrote to memory of 2604 1928 Mabejlob.exe Mkjica32.exe PID 1928 wrote to memory of 2604 1928 Mabejlob.exe Mkjica32.exe PID 1928 wrote to memory of 2604 1928 Mabejlob.exe Mkjica32.exe PID 2604 wrote to memory of 856 2604 Mkjica32.exe Mnkbdlbd.exe PID 2604 wrote to memory of 856 2604 Mkjica32.exe Mnkbdlbd.exe PID 2604 wrote to memory of 856 2604 Mkjica32.exe Mnkbdlbd.exe PID 2604 wrote to memory of 856 2604 Mkjica32.exe Mnkbdlbd.exe PID 856 wrote to memory of 1948 856 Mnkbdlbd.exe Nnnojlpa.exe PID 856 wrote to memory of 1948 856 Mnkbdlbd.exe Nnnojlpa.exe PID 856 wrote to memory of 1948 856 Mnkbdlbd.exe Nnnojlpa.exe PID 856 wrote to memory of 1948 856 Mnkbdlbd.exe Nnnojlpa.exe PID 1948 wrote to memory of 2844 1948 Nnnojlpa.exe Njdpomfe.exe PID 1948 wrote to memory of 2844 1948 Nnnojlpa.exe Njdpomfe.exe PID 1948 wrote to memory of 2844 1948 Nnnojlpa.exe Njdpomfe.exe PID 1948 wrote to memory of 2844 1948 Nnnojlpa.exe Njdpomfe.exe PID 2844 wrote to memory of 1068 2844 Njdpomfe.exe Npnhlg32.exe PID 2844 wrote to memory of 1068 2844 Njdpomfe.exe Npnhlg32.exe PID 2844 wrote to memory of 1068 2844 Njdpomfe.exe Npnhlg32.exe PID 2844 wrote to memory of 1068 2844 Njdpomfe.exe Npnhlg32.exe PID 1068 wrote to memory of 1700 1068 Npnhlg32.exe Ngkmnacm.exe PID 1068 wrote to memory of 1700 1068 Npnhlg32.exe Ngkmnacm.exe PID 1068 wrote to memory of 1700 1068 Npnhlg32.exe Ngkmnacm.exe PID 1068 wrote to memory of 1700 1068 Npnhlg32.exe Ngkmnacm.exe PID 1700 wrote to memory of 1868 1700 Ngkmnacm.exe Nhlifi32.exe PID 1700 wrote to memory of 1868 1700 Ngkmnacm.exe Nhlifi32.exe PID 1700 wrote to memory of 1868 1700 Ngkmnacm.exe Nhlifi32.exe PID 1700 wrote to memory of 1868 1700 Ngkmnacm.exe Nhlifi32.exe PID 1868 wrote to memory of 1860 1868 Nhlifi32.exe Nohnhc32.exe PID 1868 wrote to memory of 1860 1868 Nhlifi32.exe Nohnhc32.exe PID 1868 wrote to memory of 1860 1868 Nhlifi32.exe Nohnhc32.exe PID 1868 wrote to memory of 1860 1868 Nhlifi32.exe Nohnhc32.exe PID 1860 wrote to memory of 1508 1860 Nohnhc32.exe Ohqbqhde.exe PID 1860 wrote to memory of 1508 1860 Nohnhc32.exe Ohqbqhde.exe PID 1860 wrote to memory of 1508 1860 Nohnhc32.exe Ohqbqhde.exe PID 1860 wrote to memory of 1508 1860 Nohnhc32.exe Ohqbqhde.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Ldnhad32.exeC:\Windows\system32\Ldnhad32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Ldqegd32.exeC:\Windows\system32\Ldqegd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Lganiohl.exeC:\Windows\system32\Lganiohl.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\Lgdjnofi.exeC:\Windows\system32\Lgdjnofi.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Midcpj32.exeC:\Windows\system32\Midcpj32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Moalhq32.exeC:\Windows\system32\Moalhq32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\Mabejlob.exeC:\Windows\system32\Mabejlob.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Mkjica32.exeC:\Windows\system32\Mkjica32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Mnkbdlbd.exeC:\Windows\system32\Mnkbdlbd.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\Nnnojlpa.exeC:\Windows\system32\Nnnojlpa.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\Njdpomfe.exeC:\Windows\system32\Njdpomfe.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Npnhlg32.exeC:\Windows\system32\Npnhlg32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\Ngkmnacm.exeC:\Windows\system32\Ngkmnacm.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Nhlifi32.exeC:\Windows\system32\Nhlifi32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\Nohnhc32.exeC:\Windows\system32\Nohnhc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\Ohqbqhde.exeC:\Windows\system32\Ohqbqhde.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Windows\SysWOW64\Obkdonic.exeC:\Windows\system32\Obkdonic.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:532 -
C:\Windows\SysWOW64\Oiellh32.exeC:\Windows\system32\Oiellh32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:404 -
C:\Windows\SysWOW64\Onbddoog.exeC:\Windows\system32\Onbddoog.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876 -
C:\Windows\SysWOW64\Oelmai32.exeC:\Windows\system32\Oelmai32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Windows\SysWOW64\Ocomlemo.exeC:\Windows\system32\Ocomlemo.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Windows\SysWOW64\Ondajnme.exeC:\Windows\system32\Ondajnme.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Oqcnfjli.exeC:\Windows\system32\Oqcnfjli.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:976 -
C:\Windows\SysWOW64\Ofpfnqjp.exeC:\Windows\system32\Ofpfnqjp.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Windows\SysWOW64\Ongnonkb.exeC:\Windows\system32\Ongnonkb.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2300 -
C:\Windows\SysWOW64\Pccfge32.exeC:\Windows\system32\Pccfge32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Windows\SysWOW64\Pipopl32.exeC:\Windows\system32\Pipopl32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Windows\SysWOW64\Ppjglfon.exeC:\Windows\system32\Ppjglfon.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Windows\SysWOW64\Piblek32.exeC:\Windows\system32\Piblek32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424 -
C:\Windows\SysWOW64\Pmnhfjmg.exeC:\Windows\system32\Pmnhfjmg.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Windows\SysWOW64\Pbkpna32.exeC:\Windows\system32\Pbkpna32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Windows\SysWOW64\Pmqdkj32.exeC:\Windows\system32\Pmqdkj32.exe33⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\Pelipl32.exeC:\Windows\system32\Pelipl32.exe34⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Plfamfpm.exeC:\Windows\system32\Plfamfpm.exe35⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\Pndniaop.exeC:\Windows\system32\Pndniaop.exe36⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\Qhmbagfa.exeC:\Windows\system32\Qhmbagfa.exe37⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Qaefjm32.exeC:\Windows\system32\Qaefjm32.exe39⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\Qdccfh32.exeC:\Windows\system32\Qdccfh32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\Qnigda32.exeC:\Windows\system32\Qnigda32.exe41⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe42⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Aajpelhl.exeC:\Windows\system32\Aajpelhl.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1144 -
C:\Windows\SysWOW64\Affhncfc.exeC:\Windows\system32\Affhncfc.exe44⤵
- Executes dropped EXE
PID:788 -
C:\Windows\SysWOW64\Apomfh32.exeC:\Windows\system32\Apomfh32.exe45⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\Aigaon32.exeC:\Windows\system32\Aigaon32.exe46⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\Ambmpmln.exeC:\Windows\system32\Ambmpmln.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Abpfhcje.exeC:\Windows\system32\Abpfhcje.exe48⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\Aenbdoii.exeC:\Windows\system32\Aenbdoii.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\Amejeljk.exeC:\Windows\system32\Amejeljk.exe50⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\Aoffmd32.exeC:\Windows\system32\Aoffmd32.exe51⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\Aepojo32.exeC:\Windows\system32\Aepojo32.exe52⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe53⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Aljgfioc.exeC:\Windows\system32\Aljgfioc.exe54⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Bbdocc32.exeC:\Windows\system32\Bbdocc32.exe55⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\Bingpmnl.exeC:\Windows\system32\Bingpmnl.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\Blmdlhmp.exeC:\Windows\system32\Blmdlhmp.exe57⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\Bokphdld.exeC:\Windows\system32\Bokphdld.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Baildokg.exeC:\Windows\system32\Baildokg.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\Bdhhqk32.exeC:\Windows\system32\Bdhhqk32.exe60⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Bommnc32.exeC:\Windows\system32\Bommnc32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Bdjefj32.exeC:\Windows\system32\Bdjefj32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\Bhfagipa.exeC:\Windows\system32\Bhfagipa.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\Bopicc32.exeC:\Windows\system32\Bopicc32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Bdlblj32.exeC:\Windows\system32\Bdlblj32.exe65⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Bkfjhd32.exeC:\Windows\system32\Bkfjhd32.exe66⤵PID:2272
-
C:\Windows\SysWOW64\Bnefdp32.exeC:\Windows\system32\Bnefdp32.exe67⤵PID:1552
-
C:\Windows\SysWOW64\Bpcbqk32.exeC:\Windows\system32\Bpcbqk32.exe68⤵PID:2240
-
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe69⤵PID:2400
-
C:\Windows\SysWOW64\Cngcjo32.exeC:\Windows\system32\Cngcjo32.exe70⤵
- Drops file in System32 directory
PID:792 -
C:\Windows\SysWOW64\Cpeofk32.exeC:\Windows\system32\Cpeofk32.exe71⤵PID:1164
-
C:\Windows\SysWOW64\Cgpgce32.exeC:\Windows\system32\Cgpgce32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:108 -
C:\Windows\SysWOW64\Cnippoha.exeC:\Windows\system32\Cnippoha.exe73⤵PID:1916
-
C:\Windows\SysWOW64\Cphlljge.exeC:\Windows\system32\Cphlljge.exe74⤵PID:312
-
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe75⤵PID:2972
-
C:\Windows\SysWOW64\Cjpqdp32.exeC:\Windows\system32\Cjpqdp32.exe76⤵PID:2580
-
C:\Windows\SysWOW64\Chcqpmep.exeC:\Windows\system32\Chcqpmep.exe77⤵PID:2568
-
C:\Windows\SysWOW64\Cpjiajeb.exeC:\Windows\system32\Cpjiajeb.exe78⤵PID:2432
-
C:\Windows\SysWOW64\Cciemedf.exeC:\Windows\system32\Cciemedf.exe79⤵PID:2456
-
C:\Windows\SysWOW64\Cjbmjplb.exeC:\Windows\system32\Cjbmjplb.exe80⤵PID:2736
-
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe81⤵PID:2768
-
C:\Windows\SysWOW64\Cckace32.exeC:\Windows\system32\Cckace32.exe82⤵PID:2424
-
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1528 -
C:\Windows\SysWOW64\Clcflkic.exeC:\Windows\system32\Clcflkic.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1500 -
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe85⤵PID:1996
-
C:\Windows\SysWOW64\Dbpodagk.exeC:\Windows\system32\Dbpodagk.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:356 -
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe87⤵PID:2028
-
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe88⤵
- Modifies registry class
PID:2064 -
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2908 -
C:\Windows\SysWOW64\Dbbkja32.exeC:\Windows\system32\Dbbkja32.exe90⤵PID:3044
-
C:\Windows\SysWOW64\Ddagfm32.exeC:\Windows\system32\Ddagfm32.exe91⤵PID:1960
-
C:\Windows\SysWOW64\Dqhhknjp.exeC:\Windows\system32\Dqhhknjp.exe92⤵PID:2460
-
C:\Windows\SysWOW64\Dgaqgh32.exeC:\Windows\system32\Dgaqgh32.exe93⤵PID:2652
-
C:\Windows\SysWOW64\Dkmmhf32.exeC:\Windows\system32\Dkmmhf32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2720 -
C:\Windows\SysWOW64\Dnlidb32.exeC:\Windows\system32\Dnlidb32.exe95⤵
- Modifies registry class
PID:2504 -
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe96⤵PID:1656
-
C:\Windows\SysWOW64\Dgdmmgpj.exeC:\Windows\system32\Dgdmmgpj.exe97⤵PID:2952
-
C:\Windows\SysWOW64\Djbiicon.exeC:\Windows\system32\Djbiicon.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Dmafennb.exeC:\Windows\system32\Dmafennb.exe99⤵
- Modifies registry class
PID:324 -
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe100⤵PID:1812
-
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe101⤵PID:1792
-
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2416 -
C:\Windows\SysWOW64\Emcbkn32.exeC:\Windows\system32\Emcbkn32.exe103⤵PID:2988
-
C:\Windows\SysWOW64\Eqonkmdh.exeC:\Windows\system32\Eqonkmdh.exe104⤵PID:2900
-
C:\Windows\SysWOW64\Eflgccbp.exeC:\Windows\system32\Eflgccbp.exe105⤵PID:3028
-
C:\Windows\SysWOW64\Ejgcdb32.exeC:\Windows\system32\Ejgcdb32.exe106⤵PID:2216
-
C:\Windows\SysWOW64\Ekholjqg.exeC:\Windows\system32\Ekholjqg.exe107⤵PID:2444
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe108⤵PID:2700
-
C:\Windows\SysWOW64\Eeqdep32.exeC:\Windows\system32\Eeqdep32.exe109⤵PID:2440
-
C:\Windows\SysWOW64\Efppoc32.exeC:\Windows\system32\Efppoc32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2620 -
C:\Windows\SysWOW64\Eiomkn32.exeC:\Windows\system32\Eiomkn32.exe111⤵PID:1408
-
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe112⤵PID:2140
-
C:\Windows\SysWOW64\Eajaoq32.exeC:\Windows\system32\Eajaoq32.exe113⤵PID:2420
-
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe114⤵PID:588
-
C:\Windows\SysWOW64\Ejbfhfaj.exeC:\Windows\system32\Ejbfhfaj.exe115⤵PID:2344
-
C:\Windows\SysWOW64\Ebinic32.exeC:\Windows\system32\Ebinic32.exe116⤵
- Modifies registry class
PID:984 -
C:\Windows\SysWOW64\Fehjeo32.exeC:\Windows\system32\Fehjeo32.exe117⤵PID:1684
-
C:\Windows\SysWOW64\Fhffaj32.exeC:\Windows\system32\Fhffaj32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2656 -
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe119⤵PID:3048
-
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe120⤵
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe121⤵PID:2940
-
C:\Windows\SysWOW64\Faagpp32.exeC:\Windows\system32\Faagpp32.exe122⤵PID:2872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-