Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 14:42
Behavioral task
behavioral1
Sample
0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe
-
Size
448KB
-
MD5
0a11edde4861eedf8cecf120c2e2d100
-
SHA1
85c7ccb3b116d9a7ff128c6c6b8d7a96105d4ff2
-
SHA256
48ee7829afd33637ab1f9ee488d8b3e3d5d684609104096f821ee44b406f58ed
-
SHA512
940ff3efe29a82bdeadd87d4c0ad6655719c73f9d93f2f875881a71a5b2bf731c2c77534392c6fb4853b98001f8dbb16fea89670e2a4c395706814a72c4b2060
-
SSDEEP
12288:oi8T58EDpV6yYPMLnfBJKFbhDwBpV6yYP6Utri+Woh3YRVDDf1LcXD3v+2JFrfzj:oiiBWMLnfBJKhVwBW6Utri+WoxYRVDrs
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Gnkoid32.exeBhonjg32.exeJecnnk32.exeFibcoalf.exeBjedmo32.exeGhbljk32.exeIifghk32.exeAbjeejep.exeEbcmfj32.exeLbmnea32.exeGnaooi32.exeAcohnhab.exeNgbpehpj.exeJbcgeilh.exeIkldqile.exeJbhcim32.exeNhgnaehm.exeLcadghnk.exeKndbko32.exeLmnhgjmp.exeFcbecl32.exeCodbqonk.exeKhagijcd.exeEifobe32.exeDgildi32.exeCbblda32.exeFhgppnan.exeJohoic32.exeNohddd32.exeDlhaaogd.exeOdgamdef.exeNbfnggeo.exeIcdhnn32.exeLopfhk32.exeOqkpmaif.exeIebldo32.exeLfhhjklc.exeIndnnfdn.exeMjpkqonj.exeOaigib32.exeLggbmbfc.exeCglalbbi.exeIijfoh32.exeCbffoabe.exePhledp32.exeJnlepioj.exeDphmloih.exeIgkhjdde.exeBpbmqe32.exeIipejmko.exeKnmdeioh.exeLiipnb32.exeOqjibkek.exeEanldqgf.exeHmmdin32.exeHcjldp32.exeAgpeaa32.exeNcpdbohb.exeEeojcmfi.exeGdmbhnjj.exeLfkeokjp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gnkoid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhonjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jecnnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fibcoalf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bhonjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjedmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ghbljk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iifghk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abjeejep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebcmfj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbmnea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnaooi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acohnhab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ngbpehpj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbcgeilh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikldqile.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhcim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhgnaehm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcadghnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kndbko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmnhgjmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lmnhgjmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcbecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bjedmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Codbqonk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Khagijcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eifobe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgildi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbblda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhgppnan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Johoic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nohddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dlhaaogd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Odgamdef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbfnggeo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icdhnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lopfhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oqkpmaif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iebldo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfhhjklc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Indnnfdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjpkqonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oaigib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lggbmbfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cglalbbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iijfoh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbffoabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Phledp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnlepioj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dphmloih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Igkhjdde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpbmqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iipejmko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knmdeioh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liipnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oqjibkek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eanldqgf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmmdin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hcjldp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Agpeaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncpdbohb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeojcmfi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdmbhnjj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfkeokjp.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Gcahoqhf.exe family_berbew \Windows\SysWOW64\Hjdfjo32.exe family_berbew \Windows\SysWOW64\Hmglajcd.exe family_berbew \Windows\SysWOW64\Idfnicfl.exe family_berbew C:\Windows\SysWOW64\Ilabmedg.exe family_berbew \Windows\SysWOW64\Jhjphfgi.exe family_berbew \Windows\SysWOW64\Jgaiobjn.exe family_berbew C:\Windows\SysWOW64\Jjdofm32.exe family_berbew \Windows\SysWOW64\Kghpoa32.exe family_berbew \Windows\SysWOW64\Kjleflod.exe family_berbew C:\Windows\SysWOW64\Kbigpn32.exe family_berbew \Windows\SysWOW64\Ljieppcb.exe family_berbew \Windows\SysWOW64\Lgmeid32.exe family_berbew C:\Windows\SysWOW64\Mjpkqonj.exe family_berbew \Windows\SysWOW64\Mfihkoal.exe family_berbew \Windows\SysWOW64\Mjkndb32.exe family_berbew C:\Windows\SysWOW64\Nhakcfab.exe family_berbew C:\Windows\SysWOW64\Nfidjbdg.exe family_berbew C:\Windows\SysWOW64\Olkfmi32.exe family_berbew C:\Windows\SysWOW64\Opaebkmc.exe family_berbew C:\Windows\SysWOW64\Oijjka32.exe family_berbew C:\Windows\SysWOW64\Pljcllqe.exe family_berbew C:\Windows\SysWOW64\Pecgea32.exe family_berbew C:\Windows\SysWOW64\Ppkhhjei.exe family_berbew C:\Windows\SysWOW64\Pkdihhag.exe family_berbew C:\Windows\SysWOW64\Qododfek.exe family_berbew behavioral1/memory/2856-330-0x0000000000250000-0x0000000000285000-memory.dmp family_berbew C:\Windows\SysWOW64\Ajnpecbj.exe family_berbew C:\Windows\SysWOW64\Ajcipc32.exe family_berbew behavioral1/memory/2228-347-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Ackmih32.exe family_berbew C:\Windows\SysWOW64\Abpjjeim.exe family_berbew C:\Windows\SysWOW64\Bmhkmm32.exe family_berbew C:\Windows\SysWOW64\Bgdibkam.exe family_berbew C:\Windows\SysWOW64\Bbjmpcab.exe family_berbew C:\Windows\SysWOW64\Cpdgbm32.exe family_berbew C:\Windows\SysWOW64\Cillkbac.exe family_berbew C:\Windows\SysWOW64\Clmdmm32.exe family_berbew behavioral1/memory/1516-450-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Clpabm32.exe family_berbew C:\Windows\SysWOW64\Djgkii32.exe family_berbew C:\Windows\SysWOW64\Demofaol.exe family_berbew C:\Windows\SysWOW64\Ddblgn32.exe family_berbew C:\Windows\SysWOW64\Dphmloih.exe family_berbew C:\Windows\SysWOW64\Dpkibo32.exe family_berbew C:\Windows\SysWOW64\Dmojkc32.exe family_berbew C:\Windows\SysWOW64\Eggndi32.exe family_berbew C:\Windows\SysWOW64\Egikjh32.exe family_berbew C:\Windows\SysWOW64\Eihgfd32.exe family_berbew C:\Windows\SysWOW64\Eeohkeoe.exe family_berbew C:\Windows\SysWOW64\Eeaepd32.exe family_berbew C:\Windows\SysWOW64\Eoiiijcc.exe family_berbew C:\Windows\SysWOW64\Fkpjnkig.exe family_berbew C:\Windows\SysWOW64\Fpmbfbgo.exe family_berbew C:\Windows\SysWOW64\Fjegog32.exe family_berbew C:\Windows\SysWOW64\Fcnkhmdp.exe family_berbew C:\Windows\SysWOW64\Fncpef32.exe family_berbew C:\Windows\SysWOW64\Fcphnm32.exe family_berbew C:\Windows\SysWOW64\Fcbecl32.exe family_berbew C:\Windows\SysWOW64\Fjlmpfhg.exe family_berbew C:\Windows\SysWOW64\Fqfemqod.exe family_berbew C:\Windows\SysWOW64\Gmmfaa32.exe family_berbew C:\Windows\SysWOW64\Gnaooi32.exe family_berbew C:\Windows\SysWOW64\Hjofdi32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Gcahoqhf.exeHjdfjo32.exeHmglajcd.exeIdfnicfl.exeIlabmedg.exeJhjphfgi.exeJgaiobjn.exeJjdofm32.exeKghpoa32.exeKjleflod.exeKbigpn32.exeLjieppcb.exeLgmeid32.exeMjpkqonj.exeMfihkoal.exeMjkndb32.exeNhakcfab.exeNfidjbdg.exeOlkfmi32.exeOpaebkmc.exeOijjka32.exePljcllqe.exePecgea32.exePpkhhjei.exePkdihhag.exeQododfek.exeAjnpecbj.exeAjcipc32.exeAckmih32.exeAbpjjeim.exeBmhkmm32.exeBgdibkam.exeBbjmpcab.exeCpdgbm32.exeCillkbac.exeClmdmm32.exeClpabm32.exeDjgkii32.exeDemofaol.exeDdblgn32.exeDphmloih.exeDpkibo32.exeDmojkc32.exeEggndi32.exeEgikjh32.exeEihgfd32.exeEeohkeoe.exeEeaepd32.exeEoiiijcc.exeFkpjnkig.exeFpmbfbgo.exeFjegog32.exeFcnkhmdp.exeFncpef32.exeFcphnm32.exeFcbecl32.exeFjlmpfhg.exeFqfemqod.exeGmmfaa32.exeGnaooi32.exeHjofdi32.exeHidcef32.exeHblgnkdh.exeHlgimqhf.exepid process 2480 Gcahoqhf.exe 2544 Hjdfjo32.exe 2540 Hmglajcd.exe 2688 Idfnicfl.exe 2508 Ilabmedg.exe 2516 Jhjphfgi.exe 1164 Jgaiobjn.exe 880 Jjdofm32.exe 1956 Kghpoa32.exe 2656 Kjleflod.exe 2308 Kbigpn32.exe 2212 Ljieppcb.exe 1336 Lgmeid32.exe 1652 Mjpkqonj.exe 2964 Mfihkoal.exe 512 Mjkndb32.exe 1704 Nhakcfab.exe 432 Nfidjbdg.exe 1588 Olkfmi32.exe 1552 Opaebkmc.exe 828 Oijjka32.exe 792 Pljcllqe.exe 2300 Pecgea32.exe 1708 Ppkhhjei.exe 2856 Pkdihhag.exe 2160 Qododfek.exe 2228 Ajnpecbj.exe 1604 Ajcipc32.exe 2980 Ackmih32.exe 2620 Abpjjeim.exe 1740 Bmhkmm32.exe 2568 Bgdibkam.exe 1748 Bbjmpcab.exe 2808 Cpdgbm32.exe 2392 Cillkbac.exe 1516 Clmdmm32.exe 1852 Clpabm32.exe 1820 Djgkii32.exe 1868 Demofaol.exe 852 Ddblgn32.exe 1952 Dphmloih.exe 1824 Dpkibo32.exe 2120 Dmojkc32.exe 3008 Eggndi32.exe 600 Egikjh32.exe 424 Eihgfd32.exe 2272 Eeohkeoe.exe 1804 Eeaepd32.exe 1504 Eoiiijcc.exe 908 Fkpjnkig.exe 948 Fpmbfbgo.exe 684 Fjegog32.exe 888 Fcnkhmdp.exe 1936 Fncpef32.exe 2632 Fcphnm32.exe 2732 Fcbecl32.exe 2708 Fjlmpfhg.exe 2564 Fqfemqod.exe 1744 Gmmfaa32.exe 2368 Gnaooi32.exe 2156 Hjofdi32.exe 2652 Hidcef32.exe 1480 Hblgnkdh.exe 1792 Hlgimqhf.exe -
Loads dropped DLL 64 IoCs
Processes:
0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exeGcahoqhf.exeHjdfjo32.exeHmglajcd.exeIdfnicfl.exeIlabmedg.exeJhjphfgi.exeJgaiobjn.exeJjdofm32.exeKghpoa32.exeKjleflod.exeKbigpn32.exeLjieppcb.exeLgmeid32.exeMjpkqonj.exeMfihkoal.exeMjkndb32.exeNhakcfab.exeNfidjbdg.exeOlkfmi32.exeOpaebkmc.exeOijjka32.exePljcllqe.exePecgea32.exePpkhhjei.exePkdihhag.exeQododfek.exeAjnpecbj.exeAjcipc32.exeAckmih32.exeAbpjjeim.exeBmhkmm32.exepid process 2244 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe 2244 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe 2480 Gcahoqhf.exe 2480 Gcahoqhf.exe 2544 Hjdfjo32.exe 2544 Hjdfjo32.exe 2540 Hmglajcd.exe 2540 Hmglajcd.exe 2688 Idfnicfl.exe 2688 Idfnicfl.exe 2508 Ilabmedg.exe 2508 Ilabmedg.exe 2516 Jhjphfgi.exe 2516 Jhjphfgi.exe 1164 Jgaiobjn.exe 1164 Jgaiobjn.exe 880 Jjdofm32.exe 880 Jjdofm32.exe 1956 Kghpoa32.exe 1956 Kghpoa32.exe 2656 Kjleflod.exe 2656 Kjleflod.exe 2308 Kbigpn32.exe 2308 Kbigpn32.exe 2212 Ljieppcb.exe 2212 Ljieppcb.exe 1336 Lgmeid32.exe 1336 Lgmeid32.exe 1652 Mjpkqonj.exe 1652 Mjpkqonj.exe 2964 Mfihkoal.exe 2964 Mfihkoal.exe 512 Mjkndb32.exe 512 Mjkndb32.exe 1704 Nhakcfab.exe 1704 Nhakcfab.exe 432 Nfidjbdg.exe 432 Nfidjbdg.exe 1588 Olkfmi32.exe 1588 Olkfmi32.exe 1552 Opaebkmc.exe 1552 Opaebkmc.exe 828 Oijjka32.exe 828 Oijjka32.exe 792 Pljcllqe.exe 792 Pljcllqe.exe 2300 Pecgea32.exe 2300 Pecgea32.exe 1708 Ppkhhjei.exe 1708 Ppkhhjei.exe 2856 Pkdihhag.exe 2856 Pkdihhag.exe 2160 Qododfek.exe 2160 Qododfek.exe 2228 Ajnpecbj.exe 2228 Ajnpecbj.exe 1604 Ajcipc32.exe 1604 Ajcipc32.exe 2980 Ackmih32.exe 2980 Ackmih32.exe 2620 Abpjjeim.exe 2620 Abpjjeim.exe 1740 Bmhkmm32.exe 1740 Bmhkmm32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Hjlemlnk.exe0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exePhledp32.exeInepgn32.exeGaeqmk32.exeQldjdlgb.exeGoocenaa.exeMmccqbpm.exeDcbnpgkh.exeJelhmlgm.exeGghmmilh.exeLopfhk32.exeKkilgb32.exePgfjhcge.exeIegeonpc.exeIamfdo32.exeDklepmal.exeHfebhmbm.exeGnlpeh32.exeFkcilc32.exeJjdofm32.exeOfafgipc.exeCkfjjqhd.exeOhmoco32.exePcpbik32.exeGdihmo32.exeJgbmco32.exeHlgimqhf.exeHfepod32.exeFcqjfeja.exeIkagogco.exeHcjldp32.exeNinhamne.exeAoojnc32.exeJpepkk32.exeMcaafk32.exeJkfpjf32.exeJcoanb32.exeFpmbfbgo.exeBqijljfd.exeAobpfb32.exeGglbfg32.exeGlckihcg.exeAbpjjeim.exeAchjibcl.exeColpld32.exeJinfli32.exeAdleoc32.exeBedamd32.exeDkgldm32.exePeeoidik.exeOkhgod32.exeCiglaa32.exeIpdolbbj.exeInlkik32.exeNfdddm32.exeFpkchm32.exePfebnmcj.exeHogcil32.exeNkdndeon.exeBmpkqklh.exeBbikig32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Hagianlf.exe Hjlemlnk.exe File opened for modification C:\Windows\SysWOW64\Gcahoqhf.exe 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Igmaaacj.dll Phledp32.exe File opened for modification C:\Windows\SysWOW64\Ifpelq32.exe Inepgn32.exe File created C:\Windows\SysWOW64\Oepbmk32.dll Gaeqmk32.exe File created C:\Windows\SysWOW64\Pjcpccaf.dll Qldjdlgb.exe File created C:\Windows\SysWOW64\Glbdnbpk.exe Goocenaa.exe File opened for modification C:\Windows\SysWOW64\Mdogedmh.exe Mmccqbpm.exe File opened for modification C:\Windows\SysWOW64\Dmkcil32.exe Dcbnpgkh.exe File created C:\Windows\SysWOW64\Hnhjppcf.dll Jelhmlgm.exe File opened for modification C:\Windows\SysWOW64\Gconbj32.exe Gghmmilh.exe File created C:\Windows\SysWOW64\Lpcoeb32.exe Lopfhk32.exe File created C:\Windows\SysWOW64\Iaalhl32.dll Kkilgb32.exe File created C:\Windows\SysWOW64\Pghfnc32.exe Pgfjhcge.exe File created C:\Windows\SysWOW64\Ijcngenj.exe Iegeonpc.exe File opened for modification C:\Windows\SysWOW64\Jjfkmdlg.exe Iamfdo32.exe File created C:\Windows\SysWOW64\Hmdkip32.dll Dklepmal.exe File created C:\Windows\SysWOW64\Hqochjnk.exe Hfebhmbm.exe File created C:\Windows\SysWOW64\Gcahoqhf.exe 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Goplnb32.dll Gnlpeh32.exe File created C:\Windows\SysWOW64\Njfaognh.dll Fkcilc32.exe File created C:\Windows\SysWOW64\Gfmfjhcj.dll Jjdofm32.exe File created C:\Windows\SysWOW64\Agmdmp32.dll Ofafgipc.exe File created C:\Windows\SysWOW64\Codbqonk.exe Ckfjjqhd.exe File created C:\Windows\SysWOW64\Ofaolcmh.exe Ohmoco32.exe File created C:\Windows\SysWOW64\Pmpigl32.dll Pcpbik32.exe File created C:\Windows\SysWOW64\Gjemoi32.exe Gdihmo32.exe File created C:\Windows\SysWOW64\Jnlepioj.exe Jgbmco32.exe File opened for modification C:\Windows\SysWOW64\Ihniaa32.exe Hlgimqhf.exe File created C:\Windows\SysWOW64\Gblakg32.dll Hfepod32.exe File created C:\Windows\SysWOW64\Edpijbip.dll Fcqjfeja.exe File created C:\Windows\SysWOW64\Bgppdkib.dll Ikagogco.exe File opened for modification C:\Windows\SysWOW64\Hnppaill.exe Hcjldp32.exe File created C:\Windows\SysWOW64\Cbjcpc32.dll Ninhamne.exe File created C:\Windows\SysWOW64\Agjobffl.exe Aoojnc32.exe File created C:\Windows\SysWOW64\Mebgijei.dll Jpepkk32.exe File created C:\Windows\SysWOW64\Nbfnggeo.exe Mcaafk32.exe File created C:\Windows\SysWOW64\Jeaahk32.exe Jkfpjf32.exe File opened for modification C:\Windows\SysWOW64\Jmgfgham.exe Jcoanb32.exe File created C:\Windows\SysWOW64\Kgfkgo32.dll Fpmbfbgo.exe File opened for modification C:\Windows\SysWOW64\Bmpkqklh.exe Bqijljfd.exe File created C:\Windows\SysWOW64\Boddiidc.dll Aobpfb32.exe File created C:\Windows\SysWOW64\Gockgdeh.exe Gglbfg32.exe File created C:\Windows\SysWOW64\Ccboal32.dll Glckihcg.exe File created C:\Windows\SysWOW64\Bmhkmm32.exe Abpjjeim.exe File opened for modification C:\Windows\SysWOW64\Aoojnc32.exe Achjibcl.exe File created C:\Windows\SysWOW64\Dblhmoio.exe Colpld32.exe File created C:\Windows\SysWOW64\Johoic32.exe Jinfli32.exe File opened for modification C:\Windows\SysWOW64\Aoaill32.exe Adleoc32.exe File opened for modification C:\Windows\SysWOW64\Cnabffeo.exe Bedamd32.exe File created C:\Windows\SysWOW64\Djmiejji.exe Dkgldm32.exe File created C:\Windows\SysWOW64\Mhnofb32.dll Peeoidik.exe File opened for modification C:\Windows\SysWOW64\Ogohdeam.exe Okhgod32.exe File opened for modification C:\Windows\SysWOW64\Codeih32.exe Ciglaa32.exe File opened for modification C:\Windows\SysWOW64\Icdhnn32.exe Ipdolbbj.exe File created C:\Windows\SysWOW64\Iamdkfnc.exe Inlkik32.exe File created C:\Windows\SysWOW64\Pjdjea32.dll Nfdddm32.exe File created C:\Windows\SysWOW64\Fcilnl32.exe Fpkchm32.exe File created C:\Windows\SysWOW64\Phfoee32.exe Pfebnmcj.exe File created C:\Windows\SysWOW64\Hahljg32.exe Hogcil32.exe File created C:\Windows\SysWOW64\Okhgod32.exe Nkdndeon.exe File opened for modification C:\Windows\SysWOW64\Bmbgfkje.exe Bmpkqklh.exe File opened for modification C:\Windows\SysWOW64\Pjjkfe32.exe Pcpbik32.exe File opened for modification C:\Windows\SysWOW64\Cggcofkf.exe Bbikig32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2396 3080 WerFault.exe Opblgehg.exe -
Modifies registry class 64 IoCs
Processes:
Hblgnkdh.exeIamdkfnc.exeAchjibcl.exeEdlafebn.exeLmnhgjmp.exeAnkedf32.exeObokcqhk.exeHfhfhbce.exeInepgn32.exeKhagijcd.exeKqmnadlk.exe0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exeIdfnicfl.exeEbockkal.exePmmqmpdm.exeOefjdgjk.exeIamfdo32.exeNkehql32.exeAdleoc32.exeEhfhgogp.exeJgaiobjn.exeEoiiijcc.exePljnkodm.exeFakglf32.exeKmklak32.exeLmpeljkm.exeCagjqbam.exeNkqjdo32.exeGmmfaa32.exeNbmdhfog.exeGjemoi32.exeHbofmcij.exeGmkjgfmf.exeAoojnc32.exeFgocmc32.exeCofaog32.exeMfceom32.exeIimfld32.exeLoefnpnn.exeKpojkp32.exeBhpqcpkm.exePecgea32.exeMokilo32.exeJpepkk32.exeHjlemlnk.exeOhiffh32.exeAdiaommc.exeJlphbbbg.exePhnpagdp.exeIipejmko.exeObcffefa.exeAlbjnplq.exeDnefhpma.exeKckhdg32.exeLenffl32.exeKdklfe32.exeGaeqmk32.exePjjkfe32.exeDfkhndca.exeHdecea32.exeEbcmfj32.exePljcllqe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hblgnkdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlfbgb32.dll" Iamdkfnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Achjibcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Edlafebn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqjmmm32.dll" Lmnhgjmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ankedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkpidd32.dll" Obokcqhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekdjjm32.dll" Hfhfhbce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Inepgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Khagijcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kqmnadlk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Idfnicfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlaaie32.dll" Ebockkal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bknida32.dll" Pmmqmpdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qkddnqcm.dll" Oefjdgjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibnhnc32.dll" Iamfdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nkehql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Malopkam.dll" Adleoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ehfhgogp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpdqdddf.dll" Jgaiobjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebaijflc.dll" Eoiiijcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdmgldgl.dll" Pljnkodm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckmagikg.dll" Fakglf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kmklak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lmpeljkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cagjqbam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nkqjdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gmmfaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nbmdhfog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gjemoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbofmcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gmkjgfmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aoojnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fgocmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iafehn32.dll" Cofaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahlfoh32.dll" Mfceom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gphfihaj.dll" Iimfld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Loefnpnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kpojkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bhpqcpkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipnlibhd.dll" Pecgea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mokilo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jpepkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hjlemlnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ohiffh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncgfge32.dll" Khagijcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpbffcca.dll" Adiaommc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jlphbbbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Phnpagdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iipejmko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bldainid.dll" Obcffefa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Albjnplq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjfkgcdc.dll" Dnefhpma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kckhdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djdbeobe.dll" Lenffl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Doempm32.dll" Kdklfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gaeqmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agflga32.dll" Pjjkfe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfkhndca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fejcohho.dll" Hdecea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Adiaommc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ebcmfj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pljcllqe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exeGcahoqhf.exeHjdfjo32.exeHmglajcd.exeIdfnicfl.exeIlabmedg.exeJhjphfgi.exeJgaiobjn.exeJjdofm32.exeKghpoa32.exeKjleflod.exeKbigpn32.exeLjieppcb.exeLgmeid32.exeMjpkqonj.exeMfihkoal.exedescription pid process target process PID 2244 wrote to memory of 2480 2244 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe Gcahoqhf.exe PID 2244 wrote to memory of 2480 2244 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe Gcahoqhf.exe PID 2244 wrote to memory of 2480 2244 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe Gcahoqhf.exe PID 2244 wrote to memory of 2480 2244 0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe Gcahoqhf.exe PID 2480 wrote to memory of 2544 2480 Gcahoqhf.exe Hjdfjo32.exe PID 2480 wrote to memory of 2544 2480 Gcahoqhf.exe Hjdfjo32.exe PID 2480 wrote to memory of 2544 2480 Gcahoqhf.exe Hjdfjo32.exe PID 2480 wrote to memory of 2544 2480 Gcahoqhf.exe Hjdfjo32.exe PID 2544 wrote to memory of 2540 2544 Hjdfjo32.exe Hmglajcd.exe PID 2544 wrote to memory of 2540 2544 Hjdfjo32.exe Hmglajcd.exe PID 2544 wrote to memory of 2540 2544 Hjdfjo32.exe Hmglajcd.exe PID 2544 wrote to memory of 2540 2544 Hjdfjo32.exe Hmglajcd.exe PID 2540 wrote to memory of 2688 2540 Hmglajcd.exe Idfnicfl.exe PID 2540 wrote to memory of 2688 2540 Hmglajcd.exe Idfnicfl.exe PID 2540 wrote to memory of 2688 2540 Hmglajcd.exe Idfnicfl.exe PID 2540 wrote to memory of 2688 2540 Hmglajcd.exe Idfnicfl.exe PID 2688 wrote to memory of 2508 2688 Idfnicfl.exe Ilabmedg.exe PID 2688 wrote to memory of 2508 2688 Idfnicfl.exe Ilabmedg.exe PID 2688 wrote to memory of 2508 2688 Idfnicfl.exe Ilabmedg.exe PID 2688 wrote to memory of 2508 2688 Idfnicfl.exe Ilabmedg.exe PID 2508 wrote to memory of 2516 2508 Ilabmedg.exe Jhjphfgi.exe PID 2508 wrote to memory of 2516 2508 Ilabmedg.exe Jhjphfgi.exe PID 2508 wrote to memory of 2516 2508 Ilabmedg.exe Jhjphfgi.exe PID 2508 wrote to memory of 2516 2508 Ilabmedg.exe Jhjphfgi.exe PID 2516 wrote to memory of 1164 2516 Jhjphfgi.exe Jgaiobjn.exe PID 2516 wrote to memory of 1164 2516 Jhjphfgi.exe Jgaiobjn.exe PID 2516 wrote to memory of 1164 2516 Jhjphfgi.exe Jgaiobjn.exe PID 2516 wrote to memory of 1164 2516 Jhjphfgi.exe Jgaiobjn.exe PID 1164 wrote to memory of 880 1164 Jgaiobjn.exe Jjdofm32.exe PID 1164 wrote to memory of 880 1164 Jgaiobjn.exe Jjdofm32.exe PID 1164 wrote to memory of 880 1164 Jgaiobjn.exe Jjdofm32.exe PID 1164 wrote to memory of 880 1164 Jgaiobjn.exe Jjdofm32.exe PID 880 wrote to memory of 1956 880 Jjdofm32.exe Kghpoa32.exe PID 880 wrote to memory of 1956 880 Jjdofm32.exe Kghpoa32.exe PID 880 wrote to memory of 1956 880 Jjdofm32.exe Kghpoa32.exe PID 880 wrote to memory of 1956 880 Jjdofm32.exe Kghpoa32.exe PID 1956 wrote to memory of 2656 1956 Kghpoa32.exe Kjleflod.exe PID 1956 wrote to memory of 2656 1956 Kghpoa32.exe Kjleflod.exe PID 1956 wrote to memory of 2656 1956 Kghpoa32.exe Kjleflod.exe PID 1956 wrote to memory of 2656 1956 Kghpoa32.exe Kjleflod.exe PID 2656 wrote to memory of 2308 2656 Kjleflod.exe Kbigpn32.exe PID 2656 wrote to memory of 2308 2656 Kjleflod.exe Kbigpn32.exe PID 2656 wrote to memory of 2308 2656 Kjleflod.exe Kbigpn32.exe PID 2656 wrote to memory of 2308 2656 Kjleflod.exe Kbigpn32.exe PID 2308 wrote to memory of 2212 2308 Kbigpn32.exe Ljieppcb.exe PID 2308 wrote to memory of 2212 2308 Kbigpn32.exe Ljieppcb.exe PID 2308 wrote to memory of 2212 2308 Kbigpn32.exe Ljieppcb.exe PID 2308 wrote to memory of 2212 2308 Kbigpn32.exe Ljieppcb.exe PID 2212 wrote to memory of 1336 2212 Ljieppcb.exe Lgmeid32.exe PID 2212 wrote to memory of 1336 2212 Ljieppcb.exe Lgmeid32.exe PID 2212 wrote to memory of 1336 2212 Ljieppcb.exe Lgmeid32.exe PID 2212 wrote to memory of 1336 2212 Ljieppcb.exe Lgmeid32.exe PID 1336 wrote to memory of 1652 1336 Lgmeid32.exe Mjpkqonj.exe PID 1336 wrote to memory of 1652 1336 Lgmeid32.exe Mjpkqonj.exe PID 1336 wrote to memory of 1652 1336 Lgmeid32.exe Mjpkqonj.exe PID 1336 wrote to memory of 1652 1336 Lgmeid32.exe Mjpkqonj.exe PID 1652 wrote to memory of 2964 1652 Mjpkqonj.exe Mfihkoal.exe PID 1652 wrote to memory of 2964 1652 Mjpkqonj.exe Mfihkoal.exe PID 1652 wrote to memory of 2964 1652 Mjpkqonj.exe Mfihkoal.exe PID 1652 wrote to memory of 2964 1652 Mjpkqonj.exe Mfihkoal.exe PID 2964 wrote to memory of 512 2964 Mfihkoal.exe Mjkndb32.exe PID 2964 wrote to memory of 512 2964 Mfihkoal.exe Mjkndb32.exe PID 2964 wrote to memory of 512 2964 Mfihkoal.exe Mjkndb32.exe PID 2964 wrote to memory of 512 2964 Mfihkoal.exe Mjkndb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a11edde4861eedf8cecf120c2e2d100_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Gcahoqhf.exeC:\Windows\system32\Gcahoqhf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hjdfjo32.exeC:\Windows\system32\Hjdfjo32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Hmglajcd.exeC:\Windows\system32\Hmglajcd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Idfnicfl.exeC:\Windows\system32\Idfnicfl.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ilabmedg.exeC:\Windows\system32\Ilabmedg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jhjphfgi.exeC:\Windows\system32\Jhjphfgi.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jgaiobjn.exeC:\Windows\system32\Jgaiobjn.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jjdofm32.exeC:\Windows\system32\Jjdofm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kghpoa32.exeC:\Windows\system32\Kghpoa32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kjleflod.exeC:\Windows\system32\Kjleflod.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kbigpn32.exeC:\Windows\system32\Kbigpn32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ljieppcb.exeC:\Windows\system32\Ljieppcb.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lgmeid32.exeC:\Windows\system32\Lgmeid32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mjpkqonj.exeC:\Windows\system32\Mjpkqonj.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mfihkoal.exeC:\Windows\system32\Mfihkoal.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mjkndb32.exeC:\Windows\system32\Mjkndb32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nhakcfab.exeC:\Windows\system32\Nhakcfab.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Nfidjbdg.exeC:\Windows\system32\Nfidjbdg.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Olkfmi32.exeC:\Windows\system32\Olkfmi32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Opaebkmc.exeC:\Windows\system32\Opaebkmc.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Oijjka32.exeC:\Windows\system32\Oijjka32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Pljcllqe.exeC:\Windows\system32\Pljcllqe.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Pecgea32.exeC:\Windows\system32\Pecgea32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Ppkhhjei.exeC:\Windows\system32\Ppkhhjei.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Pkdihhag.exeC:\Windows\system32\Pkdihhag.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Qododfek.exeC:\Windows\system32\Qododfek.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ajnpecbj.exeC:\Windows\system32\Ajnpecbj.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ajcipc32.exeC:\Windows\system32\Ajcipc32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ackmih32.exeC:\Windows\system32\Ackmih32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Abpjjeim.exeC:\Windows\system32\Abpjjeim.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bmhkmm32.exeC:\Windows\system32\Bmhkmm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Bgdibkam.exeC:\Windows\system32\Bgdibkam.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bbjmpcab.exeC:\Windows\system32\Bbjmpcab.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cpdgbm32.exeC:\Windows\system32\Cpdgbm32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cillkbac.exeC:\Windows\system32\Cillkbac.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Clmdmm32.exeC:\Windows\system32\Clmdmm32.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Clpabm32.exeC:\Windows\system32\Clpabm32.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Djgkii32.exeC:\Windows\system32\Djgkii32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Demofaol.exeC:\Windows\system32\Demofaol.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ddblgn32.exeC:\Windows\system32\Ddblgn32.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dphmloih.exeC:\Windows\system32\Dphmloih.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dpkibo32.exeC:\Windows\system32\Dpkibo32.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Dmojkc32.exeC:\Windows\system32\Dmojkc32.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eggndi32.exeC:\Windows\system32\Eggndi32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Egikjh32.exeC:\Windows\system32\Egikjh32.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eihgfd32.exeC:\Windows\system32\Eihgfd32.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eeohkeoe.exeC:\Windows\system32\Eeohkeoe.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eeaepd32.exeC:\Windows\system32\Eeaepd32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Eoiiijcc.exeC:\Windows\system32\Eoiiijcc.exe50⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Fkpjnkig.exeC:\Windows\system32\Fkpjnkig.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fpmbfbgo.exeC:\Windows\system32\Fpmbfbgo.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fjegog32.exeC:\Windows\system32\Fjegog32.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fcnkhmdp.exeC:\Windows\system32\Fcnkhmdp.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fncpef32.exeC:\Windows\system32\Fncpef32.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fcphnm32.exeC:\Windows\system32\Fcphnm32.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fcbecl32.exeC:\Windows\system32\Fcbecl32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fjlmpfhg.exeC:\Windows\system32\Fjlmpfhg.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fqfemqod.exeC:\Windows\system32\Fqfemqod.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gmmfaa32.exeC:\Windows\system32\Gmmfaa32.exe60⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Gnaooi32.exeC:\Windows\system32\Gnaooi32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hjofdi32.exeC:\Windows\system32\Hjofdi32.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hidcef32.exeC:\Windows\system32\Hidcef32.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hblgnkdh.exeC:\Windows\system32\Hblgnkdh.exe64⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hlgimqhf.exeC:\Windows\system32\Hlgimqhf.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ihniaa32.exeC:\Windows\system32\Ihniaa32.exe66⤵
-
C:\Windows\SysWOW64\Inhanl32.exeC:\Windows\system32\Inhanl32.exe67⤵
-
C:\Windows\SysWOW64\Iimfld32.exeC:\Windows\system32\Iimfld32.exe68⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ibejdjln.exeC:\Windows\system32\Ibejdjln.exe69⤵
-
C:\Windows\SysWOW64\Inlkik32.exeC:\Windows\system32\Inlkik32.exe70⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iamdkfnc.exeC:\Windows\system32\Iamdkfnc.exe71⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ihglhp32.exeC:\Windows\system32\Ihglhp32.exe72⤵
-
C:\Windows\SysWOW64\Jaoqqflp.exeC:\Windows\system32\Jaoqqflp.exe73⤵
-
C:\Windows\SysWOW64\Jikeeh32.exeC:\Windows\system32\Jikeeh32.exe74⤵
-
C:\Windows\SysWOW64\Jbcjnnpl.exeC:\Windows\system32\Jbcjnnpl.exe75⤵
-
C:\Windows\SysWOW64\Jlkngc32.exeC:\Windows\system32\Jlkngc32.exe76⤵
-
C:\Windows\SysWOW64\Jioopgef.exeC:\Windows\system32\Jioopgef.exe77⤵
-
C:\Windows\SysWOW64\Jbhcim32.exeC:\Windows\system32\Jbhcim32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jlphbbbg.exeC:\Windows\system32\Jlphbbbg.exe79⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kdklfe32.exeC:\Windows\system32\Kdklfe32.exe80⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Koaqcn32.exeC:\Windows\system32\Koaqcn32.exe81⤵
-
C:\Windows\SysWOW64\Kglehp32.exeC:\Windows\system32\Kglehp32.exe82⤵
-
C:\Windows\SysWOW64\Kaajei32.exeC:\Windows\system32\Kaajei32.exe83⤵
-
C:\Windows\SysWOW64\Knhjjj32.exeC:\Windows\system32\Knhjjj32.exe84⤵
-
C:\Windows\SysWOW64\Kddomchg.exeC:\Windows\system32\Kddomchg.exe85⤵
-
C:\Windows\SysWOW64\Knmdeioh.exeC:\Windows\system32\Knmdeioh.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lfhhjklc.exeC:\Windows\system32\Lfhhjklc.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lfkeokjp.exeC:\Windows\system32\Lfkeokjp.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Locjhqpa.exeC:\Windows\system32\Locjhqpa.exe89⤵
-
C:\Windows\SysWOW64\Loefnpnn.exeC:\Windows\system32\Loefnpnn.exe90⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lohccp32.exeC:\Windows\system32\Lohccp32.exe91⤵
-
C:\Windows\SysWOW64\Mbhlek32.exeC:\Windows\system32\Mbhlek32.exe92⤵
-
C:\Windows\SysWOW64\Mcjhmcok.exeC:\Windows\system32\Mcjhmcok.exe93⤵
-
C:\Windows\SysWOW64\Mjfnomde.exeC:\Windows\system32\Mjfnomde.exe94⤵
-
C:\Windows\SysWOW64\Mgjnhaco.exeC:\Windows\system32\Mgjnhaco.exe95⤵
-
C:\Windows\SysWOW64\Mpebmc32.exeC:\Windows\system32\Mpebmc32.exe96⤵
-
C:\Windows\SysWOW64\Mpgobc32.exeC:\Windows\system32\Mpgobc32.exe97⤵
-
C:\Windows\SysWOW64\Nedhjj32.exeC:\Windows\system32\Nedhjj32.exe98⤵
-
C:\Windows\SysWOW64\Nfdddm32.exeC:\Windows\system32\Nfdddm32.exe99⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nbjeinje.exeC:\Windows\system32\Nbjeinje.exe100⤵
-
C:\Windows\SysWOW64\Nhgnaehm.exeC:\Windows\system32\Nhgnaehm.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nlefhcnc.exeC:\Windows\system32\Nlefhcnc.exe102⤵
-
C:\Windows\SysWOW64\Onfoin32.exeC:\Windows\system32\Onfoin32.exe103⤵
-
C:\Windows\SysWOW64\Ofadnq32.exeC:\Windows\system32\Ofadnq32.exe104⤵
-
C:\Windows\SysWOW64\Obhdcanc.exeC:\Windows\system32\Obhdcanc.exe105⤵
-
C:\Windows\SysWOW64\Odgamdef.exeC:\Windows\system32\Odgamdef.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Oidiekdn.exeC:\Windows\system32\Oidiekdn.exe107⤵
-
C:\Windows\SysWOW64\Ooabmbbe.exeC:\Windows\system32\Ooabmbbe.exe108⤵
-
C:\Windows\SysWOW64\Ohiffh32.exeC:\Windows\system32\Ohiffh32.exe109⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Obokcqhk.exeC:\Windows\system32\Obokcqhk.exe110⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Plgolf32.exeC:\Windows\system32\Plgolf32.exe111⤵
-
C:\Windows\SysWOW64\Phnpagdp.exeC:\Windows\system32\Phnpagdp.exe112⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pafdjmkq.exeC:\Windows\system32\Pafdjmkq.exe113⤵
-
C:\Windows\SysWOW64\Pmmeon32.exeC:\Windows\system32\Pmmeon32.exe114⤵
-
C:\Windows\SysWOW64\Pgfjhcge.exeC:\Windows\system32\Pgfjhcge.exe115⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pghfnc32.exeC:\Windows\system32\Pghfnc32.exe116⤵
-
C:\Windows\SysWOW64\Pleofj32.exeC:\Windows\system32\Pleofj32.exe117⤵
-
C:\Windows\SysWOW64\Achjibcl.exeC:\Windows\system32\Achjibcl.exe118⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Aoojnc32.exeC:\Windows\system32\Aoojnc32.exe119⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Agjobffl.exeC:\Windows\system32\Agjobffl.exe120⤵
-
C:\Windows\SysWOW64\Aqbdkk32.exeC:\Windows\system32\Aqbdkk32.exe121⤵
-
C:\Windows\SysWOW64\Bjkhdacm.exeC:\Windows\system32\Bjkhdacm.exe122⤵
-
C:\Windows\SysWOW64\Bjmeiq32.exeC:\Windows\system32\Bjmeiq32.exe123⤵
-
C:\Windows\SysWOW64\Bfdenafn.exeC:\Windows\system32\Bfdenafn.exe124⤵
-
C:\Windows\SysWOW64\Bqijljfd.exeC:\Windows\system32\Bqijljfd.exe125⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bmpkqklh.exeC:\Windows\system32\Bmpkqklh.exe126⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bmbgfkje.exeC:\Windows\system32\Bmbgfkje.exe127⤵
-
C:\Windows\SysWOW64\Cbppnbhm.exeC:\Windows\system32\Cbppnbhm.exe128⤵
-
C:\Windows\SysWOW64\Cbblda32.exeC:\Windows\system32\Cbblda32.exe129⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cbdiia32.exeC:\Windows\system32\Cbdiia32.exe130⤵
-
C:\Windows\SysWOW64\Ckmnbg32.exeC:\Windows\system32\Ckmnbg32.exe131⤵
-
C:\Windows\SysWOW64\Cbffoabe.exeC:\Windows\system32\Cbffoabe.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cnmfdb32.exeC:\Windows\system32\Cnmfdb32.exe133⤵
-
C:\Windows\SysWOW64\Ccjoli32.exeC:\Windows\system32\Ccjoli32.exe134⤵
-
C:\Windows\SysWOW64\Dfkhndca.exeC:\Windows\system32\Dfkhndca.exe135⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dpcmgi32.exeC:\Windows\system32\Dpcmgi32.exe136⤵
-
C:\Windows\SysWOW64\Dmgmpnhl.exeC:\Windows\system32\Dmgmpnhl.exe137⤵
-
C:\Windows\SysWOW64\Dbdehdfc.exeC:\Windows\system32\Dbdehdfc.exe138⤵
-
C:\Windows\SysWOW64\Deenjpcd.exeC:\Windows\system32\Deenjpcd.exe139⤵
-
C:\Windows\SysWOW64\Dpjbgh32.exeC:\Windows\system32\Dpjbgh32.exe140⤵
-
C:\Windows\SysWOW64\Eheglk32.exeC:\Windows\system32\Eheglk32.exe141⤵
-
C:\Windows\SysWOW64\Eanldqgf.exeC:\Windows\system32\Eanldqgf.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Emdmjamj.exeC:\Windows\system32\Emdmjamj.exe143⤵
-
C:\Windows\SysWOW64\Emgioakg.exeC:\Windows\system32\Emgioakg.exe144⤵
-
C:\Windows\SysWOW64\Ehlmljkm.exeC:\Windows\system32\Ehlmljkm.exe145⤵
-
C:\Windows\SysWOW64\Emifeqid.exeC:\Windows\system32\Emifeqid.exe146⤵
-
C:\Windows\SysWOW64\Ekmfne32.exeC:\Windows\system32\Ekmfne32.exe147⤵
-
C:\Windows\SysWOW64\Fpjofl32.exeC:\Windows\system32\Fpjofl32.exe148⤵
-
C:\Windows\SysWOW64\Fibcoalf.exeC:\Windows\system32\Fibcoalf.exe149⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fhgppnan.exeC:\Windows\system32\Fhgppnan.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Foahmh32.exeC:\Windows\system32\Foahmh32.exe151⤵
-
C:\Windows\SysWOW64\Fdqnkoep.exeC:\Windows\system32\Fdqnkoep.exe152⤵
-
C:\Windows\SysWOW64\Fofbhgde.exeC:\Windows\system32\Fofbhgde.exe153⤵
-
C:\Windows\SysWOW64\Gdcjpncm.exeC:\Windows\system32\Gdcjpncm.exe154⤵
-
C:\Windows\SysWOW64\Gnkoid32.exeC:\Windows\system32\Gnkoid32.exe155⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gaihob32.exeC:\Windows\system32\Gaihob32.exe156⤵
-
C:\Windows\SysWOW64\Gnphdceh.exeC:\Windows\system32\Gnphdceh.exe157⤵
-
C:\Windows\SysWOW64\Gghmmilh.exeC:\Windows\system32\Gghmmilh.exe158⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gconbj32.exeC:\Windows\system32\Gconbj32.exe159⤵
-
C:\Windows\SysWOW64\Ghlfjq32.exeC:\Windows\system32\Ghlfjq32.exe160⤵
-
C:\Windows\SysWOW64\Hohkmj32.exeC:\Windows\system32\Hohkmj32.exe161⤵
-
C:\Windows\SysWOW64\Hdecea32.exeC:\Windows\system32\Hdecea32.exe162⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hfepod32.exeC:\Windows\system32\Hfepod32.exe163⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hnpdcf32.exeC:\Windows\system32\Hnpdcf32.exe164⤵
-
C:\Windows\SysWOW64\Haqnea32.exeC:\Windows\system32\Haqnea32.exe165⤵
-
C:\Windows\SysWOW64\Indnnfdn.exeC:\Windows\system32\Indnnfdn.exe166⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Igoomk32.exeC:\Windows\system32\Igoomk32.exe167⤵
-
C:\Windows\SysWOW64\Iahceq32.exeC:\Windows\system32\Iahceq32.exe168⤵
-
C:\Windows\SysWOW64\Jbnjhh32.exeC:\Windows\system32\Jbnjhh32.exe169⤵
-
C:\Windows\SysWOW64\Jaecod32.exeC:\Windows\system32\Jaecod32.exe170⤵
-
C:\Windows\SysWOW64\Jeclebja.exeC:\Windows\system32\Jeclebja.exe171⤵
-
C:\Windows\SysWOW64\Jajmjcoe.exeC:\Windows\system32\Jajmjcoe.exe172⤵
-
C:\Windows\SysWOW64\Kpojkp32.exeC:\Windows\system32\Kpojkp32.exe173⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kgkonj32.exeC:\Windows\system32\Kgkonj32.exe174⤵
-
C:\Windows\SysWOW64\Khohkamc.exeC:\Windows\system32\Khohkamc.exe175⤵
-
C:\Windows\SysWOW64\Koipglep.exeC:\Windows\system32\Koipglep.exe176⤵
-
C:\Windows\SysWOW64\Keeeje32.exeC:\Windows\system32\Keeeje32.exe177⤵
-
C:\Windows\SysWOW64\Lopfhk32.exeC:\Windows\system32\Lopfhk32.exe178⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lpcoeb32.exeC:\Windows\system32\Lpcoeb32.exe179⤵
-
C:\Windows\SysWOW64\Lngpog32.exeC:\Windows\system32\Lngpog32.exe180⤵
-
C:\Windows\SysWOW64\Mokilo32.exeC:\Windows\system32\Mokilo32.exe181⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mblbnj32.exeC:\Windows\system32\Mblbnj32.exe182⤵
-
C:\Windows\SysWOW64\Mmccqbpm.exeC:\Windows\system32\Mmccqbpm.exe183⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mdogedmh.exeC:\Windows\system32\Mdogedmh.exe184⤵
-
C:\Windows\SysWOW64\Mdadjd32.exeC:\Windows\system32\Mdadjd32.exe185⤵
-
C:\Windows\SysWOW64\Njnmbk32.exeC:\Windows\system32\Njnmbk32.exe186⤵
-
C:\Windows\SysWOW64\Ndfnecgp.exeC:\Windows\system32\Ndfnecgp.exe187⤵
-
C:\Windows\SysWOW64\Njbfnjeg.exeC:\Windows\system32\Njbfnjeg.exe188⤵
-
C:\Windows\SysWOW64\Nmcopebh.exeC:\Windows\system32\Nmcopebh.exe189⤵
-
C:\Windows\SysWOW64\Ncpdbohb.exeC:\Windows\system32\Ncpdbohb.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Oniebmda.exeC:\Windows\system32\Oniebmda.exe191⤵
-
C:\Windows\SysWOW64\Ohbikbkb.exeC:\Windows\system32\Ohbikbkb.exe192⤵
-
C:\Windows\SysWOW64\Oefjdgjk.exeC:\Windows\system32\Oefjdgjk.exe193⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Oalkih32.exeC:\Windows\system32\Oalkih32.exe194⤵
-
C:\Windows\SysWOW64\Oejcpf32.exeC:\Windows\system32\Oejcpf32.exe195⤵
-
C:\Windows\SysWOW64\Pfnmmn32.exeC:\Windows\system32\Pfnmmn32.exe196⤵
-
C:\Windows\SysWOW64\Pioeoi32.exeC:\Windows\system32\Pioeoi32.exe197⤵
-
C:\Windows\SysWOW64\Pbgjgomc.exeC:\Windows\system32\Pbgjgomc.exe198⤵
-
C:\Windows\SysWOW64\Pfebnmcj.exeC:\Windows\system32\Pfebnmcj.exe199⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Phfoee32.exeC:\Windows\system32\Phfoee32.exe200⤵
-
C:\Windows\SysWOW64\Qobdgo32.exeC:\Windows\system32\Qobdgo32.exe201⤵
-
C:\Windows\SysWOW64\Qoeamo32.exeC:\Windows\system32\Qoeamo32.exe202⤵
-
C:\Windows\SysWOW64\Agpeaa32.exeC:\Windows\system32\Agpeaa32.exe203⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Agbbgqhh.exeC:\Windows\system32\Agbbgqhh.exe204⤵
-
C:\Windows\SysWOW64\Acicla32.exeC:\Windows\system32\Acicla32.exe205⤵
-
C:\Windows\SysWOW64\Ajckilei.exeC:\Windows\system32\Ajckilei.exe206⤵
-
C:\Windows\SysWOW64\Aejlnmkm.exeC:\Windows\system32\Aejlnmkm.exe207⤵
-
C:\Windows\SysWOW64\Aobpfb32.exeC:\Windows\system32\Aobpfb32.exe208⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bpbmqe32.exeC:\Windows\system32\Bpbmqe32.exe209⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bfoeil32.exeC:\Windows\system32\Bfoeil32.exe210⤵
-
C:\Windows\SysWOW64\Bhonjg32.exeC:\Windows\system32\Bhonjg32.exe211⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bhbkpgbf.exeC:\Windows\system32\Bhbkpgbf.exe212⤵
-
C:\Windows\SysWOW64\Bjedmo32.exeC:\Windows\system32\Bjedmo32.exe213⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cglalbbi.exeC:\Windows\system32\Cglalbbi.exe214⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cgnnab32.exeC:\Windows\system32\Cgnnab32.exe215⤵
-
C:\Windows\SysWOW64\Cqfbjhgf.exeC:\Windows\system32\Cqfbjhgf.exe216⤵
-
C:\Windows\SysWOW64\Colpld32.exeC:\Windows\system32\Colpld32.exe217⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dblhmoio.exeC:\Windows\system32\Dblhmoio.exe218⤵
-
C:\Windows\SysWOW64\Daaenlng.exeC:\Windows\system32\Daaenlng.exe219⤵
-
C:\Windows\SysWOW64\Dnefhpma.exeC:\Windows\system32\Dnefhpma.exe220⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dcbnpgkh.exeC:\Windows\system32\Dcbnpgkh.exe221⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dmkcil32.exeC:\Windows\system32\Dmkcil32.exe222⤵
-
C:\Windows\SysWOW64\Dnjoco32.exeC:\Windows\system32\Dnjoco32.exe223⤵
-
C:\Windows\SysWOW64\Ejaphpnp.exeC:\Windows\system32\Ejaphpnp.exe224⤵
-
C:\Windows\SysWOW64\Edidqf32.exeC:\Windows\system32\Edidqf32.exe225⤵
-
C:\Windows\SysWOW64\Edlafebn.exeC:\Windows\system32\Edlafebn.exe226⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Elgfkhpi.exeC:\Windows\system32\Elgfkhpi.exe227⤵
-
C:\Windows\SysWOW64\Eeojcmfi.exeC:\Windows\system32\Eeojcmfi.exe228⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ebckmaec.exeC:\Windows\system32\Ebckmaec.exe229⤵
-
C:\Windows\SysWOW64\Ehpcehcj.exeC:\Windows\system32\Ehpcehcj.exe230⤵
-
C:\Windows\SysWOW64\Feddombd.exeC:\Windows\system32\Feddombd.exe231⤵
-
C:\Windows\SysWOW64\Fefqdl32.exeC:\Windows\system32\Fefqdl32.exe232⤵
-
C:\Windows\SysWOW64\Fkcilc32.exeC:\Windows\system32\Fkcilc32.exe233⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Famaimfe.exeC:\Windows\system32\Famaimfe.exe234⤵
-
C:\Windows\SysWOW64\Fcqjfeja.exeC:\Windows\system32\Fcqjfeja.exe235⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fmfocnjg.exeC:\Windows\system32\Fmfocnjg.exe236⤵
-
C:\Windows\SysWOW64\Fgocmc32.exeC:\Windows\system32\Fgocmc32.exe237⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fimoiopk.exeC:\Windows\system32\Fimoiopk.exe238⤵
-
C:\Windows\SysWOW64\Ghbljk32.exeC:\Windows\system32\Ghbljk32.exe239⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Gpidki32.exeC:\Windows\system32\Gpidki32.exe240⤵
-
C:\Windows\SysWOW64\Glpepj32.exeC:\Windows\system32\Glpepj32.exe241⤵