Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 20:04
Behavioral task
behavioral1
Sample
33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe
-
Size
161KB
-
MD5
33efafc2055436b75e1b12bdd300dc20
-
SHA1
d77141d07c91f84ba2128c8662986b170911ef89
-
SHA256
e527a44bf89d0c998f4d5a0a36ce040133f735e14118a383593c9bc5c2decaed
-
SHA512
d75099528f25ba55d2e9eb24688e94d6238ede1a6eeaca41f72bf6c082f986c9034cc10d907465af9e5c0f73cb34bc8fce46fffc866e7b04cb2151fb8b443bab
-
SSDEEP
3072:9+9XMCDCQ3j4EJSHkUVwtCJXeex7rrIRZK8K8/kv:o9XMe3AkUVwtmeetrIyR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jbhebfck.exeDpfkeb32.exeAkqpom32.exeAijbfo32.exeLaleof32.exeFogibnha.exeLclicpkm.exeEdlhqlfi.exeFgjjad32.exeMopdpg32.exeAdblnnbk.exeLbafdlod.exeNeiaeiii.exeFhljkm32.exeKpdjaecc.exeQlgkki32.exeCfhkhd32.exeHnnhngjf.exePfpibn32.exeDcghkf32.exeOmbddbah.exeEddjhb32.exeAekqmbod.exeOalhqohl.exeNhlgmd32.exeLeegbnan.exePcghof32.exePlbkfdba.exeHnhgha32.exeEcadddjh.exeHdhbci32.exeAejnfe32.exeEoajel32.exeMpmcielb.exeCfckcoen.exeBbllnlfd.exeMkndhabp.exeBfioia32.exeMkipao32.exeLlpfjomf.exeHjipenda.exeLcomce32.exePblcbn32.exeMcodqkbi.exeFicehj32.exePiohgbng.exeQfljkp32.exeHiqoeplo.exeIcfpbl32.exeIfgklp32.exeJkkjeeke.exeCfanmogq.exeGojhafnb.exeAfmbak32.exeAjehnk32.exeDlgjldnm.exeNcamen32.exePbomli32.exeBaneak32.exeBceibfgj.exeJmnqje32.exeQhilkege.exeIjlaloaf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhebfck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpfkeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Akqpom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aijbfo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laleof32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fogibnha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lclicpkm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edlhqlfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgjjad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mopdpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Adblnnbk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbafdlod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neiaeiii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhljkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kpdjaecc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlgkki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfhkhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hnnhngjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pfpibn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcghkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ombddbah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eddjhb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aekqmbod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oalhqohl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhlgmd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leegbnan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eddjhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pcghof32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plbkfdba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnhgha32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecadddjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdhbci32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aejnfe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eoajel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mpmcielb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfckcoen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbllnlfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkndhabp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bfioia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkipao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpfjomf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjipenda.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcomce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pblcbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mcodqkbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ficehj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Piohgbng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qfljkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hiqoeplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Icfpbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifgklp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkkjeeke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfanmogq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gojhafnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Afmbak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajehnk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlgjldnm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncamen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbomli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Baneak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bceibfgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmnqje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhilkege.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijlaloaf.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Oidglb32.exe family_berbew \Windows\SysWOW64\Ocohkh32.exe family_berbew \Windows\SysWOW64\Plijimee.exe family_berbew \Windows\SysWOW64\Pkofjijm.exe family_berbew \Windows\SysWOW64\Pnopldgn.exe family_berbew C:\Windows\SysWOW64\Pggdejno.exe family_berbew \Windows\SysWOW64\Pqphnp32.exe family_berbew \Windows\SysWOW64\Qmgibqjc.exe family_berbew \Windows\SysWOW64\Afajafoa.exe family_berbew \Windows\SysWOW64\Akqpom32.exe family_berbew \Windows\SysWOW64\Aeidgbaf.exe family_berbew behavioral1/memory/2168-154-0x00000000001B0000-0x00000000001EF000-memory.dmp family_berbew C:\Windows\SysWOW64\Aekqmbod.exe family_berbew \Windows\SysWOW64\Bpjkiogm.exe family_berbew C:\Windows\SysWOW64\Bmphhc32.exe family_berbew \Windows\SysWOW64\Chnbcpmn.exe family_berbew \Windows\SysWOW64\Ckolek32.exe family_berbew C:\Windows\SysWOW64\Cedpbd32.exe family_berbew C:\Windows\SysWOW64\Dkfbfjdf.exe family_berbew C:\Windows\SysWOW64\Dcccpl32.exe family_berbew C:\Windows\SysWOW64\Dinklffl.exe family_berbew C:\Windows\SysWOW64\Domqjm32.exe family_berbew behavioral1/memory/2908-293-0x0000000000480000-0x00000000004BF000-memory.dmp family_berbew C:\Windows\SysWOW64\Ddiibc32.exe family_berbew C:\Windows\SysWOW64\Eoajel32.exe family_berbew C:\Windows\SysWOW64\Ehjona32.exe family_berbew C:\Windows\SysWOW64\Eabcggll.exe family_berbew C:\Windows\SysWOW64\Eniclh32.exe family_berbew C:\Windows\SysWOW64\Egahen32.exe family_berbew C:\Windows\SysWOW64\Eolmip32.exe family_berbew C:\Windows\SysWOW64\Fmcjhdbc.exe family_berbew C:\Windows\SysWOW64\Gjpqpl32.exe family_berbew C:\Windows\SysWOW64\Gcjbna32.exe family_berbew C:\Windows\SysWOW64\Gcmoda32.exe family_berbew C:\Windows\SysWOW64\Gmgpbf32.exe family_berbew behavioral1/memory/2584-418-0x0000000000220000-0x000000000025F000-memory.dmp family_berbew C:\Windows\SysWOW64\Hnkion32.exe family_berbew C:\Windows\SysWOW64\Hnmeen32.exe family_berbew C:\Windows\SysWOW64\Hnpbjnpo.exe family_berbew C:\Windows\SysWOW64\Heikgh32.exe family_berbew C:\Windows\SysWOW64\Hmeolj32.exe family_berbew C:\Windows\SysWOW64\Hjipenda.exe family_berbew C:\Windows\SysWOW64\Ipehmebh.exe family_berbew C:\Windows\SysWOW64\Iinmfk32.exe family_berbew C:\Windows\SysWOW64\Ifampo32.exe family_berbew C:\Windows\SysWOW64\Iipiljgf.exe family_berbew C:\Windows\SysWOW64\Iegjqk32.exe family_berbew C:\Windows\SysWOW64\Iiecgjba.exe family_berbew C:\Windows\SysWOW64\Ipokcdjn.exe family_berbew C:\Windows\SysWOW64\Iigpli32.exe family_berbew C:\Windows\SysWOW64\Jbpdeogo.exe family_berbew C:\Windows\SysWOW64\Jhlmmfef.exe family_berbew C:\Windows\SysWOW64\Jdcmbgkj.exe family_berbew C:\Windows\SysWOW64\Jhafhe32.exe family_berbew C:\Windows\SysWOW64\Jnnnalph.exe family_berbew C:\Windows\SysWOW64\Jlckbh32.exe family_berbew C:\Windows\SysWOW64\Kcmcoblm.exe family_berbew C:\Windows\SysWOW64\Kpadhg32.exe family_berbew C:\Windows\SysWOW64\Klhemhpk.exe family_berbew C:\Windows\SysWOW64\Kjleflod.exe family_berbew C:\Windows\SysWOW64\Kohnoc32.exe family_berbew C:\Windows\SysWOW64\Kllnhg32.exe family_berbew C:\Windows\SysWOW64\Kdhcli32.exe family_berbew C:\Windows\SysWOW64\Lblcfnhj.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Oidglb32.exeOcohkh32.exePlijimee.exePkofjijm.exePnopldgn.exePggdejno.exePqphnp32.exeQmgibqjc.exeAfajafoa.exeAkqpom32.exeAeidgbaf.exeAekqmbod.exeBpjkiogm.exeBmphhc32.exeChnbcpmn.exeCkolek32.exeCedpbd32.exeDkfbfjdf.exeDcccpl32.exeDinklffl.exeDomqjm32.exeDdiibc32.exeEoajel32.exeEhjona32.exeEabcggll.exeEniclh32.exeEgahen32.exeEolmip32.exeFmcjhdbc.exeGjpqpl32.exeGcjbna32.exeGcmoda32.exeGmgpbf32.exeHnkion32.exeHnmeen32.exeHnpbjnpo.exeHeikgh32.exeHmeolj32.exeHjipenda.exeIpehmebh.exeIinmfk32.exeIfampo32.exeIipiljgf.exeIegjqk32.exeIiecgjba.exeIpokcdjn.exeIigpli32.exeJbpdeogo.exeJhlmmfef.exeJdcmbgkj.exeJhafhe32.exeJnnnalph.exeJlckbh32.exeKcmcoblm.exeKpadhg32.exeKlhemhpk.exeKjleflod.exeKohnoc32.exeKllnhg32.exeKdhcli32.exeLblcfnhj.exeLjghjpfe.exeLcomce32.exeLqcmmjko.exepid process 2632 Oidglb32.exe 2852 Ocohkh32.exe 2508 Plijimee.exe 2624 Pkofjijm.exe 2376 Pnopldgn.exe 2424 Pggdejno.exe 1236 Pqphnp32.exe 1188 Qmgibqjc.exe 2448 Afajafoa.exe 2168 Akqpom32.exe 2032 Aeidgbaf.exe 1528 Aekqmbod.exe 2408 Bpjkiogm.exe 1684 Bmphhc32.exe 2720 Chnbcpmn.exe 3004 Ckolek32.exe 2148 Cedpbd32.exe 1836 Dkfbfjdf.exe 1000 Dcccpl32.exe 2908 Dinklffl.exe 900 Domqjm32.exe 2696 Ddiibc32.exe 2808 Eoajel32.exe 2816 Ehjona32.exe 1944 Eabcggll.exe 1576 Eniclh32.exe 2440 Egahen32.exe 2584 Eolmip32.exe 2084 Fmcjhdbc.exe 2660 Gjpqpl32.exe 2404 Gcjbna32.exe 568 Gcmoda32.exe 2156 Gmgpbf32.exe 1100 Hnkion32.exe 2680 Hnmeen32.exe 2968 Hnpbjnpo.exe 1856 Heikgh32.exe 1452 Hmeolj32.exe 1088 Hjipenda.exe 1948 Ipehmebh.exe 804 Iinmfk32.exe 1624 Ifampo32.exe 772 Iipiljgf.exe 1720 Iegjqk32.exe 436 Iiecgjba.exe 696 Ipokcdjn.exe 340 Iigpli32.exe 1984 Jbpdeogo.exe 2256 Jhlmmfef.exe 1940 Jdcmbgkj.exe 2088 Jhafhe32.exe 2112 Jnnnalph.exe 1956 Jlckbh32.exe 1692 Kcmcoblm.exe 2564 Kpadhg32.exe 1800 Klhemhpk.exe 1796 Kjleflod.exe 2524 Kohnoc32.exe 2060 Kllnhg32.exe 960 Kdhcli32.exe 2328 Lblcfnhj.exe 2656 Ljghjpfe.exe 1808 Lcomce32.exe 2012 Lqcmmjko.exe -
Loads dropped DLL 64 IoCs
Processes:
33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exeOidglb32.exeOcohkh32.exePlijimee.exePkofjijm.exePnopldgn.exePggdejno.exePqphnp32.exeQmgibqjc.exeAfajafoa.exeAkqpom32.exeAeidgbaf.exeAekqmbod.exeBpjkiogm.exeBmphhc32.exeChnbcpmn.exeCkolek32.exeCedpbd32.exeDkfbfjdf.exeDcccpl32.exeDinklffl.exeDomqjm32.exeDdiibc32.exeEoajel32.exeEhjona32.exeEabcggll.exeEniclh32.exeEgahen32.exeEolmip32.exeFmcjhdbc.exeGjpqpl32.exeGcjbna32.exepid process 1664 33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe 1664 33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe 2632 Oidglb32.exe 2632 Oidglb32.exe 2852 Ocohkh32.exe 2852 Ocohkh32.exe 2508 Plijimee.exe 2508 Plijimee.exe 2624 Pkofjijm.exe 2624 Pkofjijm.exe 2376 Pnopldgn.exe 2376 Pnopldgn.exe 2424 Pggdejno.exe 2424 Pggdejno.exe 1236 Pqphnp32.exe 1236 Pqphnp32.exe 1188 Qmgibqjc.exe 1188 Qmgibqjc.exe 2448 Afajafoa.exe 2448 Afajafoa.exe 2168 Akqpom32.exe 2168 Akqpom32.exe 2032 Aeidgbaf.exe 2032 Aeidgbaf.exe 1528 Aekqmbod.exe 1528 Aekqmbod.exe 2408 Bpjkiogm.exe 2408 Bpjkiogm.exe 1684 Bmphhc32.exe 1684 Bmphhc32.exe 2720 Chnbcpmn.exe 2720 Chnbcpmn.exe 3004 Ckolek32.exe 3004 Ckolek32.exe 2148 Cedpbd32.exe 2148 Cedpbd32.exe 1836 Dkfbfjdf.exe 1836 Dkfbfjdf.exe 1000 Dcccpl32.exe 1000 Dcccpl32.exe 2908 Dinklffl.exe 2908 Dinklffl.exe 900 Domqjm32.exe 900 Domqjm32.exe 2696 Ddiibc32.exe 2696 Ddiibc32.exe 2808 Eoajel32.exe 2808 Eoajel32.exe 2816 Ehjona32.exe 2816 Ehjona32.exe 1944 Eabcggll.exe 1944 Eabcggll.exe 1576 Eniclh32.exe 1576 Eniclh32.exe 2440 Egahen32.exe 2440 Egahen32.exe 2584 Eolmip32.exe 2584 Eolmip32.exe 2084 Fmcjhdbc.exe 2084 Fmcjhdbc.exe 2660 Gjpqpl32.exe 2660 Gjpqpl32.exe 2404 Gcjbna32.exe 2404 Gcjbna32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Eolmip32.exeGgnmbn32.exeKglehp32.exeEebibf32.exeAekqmbod.exeChnbcpmn.exePdeqfhjd.exeIcfpbl32.exePilbocej.exePlijimee.exeFamaimfe.exeMdgkjopd.exeLcomce32.exePonklpcg.exeJibnop32.exeNgjlpmnn.exeNfidjbdg.exeGoiehm32.exeMfeaiime.exeFenphjei.exeCbiiog32.exeEjaphpnp.exeLlpfjomf.exeEddjhb32.exeAfjjed32.exeOfqmcj32.exeFgjjad32.exeGglbfg32.exeDeeqch32.exeObjmgd32.exeHpkompgg.exeLlomfpag.exeAbhlak32.exeFlclam32.exeIknafhjb.exeCoafko32.exeLeegbnan.exeElkmmodo.exeMkndhabp.exeBfjkphjd.exeEqngcc32.exeCqdfehii.exeDkdmfe32.exeDqobnf32.exeObdojcef.exeCidddj32.exeNcamen32.exeHlmnogkl.exeGjpqpl32.exeNpaich32.exeEpmfgo32.exeBgllgedi.exeEkmfne32.exeBoeoek32.exeKdhcli32.exeLcdfnehp.exePddjlb32.exeGojhafnb.exeKlcgpkhh.exeAjldkhjh.exeFbfjkj32.exedescription ioc process File created C:\Windows\SysWOW64\Fmcjhdbc.exe Eolmip32.exe File opened for modification C:\Windows\SysWOW64\Hmkeke32.exe Ggnmbn32.exe File created C:\Windows\SysWOW64\Behjbjcf.dll Kglehp32.exe File opened for modification C:\Windows\SysWOW64\Fbfjkj32.exe Eebibf32.exe File created C:\Windows\SysWOW64\Bpjkiogm.exe Aekqmbod.exe File created C:\Windows\SysWOW64\Ckolek32.exe Chnbcpmn.exe File created C:\Windows\SysWOW64\Pkoicb32.exe Pdeqfhjd.exe File created C:\Windows\SysWOW64\Lifjic32.dll Icfpbl32.exe File created C:\Windows\SysWOW64\Pnhjgj32.exe Pilbocej.exe File created C:\Windows\SysWOW64\Pkofjijm.exe Plijimee.exe File opened for modification C:\Windows\SysWOW64\Fgjjad32.exe Famaimfe.exe File created C:\Windows\SysWOW64\Oehcbd32.dll Mdgkjopd.exe File opened for modification C:\Windows\SysWOW64\Pnhjgj32.exe Pilbocej.exe File opened for modification C:\Windows\SysWOW64\Lqcmmjko.exe Lcomce32.exe File created C:\Windows\SysWOW64\Plbkfdba.exe Ponklpcg.exe File opened for modification C:\Windows\SysWOW64\Kambcbhb.exe Jibnop32.exe File created C:\Windows\SysWOW64\Deankpkm.dll Ngjlpmnn.exe File created C:\Windows\SysWOW64\Dkkcoogp.dll Nfidjbdg.exe File created C:\Windows\SysWOW64\Doohmk32.dll Goiehm32.exe File created C:\Windows\SysWOW64\Momfan32.exe Mfeaiime.exe File created C:\Windows\SysWOW64\Fkkhpadq.exe Fenphjei.exe File created C:\Windows\SysWOW64\Jajjnjlc.dll Cbiiog32.exe File created C:\Windows\SysWOW64\Edidqf32.exe Ejaphpnp.exe File created C:\Windows\SysWOW64\Hfopbgif.dll Llpfjomf.exe File opened for modification C:\Windows\SysWOW64\Enmnahnm.exe Eddjhb32.exe File opened for modification C:\Windows\SysWOW64\Amcbankf.exe Afjjed32.exe File created C:\Windows\SysWOW64\Meoaif32.dll Ofqmcj32.exe File created C:\Windows\SysWOW64\Cggioi32.dll Fgjjad32.exe File created C:\Windows\SysWOW64\Hdpcokdo.exe Gglbfg32.exe File opened for modification C:\Windows\SysWOW64\Ealahi32.exe Deeqch32.exe File created C:\Windows\SysWOW64\Bamoho32.dll Objmgd32.exe File opened for modification C:\Windows\SysWOW64\Hidcef32.exe Hpkompgg.exe File created C:\Windows\SysWOW64\Ahdkab32.dll Llomfpag.exe File opened for modification C:\Windows\SysWOW64\Ahedjb32.exe Abhlak32.exe File created C:\Windows\SysWOW64\Dcjkhi32.dll Flclam32.exe File created C:\Windows\SysWOW64\Iakino32.exe Iknafhjb.exe File opened for modification C:\Windows\SysWOW64\Cdnncfoe.exe Coafko32.exe File opened for modification C:\Windows\SysWOW64\Llpoohik.exe Leegbnan.exe File created C:\Windows\SysWOW64\Pdmjki32.dll Elkmmodo.exe File opened for modification C:\Windows\SysWOW64\Mkqqnq32.exe Mkndhabp.exe File created C:\Windows\SysWOW64\Boeoek32.exe Bfjkphjd.exe File opened for modification C:\Windows\SysWOW64\Efjpkj32.exe Eqngcc32.exe File created C:\Windows\SysWOW64\Cmehhn32.dll Cqdfehii.exe File opened for modification C:\Windows\SysWOW64\Dlgjldnm.exe Dkdmfe32.exe File created C:\Windows\SysWOW64\Dijfch32.exe Dqobnf32.exe File created C:\Windows\SysWOW64\Dppfbm32.dll Dqobnf32.exe File created C:\Windows\SysWOW64\Ankojf32.dll Obdojcef.exe File created C:\Windows\SysWOW64\Dfhdnn32.exe Cidddj32.exe File opened for modification C:\Windows\SysWOW64\Edidqf32.exe Ejaphpnp.exe File created C:\Windows\SysWOW64\Oqennbbl.exe Ncamen32.exe File opened for modification C:\Windows\SysWOW64\Hdhbci32.exe Hlmnogkl.exe File created C:\Windows\SysWOW64\Gcjbna32.exe Gjpqpl32.exe File opened for modification C:\Windows\SysWOW64\Nijnln32.exe Npaich32.exe File created C:\Windows\SysWOW64\Emagacdm.exe Epmfgo32.exe File created C:\Windows\SysWOW64\Bqeqqk32.exe Bgllgedi.exe File created C:\Windows\SysWOW64\Lmnnpb32.dll Ekmfne32.exe File created C:\Windows\SysWOW64\Bikcbc32.exe Boeoek32.exe File created C:\Windows\SysWOW64\Jppgpfpi.dll Kdhcli32.exe File opened for modification C:\Windows\SysWOW64\Liqoflfh.exe Lcdfnehp.exe File opened for modification C:\Windows\SysWOW64\Piabdiep.exe Pddjlb32.exe File created C:\Windows\SysWOW64\Giolnomh.exe Gojhafnb.exe File created C:\Windows\SysWOW64\Ijjnkj32.dll Klcgpkhh.exe File created C:\Windows\SysWOW64\Ajnqphhe.exe Ajldkhjh.exe File opened for modification C:\Windows\SysWOW64\Flnndp32.exe Fbfjkj32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3384 3276 WerFault.exe Flnndp32.exe -
Modifies registry class 64 IoCs
Processes:
Kllnhg32.exeGjdldd32.exePfnmmn32.exeDklepmal.exeNijnln32.exePfpibn32.exeKlcgpkhh.exeOjeakfnd.exeNpaich32.exeEphdjeol.exeMeljbqna.exeOekjjl32.exeHgciff32.exeDcokpa32.exePpopja32.exeEfmckpko.exeCpiqmlfm.exeKmaphmln.exeAopahjll.exeCaaggpdh.exeJgabdlfb.exeIickckcl.exeEhjona32.exeJfliim32.exeQjklenpa.exeNnleiipc.exeJkbaci32.exeNfgjml32.exeNfidjbdg.exeAhedjb32.exeMopbgn32.exeIbacbcgg.exeLifcib32.exeOlchjp32.exeGgdekbgb.exeImggplgm.exeLpdankjg.exeNjnokdaq.exeQhincn32.exeIpehmebh.exeLjkaeo32.exeMkndhabp.exeEkmfne32.exeBfjkphjd.exeKhojcj32.exeAfjjed32.exeCjgoje32.exeKgclio32.exeDfpcblfp.exeCeebklai.exeFplllkdc.exeHlmnogkl.exeJbpdeogo.exeKjmnjkjd.exeNhlgmd32.exeOococb32.exeEcadddjh.exeMjnjjbbh.exeHgpjhn32.exeQppkfhlc.exeOfdclinq.exeJcnoejch.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fckada32.dll" Kllnhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpdgka32.dll" Gjdldd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pfnmmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dklepmal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nijnln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apoahgqd.dll" Pfpibn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Klcgpkhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojeakfnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hefhqhka.dll" Npaich32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ephdjeol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Meljbqna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oekjjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hgciff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbfflo32.dll" Dcokpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfjqal32.dll" Ppopja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Efmckpko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojeakfnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpnidcen.dll" Cpiqmlfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hllgegfe.dll" Kmaphmln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcdgejhm.dll" Aopahjll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Caaggpdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jgabdlfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iickckcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ehjona32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jfliim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qjklenpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnleiipc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlamphei.dll" Caaggpdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jamkdghb.dll" Jkbaci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpcfmngo.dll" Nfgjml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nfidjbdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ahedjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acfenf32.dll" Mopbgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ibacbcgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppdbln32.dll" Lifcib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Olchjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onebep32.dll" Ggdekbgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imggplgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbnlnmnm.dll" Lpdankjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njnokdaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qhincn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ipehmebh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ljkaeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkndhabp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekmfne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bfjkphjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Khojcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Afjjed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecbbbh32.dll" Cjgoje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkdbhahq.dll" Kgclio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmkedj32.dll" Dfpcblfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ceebklai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fplllkdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejfekbaf.dll" Hlmnogkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbpdeogo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kjmnjkjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfkgbapp.dll" Nhlgmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkpidd32.dll" Oococb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nglaha32.dll" Ecadddjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjnjjbbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hgpjhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbbnekdd.dll" Qppkfhlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofdclinq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jcnoejch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exeOidglb32.exeOcohkh32.exePlijimee.exePkofjijm.exePnopldgn.exePggdejno.exePqphnp32.exeQmgibqjc.exeAfajafoa.exeAkqpom32.exeAeidgbaf.exeAekqmbod.exeBpjkiogm.exeBmphhc32.exeChnbcpmn.exedescription pid process target process PID 1664 wrote to memory of 2632 1664 33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe Oidglb32.exe PID 1664 wrote to memory of 2632 1664 33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe Oidglb32.exe PID 1664 wrote to memory of 2632 1664 33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe Oidglb32.exe PID 1664 wrote to memory of 2632 1664 33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe Oidglb32.exe PID 2632 wrote to memory of 2852 2632 Oidglb32.exe Ocohkh32.exe PID 2632 wrote to memory of 2852 2632 Oidglb32.exe Ocohkh32.exe PID 2632 wrote to memory of 2852 2632 Oidglb32.exe Ocohkh32.exe PID 2632 wrote to memory of 2852 2632 Oidglb32.exe Ocohkh32.exe PID 2852 wrote to memory of 2508 2852 Ocohkh32.exe Plijimee.exe PID 2852 wrote to memory of 2508 2852 Ocohkh32.exe Plijimee.exe PID 2852 wrote to memory of 2508 2852 Ocohkh32.exe Plijimee.exe PID 2852 wrote to memory of 2508 2852 Ocohkh32.exe Plijimee.exe PID 2508 wrote to memory of 2624 2508 Plijimee.exe Pkofjijm.exe PID 2508 wrote to memory of 2624 2508 Plijimee.exe Pkofjijm.exe PID 2508 wrote to memory of 2624 2508 Plijimee.exe Pkofjijm.exe PID 2508 wrote to memory of 2624 2508 Plijimee.exe Pkofjijm.exe PID 2624 wrote to memory of 2376 2624 Pkofjijm.exe Pnopldgn.exe PID 2624 wrote to memory of 2376 2624 Pkofjijm.exe Pnopldgn.exe PID 2624 wrote to memory of 2376 2624 Pkofjijm.exe Pnopldgn.exe PID 2624 wrote to memory of 2376 2624 Pkofjijm.exe Pnopldgn.exe PID 2376 wrote to memory of 2424 2376 Pnopldgn.exe Pggdejno.exe PID 2376 wrote to memory of 2424 2376 Pnopldgn.exe Pggdejno.exe PID 2376 wrote to memory of 2424 2376 Pnopldgn.exe Pggdejno.exe PID 2376 wrote to memory of 2424 2376 Pnopldgn.exe Pggdejno.exe PID 2424 wrote to memory of 1236 2424 Pggdejno.exe Pqphnp32.exe PID 2424 wrote to memory of 1236 2424 Pggdejno.exe Pqphnp32.exe PID 2424 wrote to memory of 1236 2424 Pggdejno.exe Pqphnp32.exe PID 2424 wrote to memory of 1236 2424 Pggdejno.exe Pqphnp32.exe PID 1236 wrote to memory of 1188 1236 Pqphnp32.exe Qmgibqjc.exe PID 1236 wrote to memory of 1188 1236 Pqphnp32.exe Qmgibqjc.exe PID 1236 wrote to memory of 1188 1236 Pqphnp32.exe Qmgibqjc.exe PID 1236 wrote to memory of 1188 1236 Pqphnp32.exe Qmgibqjc.exe PID 1188 wrote to memory of 2448 1188 Qmgibqjc.exe Afajafoa.exe PID 1188 wrote to memory of 2448 1188 Qmgibqjc.exe Afajafoa.exe PID 1188 wrote to memory of 2448 1188 Qmgibqjc.exe Afajafoa.exe PID 1188 wrote to memory of 2448 1188 Qmgibqjc.exe Afajafoa.exe PID 2448 wrote to memory of 2168 2448 Afajafoa.exe Akqpom32.exe PID 2448 wrote to memory of 2168 2448 Afajafoa.exe Akqpom32.exe PID 2448 wrote to memory of 2168 2448 Afajafoa.exe Akqpom32.exe PID 2448 wrote to memory of 2168 2448 Afajafoa.exe Akqpom32.exe PID 2168 wrote to memory of 2032 2168 Akqpom32.exe Aeidgbaf.exe PID 2168 wrote to memory of 2032 2168 Akqpom32.exe Aeidgbaf.exe PID 2168 wrote to memory of 2032 2168 Akqpom32.exe Aeidgbaf.exe PID 2168 wrote to memory of 2032 2168 Akqpom32.exe Aeidgbaf.exe PID 2032 wrote to memory of 1528 2032 Aeidgbaf.exe Aekqmbod.exe PID 2032 wrote to memory of 1528 2032 Aeidgbaf.exe Aekqmbod.exe PID 2032 wrote to memory of 1528 2032 Aeidgbaf.exe Aekqmbod.exe PID 2032 wrote to memory of 1528 2032 Aeidgbaf.exe Aekqmbod.exe PID 1528 wrote to memory of 2408 1528 Aekqmbod.exe Bpjkiogm.exe PID 1528 wrote to memory of 2408 1528 Aekqmbod.exe Bpjkiogm.exe PID 1528 wrote to memory of 2408 1528 Aekqmbod.exe Bpjkiogm.exe PID 1528 wrote to memory of 2408 1528 Aekqmbod.exe Bpjkiogm.exe PID 2408 wrote to memory of 1684 2408 Bpjkiogm.exe Bmphhc32.exe PID 2408 wrote to memory of 1684 2408 Bpjkiogm.exe Bmphhc32.exe PID 2408 wrote to memory of 1684 2408 Bpjkiogm.exe Bmphhc32.exe PID 2408 wrote to memory of 1684 2408 Bpjkiogm.exe Bmphhc32.exe PID 1684 wrote to memory of 2720 1684 Bmphhc32.exe Chnbcpmn.exe PID 1684 wrote to memory of 2720 1684 Bmphhc32.exe Chnbcpmn.exe PID 1684 wrote to memory of 2720 1684 Bmphhc32.exe Chnbcpmn.exe PID 1684 wrote to memory of 2720 1684 Bmphhc32.exe Chnbcpmn.exe PID 2720 wrote to memory of 3004 2720 Chnbcpmn.exe Ckolek32.exe PID 2720 wrote to memory of 3004 2720 Chnbcpmn.exe Ckolek32.exe PID 2720 wrote to memory of 3004 2720 Chnbcpmn.exe Ckolek32.exe PID 2720 wrote to memory of 3004 2720 Chnbcpmn.exe Ckolek32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\33efafc2055436b75e1b12bdd300dc20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Oidglb32.exeC:\Windows\system32\Oidglb32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ocohkh32.exeC:\Windows\system32\Ocohkh32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Plijimee.exeC:\Windows\system32\Plijimee.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pkofjijm.exeC:\Windows\system32\Pkofjijm.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pnopldgn.exeC:\Windows\system32\Pnopldgn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pggdejno.exeC:\Windows\system32\Pggdejno.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pqphnp32.exeC:\Windows\system32\Pqphnp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qmgibqjc.exeC:\Windows\system32\Qmgibqjc.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Afajafoa.exeC:\Windows\system32\Afajafoa.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Akqpom32.exeC:\Windows\system32\Akqpom32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Aeidgbaf.exeC:\Windows\system32\Aeidgbaf.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Aekqmbod.exeC:\Windows\system32\Aekqmbod.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bpjkiogm.exeC:\Windows\system32\Bpjkiogm.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bmphhc32.exeC:\Windows\system32\Bmphhc32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Chnbcpmn.exeC:\Windows\system32\Chnbcpmn.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ckolek32.exeC:\Windows\system32\Ckolek32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Cedpbd32.exeC:\Windows\system32\Cedpbd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dkfbfjdf.exeC:\Windows\system32\Dkfbfjdf.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dcccpl32.exeC:\Windows\system32\Dcccpl32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Dinklffl.exeC:\Windows\system32\Dinklffl.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Domqjm32.exeC:\Windows\system32\Domqjm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ddiibc32.exeC:\Windows\system32\Ddiibc32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Eoajel32.exeC:\Windows\system32\Eoajel32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ehjona32.exeC:\Windows\system32\Ehjona32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Eabcggll.exeC:\Windows\system32\Eabcggll.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Eniclh32.exeC:\Windows\system32\Eniclh32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Egahen32.exeC:\Windows\system32\Egahen32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Eolmip32.exeC:\Windows\system32\Eolmip32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fmcjhdbc.exeC:\Windows\system32\Fmcjhdbc.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gjpqpl32.exeC:\Windows\system32\Gjpqpl32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gcjbna32.exeC:\Windows\system32\Gcjbna32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gcmoda32.exeC:\Windows\system32\Gcmoda32.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gmgpbf32.exeC:\Windows\system32\Gmgpbf32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hnkion32.exeC:\Windows\system32\Hnkion32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hnmeen32.exeC:\Windows\system32\Hnmeen32.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hnpbjnpo.exeC:\Windows\system32\Hnpbjnpo.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Heikgh32.exeC:\Windows\system32\Heikgh32.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hmeolj32.exeC:\Windows\system32\Hmeolj32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hjipenda.exeC:\Windows\system32\Hjipenda.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ipehmebh.exeC:\Windows\system32\Ipehmebh.exe41⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Iinmfk32.exeC:\Windows\system32\Iinmfk32.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ifampo32.exeC:\Windows\system32\Ifampo32.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iipiljgf.exeC:\Windows\system32\Iipiljgf.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iegjqk32.exeC:\Windows\system32\Iegjqk32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iiecgjba.exeC:\Windows\system32\Iiecgjba.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ipokcdjn.exeC:\Windows\system32\Ipokcdjn.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iigpli32.exeC:\Windows\system32\Iigpli32.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jbpdeogo.exeC:\Windows\system32\Jbpdeogo.exe49⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Jhlmmfef.exeC:\Windows\system32\Jhlmmfef.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jdcmbgkj.exeC:\Windows\system32\Jdcmbgkj.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jhafhe32.exeC:\Windows\system32\Jhafhe32.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jnnnalph.exeC:\Windows\system32\Jnnnalph.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Jlckbh32.exeC:\Windows\system32\Jlckbh32.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kcmcoblm.exeC:\Windows\system32\Kcmcoblm.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kpadhg32.exeC:\Windows\system32\Kpadhg32.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Klhemhpk.exeC:\Windows\system32\Klhemhpk.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kjleflod.exeC:\Windows\system32\Kjleflod.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kohnoc32.exeC:\Windows\system32\Kohnoc32.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kllnhg32.exeC:\Windows\system32\Kllnhg32.exe60⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Kdhcli32.exeC:\Windows\system32\Kdhcli32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lblcfnhj.exeC:\Windows\system32\Lblcfnhj.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ljghjpfe.exeC:\Windows\system32\Ljghjpfe.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lcomce32.exeC:\Windows\system32\Lcomce32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lqcmmjko.exeC:\Windows\system32\Lqcmmjko.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ljkaeo32.exeC:\Windows\system32\Ljkaeo32.exe66⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lcdfnehp.exeC:\Windows\system32\Lcdfnehp.exe67⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Liqoflfh.exeC:\Windows\system32\Liqoflfh.exe68⤵
-
C:\Windows\SysWOW64\Lbicoamh.exeC:\Windows\system32\Lbicoamh.exe69⤵
-
C:\Windows\SysWOW64\Mpmcielb.exeC:\Windows\system32\Mpmcielb.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mejlalji.exeC:\Windows\system32\Mejlalji.exe71⤵
-
C:\Windows\SysWOW64\Mbnljqic.exeC:\Windows\system32\Mbnljqic.exe72⤵
-
C:\Windows\SysWOW64\Mihdgkpp.exeC:\Windows\system32\Mihdgkpp.exe73⤵
-
C:\Windows\SysWOW64\Macilmnk.exeC:\Windows\system32\Macilmnk.exe74⤵
-
C:\Windows\SysWOW64\Mlhnifmq.exeC:\Windows\system32\Mlhnifmq.exe75⤵
-
C:\Windows\SysWOW64\Mhonngce.exeC:\Windows\system32\Mhonngce.exe76⤵
-
C:\Windows\SysWOW64\Mjnjjbbh.exeC:\Windows\system32\Mjnjjbbh.exe77⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Njpgpbpf.exeC:\Windows\system32\Njpgpbpf.exe78⤵
-
C:\Windows\SysWOW64\Npmphinm.exeC:\Windows\system32\Npmphinm.exe79⤵
-
C:\Windows\SysWOW64\Niedqnen.exeC:\Windows\system32\Niedqnen.exe80⤵
-
C:\Windows\SysWOW64\Nfidjbdg.exeC:\Windows\system32\Nfidjbdg.exe81⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Npaich32.exeC:\Windows\system32\Npaich32.exe82⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nijnln32.exeC:\Windows\system32\Nijnln32.exe83⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Npdfhhhe.exeC:\Windows\system32\Npdfhhhe.exe84⤵
-
C:\Windows\SysWOW64\Oiljam32.exeC:\Windows\system32\Oiljam32.exe85⤵
-
C:\Windows\SysWOW64\Obdojcef.exeC:\Windows\system32\Obdojcef.exe86⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ohagbj32.exeC:\Windows\system32\Ohagbj32.exe87⤵
-
C:\Windows\SysWOW64\Obgkpb32.exeC:\Windows\system32\Obgkpb32.exe88⤵
-
C:\Windows\SysWOW64\Oalhqohl.exeC:\Windows\system32\Oalhqohl.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Odjdmjgo.exeC:\Windows\system32\Odjdmjgo.exe90⤵
-
C:\Windows\SysWOW64\Pcghof32.exeC:\Windows\system32\Pcghof32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pegqpacp.exeC:\Windows\system32\Pegqpacp.exe92⤵
-
C:\Windows\SysWOW64\Pejmfqan.exeC:\Windows\system32\Pejmfqan.exe93⤵
-
C:\Windows\SysWOW64\Qfljkp32.exeC:\Windows\system32\Qfljkp32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Qkibcg32.exeC:\Windows\system32\Qkibcg32.exe95⤵
-
C:\Windows\SysWOW64\Qdaglmcb.exeC:\Windows\system32\Qdaglmcb.exe96⤵
-
C:\Windows\SysWOW64\Ajnpecbj.exeC:\Windows\system32\Ajnpecbj.exe97⤵
-
C:\Windows\SysWOW64\Agbpnh32.exeC:\Windows\system32\Agbpnh32.exe98⤵
-
C:\Windows\SysWOW64\Ajqljc32.exeC:\Windows\system32\Ajqljc32.exe99⤵
-
C:\Windows\SysWOW64\Adfqgl32.exeC:\Windows\system32\Adfqgl32.exe100⤵
-
C:\Windows\SysWOW64\Anneqafn.exeC:\Windows\system32\Anneqafn.exe101⤵
-
C:\Windows\SysWOW64\Aopahjll.exeC:\Windows\system32\Aopahjll.exe102⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Afjjed32.exeC:\Windows\system32\Afjjed32.exe103⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Amcbankf.exeC:\Windows\system32\Amcbankf.exe104⤵
-
C:\Windows\SysWOW64\Aijbfo32.exeC:\Windows\system32\Aijbfo32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Aodkci32.exeC:\Windows\system32\Aodkci32.exe106⤵
-
C:\Windows\SysWOW64\Bkklhjnk.exeC:\Windows\system32\Bkklhjnk.exe107⤵
-
C:\Windows\SysWOW64\Biolanld.exeC:\Windows\system32\Biolanld.exe108⤵
-
C:\Windows\SysWOW64\Bbgqjdce.exeC:\Windows\system32\Bbgqjdce.exe109⤵
-
C:\Windows\SysWOW64\Bjbeofpp.exeC:\Windows\system32\Bjbeofpp.exe110⤵
-
C:\Windows\SysWOW64\Behilopf.exeC:\Windows\system32\Behilopf.exe111⤵
-
C:\Windows\SysWOW64\Bjebdfnn.exeC:\Windows\system32\Bjebdfnn.exe112⤵
-
C:\Windows\SysWOW64\Cjgoje32.exeC:\Windows\system32\Cjgoje32.exe113⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Caaggpdh.exeC:\Windows\system32\Caaggpdh.exe114⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cfnoogbo.exeC:\Windows\system32\Cfnoogbo.exe115⤵
-
C:\Windows\SysWOW64\Ccbphk32.exeC:\Windows\system32\Ccbphk32.exe116⤵
-
C:\Windows\SysWOW64\Cpiqmlfm.exeC:\Windows\system32\Cpiqmlfm.exe117⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ceeieced.exeC:\Windows\system32\Ceeieced.exe118⤵
-
C:\Windows\SysWOW64\Cbiiog32.exeC:\Windows\system32\Cbiiog32.exe119⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Chfbgn32.exeC:\Windows\system32\Chfbgn32.exe120⤵
-
C:\Windows\SysWOW64\Cblfdg32.exeC:\Windows\system32\Cblfdg32.exe121⤵
-
C:\Windows\SysWOW64\Djgkii32.exeC:\Windows\system32\Djgkii32.exe122⤵
-
C:\Windows\SysWOW64\Demofaol.exeC:\Windows\system32\Demofaol.exe123⤵
-
C:\Windows\SysWOW64\Dacpkc32.exeC:\Windows\system32\Dacpkc32.exe124⤵
-
C:\Windows\SysWOW64\Dklddhka.exeC:\Windows\system32\Dklddhka.exe125⤵
-
C:\Windows\SysWOW64\Dmjqpdje.exeC:\Windows\system32\Dmjqpdje.exe126⤵
-
C:\Windows\SysWOW64\Dgbeiiqe.exeC:\Windows\system32\Dgbeiiqe.exe127⤵
-
C:\Windows\SysWOW64\Dgeaoinb.exeC:\Windows\system32\Dgeaoinb.exe128⤵
-
C:\Windows\SysWOW64\Epmfgo32.exeC:\Windows\system32\Epmfgo32.exe129⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Emagacdm.exeC:\Windows\system32\Emagacdm.exe130⤵
-
C:\Windows\SysWOW64\Ecnoijbd.exeC:\Windows\system32\Ecnoijbd.exe131⤵
-
C:\Windows\SysWOW64\Ecploipa.exeC:\Windows\system32\Ecploipa.exe132⤵
-
C:\Windows\SysWOW64\Eklqcl32.exeC:\Windows\system32\Eklqcl32.exe133⤵
-
C:\Windows\SysWOW64\Eaeipfei.exeC:\Windows\system32\Eaeipfei.exe134⤵
-
C:\Windows\SysWOW64\Elkmmodo.exeC:\Windows\system32\Elkmmodo.exe135⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fhbnbpjc.exeC:\Windows\system32\Fhbnbpjc.exe136⤵
-
C:\Windows\SysWOW64\Fajbke32.exeC:\Windows\system32\Fajbke32.exe137⤵
-
C:\Windows\SysWOW64\Fggkcl32.exeC:\Windows\system32\Fggkcl32.exe138⤵
-
C:\Windows\SysWOW64\Fpoolael.exeC:\Windows\system32\Fpoolael.exe139⤵
-
C:\Windows\SysWOW64\Fkecij32.exeC:\Windows\system32\Fkecij32.exe140⤵
-
C:\Windows\SysWOW64\Fcphnm32.exeC:\Windows\system32\Fcphnm32.exe141⤵
-
C:\Windows\SysWOW64\Fogibnha.exeC:\Windows\system32\Fogibnha.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Goiehm32.exeC:\Windows\system32\Goiehm32.exe143⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gjojef32.exeC:\Windows\system32\Gjojef32.exe144⤵
-
C:\Windows\SysWOW64\Ghdgfbkl.exeC:\Windows\system32\Ghdgfbkl.exe145⤵
-
C:\Windows\SysWOW64\Gfhgpg32.exeC:\Windows\system32\Gfhgpg32.exe146⤵
-
C:\Windows\SysWOW64\Gncldi32.exeC:\Windows\system32\Gncldi32.exe147⤵
-
C:\Windows\SysWOW64\Gbadjg32.exeC:\Windows\system32\Gbadjg32.exe148⤵
-
C:\Windows\SysWOW64\Ggnmbn32.exeC:\Windows\system32\Ggnmbn32.exe149⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hmkeke32.exeC:\Windows\system32\Hmkeke32.exe150⤵
-
C:\Windows\SysWOW64\Hgpjhn32.exeC:\Windows\system32\Hgpjhn32.exe151⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hpkompgg.exeC:\Windows\system32\Hpkompgg.exe152⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hidcef32.exeC:\Windows\system32\Hidcef32.exe153⤵
-
C:\Windows\SysWOW64\Ihbcmaje.exeC:\Windows\system32\Ihbcmaje.exe154⤵
-
C:\Windows\SysWOW64\Iakgefqe.exeC:\Windows\system32\Iakgefqe.exe155⤵
-
C:\Windows\SysWOW64\Ioohokoo.exeC:\Windows\system32\Ioohokoo.exe156⤵
-
C:\Windows\SysWOW64\Ihglhp32.exeC:\Windows\system32\Ihglhp32.exe157⤵
-
C:\Windows\SysWOW64\Jfliim32.exeC:\Windows\system32\Jfliim32.exe158⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jpdnbbah.exeC:\Windows\system32\Jpdnbbah.exe159⤵
-
C:\Windows\SysWOW64\Jlkngc32.exeC:\Windows\system32\Jlkngc32.exe160⤵
-
C:\Windows\SysWOW64\Jgabdlfb.exeC:\Windows\system32\Jgabdlfb.exe161⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jpigma32.exeC:\Windows\system32\Jpigma32.exe162⤵
-
C:\Windows\SysWOW64\Jajcdjca.exeC:\Windows\system32\Jajcdjca.exe163⤵
-
C:\Windows\SysWOW64\Jkchmo32.exeC:\Windows\system32\Jkchmo32.exe164⤵
-
C:\Windows\SysWOW64\Klbdgb32.exeC:\Windows\system32\Klbdgb32.exe165⤵
-
C:\Windows\SysWOW64\Kekiphge.exeC:\Windows\system32\Kekiphge.exe166⤵
-
C:\Windows\SysWOW64\Kglehp32.exeC:\Windows\system32\Kglehp32.exe167⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kpdjaecc.exeC:\Windows\system32\Kpdjaecc.exe168⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kjmnjkjd.exeC:\Windows\system32\Kjmnjkjd.exe169⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kdbbgdjj.exeC:\Windows\system32\Kdbbgdjj.exe170⤵
-
C:\Windows\SysWOW64\Kjokokha.exeC:\Windows\system32\Kjokokha.exe171⤵
-
C:\Windows\SysWOW64\Kgclio32.exeC:\Windows\system32\Kgclio32.exe172⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kpkpadnl.exeC:\Windows\system32\Kpkpadnl.exe173⤵
-
C:\Windows\SysWOW64\Lfhhjklc.exeC:\Windows\system32\Lfhhjklc.exe174⤵
-
C:\Windows\SysWOW64\Lclicpkm.exeC:\Windows\system32\Lclicpkm.exe175⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lhiakf32.exeC:\Windows\system32\Lhiakf32.exe176⤵
-
C:\Windows\SysWOW64\Lbafdlod.exeC:\Windows\system32\Lbafdlod.exe177⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lnhgim32.exeC:\Windows\system32\Lnhgim32.exe178⤵
-
C:\Windows\SysWOW64\Lgqkbb32.exeC:\Windows\system32\Lgqkbb32.exe179⤵
-
C:\Windows\SysWOW64\Lqipkhbj.exeC:\Windows\system32\Lqipkhbj.exe180⤵
-
C:\Windows\SysWOW64\Mkndhabp.exeC:\Windows\system32\Mkndhabp.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mkqqnq32.exeC:\Windows\system32\Mkqqnq32.exe182⤵
-
C:\Windows\SysWOW64\Mdiefffn.exeC:\Windows\system32\Mdiefffn.exe183⤵
-
C:\Windows\SysWOW64\Mqpflg32.exeC:\Windows\system32\Mqpflg32.exe184⤵
-
C:\Windows\SysWOW64\Mfmndn32.exeC:\Windows\system32\Mfmndn32.exe185⤵
-
C:\Windows\SysWOW64\Mcqombic.exeC:\Windows\system32\Mcqombic.exe186⤵
-
C:\Windows\SysWOW64\Mmicfh32.exeC:\Windows\system32\Mmicfh32.exe187⤵
-
C:\Windows\SysWOW64\Nedhjj32.exeC:\Windows\system32\Nedhjj32.exe188⤵
-
C:\Windows\SysWOW64\Nbhhdnlh.exeC:\Windows\system32\Nbhhdnlh.exe189⤵
-
C:\Windows\SysWOW64\Nplimbka.exeC:\Windows\system32\Nplimbka.exe190⤵
-
C:\Windows\SysWOW64\Neiaeiii.exeC:\Windows\system32\Neiaeiii.exe191⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Neknki32.exeC:\Windows\system32\Neknki32.exe192⤵
-
C:\Windows\SysWOW64\Nncbdomg.exeC:\Windows\system32\Nncbdomg.exe193⤵
-
C:\Windows\SysWOW64\Nhlgmd32.exeC:\Windows\system32\Nhlgmd32.exe194⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Omioekbo.exeC:\Windows\system32\Omioekbo.exe195⤵
-
C:\Windows\SysWOW64\Ojmpooah.exeC:\Windows\system32\Ojmpooah.exe196⤵
-
C:\Windows\SysWOW64\Oaghki32.exeC:\Windows\system32\Oaghki32.exe197⤵
-
C:\Windows\SysWOW64\Omnipjni.exeC:\Windows\system32\Omnipjni.exe198⤵
-
C:\Windows\SysWOW64\Offmipej.exeC:\Windows\system32\Offmipej.exe199⤵
-
C:\Windows\SysWOW64\Ooabmbbe.exeC:\Windows\system32\Ooabmbbe.exe200⤵
-
C:\Windows\SysWOW64\Oekjjl32.exeC:\Windows\system32\Oekjjl32.exe201⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Oococb32.exeC:\Windows\system32\Oococb32.exe202⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Plgolf32.exeC:\Windows\system32\Plgolf32.exe203⤵
-
C:\Windows\SysWOW64\Pepcelel.exeC:\Windows\system32\Pepcelel.exe204⤵
-
C:\Windows\SysWOW64\Pkmlmbcd.exeC:\Windows\system32\Pkmlmbcd.exe205⤵
-
C:\Windows\SysWOW64\Pdeqfhjd.exeC:\Windows\system32\Pdeqfhjd.exe206⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pkoicb32.exeC:\Windows\system32\Pkoicb32.exe207⤵
-
C:\Windows\SysWOW64\Pidfdofi.exeC:\Windows\system32\Pidfdofi.exe208⤵
-
C:\Windows\SysWOW64\Pkcbnanl.exeC:\Windows\system32\Pkcbnanl.exe209⤵
-
C:\Windows\SysWOW64\Qppkfhlc.exeC:\Windows\system32\Qppkfhlc.exe210⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Qlgkki32.exeC:\Windows\system32\Qlgkki32.exe211⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Qjklenpa.exeC:\Windows\system32\Qjklenpa.exe212⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Aohdmdoh.exeC:\Windows\system32\Aohdmdoh.exe213⤵
-
C:\Windows\SysWOW64\Ajmijmnn.exeC:\Windows\system32\Ajmijmnn.exe214⤵
-
C:\Windows\SysWOW64\Bgllgedi.exeC:\Windows\system32\Bgllgedi.exe215⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bqeqqk32.exeC:\Windows\system32\Bqeqqk32.exe216⤵
-
C:\Windows\SysWOW64\Bniajoic.exeC:\Windows\system32\Bniajoic.exe217⤵
-
C:\Windows\SysWOW64\Bceibfgj.exeC:\Windows\system32\Bceibfgj.exe218⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bqijljfd.exeC:\Windows\system32\Bqijljfd.exe219⤵
-
C:\Windows\SysWOW64\Bieopm32.exeC:\Windows\system32\Bieopm32.exe220⤵
-
C:\Windows\SysWOW64\Bfioia32.exeC:\Windows\system32\Bfioia32.exe221⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ccmpce32.exeC:\Windows\system32\Ccmpce32.exe222⤵
-
C:\Windows\SysWOW64\Cocphf32.exeC:\Windows\system32\Cocphf32.exe223⤵
-
C:\Windows\SysWOW64\Cileqlmg.exeC:\Windows\system32\Cileqlmg.exe224⤵
-
C:\Windows\SysWOW64\Cpfmmf32.exeC:\Windows\system32\Cpfmmf32.exe225⤵
-
C:\Windows\SysWOW64\Cjonncab.exeC:\Windows\system32\Cjonncab.exe226⤵
-
C:\Windows\SysWOW64\Ceebklai.exeC:\Windows\system32\Ceebklai.exe227⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cjakccop.exeC:\Windows\system32\Cjakccop.exe228⤵
-
C:\Windows\SysWOW64\Calcpm32.exeC:\Windows\system32\Calcpm32.exe229⤵
-
C:\Windows\SysWOW64\Cfhkhd32.exeC:\Windows\system32\Cfhkhd32.exe230⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Danpemej.exeC:\Windows\system32\Danpemej.exe231⤵
-
C:\Windows\SysWOW64\Dhhhbg32.exeC:\Windows\system32\Dhhhbg32.exe232⤵
-
C:\Windows\SysWOW64\Daplkmbg.exeC:\Windows\system32\Daplkmbg.exe233⤵
-
C:\Windows\SysWOW64\Dfmeccao.exeC:\Windows\system32\Dfmeccao.exe234⤵
-
C:\Windows\SysWOW64\Dljmlj32.exeC:\Windows\system32\Dljmlj32.exe235⤵
-
C:\Windows\SysWOW64\Dfpaic32.exeC:\Windows\system32\Dfpaic32.exe236⤵
-
C:\Windows\SysWOW64\Dmijfmfi.exeC:\Windows\system32\Dmijfmfi.exe237⤵
-
C:\Windows\SysWOW64\Dbiocd32.exeC:\Windows\system32\Dbiocd32.exe238⤵
-
C:\Windows\SysWOW64\Eheglk32.exeC:\Windows\system32\Eheglk32.exe239⤵
-
C:\Windows\SysWOW64\Edlhqlfi.exeC:\Windows\system32\Edlhqlfi.exe240⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eoblnd32.exeC:\Windows\system32\Eoblnd32.exe241⤵