Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 01:35
Behavioral task
behavioral1
Sample
2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe
-
Size
3.7MB
-
MD5
2bdb9914992c0cb77dfcd57e37bc0940
-
SHA1
0847ab732b76eb2cf0a2837613b79a706f013552
-
SHA256
bfed6a0386932bc5f95ee57db39286286ef61922e9149fe887315777a88dd3d0
-
SHA512
894d6297f1d226cc2d9f7c14ecaf9fb71f618ddea36a270944f9c11bafddea01be560c795269a8edff651ea7065be36218b47762c99c30bd0574df4c00566626
-
SSDEEP
98304:K6r6HaSHFaZRBEYyqmS2DiHPKQgmZ0aUgUjvha/4wzlF65T:4aSHFaZRBEYyqmS2DiHPKQgwUgUjvhoU
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ccahbp32.exeGfhladfn.exeJicgpb32.exeOnmdoioa.exePamiog32.exeFmjejphb.exeHhmepp32.exeKkolkk32.exeAhchbf32.exeEbjglbml.exeOfelmloo.exePgbhabjp.exeBbjbaa32.exeMpjqiq32.exeFhqbkhch.exeQmlgonbe.exeJbjochdi.exeCpnojioo.exeLaegiq32.exeLbfdaigg.exeHellne32.exeAlbjlcao.exeOdobjg32.exeJjpcbe32.exeNdjfeo32.exeJqdipqbp.exeMkgfckcj.exeJbgkcb32.exeGmgdddmq.exeEmnndlod.exeHdildlie.exeGpmjak32.exeAhikqd32.exeBiamilfj.exeOjfaijcc.exePiphee32.exeBbhela32.exeHpapln32.exeHggomh32.exeJonplmcb.exeFljafg32.exeAoepcn32.exeJbdonb32.exeIpjoplgo.exeLjibgg32.exeIkbgmj32.exeJiakjb32.exeOmfkke32.exeCafecmlj.exeHdlhjl32.exeIdceea32.exeKpkofpgq.exeOlmhdf32.exeFmlapp32.exeIhankokm.exeKmjojo32.exeOgeigofa.exeGmpgio32.exeMkhofjoj.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccahbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfhladfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jicgpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onmdoioa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pamiog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmjejphb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhmepp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkolkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahchbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebjglbml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofelmloo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgbhabjp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbjbaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpjqiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhqbkhch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmlgonbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbjochdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpnojioo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laegiq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbfdaigg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hellne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Albjlcao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbjochdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odobjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjpcbe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndjfeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jqdipqbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkgfckcj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbgkcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndjfeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmgdddmq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odobjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emnndlod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdildlie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpmjak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahikqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Biamilfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojfaijcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Piphee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbhela32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpapln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hggomh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jonplmcb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fljafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aoepcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbdonb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipjoplgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljibgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikbgmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jiakjb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omfkke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cafecmlj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdlhjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpapln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idceea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpkofpgq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olmhdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmlapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihankokm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmjojo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkolkk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogeigofa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmpgio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkhofjoj.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Qmlgonbe.exe family_berbew \Windows\SysWOW64\Amndem32.exe family_berbew C:\Windows\SysWOW64\Ahchbf32.exe family_berbew C:\Windows\SysWOW64\Afiecb32.exe family_berbew \Windows\SysWOW64\Ailkjmpo.exe family_berbew C:\Windows\SysWOW64\Bokphdld.exe family_berbew \Windows\SysWOW64\Cjlgiqbk.exe family_berbew \Windows\SysWOW64\Cfgaiaci.exe family_berbew C:\Windows\SysWOW64\Ecmkghcl.exe family_berbew C:\Windows\SysWOW64\Eijcpoac.exe family_berbew \Windows\SysWOW64\Efncicpm.exe family_berbew \Windows\SysWOW64\Ebinic32.exe family_berbew \Windows\SysWOW64\Fhkpmjln.exe family_berbew C:\Windows\SysWOW64\Fhkpmjln.exe family_berbew C:\Windows\SysWOW64\Fmlapp32.exe family_berbew C:\Windows\SysWOW64\Iknnbklc.exe family_berbew C:\Windows\SysWOW64\Idhopq32.exe family_berbew C:\Windows\SysWOW64\Idklfpon.exe family_berbew C:\Windows\SysWOW64\Kkgmgmfd.exe family_berbew C:\Windows\SysWOW64\Kpkofpgq.exe family_berbew C:\Windows\SysWOW64\Kfegbj32.exe family_berbew C:\Windows\SysWOW64\Lbnemk32.exe family_berbew C:\Windows\SysWOW64\Kblhgk32.exe family_berbew C:\Windows\SysWOW64\Kmopod32.exe family_berbew C:\Windows\SysWOW64\Knjbnh32.exe family_berbew C:\Windows\SysWOW64\Ldidkbpb.exe family_berbew C:\Windows\SysWOW64\Mkclhl32.exe family_berbew C:\Windows\SysWOW64\Kcdnao32.exe family_berbew C:\Windows\SysWOW64\Mamddf32.exe family_berbew C:\Windows\SysWOW64\Mkgfckcj.exe family_berbew C:\Windows\SysWOW64\Mmfbogcn.exe family_berbew C:\Windows\SysWOW64\Moiklogi.exe family_berbew C:\Windows\SysWOW64\Kmjfdejp.exe family_berbew C:\Windows\SysWOW64\Miooigfo.exe family_berbew C:\Windows\SysWOW64\Ncjqhmkm.exe family_berbew C:\Windows\SysWOW64\Nkeelohh.exe family_berbew C:\Windows\SysWOW64\Kaceodek.exe family_berbew C:\Windows\SysWOW64\Nejiih32.exe family_berbew C:\Windows\SysWOW64\Nnhkcj32.exe family_berbew C:\Windows\SysWOW64\Onmdoioa.exe family_berbew C:\Windows\SysWOW64\Ogeigofa.exe family_berbew C:\Windows\SysWOW64\Ojfaijcc.exe family_berbew C:\Windows\SysWOW64\Pdaoog32.exe family_berbew C:\Windows\SysWOW64\Pgplkb32.exe family_berbew C:\Windows\SysWOW64\Pgbhabjp.exe family_berbew C:\Windows\SysWOW64\Pbhmnkjf.exe family_berbew C:\Windows\SysWOW64\Piphee32.exe family_berbew C:\Windows\SysWOW64\Pclfkc32.exe family_berbew C:\Windows\SysWOW64\Pamiog32.exe family_berbew C:\Windows\SysWOW64\Obcccl32.exe family_berbew C:\Windows\SysWOW64\Odobjg32.exe family_berbew C:\Windows\SysWOW64\Ofelmloo.exe family_berbew C:\Windows\SysWOW64\Olmhdf32.exe family_berbew C:\Windows\SysWOW64\Aaobdjof.exe family_berbew C:\Windows\SysWOW64\Ahikqd32.exe family_berbew C:\Windows\SysWOW64\Anccmo32.exe family_berbew C:\Windows\SysWOW64\Aoepcn32.exe family_berbew C:\Windows\SysWOW64\Bjlqhoba.exe family_berbew C:\Windows\SysWOW64\Bpiipf32.exe family_berbew C:\Windows\SysWOW64\Bmmiij32.exe family_berbew C:\Windows\SysWOW64\Bbjbaa32.exe family_berbew C:\Windows\SysWOW64\Bekkcljk.exe family_berbew C:\Windows\SysWOW64\Biamilfj.exe family_berbew C:\Windows\SysWOW64\Baakhm32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Qmlgonbe.exeAmndem32.exeAhchbf32.exeAfiecb32.exeAilkjmpo.exeBokphdld.exeCjlgiqbk.exeCfgaiaci.exeEcmkghcl.exeEijcpoac.exeEfncicpm.exeEbinic32.exeFhkpmjln.exeFilldb32.exeFdapak32.exeFmjejphb.exeFddmgjpo.exeFeeiob32.exeFmlapp32.exeGbijhg32.exeGhfbqn32.exeGpmjak32.exeGangic32.exeGldkfl32.exeGaqcoc32.exeGdopkn32.exeGogangdc.exeHknach32.exeHpkjko32.exeHicodd32.exeHggomh32.exeHpocfncj.exeHellne32.exeHpapln32.exeHhmepp32.exeHogmmjfo.exeIdceea32.exeIknnbklc.exeIfcbodli.exeIhankokm.exeIokfhi32.exeIdhopq32.exeIkbgmj32.exeIdklfpon.exeIgihbknb.exeIncpoe32.exeIdmhkpml.exeJjjacf32.exeJqdipqbp.exeJfqahgpg.exeJmjjea32.exeJbgbni32.exeJiakjb32.exeJbjochdi.exeJicgpb32.exeJonplmcb.exeJfghif32.exeJkdpanhg.exeKemejc32.exeKkgmgmfd.exeKaceodek.exeKgnnln32.exeKmjfdejp.exeKcdnao32.exepid process 3048 Qmlgonbe.exe 2600 Amndem32.exe 2676 Ahchbf32.exe 2116 Afiecb32.exe 2392 Ailkjmpo.exe 856 Bokphdld.exe 2724 Cjlgiqbk.exe 1580 Cfgaiaci.exe 2256 Ecmkghcl.exe 2304 Eijcpoac.exe 2276 Efncicpm.exe 340 Ebinic32.exe 2176 Fhkpmjln.exe 2188 Filldb32.exe 1028 Fdapak32.exe 1788 Fmjejphb.exe 2172 Fddmgjpo.exe 2336 Feeiob32.exe 1832 Fmlapp32.exe 1924 Gbijhg32.exe 1896 Ghfbqn32.exe 760 Gpmjak32.exe 1752 Gangic32.exe 2932 Gldkfl32.exe 2064 Gaqcoc32.exe 1572 Gdopkn32.exe 2564 Gogangdc.exe 2688 Hknach32.exe 2396 Hpkjko32.exe 1868 Hicodd32.exe 2708 Hggomh32.exe 2260 Hpocfncj.exe 2504 Hellne32.exe 352 Hpapln32.exe 1756 Hhmepp32.exe 1712 Hogmmjfo.exe 2132 Idceea32.exe 2808 Iknnbklc.exe 2124 Ifcbodli.exe 1104 Ihankokm.exe 1704 Iokfhi32.exe 608 Idhopq32.exe 3060 Ikbgmj32.exe 1876 Idklfpon.exe 1400 Igihbknb.exe 788 Incpoe32.exe 2484 Idmhkpml.exe 2924 Jjjacf32.exe 1012 Jqdipqbp.exe 2844 Jfqahgpg.exe 1932 Jmjjea32.exe 2540 Jbgbni32.exe 3028 Jiakjb32.exe 1544 Jbjochdi.exe 344 Jicgpb32.exe 1620 Jonplmcb.exe 800 Jfghif32.exe 628 Jkdpanhg.exe 2740 Kemejc32.exe 2512 Kkgmgmfd.exe 2952 Kaceodek.exe 2712 Kgnnln32.exe 2812 Kmjfdejp.exe 2288 Kcdnao32.exe -
Loads dropped DLL 64 IoCs
Processes:
2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exeQmlgonbe.exeAmndem32.exeAhchbf32.exeAfiecb32.exeAilkjmpo.exeBokphdld.exeCjlgiqbk.exeCfgaiaci.exeEcmkghcl.exeEijcpoac.exeEfncicpm.exeEbinic32.exeFhkpmjln.exeFilldb32.exeFdapak32.exeFmjejphb.exeFddmgjpo.exeFeeiob32.exeFmlapp32.exeGbijhg32.exeGhfbqn32.exeGpmjak32.exeGangic32.exeGldkfl32.exeGaqcoc32.exeGmgdddmq.exeGogangdc.exeHknach32.exeHpkjko32.exeHicodd32.exeHggomh32.exepid process 1988 2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe 1988 2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe 3048 Qmlgonbe.exe 3048 Qmlgonbe.exe 2600 Amndem32.exe 2600 Amndem32.exe 2676 Ahchbf32.exe 2676 Ahchbf32.exe 2116 Afiecb32.exe 2116 Afiecb32.exe 2392 Ailkjmpo.exe 2392 Ailkjmpo.exe 856 Bokphdld.exe 856 Bokphdld.exe 2724 Cjlgiqbk.exe 2724 Cjlgiqbk.exe 1580 Cfgaiaci.exe 1580 Cfgaiaci.exe 2256 Ecmkghcl.exe 2256 Ecmkghcl.exe 2304 Eijcpoac.exe 2304 Eijcpoac.exe 2276 Efncicpm.exe 2276 Efncicpm.exe 340 Ebinic32.exe 340 Ebinic32.exe 2176 Fhkpmjln.exe 2176 Fhkpmjln.exe 2188 Filldb32.exe 2188 Filldb32.exe 1028 Fdapak32.exe 1028 Fdapak32.exe 1788 Fmjejphb.exe 1788 Fmjejphb.exe 2172 Fddmgjpo.exe 2172 Fddmgjpo.exe 2336 Feeiob32.exe 2336 Feeiob32.exe 1832 Fmlapp32.exe 1832 Fmlapp32.exe 1924 Gbijhg32.exe 1924 Gbijhg32.exe 1896 Ghfbqn32.exe 1896 Ghfbqn32.exe 760 Gpmjak32.exe 760 Gpmjak32.exe 1752 Gangic32.exe 1752 Gangic32.exe 2932 Gldkfl32.exe 2932 Gldkfl32.exe 2064 Gaqcoc32.exe 2064 Gaqcoc32.exe 1628 Gmgdddmq.exe 1628 Gmgdddmq.exe 2564 Gogangdc.exe 2564 Gogangdc.exe 2688 Hknach32.exe 2688 Hknach32.exe 2396 Hpkjko32.exe 2396 Hpkjko32.exe 1868 Hicodd32.exe 1868 Hicodd32.exe 2708 Hggomh32.exe 2708 Hggomh32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Hhmepp32.exeMiooigfo.exeOgeigofa.exeCgejac32.exeGffoldhp.exeFmjejphb.exeHpocfncj.exeJkdpanhg.exeNgkogj32.exeOmfkke32.exeBpiipf32.exeIpjoplgo.exeIdceea32.exeKfegbj32.exeKgemplap.exeFddmgjpo.exeGjdhbc32.exeBaakhm32.exeKkolkk32.exeMigbnb32.exeKohkfj32.exeLbfdaigg.exeJmjjea32.exeJbgbni32.exeOdobjg32.exeHknach32.exeHggomh32.exePgplkb32.exeGpqpjj32.exeMkhofjoj.exeKkgmgmfd.exeHipkdnmf.exeIcjhagdp.exeLjibgg32.exeAfiecb32.exeMmfbogcn.exeNnhkcj32.exeFekpnn32.exeIknnbklc.exeNpagjpcd.exeCfgaiaci.exeKcdnao32.exeMlcbenjb.exeBjlqhoba.exeKbfhbeek.exePclfkc32.exeNcjqhmkm.exeKaceodek.exeGfobbc32.exeJfghif32.exeCklmgb32.exeKnmhgf32.exedescription ioc process File created C:\Windows\SysWOW64\Ojhcelga.dll Hhmepp32.exe File opened for modification C:\Windows\SysWOW64\Nhdlkdkg.exe Miooigfo.exe File opened for modification C:\Windows\SysWOW64\Ohfeog32.exe Ogeigofa.exe File opened for modification C:\Windows\SysWOW64\Cjdfmo32.exe Cgejac32.exe File opened for modification C:\Windows\SysWOW64\Gmpgio32.exe Gffoldhp.exe File opened for modification C:\Windows\SysWOW64\Fddmgjpo.exe Fmjejphb.exe File created C:\Windows\SysWOW64\Hellne32.exe Hpocfncj.exe File opened for modification C:\Windows\SysWOW64\Kemejc32.exe Jkdpanhg.exe File created C:\Windows\SysWOW64\Niikceid.exe Ngkogj32.exe File opened for modification C:\Windows\SysWOW64\Obcccl32.exe Omfkke32.exe File opened for modification C:\Windows\SysWOW64\Bbhela32.exe Bpiipf32.exe File created C:\Windows\SysWOW64\Ilqpdm32.exe Ipjoplgo.exe File opened for modification C:\Windows\SysWOW64\Iknnbklc.exe Idceea32.exe File opened for modification C:\Windows\SysWOW64\Kmopod32.exe Kfegbj32.exe File opened for modification C:\Windows\SysWOW64\Knpemf32.exe Kgemplap.exe File opened for modification C:\Windows\SysWOW64\Feeiob32.exe Fddmgjpo.exe File opened for modification C:\Windows\SysWOW64\Gpqpjj32.exe Gjdhbc32.exe File opened for modification C:\Windows\SysWOW64\Ccahbp32.exe Baakhm32.exe File opened for modification C:\Windows\SysWOW64\Knmhgf32.exe Kkolkk32.exe File created C:\Windows\SysWOW64\Mkhofjoj.exe Migbnb32.exe File created C:\Windows\SysWOW64\Padajbnl.dll Kohkfj32.exe File opened for modification C:\Windows\SysWOW64\Mlaeonld.exe Lbfdaigg.exe File created C:\Windows\SysWOW64\Jbgbni32.exe Jmjjea32.exe File created C:\Windows\SysWOW64\Maodqp32.dll Jbgbni32.exe File created C:\Windows\SysWOW64\Nclpan32.dll Jkdpanhg.exe File opened for modification C:\Windows\SysWOW64\Omfkke32.exe Odobjg32.exe File created C:\Windows\SysWOW64\Lnlmhpjh.dll Migbnb32.exe File opened for modification C:\Windows\SysWOW64\Hpkjko32.exe Hknach32.exe File created C:\Windows\SysWOW64\Hpocfncj.exe Hggomh32.exe File opened for modification C:\Windows\SysWOW64\Piphee32.exe Pgplkb32.exe File created C:\Windows\SysWOW64\Gikaio32.exe Gpqpjj32.exe File created C:\Windows\SysWOW64\Mbpgggol.exe Mkhofjoj.exe File created C:\Windows\SysWOW64\Codpklfq.dll Hknach32.exe File created C:\Windows\SysWOW64\Ldlimbcf.dll Kkgmgmfd.exe File created C:\Windows\SysWOW64\Hdildlie.exe Hipkdnmf.exe File created C:\Windows\SysWOW64\Icmegf32.exe Icjhagdp.exe File created C:\Windows\SysWOW64\Gabqfggi.dll Ljibgg32.exe File created C:\Windows\SysWOW64\Ailkjmpo.exe Afiecb32.exe File opened for modification C:\Windows\SysWOW64\Moiklogi.exe Mmfbogcn.exe File opened for modification C:\Windows\SysWOW64\Npfgpe32.exe Nnhkcj32.exe File created C:\Windows\SysWOW64\Bneqdoee.dll Baakhm32.exe File created C:\Windows\SysWOW64\Mfmhdknh.dll Fekpnn32.exe File created C:\Windows\SysWOW64\Qpehocqo.dll Hipkdnmf.exe File opened for modification C:\Windows\SysWOW64\Ifcbodli.exe Iknnbklc.exe File created C:\Windows\SysWOW64\Nhdlkdkg.exe Miooigfo.exe File created C:\Windows\SysWOW64\Mlaeonld.exe Lbfdaigg.exe File created C:\Windows\SysWOW64\Kklcab32.dll Npagjpcd.exe File opened for modification C:\Windows\SysWOW64\Ecmkghcl.exe Cfgaiaci.exe File opened for modification C:\Windows\SysWOW64\Knjbnh32.exe Kcdnao32.exe File created C:\Windows\SysWOW64\Pecomlgc.dll Lbfdaigg.exe File created C:\Windows\SysWOW64\Mponel32.exe Mlcbenjb.exe File opened for modification C:\Windows\SysWOW64\Bpiipf32.exe Bjlqhoba.exe File opened for modification C:\Windows\SysWOW64\Kkolkk32.exe Kbfhbeek.exe File created C:\Windows\SysWOW64\Albjlcao.exe Pclfkc32.exe File created C:\Windows\SysWOW64\Ihclng32.dll Kgemplap.exe File opened for modification C:\Windows\SysWOW64\Nkeelohh.exe Ncjqhmkm.exe File created C:\Windows\SysWOW64\Lcoich32.dll Nnhkcj32.exe File created C:\Windows\SysWOW64\Kgnnln32.exe Kaceodek.exe File created C:\Windows\SysWOW64\Godgob32.dll Gfobbc32.exe File created C:\Windows\SysWOW64\Pljpdpao.dll Hpocfncj.exe File created C:\Windows\SysWOW64\Jkdpanhg.exe Jfghif32.exe File created C:\Windows\SysWOW64\Bahbme32.dll Jmjjea32.exe File created C:\Windows\SysWOW64\Cfgnhbba.dll Cklmgb32.exe File created C:\Windows\SysWOW64\Kgemplap.exe Knmhgf32.exe -
Modifies registry class 64 IoCs
Processes:
Jjpcbe32.exeIkbgmj32.exeIdklfpon.exeJjjacf32.exeMlaeonld.exeAfiecb32.exeFilldb32.exeMholen32.exeAhchbf32.exeIlqpdm32.exeOfelmloo.exeLaegiq32.exeKnmhgf32.exeMkmhaj32.exeNejiih32.exeBmmiij32.exeKemejc32.exeNpfgpe32.exeAoepcn32.exeKohkfj32.exeFmjejphb.exeIokfhi32.exeKgemplap.exeLjibgg32.exeLbfdaigg.exeMkgfckcj.exeIcjhagdp.exePgplkb32.exeLcojjmea.exeMponel32.exeMkhofjoj.exeNmpnhdfc.exeFmlapp32.exeJfghif32.exeGogangdc.exeBoqbfb32.exeGmpgio32.exeGpejeihi.exeJkjfah32.exeNmnace32.exeGangic32.exeGldkfl32.exeJfiale32.exeKnpemf32.exeGbijhg32.exeJmjjea32.exeBbhela32.exeGffoldhp.exeGjdhbc32.exeHaiccald.exeEcmkghcl.exeIncpoe32.exeHogmmjfo.exePdaoog32.exeHpapln32.exeBpiipf32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjpcbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikbgmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlfgbn32.dll" Idklfpon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjjacf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlaeonld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afiecb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nopodm32.dll" Filldb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mholen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahchbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnhplkhl.dll" Ilqpdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofelmloo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Laegiq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knmhgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkmhaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nejiih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmmiij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kemejc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npfgpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oegjkb32.dll" Aoepcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kohkfj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmjejphb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iokfhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgemplap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljibgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbfdaigg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohkgmi32.dll" Mkgfckcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnbfqn32.dll" Icjhagdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjjndgdk.dll" Kemejc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgplkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcojjmea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpahiebe.dll" Mkhofjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjbgng32.dll" Nmpnhdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmlapp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfghif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpajnpao.dll" Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkddcl32.dll" Pgplkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boqbfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gmpgio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpejeihi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkjfah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kohkfj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmnace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gangic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljdjcj32.dll" Jjjacf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fndldonj.dll" Gldkfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfiale32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knpemf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmlapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbijhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bahbme32.dll" Jmjjea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iecenlqh.dll" Bbhela32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gffoldhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmaqpohl.dll" Gjdhbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfbnag32.dll" Haiccald.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihclng32.dll" Kgemplap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecmkghcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Incpoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hogmmjfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdaoog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiiddiab.dll" Jkjfah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlidlf32.dll" Fmjejphb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdhaablp.dll" Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igmdobgi.dll" Bpiipf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exeQmlgonbe.exeAmndem32.exeAhchbf32.exeAfiecb32.exeAilkjmpo.exeBokphdld.exeCjlgiqbk.exeCfgaiaci.exeEcmkghcl.exeEijcpoac.exeEfncicpm.exeEbinic32.exeFhkpmjln.exeFilldb32.exeFdapak32.exedescription pid process target process PID 1988 wrote to memory of 3048 1988 2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe Qmlgonbe.exe PID 1988 wrote to memory of 3048 1988 2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe Qmlgonbe.exe PID 1988 wrote to memory of 3048 1988 2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe Qmlgonbe.exe PID 1988 wrote to memory of 3048 1988 2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe Qmlgonbe.exe PID 3048 wrote to memory of 2600 3048 Qmlgonbe.exe Amndem32.exe PID 3048 wrote to memory of 2600 3048 Qmlgonbe.exe Amndem32.exe PID 3048 wrote to memory of 2600 3048 Qmlgonbe.exe Amndem32.exe PID 3048 wrote to memory of 2600 3048 Qmlgonbe.exe Amndem32.exe PID 2600 wrote to memory of 2676 2600 Amndem32.exe Ahchbf32.exe PID 2600 wrote to memory of 2676 2600 Amndem32.exe Ahchbf32.exe PID 2600 wrote to memory of 2676 2600 Amndem32.exe Ahchbf32.exe PID 2600 wrote to memory of 2676 2600 Amndem32.exe Ahchbf32.exe PID 2676 wrote to memory of 2116 2676 Ahchbf32.exe Afiecb32.exe PID 2676 wrote to memory of 2116 2676 Ahchbf32.exe Afiecb32.exe PID 2676 wrote to memory of 2116 2676 Ahchbf32.exe Afiecb32.exe PID 2676 wrote to memory of 2116 2676 Ahchbf32.exe Afiecb32.exe PID 2116 wrote to memory of 2392 2116 Afiecb32.exe Ailkjmpo.exe PID 2116 wrote to memory of 2392 2116 Afiecb32.exe Ailkjmpo.exe PID 2116 wrote to memory of 2392 2116 Afiecb32.exe Ailkjmpo.exe PID 2116 wrote to memory of 2392 2116 Afiecb32.exe Ailkjmpo.exe PID 2392 wrote to memory of 856 2392 Ailkjmpo.exe Bokphdld.exe PID 2392 wrote to memory of 856 2392 Ailkjmpo.exe Bokphdld.exe PID 2392 wrote to memory of 856 2392 Ailkjmpo.exe Bokphdld.exe PID 2392 wrote to memory of 856 2392 Ailkjmpo.exe Bokphdld.exe PID 856 wrote to memory of 2724 856 Bokphdld.exe Cjlgiqbk.exe PID 856 wrote to memory of 2724 856 Bokphdld.exe Cjlgiqbk.exe PID 856 wrote to memory of 2724 856 Bokphdld.exe Cjlgiqbk.exe PID 856 wrote to memory of 2724 856 Bokphdld.exe Cjlgiqbk.exe PID 2724 wrote to memory of 1580 2724 Cjlgiqbk.exe Cfgaiaci.exe PID 2724 wrote to memory of 1580 2724 Cjlgiqbk.exe Cfgaiaci.exe PID 2724 wrote to memory of 1580 2724 Cjlgiqbk.exe Cfgaiaci.exe PID 2724 wrote to memory of 1580 2724 Cjlgiqbk.exe Cfgaiaci.exe PID 1580 wrote to memory of 2256 1580 Cfgaiaci.exe Ecmkghcl.exe PID 1580 wrote to memory of 2256 1580 Cfgaiaci.exe Ecmkghcl.exe PID 1580 wrote to memory of 2256 1580 Cfgaiaci.exe Ecmkghcl.exe PID 1580 wrote to memory of 2256 1580 Cfgaiaci.exe Ecmkghcl.exe PID 2256 wrote to memory of 2304 2256 Ecmkghcl.exe Eijcpoac.exe PID 2256 wrote to memory of 2304 2256 Ecmkghcl.exe Eijcpoac.exe PID 2256 wrote to memory of 2304 2256 Ecmkghcl.exe Eijcpoac.exe PID 2256 wrote to memory of 2304 2256 Ecmkghcl.exe Eijcpoac.exe PID 2304 wrote to memory of 2276 2304 Eijcpoac.exe Efncicpm.exe PID 2304 wrote to memory of 2276 2304 Eijcpoac.exe Efncicpm.exe PID 2304 wrote to memory of 2276 2304 Eijcpoac.exe Efncicpm.exe PID 2304 wrote to memory of 2276 2304 Eijcpoac.exe Efncicpm.exe PID 2276 wrote to memory of 340 2276 Efncicpm.exe Ebinic32.exe PID 2276 wrote to memory of 340 2276 Efncicpm.exe Ebinic32.exe PID 2276 wrote to memory of 340 2276 Efncicpm.exe Ebinic32.exe PID 2276 wrote to memory of 340 2276 Efncicpm.exe Ebinic32.exe PID 340 wrote to memory of 2176 340 Ebinic32.exe Fhkpmjln.exe PID 340 wrote to memory of 2176 340 Ebinic32.exe Fhkpmjln.exe PID 340 wrote to memory of 2176 340 Ebinic32.exe Fhkpmjln.exe PID 340 wrote to memory of 2176 340 Ebinic32.exe Fhkpmjln.exe PID 2176 wrote to memory of 2188 2176 Fhkpmjln.exe Filldb32.exe PID 2176 wrote to memory of 2188 2176 Fhkpmjln.exe Filldb32.exe PID 2176 wrote to memory of 2188 2176 Fhkpmjln.exe Filldb32.exe PID 2176 wrote to memory of 2188 2176 Fhkpmjln.exe Filldb32.exe PID 2188 wrote to memory of 1028 2188 Filldb32.exe Fdapak32.exe PID 2188 wrote to memory of 1028 2188 Filldb32.exe Fdapak32.exe PID 2188 wrote to memory of 1028 2188 Filldb32.exe Fdapak32.exe PID 2188 wrote to memory of 1028 2188 Filldb32.exe Fdapak32.exe PID 1028 wrote to memory of 1788 1028 Fdapak32.exe Fmjejphb.exe PID 1028 wrote to memory of 1788 1028 Fdapak32.exe Fmjejphb.exe PID 1028 wrote to memory of 1788 1028 Fdapak32.exe Fmjejphb.exe PID 1028 wrote to memory of 1788 1028 Fdapak32.exe Fmjejphb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2bdb9914992c0cb77dfcd57e37bc0940_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\Qmlgonbe.exeC:\Windows\system32\Qmlgonbe.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Amndem32.exeC:\Windows\system32\Amndem32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Ahchbf32.exeC:\Windows\system32\Ahchbf32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Afiecb32.exeC:\Windows\system32\Afiecb32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\Ailkjmpo.exeC:\Windows\system32\Ailkjmpo.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Bokphdld.exeC:\Windows\system32\Bokphdld.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\Cjlgiqbk.exeC:\Windows\system32\Cjlgiqbk.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Cfgaiaci.exeC:\Windows\system32\Cfgaiaci.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\Ecmkghcl.exeC:\Windows\system32\Ecmkghcl.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Efncicpm.exeC:\Windows\system32\Efncicpm.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\Ebinic32.exeC:\Windows\system32\Ebinic32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\Fhkpmjln.exeC:\Windows\system32\Fhkpmjln.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\Filldb32.exeC:\Windows\system32\Filldb32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\Fmjejphb.exeC:\Windows\system32\Fmjejphb.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1788 -
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\Feeiob32.exeC:\Windows\system32\Feeiob32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2336 -
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1832 -
C:\Windows\SysWOW64\Gbijhg32.exeC:\Windows\system32\Gbijhg32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Ghfbqn32.exeC:\Windows\system32\Ghfbqn32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1896 -
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:760 -
C:\Windows\SysWOW64\Gangic32.exeC:\Windows\system32\Gangic32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2932 -
C:\Windows\SysWOW64\Gaqcoc32.exeC:\Windows\system32\Gaqcoc32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Windows\SysWOW64\Gdopkn32.exeC:\Windows\system32\Gdopkn32.exe27⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\Gmgdddmq.exeC:\Windows\system32\Gmgdddmq.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
PID:1628 -
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2396 -
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868 -
C:\Windows\SysWOW64\Hggomh32.exeC:\Windows\system32\Hggomh32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Hpapln32.exeC:\Windows\system32\Hpapln32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:352 -
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\Iknnbklc.exeC:\Windows\system32\Iknnbklc.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe41⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\Ihankokm.exeC:\Windows\system32\Ihankokm.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1104 -
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Idhopq32.exeC:\Windows\system32\Idhopq32.exe44⤵
- Executes dropped EXE
PID:608 -
C:\Windows\SysWOW64\Ikbgmj32.exeC:\Windows\system32\Ikbgmj32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Idklfpon.exeC:\Windows\system32\Idklfpon.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1876 -
C:\Windows\SysWOW64\Igihbknb.exeC:\Windows\system32\Igihbknb.exe47⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\Incpoe32.exeC:\Windows\system32\Incpoe32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:788 -
C:\Windows\SysWOW64\Idmhkpml.exeC:\Windows\system32\Idmhkpml.exe49⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\Jjjacf32.exeC:\Windows\system32\Jjjacf32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Jqdipqbp.exeC:\Windows\system32\Jqdipqbp.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\Jfqahgpg.exeC:\Windows\system32\Jfqahgpg.exe52⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\Jmjjea32.exeC:\Windows\system32\Jmjjea32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Jbgbni32.exeC:\Windows\system32\Jbgbni32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\Jiakjb32.exeC:\Windows\system32\Jiakjb32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\Jbjochdi.exeC:\Windows\system32\Jbjochdi.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Jicgpb32.exeC:\Windows\system32\Jicgpb32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:344 -
C:\Windows\SysWOW64\Jonplmcb.exeC:\Windows\system32\Jonplmcb.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Jfghif32.exeC:\Windows\system32\Jfghif32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:800 -
C:\Windows\SysWOW64\Jkdpanhg.exeC:\Windows\system32\Jkdpanhg.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:628 -
C:\Windows\SysWOW64\Kemejc32.exeC:\Windows\system32\Kemejc32.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Kkgmgmfd.exeC:\Windows\system32\Kkgmgmfd.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\Kaceodek.exeC:\Windows\system32\Kaceodek.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\Kgnnln32.exeC:\Windows\system32\Kgnnln32.exe64⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\Kmjfdejp.exeC:\Windows\system32\Kmjfdejp.exe65⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Kcdnao32.exeC:\Windows\system32\Kcdnao32.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\Knjbnh32.exeC:\Windows\system32\Knjbnh32.exe67⤵PID:2612
-
C:\Windows\SysWOW64\Kpkofpgq.exeC:\Windows\system32\Kpkofpgq.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2944 -
C:\Windows\SysWOW64\Kfegbj32.exeC:\Windows\system32\Kfegbj32.exe69⤵
- Drops file in System32 directory
PID:780 -
C:\Windows\SysWOW64\Kmopod32.exeC:\Windows\system32\Kmopod32.exe70⤵PID:1880
-
C:\Windows\SysWOW64\Kblhgk32.exeC:\Windows\system32\Kblhgk32.exe71⤵PID:1044
-
C:\Windows\SysWOW64\Lldlqakb.exeC:\Windows\system32\Lldlqakb.exe72⤵PID:1452
-
C:\Windows\SysWOW64\Lbnemk32.exeC:\Windows\system32\Lbnemk32.exe73⤵PID:2828
-
C:\Windows\SysWOW64\Ldidkbpb.exeC:\Windows\system32\Ldidkbpb.exe74⤵PID:1624
-
C:\Windows\SysWOW64\Mkclhl32.exeC:\Windows\system32\Mkclhl32.exe75⤵PID:1920
-
C:\Windows\SysWOW64\Mamddf32.exeC:\Windows\system32\Mamddf32.exe76⤵PID:932
-
C:\Windows\SysWOW64\Mkgfckcj.exeC:\Windows\system32\Mkgfckcj.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\Mmfbogcn.exeC:\Windows\system32\Mmfbogcn.exe78⤵
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Moiklogi.exeC:\Windows\system32\Moiklogi.exe79⤵PID:2416
-
C:\Windows\SysWOW64\Miooigfo.exeC:\Windows\system32\Miooigfo.exe80⤵
- Drops file in System32 directory
PID:2076 -
C:\Windows\SysWOW64\Nhdlkdkg.exeC:\Windows\system32\Nhdlkdkg.exe81⤵PID:2936
-
C:\Windows\SysWOW64\Ncjqhmkm.exeC:\Windows\system32\Ncjqhmkm.exe82⤵
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\Nkeelohh.exeC:\Windows\system32\Nkeelohh.exe83⤵PID:2572
-
C:\Windows\SysWOW64\Nejiih32.exeC:\Windows\system32\Nejiih32.exe84⤵
- Modifies registry class
PID:1836 -
C:\Windows\SysWOW64\Nnhkcj32.exeC:\Windows\system32\Nnhkcj32.exe85⤵
- Drops file in System32 directory
PID:3068 -
C:\Windows\SysWOW64\Npfgpe32.exeC:\Windows\system32\Npfgpe32.exe86⤵
- Modifies registry class
PID:2352 -
C:\Windows\SysWOW64\Ojolhk32.exeC:\Windows\system32\Ojolhk32.exe87⤵PID:2292
-
C:\Windows\SysWOW64\Olmhdf32.exeC:\Windows\system32\Olmhdf32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2888 -
C:\Windows\SysWOW64\Ofelmloo.exeC:\Windows\system32\Ofelmloo.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Onmdoioa.exeC:\Windows\system32\Onmdoioa.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:540 -
C:\Windows\SysWOW64\Ogeigofa.exeC:\Windows\system32\Ogeigofa.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\Ohfeog32.exeC:\Windows\system32\Ohfeog32.exe92⤵PID:2480
-
C:\Windows\SysWOW64\Ojfaijcc.exeC:\Windows\system32\Ojfaijcc.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1184 -
C:\Windows\SysWOW64\Oobjaqaj.exeC:\Windows\system32\Oobjaqaj.exe94⤵PID:1940
-
C:\Windows\SysWOW64\Odobjg32.exeC:\Windows\system32\Odobjg32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\Omfkke32.exeC:\Windows\system32\Omfkke32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Obcccl32.exeC:\Windows\system32\Obcccl32.exe97⤵PID:684
-
C:\Windows\SysWOW64\Pdaoog32.exeC:\Windows\system32\Pdaoog32.exe98⤵
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\Pgplkb32.exeC:\Windows\system32\Pgplkb32.exe99⤵
- Drops file in System32 directory
- Modifies registry class
PID:1848 -
C:\Windows\SysWOW64\Piphee32.exeC:\Windows\system32\Piphee32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3032 -
C:\Windows\SysWOW64\Pgbhabjp.exeC:\Windows\system32\Pgbhabjp.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2236 -
C:\Windows\SysWOW64\Pbhmnkjf.exeC:\Windows\system32\Pbhmnkjf.exe102⤵PID:2792
-
C:\Windows\SysWOW64\Pamiog32.exeC:\Windows\system32\Pamiog32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2428 -
C:\Windows\SysWOW64\Pclfkc32.exeC:\Windows\system32\Pclfkc32.exe104⤵
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\Albjlcao.exeC:\Windows\system32\Albjlcao.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2000 -
C:\Windows\SysWOW64\Aaobdjof.exeC:\Windows\system32\Aaobdjof.exe106⤵PID:1504
-
C:\Windows\SysWOW64\Ahikqd32.exeC:\Windows\system32\Ahikqd32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1980 -
C:\Windows\SysWOW64\Anccmo32.exeC:\Windows\system32\Anccmo32.exe108⤵PID:1212
-
C:\Windows\SysWOW64\Aoepcn32.exeC:\Windows\system32\Aoepcn32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Bjlqhoba.exeC:\Windows\system32\Bjlqhoba.exe110⤵
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\Bpiipf32.exeC:\Windows\system32\Bpiipf32.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Bbhela32.exeC:\Windows\system32\Bbhela32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Biamilfj.exeC:\Windows\system32\Biamilfj.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1668 -
C:\Windows\SysWOW64\Bmmiij32.exeC:\Windows\system32\Bmmiij32.exe114⤵
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Bbjbaa32.exeC:\Windows\system32\Bbjbaa32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2328 -
C:\Windows\SysWOW64\Boqbfb32.exeC:\Windows\system32\Boqbfb32.exe116⤵
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\Bekkcljk.exeC:\Windows\system32\Bekkcljk.exe117⤵PID:2348
-
C:\Windows\SysWOW64\Baakhm32.exeC:\Windows\system32\Baakhm32.exe118⤵
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\Ccahbp32.exeC:\Windows\system32\Ccahbp32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1512 -
C:\Windows\SysWOW64\Cdbdjhmp.exeC:\Windows\system32\Cdbdjhmp.exe120⤵PID:1900
-
C:\Windows\SysWOW64\Cklmgb32.exeC:\Windows\system32\Cklmgb32.exe121⤵
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\Cafecmlj.exeC:\Windows\system32\Cafecmlj.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-