Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 04:36
Behavioral task
behavioral1
Sample
2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe
-
Size
640KB
-
MD5
2dca942b640d9e0de64bab544a9eee90
-
SHA1
fc3d646fb987aee7a596418a1c4d98c21913af23
-
SHA256
e3f864a8054bf2a554b384e82db110ab140441ffcd3b4297b91bc8f78c0ce4fb
-
SHA512
74a5f9307f4eb0963e6b3b89655ef784e44f1ae63f6247d3b27f29165d463287d12404ced82e21bdc61f9479d39694ffd0e7a925a8308a63e5befecebfc0edc7
-
SSDEEP
12288:gIZRBcb1dXHaINIVIIVy2oIvPKiK13fS2hEYM9RIPk:gT1dXHfNIVIIVy2jU13fS2hEYM9RIPk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fooeif32.exeAjhddjfn.exeDeagdn32.exeAhkobekf.exeHelfik32.exeAfjlnk32.exeMmpijp32.exeDgbdlf32.exeBhikcb32.exeKbceejpf.exePmfhig32.exeEdihepnm.exeFdlnbm32.exeOcgmpccl.exeDmjocp32.exeCdkldb32.exeAeiofcji.exeAmddjegd.exeMeiaib32.exeMdmnlj32.exePfolbmje.exeAdapgfqj.exeBaaplhef.exeConclk32.exeAjckij32.exeJmmjgejj.exeOcnjidkf.exeCmiflbel.exeFojlngce.exeIefioj32.exePgllfp32.exeHbgmcnhf.exeMegdccmb.exePdmpje32.exeAlkdnboj.exeClkndpag.exeEkhjmiad.exeMlefklpj.exeBmkjkd32.exeAjkhdp32.exeCbcilkjg.exeJlpkba32.exeAmpkof32.exeDkkcge32.exePcbmka32.exeDfnjafap.exeNggjdc32.exePfaigm32.exeHfifmnij.exeCffdpghg.exeKbaipkbi.exeGbbkaako.exeJlbgha32.exePnbbbabh.exeIehfdi32.exeCalhnpgn.exeAanjpk32.exeJbeidl32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fooeif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajhddjfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahkobekf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Helfik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afjlnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmpijp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhikcb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbceejpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmpijp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmfhig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edihepnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdlnbm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocgmpccl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdkldb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeiofcji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amddjegd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Meiaib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdmnlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfolbmje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adapgfqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baaplhef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Conclk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajckij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmmjgejj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocnjidkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmiflbel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fojlngce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iefioj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgllfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbgmcnhf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Megdccmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdmpje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alkdnboj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clkndpag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekhjmiad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlefklpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmkjkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajkhdp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbcilkjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Conclk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlpkba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ampkof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbgmcnhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcbmka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clkndpag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nggjdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfaigm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfifmnij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgllfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffdpghg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbaipkbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdlnbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbbkaako.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlbgha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnbbbabh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iehfdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Calhnpgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aanjpk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbeidl32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Nqpego32.exe family_berbew C:\Windows\SysWOW64\Ogljjiei.exe family_berbew C:\Windows\SysWOW64\Ojjffddl.exe family_berbew C:\Windows\SysWOW64\Ocegdjij.exe family_berbew C:\Windows\SysWOW64\Okloegjl.exe family_berbew C:\Windows\SysWOW64\Onklabip.exe family_berbew C:\Windows\SysWOW64\Pghieg32.exe family_berbew C:\Windows\SysWOW64\Pnbbbabh.exe family_berbew C:\Windows\SysWOW64\Pgjfkg32.exe family_berbew C:\Windows\SysWOW64\Pndohaqe.exe family_berbew C:\Windows\SysWOW64\Pjmlbbdg.exe family_berbew C:\Windows\SysWOW64\Qcepkg32.exe family_berbew C:\Windows\SysWOW64\Qgciaf32.exe family_berbew C:\Windows\SysWOW64\Anpncp32.exe family_berbew C:\Windows\SysWOW64\Aanjpk32.exe family_berbew C:\Windows\SysWOW64\Anbkio32.exe family_berbew C:\Windows\SysWOW64\Edihepnm.exe family_berbew C:\Windows\SysWOW64\Gdcdbl32.exe family_berbew C:\Windows\SysWOW64\Gcfqfc32.exe family_berbew C:\Windows\SysWOW64\Hkikkeeo.exe family_berbew C:\Windows\SysWOW64\Iefioj32.exe family_berbew C:\Windows\SysWOW64\Kbfbkj32.exe family_berbew C:\Windows\SysWOW64\Lffhfh32.exe family_berbew C:\Windows\SysWOW64\Lgmngglp.exe family_berbew C:\Windows\SysWOW64\Lebkhc32.exe family_berbew C:\Windows\SysWOW64\Ndfqbhia.exe family_berbew C:\Windows\SysWOW64\Opakbi32.exe family_berbew C:\Windows\SysWOW64\Pcbmka32.exe family_berbew C:\Windows\SysWOW64\Aminee32.exe family_berbew C:\Windows\SysWOW64\Cmiflbel.exe family_berbew C:\Windows\SysWOW64\Bfhhoi32.exe family_berbew C:\Windows\SysWOW64\Cjmgfgdf.exe family_berbew C:\Windows\SysWOW64\Cmnpgb32.exe family_berbew C:\Windows\SysWOW64\Calhnpgn.exe family_berbew C:\Windows\SysWOW64\Dddhpjof.exe family_berbew C:\Windows\SysWOW64\Djgjlelk.exe family_berbew C:\Windows\SysWOW64\Dejacond.exe family_berbew C:\Windows\SysWOW64\Djdmffnn.exe family_berbew C:\Windows\SysWOW64\Cfdhkhjj.exe family_berbew C:\Windows\SysWOW64\Ceckcp32.exe family_berbew C:\Windows\SysWOW64\Bnkgeg32.exe family_berbew C:\Windows\SysWOW64\Bcebhoii.exe family_berbew C:\Windows\SysWOW64\Agoabn32.exe family_berbew C:\Windows\SysWOW64\Acqimo32.exe family_berbew C:\Windows\SysWOW64\Afmhck32.exe family_berbew C:\Windows\SysWOW64\Aqppkd32.exe family_berbew C:\Windows\SysWOW64\Afjlnk32.exe family_berbew C:\Windows\SysWOW64\Ambgef32.exe family_berbew C:\Windows\SysWOW64\Qgcbgo32.exe family_berbew C:\Windows\SysWOW64\Qceiaa32.exe family_berbew C:\Windows\SysWOW64\Pmidog32.exe family_berbew C:\Windows\SysWOW64\Pfolbmje.exe family_berbew C:\Windows\SysWOW64\Pmfhig32.exe family_berbew C:\Windows\SysWOW64\Pgioqq32.exe family_berbew C:\Windows\SysWOW64\Pqknig32.exe family_berbew C:\Windows\SysWOW64\Ofeilobp.exe family_berbew C:\Windows\SysWOW64\Onjegled.exe family_berbew C:\Windows\SysWOW64\Odapnf32.exe family_berbew C:\Windows\SysWOW64\Odmgcgbi.exe family_berbew C:\Windows\SysWOW64\Oponmilc.exe family_berbew C:\Windows\SysWOW64\Nggjdc32.exe family_berbew C:\Windows\SysWOW64\Njqmepik.exe family_berbew C:\Windows\SysWOW64\Nphhmj32.exe family_berbew C:\Windows\SysWOW64\Npfkgjdn.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Nqpego32.exeOgljjiei.exeOjjffddl.exeOcegdjij.exeOkloegjl.exeOnklabip.exeOdednmpm.exePghieg32.exePnbbbabh.exePqpnombl.exePgjfkg32.exePndohaqe.exePcagphom.exePcccfh32.exePjmlbbdg.exeQcepkg32.exeQgciaf32.exeQjbena32.exeQnnanphk.exeQalnjkgo.exeAcjjfggb.exeAlabgd32.exeAnpncp32.exeAanjpk32.exeAejfpjne.exeAldomc32.exeAnbkio32.exeAaqgek32.exeAelcfilb.exeAhkobekf.exeAjiknpjj.exeAacckjaf.exeAdapgfqj.exeAlhhhcal.exeAjkhdp32.exeAbbpem32.exeAealah32.exeAdcmmeog.exeAlkdnboj.exeAjneip32.exeAbemjmgg.exeBecifhfj.exeBdfibe32.exeBlmacb32.exeBjpaooda.exeBbgipldd.exeBdhfhe32.exeBhdbhcck.exeBjbndobo.exeBbifelba.exeBehbag32.exeBdkcmdhp.exeBlbknaib.exeBjdkjo32.exeBblckl32.exeBejogg32.exeBhikcb32.exeBjghpn32.exeBbnpqk32.exeBaaplhef.exeBdolhc32.exeCbqlfkmi.exeCacmah32.exeCdainc32.exepid process 3080 Nqpego32.exe 3288 Ogljjiei.exe 3536 Ojjffddl.exe 3128 Ocegdjij.exe 4008 Okloegjl.exe 1196 Onklabip.exe 4248 Odednmpm.exe 1980 Pghieg32.exe 2808 Pnbbbabh.exe 400 Pqpnombl.exe 4620 Pgjfkg32.exe 4460 Pndohaqe.exe 2848 Pcagphom.exe 1796 Pcccfh32.exe 4712 Pjmlbbdg.exe 4964 Qcepkg32.exe 2784 Qgciaf32.exe 528 Qjbena32.exe 2660 Qnnanphk.exe 2144 Qalnjkgo.exe 1696 Acjjfggb.exe 4180 Alabgd32.exe 3756 Anpncp32.exe 4156 Aanjpk32.exe 2548 Aejfpjne.exe 912 Aldomc32.exe 1880 Anbkio32.exe 4876 Aaqgek32.exe 2004 Aelcfilb.exe 2032 Ahkobekf.exe 4724 Ajiknpjj.exe 2824 Aacckjaf.exe 4988 Adapgfqj.exe 4364 Alhhhcal.exe 348 Ajkhdp32.exe 3040 Abbpem32.exe 4392 Aealah32.exe 1332 Adcmmeog.exe 2492 Alkdnboj.exe 2368 Ajneip32.exe 4556 Abemjmgg.exe 1356 Becifhfj.exe 1344 Bdfibe32.exe 3740 Blmacb32.exe 1052 Bjpaooda.exe 672 Bbgipldd.exe 1900 Bdhfhe32.exe 3484 Bhdbhcck.exe 2488 Bjbndobo.exe 2872 Bbifelba.exe 4092 Behbag32.exe 4356 Bdkcmdhp.exe 1624 Blbknaib.exe 3428 Bjdkjo32.exe 4864 Bblckl32.exe 1000 Bejogg32.exe 3196 Bhikcb32.exe 5112 Bjghpn32.exe 4448 Bbnpqk32.exe 4944 Baaplhef.exe 4200 Bdolhc32.exe 2196 Cbqlfkmi.exe 3168 Cacmah32.exe 3416 Cdainc32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ecandfpd.exeGfpcgpae.exeGcfqfc32.exeKlqcioba.exeMpjlklok.exeBelebq32.exeQcepkg32.exeEcoangbg.exeFchddejl.exeGhaliknf.exeIpknlb32.exeAclpap32.exeDodbbdbb.exeQjbena32.exeFhqcam32.exeHkikkeeo.exeNnneknob.exeOcegdjij.exeChbnia32.exeKepelfam.exeIkbnacmd.exeImakkfdg.exeLmppcbjd.exeLpcfkm32.exePcbmka32.exeBbnpqk32.exeJmmjgejj.exeEkacmjgl.exeFojlngce.exeIihkpg32.exeCnkplejl.exeCffdpghg.exePghieg32.exeAbbpem32.exeHmjdjgjo.exeJpnchp32.exeCdcoim32.exeNqpego32.exeLiimncmf.exeOpdghh32.exeHcbpab32.exeKmncnb32.exeOjllan32.exeCfmajipb.exeDhfajjoj.exeIcifbang.exeJpgmha32.exeCfdhkhjj.exeQgciaf32.exePfolbmje.exeIfjodl32.exeOfeilobp.exeCfbkeh32.exeGkaejf32.exeAlkdnboj.exeCbcilkjg.exeCbefaj32.exeCecbmf32.exeIldkgc32.exeNnlhfn32.exe2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Ehnglm32.exe Ecandfpd.exe File created C:\Windows\SysWOW64\Ijcoimpn.dll Gfpcgpae.exe File created C:\Windows\SysWOW64\Gfembo32.exe Gcfqfc32.exe File opened for modification C:\Windows\SysWOW64\Kplpjn32.exe Klqcioba.exe File created C:\Windows\SysWOW64\Mchhggno.exe Mpjlklok.exe File created C:\Windows\SysWOW64\Cfmajipb.exe Belebq32.exe File opened for modification C:\Windows\SysWOW64\Qgciaf32.exe Qcepkg32.exe File created C:\Windows\SysWOW64\Mifnjj32.dll Ecoangbg.exe File opened for modification C:\Windows\SysWOW64\Fakdpb32.exe Fchddejl.exe File opened for modification C:\Windows\SysWOW64\Gmlhii32.exe Ghaliknf.exe File opened for modification C:\Windows\SysWOW64\Iehfdi32.exe Ipknlb32.exe File created C:\Windows\SysWOW64\Jmmmebhb.dll Aclpap32.exe File opened for modification C:\Windows\SysWOW64\Daconoae.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Qnnanphk.exe Qjbena32.exe File opened for modification C:\Windows\SysWOW64\Fkopnh32.exe Fhqcam32.exe File created C:\Windows\SysWOW64\Hodgkc32.exe Hkikkeeo.exe File created C:\Windows\SysWOW64\Ndhmhh32.exe Nnneknob.exe File created C:\Windows\SysWOW64\Okloegjl.exe Ocegdjij.exe File created C:\Windows\SysWOW64\Cefoce32.exe Chbnia32.exe File opened for modification C:\Windows\SysWOW64\Kmfmmcbo.exe Kepelfam.exe File created C:\Windows\SysWOW64\Ipdejo32.dll Ikbnacmd.exe File created C:\Windows\SysWOW64\Ildkgc32.exe Imakkfdg.exe File created C:\Windows\SysWOW64\Llcpoo32.exe Lmppcbjd.exe File created C:\Windows\SysWOW64\Lbabgh32.exe Lpcfkm32.exe File created C:\Windows\SysWOW64\Pfaigm32.exe Pcbmka32.exe File created C:\Windows\SysWOW64\Lnaendmh.dll Bbnpqk32.exe File created C:\Windows\SysWOW64\Jjbedgde.dll Jmmjgejj.exe File opened for modification C:\Windows\SysWOW64\Edihepnm.exe Ekacmjgl.exe File created C:\Windows\SysWOW64\Kldggoeb.dll Fojlngce.exe File opened for modification C:\Windows\SysWOW64\Ilghlc32.exe Iihkpg32.exe File opened for modification C:\Windows\SysWOW64\Cmnpgb32.exe Cnkplejl.exe File opened for modification C:\Windows\SysWOW64\Cmqmma32.exe Cffdpghg.exe File created C:\Windows\SysWOW64\Aolmfp32.dll Pghieg32.exe File opened for modification C:\Windows\SysWOW64\Aealah32.exe Abbpem32.exe File opened for modification C:\Windows\SysWOW64\Hkmefd32.exe Hmjdjgjo.exe File opened for modification C:\Windows\SysWOW64\Jblpek32.exe Jpnchp32.exe File created C:\Windows\SysWOW64\Ghekjiam.dll Cdcoim32.exe File created C:\Windows\SysWOW64\Ogljjiei.exe Nqpego32.exe File created C:\Windows\SysWOW64\Edihepnm.exe Ekacmjgl.exe File created C:\Windows\SysWOW64\Amhpcomb.dll Liimncmf.exe File created C:\Windows\SysWOW64\Ocbddc32.exe Opdghh32.exe File created C:\Windows\SysWOW64\Pkbbae32.dll Hcbpab32.exe File created C:\Windows\SysWOW64\Okokppbk.dll Kmncnb32.exe File created C:\Windows\SysWOW64\Hiclgb32.dll Ojllan32.exe File created C:\Windows\SysWOW64\Fqjamcpe.dll Cfmajipb.exe File created C:\Windows\SysWOW64\Hdhpgj32.dll Dhfajjoj.exe File opened for modification C:\Windows\SysWOW64\Ifgbnlmj.exe Icifbang.exe File created C:\Windows\SysWOW64\Eeanii32.dll Jpgmha32.exe File created C:\Windows\SysWOW64\Cnkplejl.exe Cfdhkhjj.exe File opened for modification C:\Windows\SysWOW64\Qjbena32.exe Qgciaf32.exe File created C:\Windows\SysWOW64\Pnfdcjkg.exe Pfolbmje.exe File created C:\Windows\SysWOW64\Adopjh32.dll Ifjodl32.exe File opened for modification C:\Windows\SysWOW64\Pnlaml32.exe Ofeilobp.exe File created C:\Windows\SysWOW64\Maickled.dll Cfbkeh32.exe File opened for modification C:\Windows\SysWOW64\Gomakdcp.exe Gkaejf32.exe File created C:\Windows\SysWOW64\Ieakglmn.dll Hmjdjgjo.exe File created C:\Windows\SysWOW64\Kihgme32.dll Alkdnboj.exe File created C:\Windows\SysWOW64\Jidpnp32.dll Cbcilkjg.exe File opened for modification C:\Windows\SysWOW64\Cecbmf32.exe Cbefaj32.exe File created C:\Windows\SysWOW64\Chbnia32.exe Cecbmf32.exe File created C:\Windows\SysWOW64\Ickchq32.exe Ildkgc32.exe File created C:\Windows\SysWOW64\Ndfqbhia.exe Nnlhfn32.exe File opened for modification C:\Windows\SysWOW64\Nqpego32.exe 2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Pnbbbabh.exe Pghieg32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 10920 10776 WerFault.exe Dmllipeg.exe -
Modifies registry class 64 IoCs
Processes:
Kipkhdeq.exeLgmngglp.exeNljofl32.exeOqhacgdh.exeCalhnpgn.exeBhdbhcck.exeCdkldb32.exeFdialn32.exeFooeif32.exeHijooifk.exeKplpjn32.exeOpakbi32.exeDodbbdbb.exePcagphom.exeAejfpjne.exeHckjacjg.exePcncpbmd.exeAlkdnboj.exeHimldi32.exeLdleel32.exeOjjolnaq.exeAeiofcji.exeAjhddjfn.exeCfdhkhjj.exeCffdpghg.exeGofkje32.exeJlpkba32.exeKbfbkj32.exeLlcpoo32.exeOlhlhjpd.exePnakhkol.exePmidog32.exeIiaephpc.exeMigjoaaf.exeNjefqo32.exeKlimip32.exeKdcbom32.exeMlampmdo.exeBbgipldd.exeBjdkjo32.exeDedkdcie.exeFlceckoj.exeHmabdibj.exeHmjdjgjo.exeKebbafoj.exeOcbddc32.exePcbmka32.exeAhkobekf.exeOponmilc.exeBanllbdn.exeKlljnp32.exeLffhfh32.exeLbmhlihl.exeLekehdgp.exeOgkcpbam.exeAcqimo32.exeBmpcfdmg.exeAbbpem32.exeJmbdbd32.exe2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kipkhdeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgmngglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nljofl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oqhacgdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pllfhkno.dll" Bhdbhcck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdkldb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paihpaak.dll" Fdialn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icfpbq32.dll" Fooeif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dammlf32.dll" Hijooifk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kplpjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opakbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcagphom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aejfpjne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hckjacjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcncpbmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alkdnboj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Himldi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldleel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojjolnaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aeiofcji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajhddjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfdhkhjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cffdpghg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gofkje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlpkba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojleohnl.dll" Kbfbkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbeedbdm.dll" Llcpoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olhlhjpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnakhkol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmidog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iiaephpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Migjoaaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njefqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohbkfake.dll" Opakbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klimip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdcbom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aihbcp32.dll" Mlampmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgdpie32.dll" Bbgipldd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdchadai.dll" Bjdkjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dedkdcie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flceckoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmabdibj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmjdjgjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kebbafoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfdjmlhn.dll" Ocbddc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcbmka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eegdfm32.dll" Ahkobekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kebbafoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Najmlf32.dll" Oponmilc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chmhoe32.dll" Olhlhjpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcncpbmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjlogcip.dll" Banllbdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejnjpohk.dll" Klljnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lffhfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbmhlihl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Allebf32.dll" Lekehdgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogkcpbam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnjgghdi.dll" Acqimo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmpcfdmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abbpem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhoilahe.dll" Jmbdbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exeNqpego32.exeOgljjiei.exeOjjffddl.exeOcegdjij.exeOkloegjl.exeOnklabip.exeOdednmpm.exePghieg32.exePnbbbabh.exePqpnombl.exePgjfkg32.exePndohaqe.exePcagphom.exePcccfh32.exePjmlbbdg.exeQcepkg32.exeQgciaf32.exeQjbena32.exeQnnanphk.exeQalnjkgo.exeAcjjfggb.exedescription pid process target process PID 4016 wrote to memory of 3080 4016 2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe Nqpego32.exe PID 4016 wrote to memory of 3080 4016 2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe Nqpego32.exe PID 4016 wrote to memory of 3080 4016 2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe Nqpego32.exe PID 3080 wrote to memory of 3288 3080 Nqpego32.exe Ogljjiei.exe PID 3080 wrote to memory of 3288 3080 Nqpego32.exe Ogljjiei.exe PID 3080 wrote to memory of 3288 3080 Nqpego32.exe Ogljjiei.exe PID 3288 wrote to memory of 3536 3288 Ogljjiei.exe Ojjffddl.exe PID 3288 wrote to memory of 3536 3288 Ogljjiei.exe Ojjffddl.exe PID 3288 wrote to memory of 3536 3288 Ogljjiei.exe Ojjffddl.exe PID 3536 wrote to memory of 3128 3536 Ojjffddl.exe Ocegdjij.exe PID 3536 wrote to memory of 3128 3536 Ojjffddl.exe Ocegdjij.exe PID 3536 wrote to memory of 3128 3536 Ojjffddl.exe Ocegdjij.exe PID 3128 wrote to memory of 4008 3128 Ocegdjij.exe Okloegjl.exe PID 3128 wrote to memory of 4008 3128 Ocegdjij.exe Okloegjl.exe PID 3128 wrote to memory of 4008 3128 Ocegdjij.exe Okloegjl.exe PID 4008 wrote to memory of 1196 4008 Okloegjl.exe Onklabip.exe PID 4008 wrote to memory of 1196 4008 Okloegjl.exe Onklabip.exe PID 4008 wrote to memory of 1196 4008 Okloegjl.exe Onklabip.exe PID 1196 wrote to memory of 4248 1196 Onklabip.exe Odednmpm.exe PID 1196 wrote to memory of 4248 1196 Onklabip.exe Odednmpm.exe PID 1196 wrote to memory of 4248 1196 Onklabip.exe Odednmpm.exe PID 4248 wrote to memory of 1980 4248 Odednmpm.exe Pghieg32.exe PID 4248 wrote to memory of 1980 4248 Odednmpm.exe Pghieg32.exe PID 4248 wrote to memory of 1980 4248 Odednmpm.exe Pghieg32.exe PID 1980 wrote to memory of 2808 1980 Pghieg32.exe Pnbbbabh.exe PID 1980 wrote to memory of 2808 1980 Pghieg32.exe Pnbbbabh.exe PID 1980 wrote to memory of 2808 1980 Pghieg32.exe Pnbbbabh.exe PID 2808 wrote to memory of 400 2808 Pnbbbabh.exe Pqpnombl.exe PID 2808 wrote to memory of 400 2808 Pnbbbabh.exe Pqpnombl.exe PID 2808 wrote to memory of 400 2808 Pnbbbabh.exe Pqpnombl.exe PID 400 wrote to memory of 4620 400 Pqpnombl.exe Pgjfkg32.exe PID 400 wrote to memory of 4620 400 Pqpnombl.exe Pgjfkg32.exe PID 400 wrote to memory of 4620 400 Pqpnombl.exe Pgjfkg32.exe PID 4620 wrote to memory of 4460 4620 Pgjfkg32.exe Pndohaqe.exe PID 4620 wrote to memory of 4460 4620 Pgjfkg32.exe Pndohaqe.exe PID 4620 wrote to memory of 4460 4620 Pgjfkg32.exe Pndohaqe.exe PID 4460 wrote to memory of 2848 4460 Pndohaqe.exe Pcagphom.exe PID 4460 wrote to memory of 2848 4460 Pndohaqe.exe Pcagphom.exe PID 4460 wrote to memory of 2848 4460 Pndohaqe.exe Pcagphom.exe PID 2848 wrote to memory of 1796 2848 Pcagphom.exe Pcccfh32.exe PID 2848 wrote to memory of 1796 2848 Pcagphom.exe Pcccfh32.exe PID 2848 wrote to memory of 1796 2848 Pcagphom.exe Pcccfh32.exe PID 1796 wrote to memory of 4712 1796 Pcccfh32.exe Pjmlbbdg.exe PID 1796 wrote to memory of 4712 1796 Pcccfh32.exe Pjmlbbdg.exe PID 1796 wrote to memory of 4712 1796 Pcccfh32.exe Pjmlbbdg.exe PID 4712 wrote to memory of 4964 4712 Pjmlbbdg.exe Qcepkg32.exe PID 4712 wrote to memory of 4964 4712 Pjmlbbdg.exe Qcepkg32.exe PID 4712 wrote to memory of 4964 4712 Pjmlbbdg.exe Qcepkg32.exe PID 4964 wrote to memory of 2784 4964 Qcepkg32.exe Qgciaf32.exe PID 4964 wrote to memory of 2784 4964 Qcepkg32.exe Qgciaf32.exe PID 4964 wrote to memory of 2784 4964 Qcepkg32.exe Qgciaf32.exe PID 2784 wrote to memory of 528 2784 Qgciaf32.exe Qjbena32.exe PID 2784 wrote to memory of 528 2784 Qgciaf32.exe Qjbena32.exe PID 2784 wrote to memory of 528 2784 Qgciaf32.exe Qjbena32.exe PID 528 wrote to memory of 2660 528 Qjbena32.exe Qnnanphk.exe PID 528 wrote to memory of 2660 528 Qjbena32.exe Qnnanphk.exe PID 528 wrote to memory of 2660 528 Qjbena32.exe Qnnanphk.exe PID 2660 wrote to memory of 2144 2660 Qnnanphk.exe Qalnjkgo.exe PID 2660 wrote to memory of 2144 2660 Qnnanphk.exe Qalnjkgo.exe PID 2660 wrote to memory of 2144 2660 Qnnanphk.exe Qalnjkgo.exe PID 2144 wrote to memory of 1696 2144 Qalnjkgo.exe Acjjfggb.exe PID 2144 wrote to memory of 1696 2144 Qalnjkgo.exe Acjjfggb.exe PID 2144 wrote to memory of 1696 2144 Qalnjkgo.exe Acjjfggb.exe PID 1696 wrote to memory of 4180 1696 Acjjfggb.exe Alabgd32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2dca942b640d9e0de64bab544a9eee90_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\Nqpego32.exeC:\Windows\system32\Nqpego32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\Ogljjiei.exeC:\Windows\system32\Ogljjiei.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\Ojjffddl.exeC:\Windows\system32\Ojjffddl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\Ocegdjij.exeC:\Windows\system32\Ocegdjij.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\Okloegjl.exeC:\Windows\system32\Okloegjl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\Onklabip.exeC:\Windows\system32\Onklabip.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Odednmpm.exeC:\Windows\system32\Odednmpm.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Pnbbbabh.exeC:\Windows\system32\Pnbbbabh.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Pqpnombl.exeC:\Windows\system32\Pqpnombl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\Pgjfkg32.exeC:\Windows\system32\Pgjfkg32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\Pndohaqe.exeC:\Windows\system32\Pndohaqe.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\Pcagphom.exeC:\Windows\system32\Pcagphom.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Pcccfh32.exeC:\Windows\system32\Pcccfh32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Pjmlbbdg.exeC:\Windows\system32\Pjmlbbdg.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\Qcepkg32.exeC:\Windows\system32\Qcepkg32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\Qgciaf32.exeC:\Windows\system32\Qgciaf32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Qjbena32.exeC:\Windows\system32\Qjbena32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Qnnanphk.exeC:\Windows\system32\Qnnanphk.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Qalnjkgo.exeC:\Windows\system32\Qalnjkgo.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\Acjjfggb.exeC:\Windows\system32\Acjjfggb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Alabgd32.exeC:\Windows\system32\Alabgd32.exe23⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\Anpncp32.exeC:\Windows\system32\Anpncp32.exe24⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Aanjpk32.exeC:\Windows\system32\Aanjpk32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\Aejfpjne.exeC:\Windows\system32\Aejfpjne.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:2548 -
C:\Windows\SysWOW64\Aldomc32.exeC:\Windows\system32\Aldomc32.exe27⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\Anbkio32.exeC:\Windows\system32\Anbkio32.exe28⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Aaqgek32.exeC:\Windows\system32\Aaqgek32.exe29⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\Aelcfilb.exeC:\Windows\system32\Aelcfilb.exe30⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\Ajiknpjj.exeC:\Windows\system32\Ajiknpjj.exe32⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\Aacckjaf.exeC:\Windows\system32\Aacckjaf.exe33⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Adapgfqj.exeC:\Windows\system32\Adapgfqj.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4988 -
C:\Windows\SysWOW64\Alhhhcal.exeC:\Windows\system32\Alhhhcal.exe35⤵
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\Ajkhdp32.exeC:\Windows\system32\Ajkhdp32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:348 -
C:\Windows\SysWOW64\Abbpem32.exeC:\Windows\system32\Abbpem32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Aealah32.exeC:\Windows\system32\Aealah32.exe38⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Adcmmeog.exeC:\Windows\system32\Adcmmeog.exe39⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\Alkdnboj.exeC:\Windows\system32\Alkdnboj.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Ajneip32.exeC:\Windows\system32\Ajneip32.exe41⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Abemjmgg.exeC:\Windows\system32\Abemjmgg.exe42⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\Becifhfj.exeC:\Windows\system32\Becifhfj.exe43⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\Bdfibe32.exeC:\Windows\system32\Bdfibe32.exe44⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Blmacb32.exeC:\Windows\system32\Blmacb32.exe45⤵
- Executes dropped EXE
PID:3740 -
C:\Windows\SysWOW64\Bjpaooda.exeC:\Windows\system32\Bjpaooda.exe46⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\Bbgipldd.exeC:\Windows\system32\Bbgipldd.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:672 -
C:\Windows\SysWOW64\Bdhfhe32.exeC:\Windows\system32\Bdhfhe32.exe48⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Bhdbhcck.exeC:\Windows\system32\Bhdbhcck.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:3484 -
C:\Windows\SysWOW64\Bjbndobo.exeC:\Windows\system32\Bjbndobo.exe50⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\Bbifelba.exeC:\Windows\system32\Bbifelba.exe51⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\Behbag32.exeC:\Windows\system32\Behbag32.exe52⤵
- Executes dropped EXE
PID:4092 -
C:\Windows\SysWOW64\Bdkcmdhp.exeC:\Windows\system32\Bdkcmdhp.exe53⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\Blbknaib.exeC:\Windows\system32\Blbknaib.exe54⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:3428 -
C:\Windows\SysWOW64\Bblckl32.exeC:\Windows\system32\Bblckl32.exe56⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\Bejogg32.exeC:\Windows\system32\Bejogg32.exe57⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\SysWOW64\Bhikcb32.exeC:\Windows\system32\Bhikcb32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3196 -
C:\Windows\SysWOW64\Bjghpn32.exeC:\Windows\system32\Bjghpn32.exe59⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\Bbnpqk32.exeC:\Windows\system32\Bbnpqk32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4448 -
C:\Windows\SysWOW64\Baaplhef.exeC:\Windows\system32\Baaplhef.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\Bdolhc32.exeC:\Windows\system32\Bdolhc32.exe62⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\Cbqlfkmi.exeC:\Windows\system32\Cbqlfkmi.exe63⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Cacmah32.exeC:\Windows\system32\Cacmah32.exe64⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\Cdainc32.exeC:\Windows\system32\Cdainc32.exe65⤵
- Executes dropped EXE
PID:3416 -
C:\Windows\SysWOW64\Cliaoq32.exeC:\Windows\system32\Cliaoq32.exe66⤵PID:2276
-
C:\Windows\SysWOW64\Cklaknjd.exeC:\Windows\system32\Cklaknjd.exe67⤵PID:3020
-
C:\Windows\SysWOW64\Cbcilkjg.exeC:\Windows\system32\Cbcilkjg.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4928 -
C:\Windows\SysWOW64\Cafigg32.exeC:\Windows\system32\Cafigg32.exe69⤵PID:2232
-
C:\Windows\SysWOW64\Cddecc32.exeC:\Windows\system32\Cddecc32.exe70⤵PID:4232
-
C:\Windows\SysWOW64\Clkndpag.exeC:\Windows\system32\Clkndpag.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2552 -
C:\Windows\SysWOW64\Cknnpm32.exeC:\Windows\system32\Cknnpm32.exe72⤵PID:4720
-
C:\Windows\SysWOW64\Cbefaj32.exeC:\Windows\system32\Cbefaj32.exe73⤵
- Drops file in System32 directory
PID:3680 -
C:\Windows\SysWOW64\Cecbmf32.exeC:\Windows\system32\Cecbmf32.exe74⤵
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\Chbnia32.exeC:\Windows\system32\Chbnia32.exe75⤵
- Drops file in System32 directory
PID:3248 -
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe76⤵PID:1180
-
C:\Windows\SysWOW64\Chdkoa32.exeC:\Windows\system32\Chdkoa32.exe77⤵PID:1204
-
C:\Windows\SysWOW64\Ckcgkldl.exeC:\Windows\system32\Ckcgkldl.exe78⤵PID:4860
-
C:\Windows\SysWOW64\Conclk32.exeC:\Windows\system32\Conclk32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3776 -
C:\Windows\SysWOW64\Cehkhecb.exeC:\Windows\system32\Cehkhecb.exe80⤵PID:3368
-
C:\Windows\SysWOW64\Cdkldb32.exeC:\Windows\system32\Cdkldb32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Ckedalaj.exeC:\Windows\system32\Ckedalaj.exe82⤵PID:5116
-
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe83⤵PID:1380
-
C:\Windows\SysWOW64\Dedkdcie.exeC:\Windows\system32\Dedkdcie.exe84⤵
- Modifies registry class
PID:4048 -
C:\Windows\SysWOW64\Dhbgqohi.exeC:\Windows\system32\Dhbgqohi.exe85⤵PID:3984
-
C:\Windows\SysWOW64\Ekacmjgl.exeC:\Windows\system32\Ekacmjgl.exe86⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Edihepnm.exeC:\Windows\system32\Edihepnm.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3324 -
C:\Windows\SysWOW64\Elppfmoo.exeC:\Windows\system32\Elppfmoo.exe88⤵PID:3172
-
C:\Windows\SysWOW64\Eamhodmf.exeC:\Windows\system32\Eamhodmf.exe89⤵PID:3044
-
C:\Windows\SysWOW64\Ehgqln32.exeC:\Windows\system32\Ehgqln32.exe90⤵PID:1780
-
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe91⤵PID:4916
-
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe92⤵PID:808
-
C:\Windows\SysWOW64\Ehimanbq.exeC:\Windows\system32\Ehimanbq.exe93⤵PID:1232
-
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2780 -
C:\Windows\SysWOW64\Ecoangbg.exeC:\Windows\system32\Ecoangbg.exe95⤵
- Drops file in System32 directory
PID:4504 -
C:\Windows\SysWOW64\Eabbjc32.exeC:\Windows\system32\Eabbjc32.exe96⤵PID:3808
-
C:\Windows\SysWOW64\Edpnfo32.exeC:\Windows\system32\Edpnfo32.exe97⤵PID:1816
-
C:\Windows\SysWOW64\Elgfgl32.exeC:\Windows\system32\Elgfgl32.exe98⤵PID:1088
-
C:\Windows\SysWOW64\Ecandfpd.exeC:\Windows\system32\Ecandfpd.exe99⤵
- Drops file in System32 directory
PID:224 -
C:\Windows\SysWOW64\Ehnglm32.exeC:\Windows\system32\Ehnglm32.exe100⤵PID:5160
-
C:\Windows\SysWOW64\Fkmchi32.exeC:\Windows\system32\Fkmchi32.exe101⤵PID:5200
-
C:\Windows\SysWOW64\Fcckif32.exeC:\Windows\system32\Fcckif32.exe102⤵PID:5244
-
C:\Windows\SysWOW64\Febgea32.exeC:\Windows\system32\Febgea32.exe103⤵PID:5284
-
C:\Windows\SysWOW64\Fhqcam32.exeC:\Windows\system32\Fhqcam32.exe104⤵
- Drops file in System32 directory
PID:5324 -
C:\Windows\SysWOW64\Fkopnh32.exeC:\Windows\system32\Fkopnh32.exe105⤵PID:5360
-
C:\Windows\SysWOW64\Fojlngce.exeC:\Windows\system32\Fojlngce.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5400 -
C:\Windows\SysWOW64\Faihkbci.exeC:\Windows\system32\Faihkbci.exe107⤵PID:5444
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe108⤵PID:5484
-
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe109⤵PID:5524
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe110⤵
- Drops file in System32 directory
PID:5560 -
C:\Windows\SysWOW64\Fakdpb32.exeC:\Windows\system32\Fakdpb32.exe111⤵PID:5600
-
C:\Windows\SysWOW64\Fdialn32.exeC:\Windows\system32\Fdialn32.exe112⤵
- Modifies registry class
PID:5644 -
C:\Windows\SysWOW64\Fhemmlhc.exeC:\Windows\system32\Fhemmlhc.exe113⤵PID:5684
-
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe114⤵PID:5720
-
C:\Windows\SysWOW64\Fooeif32.exeC:\Windows\system32\Fooeif32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5764 -
C:\Windows\SysWOW64\Fckajehi.exeC:\Windows\system32\Fckajehi.exe116⤵PID:5808
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe117⤵PID:5848
-
C:\Windows\SysWOW64\Fdlnbm32.exeC:\Windows\system32\Fdlnbm32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5884 -
C:\Windows\SysWOW64\Flceckoj.exeC:\Windows\system32\Flceckoj.exe119⤵
- Modifies registry class
PID:5928 -
C:\Windows\SysWOW64\Foabofnn.exeC:\Windows\system32\Foabofnn.exe120⤵PID:5972
-
C:\Windows\SysWOW64\Fbpnkama.exeC:\Windows\system32\Fbpnkama.exe121⤵PID:6016
-
C:\Windows\SysWOW64\Ffkjlp32.exeC:\Windows\system32\Ffkjlp32.exe122⤵PID:6048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-