Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 04:13
Behavioral task
behavioral1
Sample
2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe
-
Size
89KB
-
MD5
2bfa03e9bf3192e33a8fb790778f0860
-
SHA1
902660b3cebdbf288107835a9e195a1582f59c31
-
SHA256
b446c6fba9ea6dfd26c85c6c6b5579bcacc29bc633a59c4073a9eb3a7257ca52
-
SHA512
ad76563b7943e92f854108b8fba1d3f112f5de5168f60275c66a30caf392e7a0629f1cbab0cf79f33410a6fcb1f0dd3c90acf3303ad0c4d0a337e14a6529a841
-
SSDEEP
1536:D1L75AyoPYOWdT6ppMpEUuZA+GGyUb3lHg5SQRQAD68a+VMKKTRVGFtUhQfR1WRw:Qh5WkppWuZA+Dyc1AcQe5r4MKy3G7UEb
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jbgbni32.exeDgmglh32.exeAhgnke32.exeAnafhopc.exeBpleef32.exeGmgdddmq.exeHnagjbdf.exeNgpolo32.exeGhfbqn32.exeMpfkqb32.exeDlkepi32.exeEfcfga32.exeLajhofao.exeQcbllb32.exeGejcjbah.exeCldooj32.exeIdmhkpml.exeNdpfkdmf.exeHenidd32.exeIkddbj32.exeMppepcfg.exeMpigfa32.exeFjgoce32.exeOgblbo32.exeOfmbnkhg.exeLeonofpp.exeHpocfncj.exeLdfgebbe.exePmanoifd.exePflomnkb.exeQedhdjnh.exeGkihhhnm.exeHahjpbad.exeOjfaijcc.exeCjpqdp32.exeLmolnh32.exeIfcbodli.exeKpmlkp32.exeCkafbbph.exeFjaonpnn.exeDfamcogo.exeEcqqpgli.exeCndbcc32.exePkndaa32.exeIjeghgoh.exeIoijbj32.exeAaobdjof.exeHjhhocjj.exeGlaoalkh.exeDjklnnaj.exeCnaocmmi.exeEqonkmdh.exeIggkllpe.exeNhiffc32.exeBpgljfbl.exeCgbdhd32.exeGpmjak32.exeClaifkkf.exeHlhaqogk.exePkpagq32.exeGobgcg32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbgbni32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgmglh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahgnke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anafhopc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bpleef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmgdddmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hnagjbdf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngpolo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghfbqn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpfkqb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlkepi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efcfga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lajhofao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcbllb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gejcjbah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cldooj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idmhkpml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndpfkdmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Henidd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikddbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mppepcfg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpigfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjgoce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogblbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ofmbnkhg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leonofpp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpocfncj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldfgebbe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmanoifd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pflomnkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qedhdjnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gkihhhnm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hahjpbad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ojfaijcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjpqdp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmolnh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifcbodli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kpmlkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckafbbph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fjaonpnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnagjbdf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qedhdjnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfamcogo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ecqqpgli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cndbcc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkndaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijeghgoh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioijbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaobdjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hjhhocjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Glaoalkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Djklnnaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnaocmmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqonkmdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iggkllpe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhiffc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpgljfbl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgbdhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gpmjak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Claifkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hahjpbad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlhaqogk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkpagq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gobgcg32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Cfbhnaho.exe family_berbew \Windows\SysWOW64\Cgbdhd32.exe family_berbew C:\Windows\SysWOW64\Cjpqdp32.exe family_berbew \Windows\SysWOW64\Clomqk32.exe family_berbew behavioral1/memory/2624-67-0x00000000002D0000-0x0000000000312000-memory.dmp family_berbew C:\Windows\SysWOW64\Cciemedf.exe family_berbew \Windows\SysWOW64\Claifkkf.exe family_berbew C:\Windows\SysWOW64\Copfbfjj.exe family_berbew behavioral1/memory/2808-95-0x0000000000360000-0x00000000003A2000-memory.dmp family_berbew \Windows\SysWOW64\Cbnbobin.exe family_berbew C:\Windows\SysWOW64\Chhjkl32.exe family_berbew \Windows\SysWOW64\Cndbcc32.exe family_berbew C:\Windows\SysWOW64\Dflkdp32.exe family_berbew \Windows\SysWOW64\Dgmglh32.exe family_berbew C:\Windows\SysWOW64\Dngoibmo.exe family_berbew C:\Windows\SysWOW64\Dqelenlc.exe family_berbew \Windows\SysWOW64\Ddagfm32.exe family_berbew C:\Windows\SysWOW64\Dgodbh32.exe family_berbew behavioral1/memory/704-233-0x0000000000250000-0x0000000000292000-memory.dmp family_berbew C:\Windows\SysWOW64\Dnilobkm.exe family_berbew C:\Windows\SysWOW64\Dcfdgiid.exe family_berbew C:\Windows\SysWOW64\Dkmmhf32.exe family_berbew C:\Windows\SysWOW64\Dmoipopd.exe family_berbew C:\Windows\SysWOW64\Dnlidb32.exe family_berbew C:\Windows\SysWOW64\Dgdmmgpj.exe family_berbew C:\Windows\SysWOW64\Dnneja32.exe family_berbew behavioral1/memory/704-306-0x0000000000250000-0x0000000000292000-memory.dmp family_berbew C:\Windows\SysWOW64\Doobajme.exe family_berbew C:\Windows\SysWOW64\Dgfjbgmh.exe family_berbew behavioral1/memory/1620-317-0x00000000002F0000-0x0000000000332000-memory.dmp family_berbew C:\Windows\SysWOW64\Djefobmk.exe family_berbew C:\Windows\SysWOW64\Eqonkmdh.exe family_berbew C:\Windows\SysWOW64\Eijcpoac.exe family_berbew behavioral1/memory/1224-357-0x0000000000300000-0x0000000000342000-memory.dmp family_berbew C:\Windows\SysWOW64\Ekholjqg.exe family_berbew C:\Windows\SysWOW64\Ebbgid32.exe family_berbew C:\Windows\SysWOW64\Efncicpm.exe family_berbew C:\Windows\SysWOW64\Enihne32.exe family_berbew C:\Windows\SysWOW64\Eecqjpee.exe family_berbew C:\Windows\SysWOW64\Ebgacddo.exe family_berbew C:\Windows\SysWOW64\Eajaoq32.exe family_berbew C:\Windows\SysWOW64\Egdilkbf.exe family_berbew C:\Windows\SysWOW64\Ennaieib.exe family_berbew C:\Windows\SysWOW64\Fehjeo32.exe family_berbew C:\Windows\SysWOW64\Fjdbnf32.exe family_berbew C:\Windows\SysWOW64\Fmcoja32.exe family_berbew C:\Windows\SysWOW64\Fejgko32.exe family_berbew C:\Windows\SysWOW64\Fcmgfkeg.exe family_berbew C:\Windows\SysWOW64\Ffkcbgek.exe family_berbew C:\Windows\SysWOW64\Fjgoce32.exe family_berbew C:\Windows\SysWOW64\Fmekoalh.exe family_berbew C:\Windows\SysWOW64\Fpdhklkl.exe family_berbew C:\Windows\SysWOW64\Fhkpmjln.exe family_berbew C:\Windows\SysWOW64\Ffnphf32.exe family_berbew C:\Windows\SysWOW64\Filldb32.exe family_berbew C:\Windows\SysWOW64\Fmhheqje.exe family_berbew C:\Windows\SysWOW64\Fpfdalii.exe family_berbew C:\Windows\SysWOW64\Fdapak32.exe family_berbew C:\Windows\SysWOW64\Ffpmnf32.exe family_berbew C:\Windows\SysWOW64\Fioija32.exe family_berbew C:\Windows\SysWOW64\Flmefm32.exe family_berbew C:\Windows\SysWOW64\Fddmgjpo.exe family_berbew C:\Windows\SysWOW64\Fbgmbg32.exe family_berbew C:\Windows\SysWOW64\Ffbicfoc.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Cfbhnaho.exeCgbdhd32.exeCjpqdp32.exeClomqk32.exeCciemedf.exeClaifkkf.exeCopfbfjj.exeCbnbobin.exeChhjkl32.exeCndbcc32.exeDflkdp32.exeDgmglh32.exeDngoibmo.exeDqelenlc.exeDdagfm32.exeDgodbh32.exeDnilobkm.exeDcfdgiid.exeDkmmhf32.exeDnlidb32.exeDmoipopd.exeDgdmmgpj.exeDnneja32.exeDoobajme.exeDgfjbgmh.exeDjefobmk.exeEqonkmdh.exeEijcpoac.exeEkholjqg.exeEbbgid32.exeEfncicpm.exeEnihne32.exeEecqjpee.exeEbgacddo.exeEajaoq32.exeEgdilkbf.exeEnnaieib.exeFehjeo32.exeFjdbnf32.exeFmcoja32.exeFejgko32.exeFcmgfkeg.exeFfkcbgek.exeFjgoce32.exeFmekoalh.exeFpdhklkl.exeFhkpmjln.exeFfnphf32.exeFilldb32.exeFmhheqje.exeFpfdalii.exeFdapak32.exeFfpmnf32.exeFioija32.exeFlmefm32.exeFddmgjpo.exeFbgmbg32.exeFfbicfoc.exeFiaeoang.exeGloblmmj.exeGonnhhln.exeGfefiemq.exeGegfdb32.exeGhfbqn32.exepid process 2660 Cfbhnaho.exe 2576 Cgbdhd32.exe 2600 Cjpqdp32.exe 2624 Clomqk32.exe 2376 Cciemedf.exe 2808 Claifkkf.exe 2188 Copfbfjj.exe 1188 Cbnbobin.exe 2664 Chhjkl32.exe 824 Cndbcc32.exe 1868 Dflkdp32.exe 2304 Dgmglh32.exe 1688 Dngoibmo.exe 540 Dqelenlc.exe 2320 Ddagfm32.exe 704 Dgodbh32.exe 1620 Dnilobkm.exe 2328 Dcfdgiid.exe 2776 Dkmmhf32.exe 856 Dnlidb32.exe 976 Dmoipopd.exe 1224 Dgdmmgpj.exe 1076 Dnneja32.exe 2836 Doobajme.exe 2344 Dgfjbgmh.exe 2944 Djefobmk.exe 2504 Eqonkmdh.exe 1972 Eijcpoac.exe 2640 Ekholjqg.exe 2156 Ebbgid32.exe 1964 Efncicpm.exe 2296 Enihne32.exe 1892 Eecqjpee.exe 1748 Ebgacddo.exe 2352 Eajaoq32.exe 1740 Egdilkbf.exe 1544 Ennaieib.exe 2820 Fehjeo32.exe 2756 Fjdbnf32.exe 2792 Fmcoja32.exe 2136 Fejgko32.exe 1796 Fcmgfkeg.exe 1404 Ffkcbgek.exe 1144 Fjgoce32.exe 1704 Fmekoalh.exe 1468 Fpdhklkl.exe 1804 Fhkpmjln.exe 2804 Ffnphf32.exe 2936 Filldb32.exe 2484 Fmhheqje.exe 2560 Fpfdalii.exe 2516 Fdapak32.exe 2548 Ffpmnf32.exe 1608 Fioija32.exe 1444 Flmefm32.exe 1788 Fddmgjpo.exe 292 Fbgmbg32.exe 1904 Ffbicfoc.exe 2164 Fiaeoang.exe 840 Globlmmj.exe 864 Gonnhhln.exe 2752 Gfefiemq.exe 624 Gegfdb32.exe 2052 Ghfbqn32.exe -
Loads dropped DLL 64 IoCs
Processes:
2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exeCfbhnaho.exeCgbdhd32.exeCjpqdp32.exeClomqk32.exeCciemedf.exeClaifkkf.exeCopfbfjj.exeCbnbobin.exeChhjkl32.exeCndbcc32.exeDflkdp32.exeDgmglh32.exeDngoibmo.exeDqelenlc.exeDdagfm32.exeDgodbh32.exeDnilobkm.exeDcfdgiid.exeDkmmhf32.exeDnlidb32.exeDmoipopd.exeDgdmmgpj.exeDnneja32.exeDoobajme.exeDgfjbgmh.exeDjefobmk.exeEqonkmdh.exeEijcpoac.exeEkholjqg.exeEbbgid32.exeEfncicpm.exepid process 3036 2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe 3036 2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe 2660 Cfbhnaho.exe 2660 Cfbhnaho.exe 2576 Cgbdhd32.exe 2576 Cgbdhd32.exe 2600 Cjpqdp32.exe 2600 Cjpqdp32.exe 2624 Clomqk32.exe 2624 Clomqk32.exe 2376 Cciemedf.exe 2376 Cciemedf.exe 2808 Claifkkf.exe 2808 Claifkkf.exe 2188 Copfbfjj.exe 2188 Copfbfjj.exe 1188 Cbnbobin.exe 1188 Cbnbobin.exe 2664 Chhjkl32.exe 2664 Chhjkl32.exe 824 Cndbcc32.exe 824 Cndbcc32.exe 1868 Dflkdp32.exe 1868 Dflkdp32.exe 2304 Dgmglh32.exe 2304 Dgmglh32.exe 1688 Dngoibmo.exe 1688 Dngoibmo.exe 540 Dqelenlc.exe 540 Dqelenlc.exe 2320 Ddagfm32.exe 2320 Ddagfm32.exe 704 Dgodbh32.exe 704 Dgodbh32.exe 1620 Dnilobkm.exe 1620 Dnilobkm.exe 2328 Dcfdgiid.exe 2328 Dcfdgiid.exe 2776 Dkmmhf32.exe 2776 Dkmmhf32.exe 856 Dnlidb32.exe 856 Dnlidb32.exe 976 Dmoipopd.exe 976 Dmoipopd.exe 1224 Dgdmmgpj.exe 1224 Dgdmmgpj.exe 1076 Dnneja32.exe 1076 Dnneja32.exe 2836 Doobajme.exe 2836 Doobajme.exe 2344 Dgfjbgmh.exe 2344 Dgfjbgmh.exe 2944 Djefobmk.exe 2944 Djefobmk.exe 2504 Eqonkmdh.exe 2504 Eqonkmdh.exe 1972 Eijcpoac.exe 1972 Eijcpoac.exe 2640 Ekholjqg.exe 2640 Ekholjqg.exe 2156 Ebbgid32.exe 2156 Ebbgid32.exe 1964 Efncicpm.exe 1964 Efncicpm.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ieqeidnl.exeMgimmm32.exeGhkllmoi.exeJoifam32.exeKneicieh.exeMdmmfa32.exeMgljbm32.exeEnnaieib.exeHknach32.exeLfjqnjkh.exeBhigphio.exeCgcmlcja.exeOqideepg.exeQabcjgkh.exeQimhoi32.exeGejcjbah.exeImfqjbli.exeCeodnl32.exeDcadac32.exeDgmglh32.exeFpfdalii.exeGlaoalkh.exeIlknfn32.exeJbjochdi.exeJehkodcm.exeNncahjgl.exeOgeigofa.exeAnlmmp32.exeCadhnmnm.exeEbgacddo.exeJmhmpb32.exeKaaijdgn.exeKblhgk32.exeNejiih32.exeBocolb32.exeDhbfdjdp.exeEqpgol32.exeIdceea32.exeIoijbj32.exeIggkllpe.exeCnobnmpl.exeHnojdcfi.exeLahkigca.exeBioqclil.exeEfcfga32.exeFejgko32.exeOkikfagn.exeCkccgane.exeQbelgood.exeCahail32.exeChhjkl32.exeDkmmhf32.exeMeccii32.exeJokcgmee.exePbfpik32.exeKfegbj32.exeHogmmjfo.exeOfjfhk32.exeMdkqqa32.exeQpecfc32.exeFpdhklkl.exeGhfbqn32.exedescription ioc process File created C:\Windows\SysWOW64\Pqiqnfej.dll Ieqeidnl.exe File opened for modification C:\Windows\SysWOW64\Mkeimlfm.exe Mgimmm32.exe File created C:\Windows\SysWOW64\Ahcocb32.dll Ghkllmoi.exe File opened for modification C:\Windows\SysWOW64\Jbgbni32.exe Joifam32.exe File opened for modification C:\Windows\SysWOW64\Kaceodek.exe Kneicieh.exe File opened for modification C:\Windows\SysWOW64\Mgljbm32.exe Mdmmfa32.exe File created C:\Windows\SysWOW64\Pbmnie32.dll Mgljbm32.exe File created C:\Windows\SysWOW64\Fehjeo32.exe Ennaieib.exe File opened for modification C:\Windows\SysWOW64\Hmlnoc32.exe Hknach32.exe File created C:\Windows\SysWOW64\Lemaif32.exe Lfjqnjkh.exe File created C:\Windows\SysWOW64\Bldcpf32.exe Bhigphio.exe File created C:\Windows\SysWOW64\Lfmnmlid.dll Cgcmlcja.exe File created C:\Windows\SysWOW64\Djhmenjp.dll Oqideepg.exe File opened for modification C:\Windows\SysWOW64\Qpecfc32.exe Qabcjgkh.exe File created C:\Windows\SysWOW64\Qlkdkd32.exe Qimhoi32.exe File created C:\Windows\SysWOW64\Ghhofmql.exe Gejcjbah.exe File opened for modification C:\Windows\SysWOW64\Iqalka32.exe Imfqjbli.exe File created C:\Windows\SysWOW64\Cnkicn32.exe Ceodnl32.exe File created C:\Windows\SysWOW64\Dglpbbbg.exe Dcadac32.exe File opened for modification C:\Windows\SysWOW64\Dngoibmo.exe Dgmglh32.exe File created C:\Windows\SysWOW64\Nopodm32.dll Fpfdalii.exe File created C:\Windows\SysWOW64\Gpmjak32.exe Glaoalkh.exe File opened for modification C:\Windows\SysWOW64\Ioijbj32.exe Ilknfn32.exe File created C:\Windows\SysWOW64\Jehkodcm.exe Jbjochdi.exe File created C:\Windows\SysWOW64\Qjdijm32.dll Jehkodcm.exe File opened for modification C:\Windows\SysWOW64\Naoniipe.exe Nncahjgl.exe File opened for modification C:\Windows\SysWOW64\Ofhick32.exe Ogeigofa.exe File created C:\Windows\SysWOW64\Abhimnma.exe Anlmmp32.exe File opened for modification C:\Windows\SysWOW64\Ceodnl32.exe Cadhnmnm.exe File created C:\Windows\SysWOW64\Eajaoq32.exe Ebgacddo.exe File created C:\Windows\SysWOW64\Ndpaod32.dll Jmhmpb32.exe File created C:\Windows\SysWOW64\Nclpan32.dll Kaaijdgn.exe File opened for modification C:\Windows\SysWOW64\Kfgdhjmk.exe Kblhgk32.exe File created C:\Windows\SysWOW64\Nhiffc32.exe Nejiih32.exe File created C:\Windows\SysWOW64\Ekjajfei.dll Bocolb32.exe File created C:\Windows\SysWOW64\Dlnbeh32.exe Dhbfdjdp.exe File created C:\Windows\SysWOW64\Edkcojga.exe Eqpgol32.exe File created C:\Windows\SysWOW64\Pdpfph32.dll Idceea32.exe File created C:\Windows\SysWOW64\Ifcbodli.exe Ioijbj32.exe File created C:\Windows\SysWOW64\Bleago32.dll Iggkllpe.exe File created C:\Windows\SysWOW64\Caknol32.exe Cnobnmpl.exe File created C:\Windows\SysWOW64\Hggomh32.exe Hnojdcfi.exe File opened for modification C:\Windows\SysWOW64\Ldfgebbe.exe Lahkigca.exe File opened for modification C:\Windows\SysWOW64\Bafidiio.exe Bioqclil.exe File created C:\Windows\SysWOW64\Ekgednng.dll Efcfga32.exe File created C:\Windows\SysWOW64\Fcmgfkeg.exe Fejgko32.exe File created C:\Windows\SysWOW64\Egahmk32.dll Okikfagn.exe File created C:\Windows\SysWOW64\Cnaocmmi.exe Ckccgane.exe File created C:\Windows\SysWOW64\Qedhdjnh.exe Qbelgood.exe File created C:\Windows\SysWOW64\Cpkbdiqb.exe Cahail32.exe File created C:\Windows\SysWOW64\Hpenlb32.dll Chhjkl32.exe File created C:\Windows\SysWOW64\Dnlidb32.exe Dkmmhf32.exe File created C:\Windows\SysWOW64\Jddnncch.dll Meccii32.exe File opened for modification C:\Windows\SysWOW64\Cndbcc32.exe Chhjkl32.exe File created C:\Windows\SysWOW64\Abqjpn32.dll Jokcgmee.exe File opened for modification C:\Windows\SysWOW64\Pedleg32.exe Pbfpik32.exe File created C:\Windows\SysWOW64\Nhlhki32.dll Kfegbj32.exe File opened for modification C:\Windows\SysWOW64\Icbimi32.exe Hogmmjfo.exe File opened for modification C:\Windows\SysWOW64\Ojfaijcc.exe Ofjfhk32.exe File opened for modification C:\Windows\SysWOW64\Dlnbeh32.exe Dhbfdjdp.exe File created C:\Windows\SysWOW64\Mgimmm32.exe Mdkqqa32.exe File created C:\Windows\SysWOW64\Hjkbhikj.dll Qpecfc32.exe File created C:\Windows\SysWOW64\Ikkbnm32.dll Fpdhklkl.exe File opened for modification C:\Windows\SysWOW64\Glaoalkh.exe Ghfbqn32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4264 5004 WerFault.exe Fkckeh32.exe -
Modifies registry class 64 IoCs
Processes:
Bhndldcn.exeDggcffhg.exeDqelenlc.exeEbbgid32.exeFpfdalii.exeQcpofbjl.exePgplkb32.exePqkmjh32.exeCoelaaoi.exeDjhphncm.exeGpmjak32.exeKmopod32.exeLkppbl32.exeMhdplq32.exeEnhacojl.exeKcbakpdo.exeAjhgmpfg.exeNejiih32.exePmanoifd.exeQfokbnip.exeBmmiij32.exeAlbjlcao.exeAlegac32.exeBjlqhoba.exeBdgafdfp.exeGdamqndn.exePkpagq32.exePeiepfgg.exeQabcjgkh.exeCclkfdnc.exeEqbddk32.exeEgafleqm.exeClaifkkf.exeDgmglh32.exeNocnbmoo.exeBdeeqehb.exeQimhoi32.exeAnlmmp32.exeBfenbpec.exeImfqjbli.exeJehkodcm.exeObcccl32.exeAlnqqd32.exeFfbicfoc.exeHenidd32.exeJbgbni32.exeMlibjc32.exeNnhkcj32.exeDpeekh32.exeEccmffjf.exePggbla32.exeCojema32.exePbfpik32.exePciifc32.exeDdgjdk32.exeDgfjbgmh.exeIqalka32.exeJfqahgpg.exeLeajdfnm.exeIhdkao32.exeAoepcn32.exeBioqclil.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bhndldcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dggcffhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njcbaa32.dll" Dqelenlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkojpojq.dll" Ebbgid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nopodm32.dll" Fpfdalii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qcpofbjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pgplkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkemkhcd.dll" Pqkmjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Coelaaoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjpmgg32.dll" Djhphncm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mncnkh32.dll" Gpmjak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kmopod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egjbkk32.dll" Lkppbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mhdplq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jaqddb32.dll" Enhacojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gemaaoaf.dll" Kcbakpdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ajhgmpfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nejiih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pmanoifd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjlcbpdk.dll" Qfokbnip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bmmiij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Albjlcao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Alegac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bjlqhoba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mclgfa32.dll" Bdgafdfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gdamqndn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pkpagq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Peiepfgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idnhde32.dll" Qabcjgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cclkfdnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dinhacjp.dll" Eqbddk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Egafleqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbamcl32.dll" Claifkkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dgmglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nocnbmoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bdeeqehb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qimhoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Anlmmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mclgfa32.dll" Bfenbpec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Imfqjbli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjdijm32.dll" Jehkodcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jehkodcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Obcccl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Alnqqd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ffbicfoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Henidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jbgbni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obdkcckg.dll" Mlibjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nnhkcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dpeekh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eccmffjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pggbla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Albjlcao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cojema32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pbfpik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcpclc32.dll" Pciifc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddgjdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dgfjbgmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcmkhb32.dll" Iqalka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnpbep32.dll" Jfqahgpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bibkki32.dll" Leajdfnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhnijp32.dll" Ihdkao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncdbcl32.dll" Aoepcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geiiogja.dll" Bioqclil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exeCfbhnaho.exeCgbdhd32.exeCjpqdp32.exeClomqk32.exeCciemedf.exeClaifkkf.exeCopfbfjj.exeCbnbobin.exeChhjkl32.exeCndbcc32.exeDflkdp32.exeDgmglh32.exeDngoibmo.exeDqelenlc.exeDdagfm32.exedescription pid process target process PID 3036 wrote to memory of 2660 3036 2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe Cfbhnaho.exe PID 3036 wrote to memory of 2660 3036 2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe Cfbhnaho.exe PID 3036 wrote to memory of 2660 3036 2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe Cfbhnaho.exe PID 3036 wrote to memory of 2660 3036 2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe Cfbhnaho.exe PID 2660 wrote to memory of 2576 2660 Cfbhnaho.exe Cgbdhd32.exe PID 2660 wrote to memory of 2576 2660 Cfbhnaho.exe Cgbdhd32.exe PID 2660 wrote to memory of 2576 2660 Cfbhnaho.exe Cgbdhd32.exe PID 2660 wrote to memory of 2576 2660 Cfbhnaho.exe Cgbdhd32.exe PID 2576 wrote to memory of 2600 2576 Cgbdhd32.exe Cjpqdp32.exe PID 2576 wrote to memory of 2600 2576 Cgbdhd32.exe Cjpqdp32.exe PID 2576 wrote to memory of 2600 2576 Cgbdhd32.exe Cjpqdp32.exe PID 2576 wrote to memory of 2600 2576 Cgbdhd32.exe Cjpqdp32.exe PID 2600 wrote to memory of 2624 2600 Cjpqdp32.exe Clomqk32.exe PID 2600 wrote to memory of 2624 2600 Cjpqdp32.exe Clomqk32.exe PID 2600 wrote to memory of 2624 2600 Cjpqdp32.exe Clomqk32.exe PID 2600 wrote to memory of 2624 2600 Cjpqdp32.exe Clomqk32.exe PID 2624 wrote to memory of 2376 2624 Clomqk32.exe Cciemedf.exe PID 2624 wrote to memory of 2376 2624 Clomqk32.exe Cciemedf.exe PID 2624 wrote to memory of 2376 2624 Clomqk32.exe Cciemedf.exe PID 2624 wrote to memory of 2376 2624 Clomqk32.exe Cciemedf.exe PID 2376 wrote to memory of 2808 2376 Cciemedf.exe Claifkkf.exe PID 2376 wrote to memory of 2808 2376 Cciemedf.exe Claifkkf.exe PID 2376 wrote to memory of 2808 2376 Cciemedf.exe Claifkkf.exe PID 2376 wrote to memory of 2808 2376 Cciemedf.exe Claifkkf.exe PID 2808 wrote to memory of 2188 2808 Claifkkf.exe Copfbfjj.exe PID 2808 wrote to memory of 2188 2808 Claifkkf.exe Copfbfjj.exe PID 2808 wrote to memory of 2188 2808 Claifkkf.exe Copfbfjj.exe PID 2808 wrote to memory of 2188 2808 Claifkkf.exe Copfbfjj.exe PID 2188 wrote to memory of 1188 2188 Copfbfjj.exe Cbnbobin.exe PID 2188 wrote to memory of 1188 2188 Copfbfjj.exe Cbnbobin.exe PID 2188 wrote to memory of 1188 2188 Copfbfjj.exe Cbnbobin.exe PID 2188 wrote to memory of 1188 2188 Copfbfjj.exe Cbnbobin.exe PID 1188 wrote to memory of 2664 1188 Cbnbobin.exe Chhjkl32.exe PID 1188 wrote to memory of 2664 1188 Cbnbobin.exe Chhjkl32.exe PID 1188 wrote to memory of 2664 1188 Cbnbobin.exe Chhjkl32.exe PID 1188 wrote to memory of 2664 1188 Cbnbobin.exe Chhjkl32.exe PID 2664 wrote to memory of 824 2664 Chhjkl32.exe Cndbcc32.exe PID 2664 wrote to memory of 824 2664 Chhjkl32.exe Cndbcc32.exe PID 2664 wrote to memory of 824 2664 Chhjkl32.exe Cndbcc32.exe PID 2664 wrote to memory of 824 2664 Chhjkl32.exe Cndbcc32.exe PID 824 wrote to memory of 1868 824 Cndbcc32.exe Dflkdp32.exe PID 824 wrote to memory of 1868 824 Cndbcc32.exe Dflkdp32.exe PID 824 wrote to memory of 1868 824 Cndbcc32.exe Dflkdp32.exe PID 824 wrote to memory of 1868 824 Cndbcc32.exe Dflkdp32.exe PID 1868 wrote to memory of 2304 1868 Dflkdp32.exe Dgmglh32.exe PID 1868 wrote to memory of 2304 1868 Dflkdp32.exe Dgmglh32.exe PID 1868 wrote to memory of 2304 1868 Dflkdp32.exe Dgmglh32.exe PID 1868 wrote to memory of 2304 1868 Dflkdp32.exe Dgmglh32.exe PID 2304 wrote to memory of 1688 2304 Dgmglh32.exe Dngoibmo.exe PID 2304 wrote to memory of 1688 2304 Dgmglh32.exe Dngoibmo.exe PID 2304 wrote to memory of 1688 2304 Dgmglh32.exe Dngoibmo.exe PID 2304 wrote to memory of 1688 2304 Dgmglh32.exe Dngoibmo.exe PID 1688 wrote to memory of 540 1688 Dngoibmo.exe Dqelenlc.exe PID 1688 wrote to memory of 540 1688 Dngoibmo.exe Dqelenlc.exe PID 1688 wrote to memory of 540 1688 Dngoibmo.exe Dqelenlc.exe PID 1688 wrote to memory of 540 1688 Dngoibmo.exe Dqelenlc.exe PID 540 wrote to memory of 2320 540 Dqelenlc.exe Ddagfm32.exe PID 540 wrote to memory of 2320 540 Dqelenlc.exe Ddagfm32.exe PID 540 wrote to memory of 2320 540 Dqelenlc.exe Ddagfm32.exe PID 540 wrote to memory of 2320 540 Dqelenlc.exe Ddagfm32.exe PID 2320 wrote to memory of 704 2320 Ddagfm32.exe Dgodbh32.exe PID 2320 wrote to memory of 704 2320 Ddagfm32.exe Dgodbh32.exe PID 2320 wrote to memory of 704 2320 Ddagfm32.exe Dgodbh32.exe PID 2320 wrote to memory of 704 2320 Ddagfm32.exe Dgodbh32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2bfa03e9bf3192e33a8fb790778f0860_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Cfbhnaho.exeC:\Windows\system32\Cfbhnaho.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Cjpqdp32.exeC:\Windows\system32\Cjpqdp32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Clomqk32.exeC:\Windows\system32\Clomqk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Cciemedf.exeC:\Windows\system32\Cciemedf.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Copfbfjj.exeC:\Windows\system32\Copfbfjj.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Cbnbobin.exeC:\Windows\system32\Cbnbobin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Chhjkl32.exeC:\Windows\system32\Chhjkl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\Dflkdp32.exeC:\Windows\system32\Dflkdp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\Dqelenlc.exeC:\Windows\system32\Dqelenlc.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\Ddagfm32.exeC:\Windows\system32\Ddagfm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Dgodbh32.exeC:\Windows\system32\Dgodbh32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:704 -
C:\Windows\SysWOW64\Dnilobkm.exeC:\Windows\system32\Dnilobkm.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Dcfdgiid.exeC:\Windows\system32\Dcfdgiid.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2328 -
C:\Windows\SysWOW64\Dkmmhf32.exeC:\Windows\system32\Dkmmhf32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\Dnlidb32.exeC:\Windows\system32\Dnlidb32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:856 -
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976 -
C:\Windows\SysWOW64\Dgdmmgpj.exeC:\Windows\system32\Dgdmmgpj.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1224 -
C:\Windows\SysWOW64\Dnneja32.exeC:\Windows\system32\Dnneja32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1076 -
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836 -
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Djefobmk.exeC:\Windows\system32\Djefobmk.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944 -
C:\Windows\SysWOW64\Eqonkmdh.exeC:\Windows\system32\Eqonkmdh.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2504 -
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Windows\SysWOW64\Ekholjqg.exeC:\Windows\system32\Ekholjqg.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640 -
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2156 -
C:\Windows\SysWOW64\Efncicpm.exeC:\Windows\system32\Efncicpm.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Windows\SysWOW64\Enihne32.exeC:\Windows\system32\Enihne32.exe33⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\Eecqjpee.exeC:\Windows\system32\Eecqjpee.exe34⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\Eajaoq32.exeC:\Windows\system32\Eajaoq32.exe36⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\Egdilkbf.exeC:\Windows\system32\Egdilkbf.exe37⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1544 -
C:\Windows\SysWOW64\Fehjeo32.exeC:\Windows\system32\Fehjeo32.exe39⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe40⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Fmcoja32.exeC:\Windows\system32\Fmcoja32.exe41⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2136 -
C:\Windows\SysWOW64\Fcmgfkeg.exeC:\Windows\system32\Fcmgfkeg.exe43⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe44⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Fjgoce32.exeC:\Windows\system32\Fjgoce32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Fmekoalh.exeC:\Windows\system32\Fmekoalh.exe46⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\Fpdhklkl.exeC:\Windows\system32\Fpdhklkl.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Fhkpmjln.exeC:\Windows\system32\Fhkpmjln.exe48⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe49⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\Filldb32.exeC:\Windows\system32\Filldb32.exe50⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Fmhheqje.exeC:\Windows\system32\Fmhheqje.exe51⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\Fpfdalii.exeC:\Windows\system32\Fpfdalii.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2560 -
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe53⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Ffpmnf32.exeC:\Windows\system32\Ffpmnf32.exe54⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Fioija32.exeC:\Windows\system32\Fioija32.exe55⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe56⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe57⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe58⤵
- Executes dropped EXE
PID:292 -
C:\Windows\SysWOW64\Ffbicfoc.exeC:\Windows\system32\Ffbicfoc.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe60⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Globlmmj.exeC:\Windows\system32\Globlmmj.exe61⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\Gonnhhln.exeC:\Windows\system32\Gonnhhln.exe62⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe63⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\Gegfdb32.exeC:\Windows\system32\Gegfdb32.exe64⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Ghfbqn32.exeC:\Windows\system32\Ghfbqn32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\Glaoalkh.exeC:\Windows\system32\Glaoalkh.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Gangic32.exeC:\Windows\system32\Gangic32.exe68⤵PID:1548
-
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\Ghhofmql.exeC:\Windows\system32\Ghhofmql.exe70⤵PID:352
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe71⤵PID:1212
-
C:\Windows\SysWOW64\Gobgcg32.exeC:\Windows\system32\Gobgcg32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2508 -
C:\Windows\SysWOW64\Gaqcoc32.exeC:\Windows\system32\Gaqcoc32.exe73⤵PID:2492
-
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe74⤵PID:2384
-
C:\Windows\SysWOW64\Ghkllmoi.exeC:\Windows\system32\Ghkllmoi.exe75⤵
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\Gkihhhnm.exeC:\Windows\system32\Gkihhhnm.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2444 -
C:\Windows\SysWOW64\Gmgdddmq.exeC:\Windows\system32\Gmgdddmq.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:640 -
C:\Windows\SysWOW64\Geolea32.exeC:\Windows\system32\Geolea32.exe78⤵PID:1744
-
C:\Windows\SysWOW64\Gdamqndn.exeC:\Windows\system32\Gdamqndn.exe79⤵
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Ggpimica.exeC:\Windows\system32\Ggpimica.exe80⤵PID:1240
-
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe81⤵PID:1408
-
C:\Windows\SysWOW64\Gmjaic32.exeC:\Windows\system32\Gmjaic32.exe82⤵PID:2680
-
C:\Windows\SysWOW64\Gddifnbk.exeC:\Windows\system32\Gddifnbk.exe83⤵PID:1104
-
C:\Windows\SysWOW64\Ghoegl32.exeC:\Windows\system32\Ghoegl32.exe84⤵PID:1588
-
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe85⤵
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\Hmlnoc32.exeC:\Windows\system32\Hmlnoc32.exe86⤵PID:1220
-
C:\Windows\SysWOW64\Hahjpbad.exeC:\Windows\system32\Hahjpbad.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2244 -
C:\Windows\SysWOW64\Hdfflm32.exeC:\Windows\system32\Hdfflm32.exe88⤵PID:1540
-
C:\Windows\SysWOW64\Hgdbhi32.exeC:\Windows\system32\Hgdbhi32.exe89⤵PID:2740
-
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe90⤵PID:2532
-
C:\Windows\SysWOW64\Hnojdcfi.exeC:\Windows\system32\Hnojdcfi.exe91⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\Hggomh32.exeC:\Windows\system32\Hggomh32.exe92⤵PID:2860
-
C:\Windows\SysWOW64\Hiekid32.exeC:\Windows\system32\Hiekid32.exe93⤵PID:2124
-
C:\Windows\SysWOW64\Hnagjbdf.exeC:\Windows\system32\Hnagjbdf.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1428 -
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1636 -
C:\Windows\SysWOW64\Hcnpbi32.exeC:\Windows\system32\Hcnpbi32.exe96⤵PID:2588
-
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe97⤵PID:3048
-
C:\Windows\SysWOW64\Hjhhocjj.exeC:\Windows\system32\Hjhhocjj.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2336 -
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe99⤵PID:592
-
C:\Windows\SysWOW64\Hpapln32.exeC:\Windows\system32\Hpapln32.exe100⤵PID:2356
-
C:\Windows\SysWOW64\Hcplhi32.exeC:\Windows\system32\Hcplhi32.exe101⤵PID:2956
-
C:\Windows\SysWOW64\Henidd32.exeC:\Windows\system32\Henidd32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe103⤵PID:2060
-
C:\Windows\SysWOW64\Hlhaqogk.exeC:\Windows\system32\Hlhaqogk.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2568 -
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe105⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe106⤵PID:2692
-
C:\Windows\SysWOW64\Ieqeidnl.exeC:\Windows\system32\Ieqeidnl.exe107⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe108⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Ilknfn32.exeC:\Windows\system32\Ilknfn32.exe109⤵
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\Ioijbj32.exeC:\Windows\system32\Ioijbj32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1256 -
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2688 -
C:\Windows\SysWOW64\Igdogl32.exeC:\Windows\system32\Igdogl32.exe112⤵PID:2672
-
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe113⤵PID:1760
-
C:\Windows\SysWOW64\Inngcfid.exeC:\Windows\system32\Inngcfid.exe114⤵PID:1592
-
C:\Windows\SysWOW64\Iqmcpahh.exeC:\Windows\system32\Iqmcpahh.exe115⤵PID:1056
-
C:\Windows\SysWOW64\Ihdkao32.exeC:\Windows\system32\Ihdkao32.exe116⤵
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Iggkllpe.exeC:\Windows\system32\Iggkllpe.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2408 -
C:\Windows\SysWOW64\Ijeghgoh.exeC:\Windows\system32\Ijeghgoh.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2500 -
C:\Windows\SysWOW64\Iblpjdpk.exeC:\Windows\system32\Iblpjdpk.exe119⤵PID:1464
-
C:\Windows\SysWOW64\Iqopea32.exeC:\Windows\system32\Iqopea32.exe120⤵PID:1556
-
C:\Windows\SysWOW64\Icmlam32.exeC:\Windows\system32\Icmlam32.exe121⤵PID:1752
-
C:\Windows\SysWOW64\Ikddbj32.exeC:\Windows\system32\Ikddbj32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-