Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 05:27
Behavioral task
behavioral1
Sample
329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe
-
Size
94KB
-
MD5
329f9e90afa4bc33e63f98ff554b3c10
-
SHA1
21128b8cc17034b4228fffc483e87807b511c01b
-
SHA256
2e8f601825f4fb4594de13e91f28cf240f8e100a5f679018872765d13501b199
-
SHA512
a87fa09ab4a92865789a8d41633e784dc906954e1b1b5e86346fee062b4271778494eb07547cd394777955788ca47881ea4879cf058aed680333afa290e27264
-
SSDEEP
1536:MVjFZxpMqhJjILqvvWf3Lp5IZ78g76ddx6A2LdaIZTJ+7LhkiB0MPiKeEAgv:M5FHpMqDIsWjp5IyVx6xdaMU7uihJ5v
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Obkdonic.exePfiidobe.exeNkiogn32.exeOdobjg32.exeAbjebn32.exeEibbcm32.exeNlblkhei.exeNcancbha.exeDcfdgiid.exePefijfii.exePjcabmga.exeCfeddafl.exeOklkmnbp.exeCoelaaoi.exeEchfaf32.exeLpeifeca.exeQmlgonbe.exeAigaon32.exeAdmemg32.exeAlbjlcao.exeDfmdho32.exeAdhlaggp.exeLeonofpp.exeJicgpb32.exeOoeggp32.exeCklmgb32.exeLlccmb32.exeAplpai32.exeHogmmjfo.exeOclilp32.exeDlkepi32.exeLpgele32.exePjpkjond.exeCdlnkmha.exeDbpodagk.exeBmmiij32.exeDkcofe32.exeLplogdmj.exeMcmhiojk.exeOicpfh32.exeEnfenplo.exeEmkaol32.exeDlnbeh32.exeNofabc32.exePlfamfpm.exeAjbdna32.exeDjefobmk.exeEcpgmhai.exeJqfffqpm.exeBlgpef32.exeMpolmdkg.exeOkfencna.exeBeehencq.exeNhdlkdkg.exeNdbcpd32.exeNjdpomfe.exeAlenki32.exeCopfbfjj.exeHjjddchg.exePfoocjfd.exePbhmnkjf.exeDhnmij32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obkdonic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfiidobe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkiogn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odobjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abjebn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eibbcm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlblkhei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncancbha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcfdgiid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pefijfii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjcabmga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfeddafl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oklkmnbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coelaaoi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Echfaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpeifeca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmlgonbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aigaon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Admemg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abjebn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Albjlcao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfmdho32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adhlaggp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leonofpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jicgpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ooeggp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cklmgb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llccmb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aplpai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oclilp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlkepi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Echfaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpgele32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjpkjond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdlnkmha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbpodagk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmmiij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkcofe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lplogdmj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcmhiojk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oicpfh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enfenplo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emkaol32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlnbeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nofabc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plfamfpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajbdna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djefobmk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecpgmhai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqfffqpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blgpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpolmdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Okfencna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beehencq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhdlkdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndbcpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njdpomfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alenki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Copfbfjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjjddchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfoocjfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbhmnkjf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhnmij32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Kedaeh32.exe family_berbew C:\Windows\SysWOW64\Klnjbbdh.exe family_berbew C:\Windows\SysWOW64\Kbhbom32.exe family_berbew C:\Windows\SysWOW64\Kegnkh32.exe family_berbew C:\Windows\SysWOW64\Klqfhbbe.exe family_berbew C:\Windows\SysWOW64\Kjcgco32.exe family_berbew C:\Windows\SysWOW64\Kdlkld32.exe family_berbew \Windows\SysWOW64\Lekhfgfc.exe family_berbew C:\Windows\SysWOW64\Lkhpnnej.exe family_berbew C:\Windows\SysWOW64\Ldcamcih.exe family_berbew C:\Windows\SysWOW64\Meigpkka.exe family_berbew behavioral1/memory/1940-438-0x00000000002F0000-0x000000000032C000-memory.dmp family_berbew C:\Windows\SysWOW64\Mekdekin.exe family_berbew C:\Windows\SysWOW64\Mcodno32.exe family_berbew C:\Windows\SysWOW64\Menakj32.exe family_berbew C:\Windows\SysWOW64\Mlgigdoh.exe family_berbew C:\Windows\SysWOW64\Mofecpnl.exe family_berbew C:\Windows\SysWOW64\Mnieom32.exe family_berbew C:\Windows\SysWOW64\Mkmfhacp.exe family_berbew C:\Windows\SysWOW64\Mnkbdlbd.exe family_berbew C:\Windows\SysWOW64\Mhqfbebj.exe family_berbew C:\Windows\SysWOW64\Naikkk32.exe family_berbew C:\Windows\SysWOW64\Ncjgbcoi.exe family_berbew C:\Windows\SysWOW64\Njdpomfe.exe family_berbew C:\Windows\SysWOW64\Npnhlg32.exe family_berbew C:\Windows\SysWOW64\Nghphaeo.exe family_berbew C:\Windows\SysWOW64\Nnbhek32.exe family_berbew C:\Windows\SysWOW64\Ncoamb32.exe family_berbew C:\Windows\SysWOW64\Nfmmin32.exe family_berbew C:\Windows\SysWOW64\Nlgefh32.exe family_berbew C:\Windows\SysWOW64\Ncancbha.exe family_berbew C:\Windows\SysWOW64\Nkmbgdfl.exe family_berbew C:\Windows\SysWOW64\Ofdcjm32.exe family_berbew C:\Windows\SysWOW64\Okalbc32.exe family_berbew C:\Windows\SysWOW64\Obkdonic.exe family_berbew C:\Windows\SysWOW64\Oiellh32.exe family_berbew C:\Windows\SysWOW64\Ojficpfn.exe family_berbew C:\Windows\SysWOW64\Onbddoog.exe family_berbew C:\Windows\SysWOW64\Ondajnme.exe family_berbew C:\Windows\SysWOW64\Pccfge32.exe family_berbew C:\Windows\SysWOW64\Pjmodopf.exe family_berbew C:\Windows\SysWOW64\Pmlkpjpj.exe family_berbew C:\Windows\SysWOW64\Pbiciana.exe family_berbew C:\Windows\SysWOW64\Pbmmcq32.exe family_berbew C:\Windows\SysWOW64\Pndniaop.exe family_berbew C:\Windows\SysWOW64\Penfelgm.exe family_berbew C:\Windows\SysWOW64\Qljkhe32.exe family_berbew C:\Windows\SysWOW64\Adeplhib.exe family_berbew C:\Windows\SysWOW64\Ajphib32.exe family_berbew C:\Windows\SysWOW64\Adhlaggp.exe family_berbew C:\Windows\SysWOW64\Ahchbf32.exe family_berbew C:\Windows\SysWOW64\Aiedjneg.exe family_berbew C:\Windows\SysWOW64\Aigaon32.exe family_berbew C:\Windows\SysWOW64\Alenki32.exe family_berbew C:\Windows\SysWOW64\Aenbdoii.exe family_berbew C:\Windows\SysWOW64\Aoffmd32.exe family_berbew C:\Windows\SysWOW64\Aepojo32.exe family_berbew C:\Windows\SysWOW64\Aljgfioc.exe family_berbew C:\Windows\SysWOW64\Boiccdnf.exe family_berbew C:\Windows\SysWOW64\Bingpmnl.exe family_berbew C:\Windows\SysWOW64\Bkodhe32.exe family_berbew C:\Windows\SysWOW64\Bbflib32.exe family_berbew C:\Windows\SysWOW64\Bkaqmeah.exe family_berbew C:\Windows\SysWOW64\Bommnc32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Kedaeh32.exeKlnjbbdh.exeKpjfba32.exeKbhbom32.exeKegnkh32.exeKibjkgca.exeKlqfhbbe.exeKjcgco32.exeKbkodl32.exeKeikqhhe.exeKdlkld32.exeLlccmb32.exeLmdpejfq.exeLekhfgfc.exeLdnhad32.exeLkhpnnej.exeLmgmjjdn.exeLabhkh32.exeLpeifeca.exeLhlqhb32.exeLkkmdn32.exeLimmokib.exeLmiipi32.exeLpgele32.exeLdcamcih.exeLkmjin32.exeLgdjnofi.exeLibgjj32.exeLmnbkinf.exeLlqcfe32.exeLplogdmj.exeMcjkcplm.exeMeigpkka.exeMlcple32.exeMpolmdkg.exeMcmhiojk.exeMekdekin.exeMhjpaf32.exeMkhmma32.exeMcodno32.exeMabejlob.exeMenakj32.exeMhlmgf32.exeMlgigdoh.exeMofecpnl.exeMnieom32.exeMhnjle32.exeMkmfhacp.exeMohbip32.exeMnkbdlbd.exeMpjoqhah.exeMdejaf32.exeMhqfbebj.exeMgcgmb32.exeNjbcim32.exeNaikkk32.exeNplkfgoe.exeNcjgbcoi.exeNkaocp32.exeNjdpomfe.exeNlblkhei.exeNpnhlg32.exeNcmdhb32.exeNghphaeo.exepid process 2956 Kedaeh32.exe 2020 Klnjbbdh.exe 2628 Kpjfba32.exe 2444 Kbhbom32.exe 2744 Kegnkh32.exe 2492 Kibjkgca.exe 3052 Klqfhbbe.exe 1868 Kjcgco32.exe 3032 Kbkodl32.exe 2676 Keikqhhe.exe 2508 Kdlkld32.exe 2820 Llccmb32.exe 1428 Lmdpejfq.exe 2304 Lekhfgfc.exe 1732 Ldnhad32.exe 684 Lkhpnnej.exe 816 Lmgmjjdn.exe 344 Labhkh32.exe 2408 Lpeifeca.exe 2132 Lhlqhb32.exe 1088 Lkkmdn32.exe 2340 Limmokib.exe 1244 Lmiipi32.exe 1040 Lpgele32.exe 2284 Ldcamcih.exe 2892 Lkmjin32.exe 2464 Lgdjnofi.exe 1940 Libgjj32.exe 2904 Lmnbkinf.exe 3008 Llqcfe32.exe 1840 Lplogdmj.exe 2460 Mcjkcplm.exe 2384 Meigpkka.exe 1440 Mlcple32.exe 3004 Mpolmdkg.exe 2080 Mcmhiojk.exe 2920 Mekdekin.exe 1848 Mhjpaf32.exe 1660 Mkhmma32.exe 1296 Mcodno32.exe 2064 Mabejlob.exe 1888 Menakj32.exe 1932 Mhlmgf32.exe 1488 Mlgigdoh.exe 692 Mofecpnl.exe 2592 Mnieom32.exe 2564 Mhnjle32.exe 2552 Mkmfhacp.exe 3040 Mohbip32.exe 2332 Mnkbdlbd.exe 1752 Mpjoqhah.exe 896 Mdejaf32.exe 2208 Mhqfbebj.exe 2980 Mgcgmb32.exe 2576 Njbcim32.exe 488 Naikkk32.exe 2540 Nplkfgoe.exe 2036 Ncjgbcoi.exe 2500 Nkaocp32.exe 2808 Njdpomfe.exe 2144 Nlblkhei.exe 2296 Npnhlg32.exe 2120 Ncmdhb32.exe 2840 Nghphaeo.exe -
Loads dropped DLL 64 IoCs
Processes:
329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exeKedaeh32.exeKlnjbbdh.exeKpjfba32.exeKbhbom32.exeKegnkh32.exeKibjkgca.exeKlqfhbbe.exeKjcgco32.exeKbkodl32.exeKeikqhhe.exeKdlkld32.exeLlccmb32.exeLmdpejfq.exeLekhfgfc.exeLdnhad32.exeLkhpnnej.exeLmgmjjdn.exeLabhkh32.exeLpeifeca.exeLhlqhb32.exeLkkmdn32.exeLimmokib.exeLmiipi32.exeLpgele32.exeLdcamcih.exeLkmjin32.exeLgdjnofi.exeLibgjj32.exeLmnbkinf.exeLlqcfe32.exeLplogdmj.exepid process 2944 329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe 2944 329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe 2956 Kedaeh32.exe 2956 Kedaeh32.exe 2020 Klnjbbdh.exe 2020 Klnjbbdh.exe 2628 Kpjfba32.exe 2628 Kpjfba32.exe 2444 Kbhbom32.exe 2444 Kbhbom32.exe 2744 Kegnkh32.exe 2744 Kegnkh32.exe 2492 Kibjkgca.exe 2492 Kibjkgca.exe 3052 Klqfhbbe.exe 3052 Klqfhbbe.exe 1868 Kjcgco32.exe 1868 Kjcgco32.exe 3032 Kbkodl32.exe 3032 Kbkodl32.exe 2676 Keikqhhe.exe 2676 Keikqhhe.exe 2508 Kdlkld32.exe 2508 Kdlkld32.exe 2820 Llccmb32.exe 2820 Llccmb32.exe 1428 Lmdpejfq.exe 1428 Lmdpejfq.exe 2304 Lekhfgfc.exe 2304 Lekhfgfc.exe 1732 Ldnhad32.exe 1732 Ldnhad32.exe 684 Lkhpnnej.exe 684 Lkhpnnej.exe 816 Lmgmjjdn.exe 816 Lmgmjjdn.exe 344 Labhkh32.exe 344 Labhkh32.exe 2408 Lpeifeca.exe 2408 Lpeifeca.exe 2132 Lhlqhb32.exe 2132 Lhlqhb32.exe 1088 Lkkmdn32.exe 1088 Lkkmdn32.exe 2340 Limmokib.exe 2340 Limmokib.exe 1244 Lmiipi32.exe 1244 Lmiipi32.exe 1040 Lpgele32.exe 1040 Lpgele32.exe 2284 Ldcamcih.exe 2284 Ldcamcih.exe 2892 Lkmjin32.exe 2892 Lkmjin32.exe 2464 Lgdjnofi.exe 2464 Lgdjnofi.exe 1940 Libgjj32.exe 1940 Libgjj32.exe 2904 Lmnbkinf.exe 2904 Lmnbkinf.exe 3008 Llqcfe32.exe 3008 Llqcfe32.exe 1840 Lplogdmj.exe 1840 Lplogdmj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Pgplkb32.exePjcabmga.exeCpkbdiqb.exeLhlqhb32.exePjpkjond.exeOojknblb.exeJgnamk32.exeBbjbaa32.exeDhnmij32.exeHckcmjep.exeBdbhke32.exeCadhnmnm.exeKjcgco32.exeNdkmpe32.exeApimacnn.exeAefeijle.exeEqijej32.exeQlhnbf32.exeOkgnab32.exeAidnohbk.exeBioqclil.exeBblogakg.exeCoelaaoi.exeCojema32.exeKibjkgca.exeNohnhc32.exeOmloag32.exeApomfh32.exeKjnfniii.exeNocnbmoo.exeDpeekh32.exeMnkbdlbd.exeNjgldmdc.exeJkpgfn32.exeQjjgclai.exeAnkdiqih.exeJokcgmee.exeMdejaf32.exeEibbcm32.exeNfmmin32.exeAlenki32.exeEijcpoac.exeHejoiedd.exeMabejlob.exeObigjnkf.exeChemfl32.exeOgblbo32.exeOfhick32.exeLekhfgfc.exeOmgaek32.exeDhjgal32.exeEeqdep32.exeFcmgfkeg.exeFhkpmjln.exeQabcjgkh.exeAmhpnkch.exeBafidiio.exeDoehqead.exeLdcamcih.exeBingpmnl.exePnlqnl32.exePlfamfpm.exeDjefobmk.exedescription ioc process File created C:\Windows\SysWOW64\Pogclp32.exe Pgplkb32.exe File created C:\Windows\SysWOW64\Lijfoo32.dll Pjcabmga.exe File created C:\Windows\SysWOW64\Hdjlnm32.dll Cpkbdiqb.exe File created C:\Windows\SysWOW64\Lkkmdn32.exe Lhlqhb32.exe File created C:\Windows\SysWOW64\Piblek32.exe Pjpkjond.exe File created C:\Windows\SysWOW64\Obigjnkf.exe Oojknblb.exe File created C:\Windows\SysWOW64\Jiondcpk.exe Jgnamk32.exe File opened for modification C:\Windows\SysWOW64\Behnnm32.exe Bbjbaa32.exe File created C:\Windows\SysWOW64\Efhhaddp.dll Dhnmij32.exe File created C:\Windows\SysWOW64\Hepmggig.dll Hckcmjep.exe File opened for modification C:\Windows\SysWOW64\Bhndldcn.exe Bdbhke32.exe File created C:\Windows\SysWOW64\Cdbdjhmp.exe Cadhnmnm.exe File created C:\Windows\SysWOW64\Neolegcj.dll Kjcgco32.exe File created C:\Windows\SysWOW64\Nkeelohh.exe Ndkmpe32.exe File opened for modification C:\Windows\SysWOW64\Anlmmp32.exe Apimacnn.exe File opened for modification C:\Windows\SysWOW64\Ahdaee32.exe Aefeijle.exe File created C:\Windows\SysWOW64\Echfaf32.exe Eqijej32.exe File created C:\Windows\SysWOW64\Qlhnbf32.exe Qlhnbf32.exe File opened for modification C:\Windows\SysWOW64\Ocnfbo32.exe Okgnab32.exe File created C:\Windows\SysWOW64\Jjifqd32.dll Aidnohbk.exe File created C:\Windows\SysWOW64\Bafidiio.exe Bioqclil.exe File created C:\Windows\SysWOW64\Qpmnhglp.dll Bblogakg.exe File created C:\Windows\SysWOW64\Gojbjm32.dll Coelaaoi.exe File created C:\Windows\SysWOW64\Cnmehnan.exe Cojema32.exe File opened for modification C:\Windows\SysWOW64\Klqfhbbe.exe Kibjkgca.exe File opened for modification C:\Windows\SysWOW64\Nccjhafn.exe Nohnhc32.exe File created C:\Windows\SysWOW64\Kedlancd.dll Omloag32.exe File opened for modification C:\Windows\SysWOW64\Adjigg32.exe Apomfh32.exe File created C:\Windows\SysWOW64\Kcfkfo32.exe Kjnfniii.exe File opened for modification C:\Windows\SysWOW64\Naajoinb.exe Nocnbmoo.exe File opened for modification C:\Windows\SysWOW64\Dogefd32.exe Dpeekh32.exe File created C:\Windows\SysWOW64\Jkkilgnq.dll Mnkbdlbd.exe File opened for modification C:\Windows\SysWOW64\Nnbhek32.exe Njgldmdc.exe File opened for modification C:\Windows\SysWOW64\Jokcgmee.exe Jkpgfn32.exe File created C:\Windows\SysWOW64\Gcghbk32.dll Qjjgclai.exe File created C:\Windows\SysWOW64\Ipghqomc.dll Ankdiqih.exe File opened for modification C:\Windows\SysWOW64\Jcgogk32.exe Jokcgmee.exe File created C:\Windows\SysWOW64\Mhqfbebj.exe Mdejaf32.exe File opened for modification C:\Windows\SysWOW64\Eqijej32.exe Eibbcm32.exe File created C:\Windows\SysWOW64\Njiijlbp.exe Nfmmin32.exe File created C:\Windows\SysWOW64\Jolfcj32.dll Alenki32.exe File created C:\Windows\SysWOW64\Dekpaqgc.dll Eijcpoac.exe File opened for modification C:\Windows\SysWOW64\Hnagjbdf.exe Hejoiedd.exe File opened for modification C:\Windows\SysWOW64\Menakj32.exe Mabejlob.exe File created C:\Windows\SysWOW64\Aadlib32.dll Obigjnkf.exe File created C:\Windows\SysWOW64\Claifkkf.exe Chemfl32.exe File opened for modification C:\Windows\SysWOW64\Ojahnj32.exe Ogblbo32.exe File opened for modification C:\Windows\SysWOW64\Ojcecjee.exe Ofhick32.exe File created C:\Windows\SysWOW64\Ldnhad32.exe Lekhfgfc.exe File created C:\Windows\SysWOW64\Oqcnfjli.exe Omgaek32.exe File created C:\Windows\SysWOW64\Dhjgal32.exe Dhjgal32.exe File opened for modification C:\Windows\SysWOW64\Epfhbign.exe Eeqdep32.exe File opened for modification C:\Windows\SysWOW64\Ffkcbgek.exe Fcmgfkeg.exe File created C:\Windows\SysWOW64\Dhggeddb.dll Fhkpmjln.exe File created C:\Windows\SysWOW64\Hnagjbdf.exe Hejoiedd.exe File created C:\Windows\SysWOW64\Hjkbhikj.dll Qabcjgkh.exe File opened for modification C:\Windows\SysWOW64\Aadloj32.exe Amhpnkch.exe File opened for modification C:\Windows\SysWOW64\Bdeeqehb.exe Bafidiio.exe File created C:\Windows\SysWOW64\Dcadac32.exe Doehqead.exe File opened for modification C:\Windows\SysWOW64\Lkmjin32.exe Ldcamcih.exe File created C:\Windows\SysWOW64\Blmdlhmp.exe Bingpmnl.exe File created C:\Windows\SysWOW64\Jejinjob.dll Pnlqnl32.exe File created C:\Windows\SysWOW64\Ppamme32.exe Plfamfpm.exe File created C:\Windows\SysWOW64\Epafjqck.dll Djefobmk.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6820 6792 WerFault.exe Fkckeh32.exe -
Modifies registry class 64 IoCs
Processes:
Ffkcbgek.exeAehboi32.exeNhnfkigh.exePbmmcq32.exeInljnfkg.exeCpnojioo.exeBekkcljk.exeBppoqeja.exeEmkaol32.exeBkaqmeah.exeFpfdalii.exeLbnemk32.exeOmloag32.exeIqalka32.exeHejoiedd.exeOcnfbo32.exeQabcjgkh.exeEchfaf32.exe329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exeAiinen32.exePjhknm32.exeMlcple32.exeNialog32.exeBdhhqk32.exeCcdlbf32.exeJjjacf32.exeBkfjhd32.exeLbcnhjnj.exeMgqcmlgl.exeLibgjj32.exeAplpai32.exeCfeddafl.exeJokcgmee.exeQcpofbjl.exeAnccmo32.exeDlkepi32.exePiblek32.exeAhakmf32.exeOnphoo32.exeAbjebn32.exeOfbfdmeb.exeAnkdiqih.exeObcccl32.exeCcngld32.exeNcmdhb32.exeNgkmnacm.exeGmgdddmq.exeAaobdjof.exePpjglfon.exeBhfagipa.exeDhdcji32.exeBnpmipql.exeOkgnab32.exeCljcelan.exeQmicohqm.exeNkiogn32.exeInqcif32.exeJcbellac.exeKfegbj32.exeEnfenplo.exeLmdpejfq.exeCobbhfhg.exeDhnmij32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffkcbgek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aehboi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nhnfkigh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbmmcq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Inljnfkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpnojioo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bekkcljk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bppoqeja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkmkpl32.dll" Emkaol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkaqmeah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clphjpmh.dll" Fpfdalii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdklej32.dll" Lbnemk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kedlancd.dll" Omloag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iqalka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enlbgc32.dll" Hejoiedd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmccegik.dll" Ocnfbo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qabcjgkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Echfaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeahel32.dll" Aiinen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdmqokqf.dll" Pjhknm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlcple32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onmddnil.dll" Nialog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdhhqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccdlbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjjacf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkfjhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbcnhjnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgqcmlgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Libgjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aplpai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfeddafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chgdod32.dll" Jokcgmee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcpofbjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anccmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlkepi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Piblek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahakmf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Onphoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abjebn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofbfdmeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aimcgn32.dll" Ankdiqih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Obcccl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amkoie32.dll" Obcccl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccngld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ildamhjd.dll" Ncmdhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngkmnacm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbnkge32.dll" Gmgdddmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fikjha32.dll" Aaobdjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbkdjjal.dll" Ppjglfon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhfagipa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhdcji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnpmipql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okgnab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeeonk32.dll" Cljcelan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qmicohqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkiogn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Inqcif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcbellac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhlhki32.dll" Kfegbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enfenplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghgobd32.dll" Lmdpejfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cobbhfhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efhhaddp.dll" Dhnmij32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exeKedaeh32.exeKlnjbbdh.exeKpjfba32.exeKbhbom32.exeKegnkh32.exeKibjkgca.exeKlqfhbbe.exeKjcgco32.exeKbkodl32.exeKeikqhhe.exeKdlkld32.exeLlccmb32.exeLmdpejfq.exeLekhfgfc.exeLdnhad32.exedescription pid process target process PID 2944 wrote to memory of 2956 2944 329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe Kedaeh32.exe PID 2944 wrote to memory of 2956 2944 329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe Kedaeh32.exe PID 2944 wrote to memory of 2956 2944 329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe Kedaeh32.exe PID 2944 wrote to memory of 2956 2944 329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe Kedaeh32.exe PID 2956 wrote to memory of 2020 2956 Kedaeh32.exe Klnjbbdh.exe PID 2956 wrote to memory of 2020 2956 Kedaeh32.exe Klnjbbdh.exe PID 2956 wrote to memory of 2020 2956 Kedaeh32.exe Klnjbbdh.exe PID 2956 wrote to memory of 2020 2956 Kedaeh32.exe Klnjbbdh.exe PID 2020 wrote to memory of 2628 2020 Klnjbbdh.exe Kpjfba32.exe PID 2020 wrote to memory of 2628 2020 Klnjbbdh.exe Kpjfba32.exe PID 2020 wrote to memory of 2628 2020 Klnjbbdh.exe Kpjfba32.exe PID 2020 wrote to memory of 2628 2020 Klnjbbdh.exe Kpjfba32.exe PID 2628 wrote to memory of 2444 2628 Kpjfba32.exe Kbhbom32.exe PID 2628 wrote to memory of 2444 2628 Kpjfba32.exe Kbhbom32.exe PID 2628 wrote to memory of 2444 2628 Kpjfba32.exe Kbhbom32.exe PID 2628 wrote to memory of 2444 2628 Kpjfba32.exe Kbhbom32.exe PID 2444 wrote to memory of 2744 2444 Kbhbom32.exe Kegnkh32.exe PID 2444 wrote to memory of 2744 2444 Kbhbom32.exe Kegnkh32.exe PID 2444 wrote to memory of 2744 2444 Kbhbom32.exe Kegnkh32.exe PID 2444 wrote to memory of 2744 2444 Kbhbom32.exe Kegnkh32.exe PID 2744 wrote to memory of 2492 2744 Kegnkh32.exe Kibjkgca.exe PID 2744 wrote to memory of 2492 2744 Kegnkh32.exe Kibjkgca.exe PID 2744 wrote to memory of 2492 2744 Kegnkh32.exe Kibjkgca.exe PID 2744 wrote to memory of 2492 2744 Kegnkh32.exe Kibjkgca.exe PID 2492 wrote to memory of 3052 2492 Kibjkgca.exe Klqfhbbe.exe PID 2492 wrote to memory of 3052 2492 Kibjkgca.exe Klqfhbbe.exe PID 2492 wrote to memory of 3052 2492 Kibjkgca.exe Klqfhbbe.exe PID 2492 wrote to memory of 3052 2492 Kibjkgca.exe Klqfhbbe.exe PID 3052 wrote to memory of 1868 3052 Klqfhbbe.exe Kjcgco32.exe PID 3052 wrote to memory of 1868 3052 Klqfhbbe.exe Kjcgco32.exe PID 3052 wrote to memory of 1868 3052 Klqfhbbe.exe Kjcgco32.exe PID 3052 wrote to memory of 1868 3052 Klqfhbbe.exe Kjcgco32.exe PID 1868 wrote to memory of 3032 1868 Kjcgco32.exe Kbkodl32.exe PID 1868 wrote to memory of 3032 1868 Kjcgco32.exe Kbkodl32.exe PID 1868 wrote to memory of 3032 1868 Kjcgco32.exe Kbkodl32.exe PID 1868 wrote to memory of 3032 1868 Kjcgco32.exe Kbkodl32.exe PID 3032 wrote to memory of 2676 3032 Kbkodl32.exe Keikqhhe.exe PID 3032 wrote to memory of 2676 3032 Kbkodl32.exe Keikqhhe.exe PID 3032 wrote to memory of 2676 3032 Kbkodl32.exe Keikqhhe.exe PID 3032 wrote to memory of 2676 3032 Kbkodl32.exe Keikqhhe.exe PID 2676 wrote to memory of 2508 2676 Keikqhhe.exe Kdlkld32.exe PID 2676 wrote to memory of 2508 2676 Keikqhhe.exe Kdlkld32.exe PID 2676 wrote to memory of 2508 2676 Keikqhhe.exe Kdlkld32.exe PID 2676 wrote to memory of 2508 2676 Keikqhhe.exe Kdlkld32.exe PID 2508 wrote to memory of 2820 2508 Kdlkld32.exe Llccmb32.exe PID 2508 wrote to memory of 2820 2508 Kdlkld32.exe Llccmb32.exe PID 2508 wrote to memory of 2820 2508 Kdlkld32.exe Llccmb32.exe PID 2508 wrote to memory of 2820 2508 Kdlkld32.exe Llccmb32.exe PID 2820 wrote to memory of 1428 2820 Llccmb32.exe Lmdpejfq.exe PID 2820 wrote to memory of 1428 2820 Llccmb32.exe Lmdpejfq.exe PID 2820 wrote to memory of 1428 2820 Llccmb32.exe Lmdpejfq.exe PID 2820 wrote to memory of 1428 2820 Llccmb32.exe Lmdpejfq.exe PID 1428 wrote to memory of 2304 1428 Lmdpejfq.exe Lekhfgfc.exe PID 1428 wrote to memory of 2304 1428 Lmdpejfq.exe Lekhfgfc.exe PID 1428 wrote to memory of 2304 1428 Lmdpejfq.exe Lekhfgfc.exe PID 1428 wrote to memory of 2304 1428 Lmdpejfq.exe Lekhfgfc.exe PID 2304 wrote to memory of 1732 2304 Lekhfgfc.exe Ldnhad32.exe PID 2304 wrote to memory of 1732 2304 Lekhfgfc.exe Ldnhad32.exe PID 2304 wrote to memory of 1732 2304 Lekhfgfc.exe Ldnhad32.exe PID 2304 wrote to memory of 1732 2304 Lekhfgfc.exe Ldnhad32.exe PID 1732 wrote to memory of 684 1732 Ldnhad32.exe Lkhpnnej.exe PID 1732 wrote to memory of 684 1732 Ldnhad32.exe Lkhpnnej.exe PID 1732 wrote to memory of 684 1732 Ldnhad32.exe Lkhpnnej.exe PID 1732 wrote to memory of 684 1732 Ldnhad32.exe Lkhpnnej.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\329f9e90afa4bc33e63f98ff554b3c10_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Kedaeh32.exeC:\Windows\system32\Kedaeh32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Klnjbbdh.exeC:\Windows\system32\Klnjbbdh.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Kpjfba32.exeC:\Windows\system32\Kpjfba32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Kbhbom32.exeC:\Windows\system32\Kbhbom32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Kegnkh32.exeC:\Windows\system32\Kegnkh32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Kibjkgca.exeC:\Windows\system32\Kibjkgca.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\Klqfhbbe.exeC:\Windows\system32\Klqfhbbe.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Kjcgco32.exeC:\Windows\system32\Kjcgco32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\Kbkodl32.exeC:\Windows\system32\Kbkodl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Keikqhhe.exeC:\Windows\system32\Keikqhhe.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Kdlkld32.exeC:\Windows\system32\Kdlkld32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Llccmb32.exeC:\Windows\system32\Llccmb32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Lmdpejfq.exeC:\Windows\system32\Lmdpejfq.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\Lekhfgfc.exeC:\Windows\system32\Lekhfgfc.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Ldnhad32.exeC:\Windows\system32\Ldnhad32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Lkhpnnej.exeC:\Windows\system32\Lkhpnnej.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Windows\SysWOW64\Lmgmjjdn.exeC:\Windows\system32\Lmgmjjdn.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816 -
C:\Windows\SysWOW64\Labhkh32.exeC:\Windows\system32\Labhkh32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:344 -
C:\Windows\SysWOW64\Lpeifeca.exeC:\Windows\system32\Lpeifeca.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2408 -
C:\Windows\SysWOW64\Lhlqhb32.exeC:\Windows\system32\Lhlqhb32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\Lkkmdn32.exeC:\Windows\system32\Lkkmdn32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Windows\SysWOW64\Limmokib.exeC:\Windows\system32\Limmokib.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2340 -
C:\Windows\SysWOW64\Lmiipi32.exeC:\Windows\system32\Lmiipi32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\Lpgele32.exeC:\Windows\system32\Lpgele32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1040 -
C:\Windows\SysWOW64\Ldcamcih.exeC:\Windows\system32\Ldcamcih.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\Lkmjin32.exeC:\Windows\system32\Lkmjin32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892 -
C:\Windows\SysWOW64\Lgdjnofi.exeC:\Windows\system32\Lgdjnofi.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2464 -
C:\Windows\SysWOW64\Libgjj32.exeC:\Windows\system32\Libgjj32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Lmnbkinf.exeC:\Windows\system32\Lmnbkinf.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Windows\SysWOW64\Llqcfe32.exeC:\Windows\system32\Llqcfe32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3008 -
C:\Windows\SysWOW64\Lplogdmj.exeC:\Windows\system32\Lplogdmj.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1840 -
C:\Windows\SysWOW64\Mcjkcplm.exeC:\Windows\system32\Mcjkcplm.exe33⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Meigpkka.exeC:\Windows\system32\Meigpkka.exe34⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\Mlcple32.exeC:\Windows\system32\Mlcple32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1440 -
C:\Windows\SysWOW64\Mpolmdkg.exeC:\Windows\system32\Mpolmdkg.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Mcmhiojk.exeC:\Windows\system32\Mcmhiojk.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\Mekdekin.exeC:\Windows\system32\Mekdekin.exe38⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Mhjpaf32.exeC:\Windows\system32\Mhjpaf32.exe39⤵
- Executes dropped EXE
PID:1848 -
C:\Windows\SysWOW64\Mkhmma32.exeC:\Windows\system32\Mkhmma32.exe40⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\Mcodno32.exeC:\Windows\system32\Mcodno32.exe41⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Mabejlob.exeC:\Windows\system32\Mabejlob.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\Menakj32.exeC:\Windows\system32\Menakj32.exe43⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\Mhlmgf32.exeC:\Windows\system32\Mhlmgf32.exe44⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\Mlgigdoh.exeC:\Windows\system32\Mlgigdoh.exe45⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\Mofecpnl.exeC:\Windows\system32\Mofecpnl.exe46⤵
- Executes dropped EXE
PID:692 -
C:\Windows\SysWOW64\Mnieom32.exeC:\Windows\system32\Mnieom32.exe47⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\Mhnjle32.exeC:\Windows\system32\Mhnjle32.exe48⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\Mkmfhacp.exeC:\Windows\system32\Mkmfhacp.exe49⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Mohbip32.exeC:\Windows\system32\Mohbip32.exe50⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\Mnkbdlbd.exeC:\Windows\system32\Mnkbdlbd.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\Mpjoqhah.exeC:\Windows\system32\Mpjoqhah.exe52⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\Mdejaf32.exeC:\Windows\system32\Mdejaf32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:896 -
C:\Windows\SysWOW64\Mhqfbebj.exeC:\Windows\system32\Mhqfbebj.exe54⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\Mgcgmb32.exeC:\Windows\system32\Mgcgmb32.exe55⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Njbcim32.exeC:\Windows\system32\Njbcim32.exe56⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\Naikkk32.exeC:\Windows\system32\Naikkk32.exe57⤵
- Executes dropped EXE
PID:488 -
C:\Windows\SysWOW64\Nplkfgoe.exeC:\Windows\system32\Nplkfgoe.exe58⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\Ncjgbcoi.exeC:\Windows\system32\Ncjgbcoi.exe59⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Nkaocp32.exeC:\Windows\system32\Nkaocp32.exe60⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\Njdpomfe.exeC:\Windows\system32\Njdpomfe.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Nlblkhei.exeC:\Windows\system32\Nlblkhei.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\Npnhlg32.exeC:\Windows\system32\Npnhlg32.exe63⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\Ncmdhb32.exeC:\Windows\system32\Ncmdhb32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Nghphaeo.exeC:\Windows\system32\Nghphaeo.exe65⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\Njgldmdc.exeC:\Windows\system32\Njgldmdc.exe66⤵
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Nnbhek32.exeC:\Windows\system32\Nnbhek32.exe67⤵PID:1284
-
C:\Windows\SysWOW64\Nleiqhcg.exeC:\Windows\system32\Nleiqhcg.exe68⤵PID:2348
-
C:\Windows\SysWOW64\Nqqdag32.exeC:\Windows\system32\Nqqdag32.exe69⤵PID:1492
-
C:\Windows\SysWOW64\Ncoamb32.exeC:\Windows\system32\Ncoamb32.exe70⤵PID:2644
-
C:\Windows\SysWOW64\Ncoamb32.exeC:\Windows\system32\Ncoamb32.exe71⤵PID:2344
-
C:\Windows\SysWOW64\Ngkmnacm.exeC:\Windows\system32\Ngkmnacm.exe72⤵
- Modifies registry class
PID:1872 -
C:\Windows\SysWOW64\Nfmmin32.exeC:\Windows\system32\Nfmmin32.exe73⤵
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\Njiijlbp.exeC:\Windows\system32\Njiijlbp.exe74⤵PID:840
-
C:\Windows\SysWOW64\Nlgefh32.exeC:\Windows\system32\Nlgefh32.exe75⤵PID:2104
-
C:\Windows\SysWOW64\Nqcagfim.exeC:\Windows\system32\Nqcagfim.exe76⤵PID:2888
-
C:\Windows\SysWOW64\Nofabc32.exeC:\Windows\system32\Nofabc32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2336 -
C:\Windows\SysWOW64\Ncancbha.exeC:\Windows\system32\Ncancbha.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2792 -
C:\Windows\SysWOW64\Nbdnoo32.exeC:\Windows\system32\Nbdnoo32.exe79⤵PID:1672
-
C:\Windows\SysWOW64\Njkfpl32.exeC:\Windows\system32\Njkfpl32.exe80⤵PID:1816
-
C:\Windows\SysWOW64\Njkfpl32.exeC:\Windows\system32\Njkfpl32.exe81⤵PID:596
-
C:\Windows\SysWOW64\Nhnfkigh.exeC:\Windows\system32\Nhnfkigh.exe82⤵
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Nmjblg32.exeC:\Windows\system32\Nmjblg32.exe83⤵PID:2928
-
C:\Windows\SysWOW64\Nkmbgdfl.exeC:\Windows\system32\Nkmbgdfl.exe84⤵PID:2392
-
C:\Windows\SysWOW64\Nohnhc32.exeC:\Windows\system32\Nohnhc32.exe85⤵
- Drops file in System32 directory
PID:1252 -
C:\Windows\SysWOW64\Nccjhafn.exeC:\Windows\system32\Nccjhafn.exe86⤵PID:2456
-
C:\Windows\SysWOW64\Ofbfdmeb.exeC:\Windows\system32\Ofbfdmeb.exe87⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Odegpj32.exeC:\Windows\system32\Odegpj32.exe88⤵PID:2324
-
C:\Windows\SysWOW64\Ohqbqhde.exeC:\Windows\system32\Ohqbqhde.exe89⤵PID:3064
-
C:\Windows\SysWOW64\Omloag32.exeC:\Windows\system32\Omloag32.exe90⤵
- Drops file in System32 directory
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Okoomd32.exeC:\Windows\system32\Okoomd32.exe91⤵PID:2228
-
C:\Windows\SysWOW64\Oojknblb.exeC:\Windows\system32\Oojknblb.exe92⤵
- Drops file in System32 directory
PID:1128 -
C:\Windows\SysWOW64\Obigjnkf.exeC:\Windows\system32\Obigjnkf.exe93⤵
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\Ofdcjm32.exeC:\Windows\system32\Ofdcjm32.exe94⤵PID:2720
-
C:\Windows\SysWOW64\Odgcfijj.exeC:\Windows\system32\Odgcfijj.exe95⤵PID:2872
-
C:\Windows\SysWOW64\Oicpfh32.exeC:\Windows\system32\Oicpfh32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1648 -
C:\Windows\SysWOW64\Okalbc32.exeC:\Windows\system32\Okalbc32.exe97⤵PID:2504
-
C:\Windows\SysWOW64\Onphoo32.exeC:\Windows\system32\Onphoo32.exe98⤵
- Modifies registry class
PID:764 -
C:\Windows\SysWOW64\Obkdonic.exeC:\Windows\system32\Obkdonic.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2856 -
C:\Windows\SysWOW64\Oqndkj32.exeC:\Windows\system32\Oqndkj32.exe100⤵PID:1696
-
C:\Windows\SysWOW64\Odjpkihg.exeC:\Windows\system32\Odjpkihg.exe101⤵PID:2732
-
C:\Windows\SysWOW64\Oiellh32.exeC:\Windows\system32\Oiellh32.exe102⤵PID:2632
-
C:\Windows\SysWOW64\Oghlgdgk.exeC:\Windows\system32\Oghlgdgk.exe103⤵PID:472
-
C:\Windows\SysWOW64\Ojficpfn.exeC:\Windows\system32\Ojficpfn.exe104⤵PID:2824
-
C:\Windows\SysWOW64\Onbddoog.exeC:\Windows\system32\Onbddoog.exe105⤵PID:2716
-
C:\Windows\SysWOW64\Oelmai32.exeC:\Windows\system32\Oelmai32.exe106⤵PID:1584
-
C:\Windows\SysWOW64\Ocomlemo.exeC:\Windows\system32\Ocomlemo.exe107⤵PID:2560
-
C:\Windows\SysWOW64\Okfencna.exeC:\Windows\system32\Okfencna.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1508 -
C:\Windows\SysWOW64\Ojieip32.exeC:\Windows\system32\Ojieip32.exe109⤵PID:1892
-
C:\Windows\SysWOW64\Ondajnme.exeC:\Windows\system32\Ondajnme.exe110⤵PID:2224
-
C:\Windows\SysWOW64\Omgaek32.exeC:\Windows\system32\Omgaek32.exe111⤵
- Drops file in System32 directory
PID:2620 -
C:\Windows\SysWOW64\Oqcnfjli.exeC:\Windows\system32\Oqcnfjli.exe112⤵PID:1976
-
C:\Windows\SysWOW64\Oenifh32.exeC:\Windows\system32\Oenifh32.exe113⤵PID:2032
-
C:\Windows\SysWOW64\Ogmfbd32.exeC:\Windows\system32\Ogmfbd32.exe114⤵PID:2708
-
C:\Windows\SysWOW64\Ofpfnqjp.exeC:\Windows\system32\Ofpfnqjp.exe115⤵PID:1608
-
C:\Windows\SysWOW64\Ojkboo32.exeC:\Windows\system32\Ojkboo32.exe116⤵PID:1100
-
C:\Windows\SysWOW64\Pminkk32.exeC:\Windows\system32\Pminkk32.exe117⤵PID:1724
-
C:\Windows\SysWOW64\Pminkk32.exeC:\Windows\system32\Pminkk32.exe118⤵PID:2400
-
C:\Windows\SysWOW64\Paejki32.exeC:\Windows\system32\Paejki32.exe119⤵PID:2572
-
C:\Windows\SysWOW64\Pccfge32.exeC:\Windows\system32\Pccfge32.exe120⤵PID:2924
-
C:\Windows\SysWOW64\Pgobhcac.exeC:\Windows\system32\Pgobhcac.exe121⤵PID:2996
-
C:\Windows\SysWOW64\Pjmodopf.exeC:\Windows\system32\Pjmodopf.exe122⤵PID:1996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-