Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 06:29
Behavioral task
behavioral1
Sample
381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe
-
Size
192KB
-
MD5
381c7b760f1e90f268855826de4040d0
-
SHA1
f0517bd0ea97b3949b7fd73503f222a35a143cd6
-
SHA256
893191aea2264679e6ced8aa7f1ebb7e0be49eefdf8be917c2033dff986f1929
-
SHA512
fd4f3131bfb643f190669556d7d0558b9b89d01ac576cb9fa70b9c17742309367b6c161a008ecae6b2de00b7ed4790da63dc29a9923e3fe8bbe4cf096632710b
-
SSDEEP
3072:tUhkuDY6vwSRGYnX3Kieqr4MKy3G7UEqMM6T9pui6yYPaI7DehizrVtNe8ohrQ3N:tUhApghK5rndpui6yYPaIGckfruN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Bmnlbcfg.exeCcpcckck.exeFogibnha.exeCebeem32.exeQlgkki32.exeCnfqccna.exeNmqpam32.exePcghof32.exeHqfaldbo.exeJliaac32.exeMfmndn32.exeBpjkiogm.exeNeqnqofm.exeLlbqfe32.exeNfkapb32.exeLnhgim32.exeMfokinhf.exeGpcoib32.exeBkegah32.exeMamgmofp.exeOcgbji32.exeGjicfk32.exeFoojop32.exeIiecgjba.exePejmfqan.exeBaojapfj.exeAbmgjo32.exeNlqmmd32.exeAomnhd32.exeAhgofi32.exeDhbhmb32.exeKkmand32.exeAfgmodel.exeGfcnegnk.exeKdnild32.exeNdkhngdd.exeEijdkcgn.exeBoljgg32.exeJkpbdq32.exeKnbhlkkc.exePlolgk32.exeDahifbpk.exeJaoqqflp.exeAjqljc32.exeOfadnq32.exePkmlmbcd.exeOdjdmjgo.exeGbadjg32.exeOmklkkpl.exeObjaha32.exeMjpkqonj.exeFkbgckgd.exeAqbdkk32.exeBmphhc32.exeJgaiobjn.exeMgedmb32.exeAccnekon.exeGcgnnlle.exeJampjian.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmnlbcfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ccpcckck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fogibnha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cebeem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qlgkki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnfqccna.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmqpam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcghof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hqfaldbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jliaac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mfmndn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpjkiogm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Neqnqofm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fogibnha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Llbqfe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfkapb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lnhgim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mfokinhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gpcoib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnhgim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bkegah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mamgmofp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ocgbji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjicfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Foojop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iiecgjba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pejmfqan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Baojapfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abmgjo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlqmmd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aomnhd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahgofi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhbhmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kkmand32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Afgmodel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gfcnegnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdnild32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ndkhngdd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eijdkcgn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boljgg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkpbdq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knbhlkkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdnild32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plolgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dahifbpk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaoqqflp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajqljc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ofadnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pkmlmbcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Odjdmjgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gbadjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jaoqqflp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Omklkkpl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Objaha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmnlbcfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjpkqonj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkbgckgd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqbdkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmphhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jgaiobjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgedmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Accnekon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gcgnnlle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jampjian.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Mamgmofp.exe family_berbew \Windows\SysWOW64\Mapccndn.exe family_berbew C:\Windows\SysWOW64\Mbeiefff.exe family_berbew \Windows\SysWOW64\Nianhplq.exe family_berbew \Windows\SysWOW64\Noogpfjh.exe family_berbew \Windows\SysWOW64\Nmfqgbmm.exe family_berbew C:\Windows\SysWOW64\Nmhmlbkk.exe family_berbew C:\Windows\SysWOW64\Ocgbji32.exe family_berbew \Windows\SysWOW64\Ocjophem.exe family_berbew \Windows\SysWOW64\Pcaepg32.exe family_berbew \Windows\SysWOW64\Pnjfae32.exe family_berbew \Windows\SysWOW64\Pkacpihj.exe family_berbew \Windows\SysWOW64\Pclhdl32.exe family_berbew \Windows\SysWOW64\Qjkjle32.exe family_berbew \Windows\SysWOW64\Accnekon.exe family_berbew \Windows\SysWOW64\Akncimmh.exe family_berbew C:\Windows\SysWOW64\Acqnnndl.exe family_berbew C:\Windows\SysWOW64\Badnhbce.exe family_berbew C:\Windows\SysWOW64\Bpjkiogm.exe family_berbew C:\Windows\SysWOW64\Bmnlbcfg.exe family_berbew C:\Windows\SysWOW64\Bmphhc32.exe family_berbew C:\Windows\SysWOW64\Chlfnp32.exe family_berbew C:\Windows\SysWOW64\Cohkpj32.exe family_berbew C:\Windows\SysWOW64\Cojhejbh.exe family_berbew C:\Windows\SysWOW64\Cedpbd32.exe family_berbew C:\Windows\SysWOW64\Ckcepj32.exe family_berbew C:\Windows\SysWOW64\Depbfhpe.exe family_berbew C:\Windows\SysWOW64\Dhbhmb32.exe family_berbew C:\Windows\SysWOW64\Degiggjm.exe family_berbew C:\Windows\SysWOW64\Eamilh32.exe family_berbew C:\Windows\SysWOW64\Ednbncmb.exe family_berbew C:\Windows\SysWOW64\Ejkkfjkj.exe family_berbew C:\Windows\SysWOW64\Eniclh32.exe family_berbew C:\Windows\SysWOW64\Ejpdai32.exe family_berbew C:\Windows\SysWOW64\Fheabelm.exe family_berbew C:\Windows\SysWOW64\Foojop32.exe family_berbew C:\Windows\SysWOW64\Fmcjhdbc.exe family_berbew C:\Windows\SysWOW64\Fbpbpkpj.exe family_berbew C:\Windows\SysWOW64\Fnfcel32.exe family_berbew C:\Windows\SysWOW64\Fgohna32.exe family_berbew C:\Windows\SysWOW64\Fnipkkdl.exe family_berbew C:\Windows\SysWOW64\Fkmqdpce.exe family_berbew C:\Windows\SysWOW64\Geeemeif.exe family_berbew C:\Windows\SysWOW64\Gmpjagfa.exe family_berbew C:\Windows\SysWOW64\Gfhnjm32.exe family_berbew C:\Windows\SysWOW64\Gqnbhf32.exe family_berbew C:\Windows\SysWOW64\Gghkdp32.exe family_berbew C:\Windows\SysWOW64\Gpcoib32.exe family_berbew C:\Windows\SysWOW64\Gjicfk32.exe family_berbew C:\Windows\SysWOW64\Gcahoqhf.exe family_berbew C:\Windows\SysWOW64\Hmjlhfof.exe family_berbew C:\Windows\SysWOW64\Heealhla.exe family_berbew C:\Windows\SysWOW64\Hnmeen32.exe family_berbew C:\Windows\SysWOW64\Hhejnc32.exe family_berbew C:\Windows\SysWOW64\Hhhgcc32.exe family_berbew C:\Windows\SysWOW64\Hmeolj32.exe family_berbew C:\Windows\SysWOW64\Hhjcic32.exe family_berbew C:\Windows\SysWOW64\Ihmpobck.exe family_berbew C:\Windows\SysWOW64\Iphecepe.exe family_berbew C:\Windows\SysWOW64\Ijmipn32.exe family_berbew C:\Windows\SysWOW64\Ibhndp32.exe family_berbew C:\Windows\SysWOW64\Iegjqk32.exe family_berbew C:\Windows\SysWOW64\Iiecgjba.exe family_berbew C:\Windows\SysWOW64\Ioakoq32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Mamgmofp.exeMapccndn.exeMbeiefff.exeNianhplq.exeNoogpfjh.exeNmfqgbmm.exeNmhmlbkk.exeOcgbji32.exeOcjophem.exePcaepg32.exePnjfae32.exePkacpihj.exePclhdl32.exeQjkjle32.exeAccnekon.exeAkncimmh.exeAcqnnndl.exeBadnhbce.exeBpjkiogm.exeBmnlbcfg.exeBmphhc32.exeChlfnp32.exeCohkpj32.exeCojhejbh.exeCedpbd32.exeCkcepj32.exeDepbfhpe.exeDhbhmb32.exeDegiggjm.exeEamilh32.exeEdnbncmb.exeEjkkfjkj.exeEniclh32.exeEjpdai32.exeFheabelm.exeFoojop32.exeFmcjhdbc.exeFbpbpkpj.exeFnfcel32.exeFgohna32.exeFnipkkdl.exeFkmqdpce.exeGeeemeif.exeGmpjagfa.exeGfhnjm32.exeGqnbhf32.exeGghkdp32.exeGpcoib32.exeGjicfk32.exeGcahoqhf.exeHmjlhfof.exeHeealhla.exeHnmeen32.exeHhejnc32.exeHhhgcc32.exeHmeolj32.exeHhjcic32.exeIhmpobck.exeIphecepe.exeIjmipn32.exeIbhndp32.exeIegjqk32.exeIiecgjba.exeIoakoq32.exepid process 2276 Mamgmofp.exe 2536 Mapccndn.exe 2552 Mbeiefff.exe 2564 Nianhplq.exe 2640 Noogpfjh.exe 2408 Nmfqgbmm.exe 3032 Nmhmlbkk.exe 928 Ocgbji32.exe 1184 Ocjophem.exe 1936 Pcaepg32.exe 2336 Pnjfae32.exe 1748 Pkacpihj.exe 1540 Pclhdl32.exe 2740 Qjkjle32.exe 2924 Accnekon.exe 1056 Akncimmh.exe 1444 Acqnnndl.exe 976 Badnhbce.exe 2344 Bpjkiogm.exe 1668 Bmnlbcfg.exe 2808 Bmphhc32.exe 2820 Chlfnp32.exe 2948 Cohkpj32.exe 876 Cojhejbh.exe 2160 Cedpbd32.exe 2164 Ckcepj32.exe 2624 Depbfhpe.exe 1132 Dhbhmb32.exe 2724 Degiggjm.exe 2532 Eamilh32.exe 2468 Ednbncmb.exe 2516 Ejkkfjkj.exe 2848 Eniclh32.exe 2688 Ejpdai32.exe 2188 Fheabelm.exe 1092 Foojop32.exe 2700 Fmcjhdbc.exe 2312 Fbpbpkpj.exe 1640 Fnfcel32.exe 2816 Fgohna32.exe 2436 Fnipkkdl.exe 476 Fkmqdpce.exe 2968 Geeemeif.exe 1320 Gmpjagfa.exe 1812 Gfhnjm32.exe 684 Gqnbhf32.exe 1820 Gghkdp32.exe 1364 Gpcoib32.exe 1760 Gjicfk32.exe 2860 Gcahoqhf.exe 2796 Hmjlhfof.exe 3048 Heealhla.exe 2124 Hnmeen32.exe 2772 Hhejnc32.exe 2128 Hhhgcc32.exe 2908 Hmeolj32.exe 2192 Hhjcic32.exe 2836 Ihmpobck.exe 392 Iphecepe.exe 1480 Ijmipn32.exe 1780 Ibhndp32.exe 1172 Iegjqk32.exe 1724 Iiecgjba.exe 1548 Ioakoq32.exe -
Loads dropped DLL 64 IoCs
Processes:
381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exeMamgmofp.exeMapccndn.exeMbeiefff.exeNianhplq.exeNoogpfjh.exeNmfqgbmm.exeNmhmlbkk.exeOcgbji32.exeOcjophem.exePcaepg32.exePnjfae32.exePkacpihj.exePclhdl32.exeQjkjle32.exeAccnekon.exeAkncimmh.exeAcqnnndl.exeBadnhbce.exeBpjkiogm.exeBmnlbcfg.exeBmphhc32.exeChlfnp32.exeCohkpj32.exeCojhejbh.exeCakqgeoi.exeCkcepj32.exeDepbfhpe.exeDhbhmb32.exeDegiggjm.exeEamilh32.exeEdnbncmb.exepid process 1368 381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe 1368 381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe 2276 Mamgmofp.exe 2276 Mamgmofp.exe 2536 Mapccndn.exe 2536 Mapccndn.exe 2552 Mbeiefff.exe 2552 Mbeiefff.exe 2564 Nianhplq.exe 2564 Nianhplq.exe 2640 Noogpfjh.exe 2640 Noogpfjh.exe 2408 Nmfqgbmm.exe 2408 Nmfqgbmm.exe 3032 Nmhmlbkk.exe 3032 Nmhmlbkk.exe 928 Ocgbji32.exe 928 Ocgbji32.exe 1184 Ocjophem.exe 1184 Ocjophem.exe 1936 Pcaepg32.exe 1936 Pcaepg32.exe 2336 Pnjfae32.exe 2336 Pnjfae32.exe 1748 Pkacpihj.exe 1748 Pkacpihj.exe 1540 Pclhdl32.exe 1540 Pclhdl32.exe 2740 Qjkjle32.exe 2740 Qjkjle32.exe 2924 Accnekon.exe 2924 Accnekon.exe 1056 Akncimmh.exe 1056 Akncimmh.exe 1444 Acqnnndl.exe 1444 Acqnnndl.exe 976 Badnhbce.exe 976 Badnhbce.exe 2344 Bpjkiogm.exe 2344 Bpjkiogm.exe 1668 Bmnlbcfg.exe 1668 Bmnlbcfg.exe 2808 Bmphhc32.exe 2808 Bmphhc32.exe 2820 Chlfnp32.exe 2820 Chlfnp32.exe 2948 Cohkpj32.exe 2948 Cohkpj32.exe 876 Cojhejbh.exe 876 Cojhejbh.exe 1340 Cakqgeoi.exe 1340 Cakqgeoi.exe 2164 Ckcepj32.exe 2164 Ckcepj32.exe 2624 Depbfhpe.exe 2624 Depbfhpe.exe 1132 Dhbhmb32.exe 1132 Dhbhmb32.exe 2724 Degiggjm.exe 2724 Degiggjm.exe 2532 Eamilh32.exe 2532 Eamilh32.exe 2468 Ednbncmb.exe 2468 Ednbncmb.exe -
Drops file in System32 directory 64 IoCs
Processes:
Noogpfjh.exeGcgnnlle.exeLclicpkm.exeBqlfaj32.exeBigkel32.exeCnkjnb32.exeGoiehm32.exeIfjlcmmj.exeNmfqgbmm.exeGghkdp32.exePidfdofi.exeAhgofi32.exeOcjophem.exeNoffdd32.exeDaofpchf.exeEijdkcgn.exePadhdm32.exePkcbnanl.exeMapccndn.exeLqqpgj32.exeEiekpd32.exeMgedmb32.exeAhbekjcf.exeCebeem32.exeAcqnnndl.exeCkcepj32.exeJagnlkjd.exeJkpbdq32.exeQngopb32.exeFkbgckgd.exeMbeiefff.exeNpmphinm.exeFogibnha.exeJampjian.exeKjmnjkjd.exeBniajoic.exeMamgmofp.exeFoojop32.exeCiohqa32.exeMfokinhf.exePlaimk32.exeQnebjc32.exeAjqljc32.exeBaojapfj.exeDepbfhpe.exeIbhndp32.exeFgigil32.exePcaepg32.exeBofgii32.exeCillkbac.exeEdibhmml.exeIoohokoo.exeObhdcanc.exeCiihklpj.exePkacpihj.exeLmljgj32.exeCpkmcldj.exeJefpeh32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Nmfqgbmm.exe Noogpfjh.exe File created C:\Windows\SysWOW64\Mkaohl32.dll Gcgnnlle.exe File created C:\Windows\SysWOW64\Jefdckem.dll Lclicpkm.exe File created C:\Windows\SysWOW64\Bigkel32.exe Bqlfaj32.exe File opened for modification C:\Windows\SysWOW64\Bkegah32.exe Bigkel32.exe File created C:\Windows\SysWOW64\Cgcnghpl.exe Cnkjnb32.exe File opened for modification C:\Windows\SysWOW64\Gfcnegnk.exe Goiehm32.exe File created C:\Windows\SysWOW64\Nhnmcb32.dll Ifjlcmmj.exe File created C:\Windows\SysWOW64\Nmhmlbkk.exe Nmfqgbmm.exe File created C:\Windows\SysWOW64\Phcohg32.dll Gghkdp32.exe File created C:\Windows\SysWOW64\Cofdbf32.dll Pidfdofi.exe File created C:\Windows\SysWOW64\Kmhnlgkg.dll Ahgofi32.exe File created C:\Windows\SysWOW64\Pcaepg32.exe Ocjophem.exe File created C:\Windows\SysWOW64\Jinafidh.dll Noffdd32.exe File created C:\Windows\SysWOW64\Ioloda32.dll Daofpchf.exe File created C:\Windows\SysWOW64\Ekdehk32.dll Eijdkcgn.exe File created C:\Windows\SysWOW64\Nfdgghho.dll Padhdm32.exe File created C:\Windows\SysWOW64\Nlbjim32.dll Pkcbnanl.exe File opened for modification C:\Windows\SysWOW64\Mbeiefff.exe Mapccndn.exe File opened for modification C:\Windows\SysWOW64\Lkfddc32.exe Lqqpgj32.exe File created C:\Windows\SysWOW64\Egikjh32.exe Eiekpd32.exe File created C:\Windows\SysWOW64\Bjibgc32.dll Mgedmb32.exe File created C:\Windows\SysWOW64\Pmmgmc32.dll Ahbekjcf.exe File created C:\Windows\SysWOW64\Aqbdkk32.exe Ahgofi32.exe File created C:\Windows\SysWOW64\Cnkjnb32.exe Cebeem32.exe File created C:\Windows\SysWOW64\Badnhbce.exe Acqnnndl.exe File created C:\Windows\SysWOW64\Jnfdfhli.dll Ckcepj32.exe File opened for modification C:\Windows\SysWOW64\Jkpbdq32.exe Jagnlkjd.exe File opened for modification C:\Windows\SysWOW64\Jdhgnf32.exe Jkpbdq32.exe File created C:\Windows\SysWOW64\Qhmcmk32.exe Qngopb32.exe File opened for modification C:\Windows\SysWOW64\Fgigil32.exe Fkbgckgd.exe File created C:\Windows\SysWOW64\Gfcnegnk.exe Goiehm32.exe File opened for modification C:\Windows\SysWOW64\Nianhplq.exe Mbeiefff.exe File created C:\Windows\SysWOW64\Nmqpam32.exe Npmphinm.exe File created C:\Windows\SysWOW64\Goiehm32.exe Fogibnha.exe File created C:\Windows\SysWOW64\Koaqcn32.exe Jampjian.exe File created C:\Windows\SysWOW64\Kjokokha.exe Kjmnjkjd.exe File created C:\Windows\SysWOW64\Akkggpci.dll Bniajoic.exe File opened for modification C:\Windows\SysWOW64\Mapccndn.exe Mamgmofp.exe File created C:\Windows\SysWOW64\Cmqmci32.dll Foojop32.exe File opened for modification C:\Windows\SysWOW64\Cfcijf32.exe Ciohqa32.exe File created C:\Windows\SysWOW64\Mpgobc32.exe Mfokinhf.exe File created C:\Windows\SysWOW64\Alacdcjm.dll Plaimk32.exe File created C:\Windows\SysWOW64\Qgmfchei.exe Qnebjc32.exe File opened for modification C:\Windows\SysWOW64\Adfqgl32.exe Ajqljc32.exe File created C:\Windows\SysWOW64\Hdhlfoln.dll Baojapfj.exe File opened for modification C:\Windows\SysWOW64\Dhbhmb32.exe Depbfhpe.exe File created C:\Windows\SysWOW64\Fmcjhdbc.exe Foojop32.exe File created C:\Windows\SysWOW64\Iegjqk32.exe Ibhndp32.exe File opened for modification C:\Windows\SysWOW64\Nmqpam32.exe Npmphinm.exe File created C:\Windows\SysWOW64\Qmfpeb32.dll Fgigil32.exe File created C:\Windows\SysWOW64\Pleofj32.exe Pkcbnanl.exe File created C:\Windows\SysWOW64\Pnjfae32.exe Pcaepg32.exe File created C:\Windows\SysWOW64\Depbfhpe.exe Ckcepj32.exe File created C:\Windows\SysWOW64\Fkhabhbn.dll Bofgii32.exe File created C:\Windows\SysWOW64\Pdaemiaj.dll Cillkbac.exe File created C:\Windows\SysWOW64\Feglhlfm.dll Edibhmml.exe File opened for modification C:\Windows\SysWOW64\Ifjlcmmj.exe Ioohokoo.exe File opened for modification C:\Windows\SysWOW64\Objaha32.exe Obhdcanc.exe File opened for modification C:\Windows\SysWOW64\Cnfqccna.exe Ciihklpj.exe File created C:\Windows\SysWOW64\Pclhdl32.exe Pkacpihj.exe File created C:\Windows\SysWOW64\Jmladcej.dll Lmljgj32.exe File opened for modification C:\Windows\SysWOW64\Chfbgn32.exe Cpkmcldj.exe File opened for modification C:\Windows\SysWOW64\Jampjian.exe Jefpeh32.exe -
Drops file in Windows directory 1 IoCs
Processes:
Dpapaj32.exedescription ioc process File created C:\Windows\system32†Eahedh32.¾ll Dpapaj32.exe -
Modifies registry class 64 IoCs
Processes:
Aojabdlf.exeHnmeen32.exeHhejnc32.exeKdefgj32.exeBiaign32.exeKdhcli32.exeDoecog32.exeDgeaoinb.exeGbadjg32.exeJliaac32.exeGeeemeif.exeGmpjagfa.exeGqnbhf32.exeHmjlhfof.exeAjqljc32.exeOmklkkpl.exeCjakccop.exeLcaiiejc.exeCcpcckck.exeMpgobc32.exeEniclh32.exeElfcbo32.exeEijdkcgn.exeIfjlcmmj.exeQnghel32.exeCjgoje32.exeKdnild32.exeMqpflg32.exeCillkbac.exeMbeiefff.exeNlfmbibo.exeEgikjh32.exeGdmdacnn.exeNpjlhcmd.exeKpicle32.exeCakqgeoi.exeGjicfk32.exeLkfddc32.exeNfdkoc32.exeIhmpobck.exeMaefamlh.exeNfdddm32.exePclhdl32.exeKkmand32.exeBqlfaj32.exeHqfaldbo.exePkcbnanl.exePleofj32.exeAqbdkk32.exeEjkkfjkj.exeLqqpgj32.exeOadkej32.exeIeomef32.exeQgmfchei.exeAmcbankf.exeDahifbpk.exeFjjpjgjj.exePplaki32.exeDogpdg32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maanne32.dll" Aojabdlf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hnmeen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hhejnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kdefgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Biaign32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncniim32.dll" Kdhcli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Doecog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnkgen32.dll" Dgeaoinb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbnooiab.dll" Gbadjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlmgamof.dll" Jliaac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Geeemeif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gmpjagfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gqnbhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hmjlhfof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ajqljc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Omklkkpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cjakccop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lcaiiejc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ccpcckck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mpgobc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glegaime.dll" Eniclh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edgeao32.dll" Elfcbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekdehk32.dll" Eijdkcgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ifjlcmmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qnghel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cjgoje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Behjbjcf.dll" Kdnild32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mqpflg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cillkbac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbnnnbbh.dll" Omklkkpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mbeiefff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nlfmbibo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Biaign32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Egikjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iajfhi32.dll" Gdmdacnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Npjlhcmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cefhdnca.dll" Kpicle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpicle32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cakqgeoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gjicfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lkfddc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmoogf32.dll" Nfdkoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ihmpobck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkfklboi.dll" Maefamlh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nfdddm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pclhdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Feafacjb.dll" Kkmand32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bqlfaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gmpjagfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fijbkbjk.dll" Hqfaldbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pkcbnanl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pleofj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aqbdkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ejkkfjkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lqqpgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcnfppba.dll" Oadkej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbkipjbh.dll" Ieomef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qgmfchei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Amcbankf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dahifbpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dgeaoinb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fjjpjgjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaaded32.dll" Pplaki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dogpdg32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exeMamgmofp.exeMapccndn.exeMbeiefff.exeNianhplq.exeNoogpfjh.exeNmfqgbmm.exeNmhmlbkk.exeOcgbji32.exeOcjophem.exePcaepg32.exePnjfae32.exePkacpihj.exePclhdl32.exeQjkjle32.exeAccnekon.exedescription pid process target process PID 1368 wrote to memory of 2276 1368 381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe Mamgmofp.exe PID 1368 wrote to memory of 2276 1368 381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe Mamgmofp.exe PID 1368 wrote to memory of 2276 1368 381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe Mamgmofp.exe PID 1368 wrote to memory of 2276 1368 381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe Mamgmofp.exe PID 2276 wrote to memory of 2536 2276 Mamgmofp.exe Mapccndn.exe PID 2276 wrote to memory of 2536 2276 Mamgmofp.exe Mapccndn.exe PID 2276 wrote to memory of 2536 2276 Mamgmofp.exe Mapccndn.exe PID 2276 wrote to memory of 2536 2276 Mamgmofp.exe Mapccndn.exe PID 2536 wrote to memory of 2552 2536 Mapccndn.exe Mbeiefff.exe PID 2536 wrote to memory of 2552 2536 Mapccndn.exe Mbeiefff.exe PID 2536 wrote to memory of 2552 2536 Mapccndn.exe Mbeiefff.exe PID 2536 wrote to memory of 2552 2536 Mapccndn.exe Mbeiefff.exe PID 2552 wrote to memory of 2564 2552 Mbeiefff.exe Nianhplq.exe PID 2552 wrote to memory of 2564 2552 Mbeiefff.exe Nianhplq.exe PID 2552 wrote to memory of 2564 2552 Mbeiefff.exe Nianhplq.exe PID 2552 wrote to memory of 2564 2552 Mbeiefff.exe Nianhplq.exe PID 2564 wrote to memory of 2640 2564 Nianhplq.exe Noogpfjh.exe PID 2564 wrote to memory of 2640 2564 Nianhplq.exe Noogpfjh.exe PID 2564 wrote to memory of 2640 2564 Nianhplq.exe Noogpfjh.exe PID 2564 wrote to memory of 2640 2564 Nianhplq.exe Noogpfjh.exe PID 2640 wrote to memory of 2408 2640 Noogpfjh.exe Nmfqgbmm.exe PID 2640 wrote to memory of 2408 2640 Noogpfjh.exe Nmfqgbmm.exe PID 2640 wrote to memory of 2408 2640 Noogpfjh.exe Nmfqgbmm.exe PID 2640 wrote to memory of 2408 2640 Noogpfjh.exe Nmfqgbmm.exe PID 2408 wrote to memory of 3032 2408 Nmfqgbmm.exe Nmhmlbkk.exe PID 2408 wrote to memory of 3032 2408 Nmfqgbmm.exe Nmhmlbkk.exe PID 2408 wrote to memory of 3032 2408 Nmfqgbmm.exe Nmhmlbkk.exe PID 2408 wrote to memory of 3032 2408 Nmfqgbmm.exe Nmhmlbkk.exe PID 3032 wrote to memory of 928 3032 Nmhmlbkk.exe Ocgbji32.exe PID 3032 wrote to memory of 928 3032 Nmhmlbkk.exe Ocgbji32.exe PID 3032 wrote to memory of 928 3032 Nmhmlbkk.exe Ocgbji32.exe PID 3032 wrote to memory of 928 3032 Nmhmlbkk.exe Ocgbji32.exe PID 928 wrote to memory of 1184 928 Ocgbji32.exe Ocjophem.exe PID 928 wrote to memory of 1184 928 Ocgbji32.exe Ocjophem.exe PID 928 wrote to memory of 1184 928 Ocgbji32.exe Ocjophem.exe PID 928 wrote to memory of 1184 928 Ocgbji32.exe Ocjophem.exe PID 1184 wrote to memory of 1936 1184 Ocjophem.exe Pcaepg32.exe PID 1184 wrote to memory of 1936 1184 Ocjophem.exe Pcaepg32.exe PID 1184 wrote to memory of 1936 1184 Ocjophem.exe Pcaepg32.exe PID 1184 wrote to memory of 1936 1184 Ocjophem.exe Pcaepg32.exe PID 1936 wrote to memory of 2336 1936 Pcaepg32.exe Pnjfae32.exe PID 1936 wrote to memory of 2336 1936 Pcaepg32.exe Pnjfae32.exe PID 1936 wrote to memory of 2336 1936 Pcaepg32.exe Pnjfae32.exe PID 1936 wrote to memory of 2336 1936 Pcaepg32.exe Pnjfae32.exe PID 2336 wrote to memory of 1748 2336 Pnjfae32.exe Pkacpihj.exe PID 2336 wrote to memory of 1748 2336 Pnjfae32.exe Pkacpihj.exe PID 2336 wrote to memory of 1748 2336 Pnjfae32.exe Pkacpihj.exe PID 2336 wrote to memory of 1748 2336 Pnjfae32.exe Pkacpihj.exe PID 1748 wrote to memory of 1540 1748 Pkacpihj.exe Pclhdl32.exe PID 1748 wrote to memory of 1540 1748 Pkacpihj.exe Pclhdl32.exe PID 1748 wrote to memory of 1540 1748 Pkacpihj.exe Pclhdl32.exe PID 1748 wrote to memory of 1540 1748 Pkacpihj.exe Pclhdl32.exe PID 1540 wrote to memory of 2740 1540 Pclhdl32.exe Qjkjle32.exe PID 1540 wrote to memory of 2740 1540 Pclhdl32.exe Qjkjle32.exe PID 1540 wrote to memory of 2740 1540 Pclhdl32.exe Qjkjle32.exe PID 1540 wrote to memory of 2740 1540 Pclhdl32.exe Qjkjle32.exe PID 2740 wrote to memory of 2924 2740 Qjkjle32.exe Accnekon.exe PID 2740 wrote to memory of 2924 2740 Qjkjle32.exe Accnekon.exe PID 2740 wrote to memory of 2924 2740 Qjkjle32.exe Accnekon.exe PID 2740 wrote to memory of 2924 2740 Qjkjle32.exe Accnekon.exe PID 2924 wrote to memory of 1056 2924 Accnekon.exe Akncimmh.exe PID 2924 wrote to memory of 1056 2924 Accnekon.exe Akncimmh.exe PID 2924 wrote to memory of 1056 2924 Accnekon.exe Akncimmh.exe PID 2924 wrote to memory of 1056 2924 Accnekon.exe Akncimmh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\381c7b760f1e90f268855826de4040d0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\Mamgmofp.exeC:\Windows\system32\Mamgmofp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\Mapccndn.exeC:\Windows\system32\Mapccndn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Mbeiefff.exeC:\Windows\system32\Mbeiefff.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Nianhplq.exeC:\Windows\system32\Nianhplq.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Noogpfjh.exeC:\Windows\system32\Noogpfjh.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Nmfqgbmm.exeC:\Windows\system32\Nmfqgbmm.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Nmhmlbkk.exeC:\Windows\system32\Nmhmlbkk.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Ocgbji32.exeC:\Windows\system32\Ocgbji32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\Ocjophem.exeC:\Windows\system32\Ocjophem.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\Pcaepg32.exeC:\Windows\system32\Pcaepg32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\Pnjfae32.exeC:\Windows\system32\Pnjfae32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\Pkacpihj.exeC:\Windows\system32\Pkacpihj.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Pclhdl32.exeC:\Windows\system32\Pclhdl32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\Qjkjle32.exeC:\Windows\system32\Qjkjle32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Accnekon.exeC:\Windows\system32\Accnekon.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\Akncimmh.exeC:\Windows\system32\Akncimmh.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1056 -
C:\Windows\SysWOW64\Acqnnndl.exeC:\Windows\system32\Acqnnndl.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1444 -
C:\Windows\SysWOW64\Badnhbce.exeC:\Windows\system32\Badnhbce.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976 -
C:\Windows\SysWOW64\Bpjkiogm.exeC:\Windows\system32\Bpjkiogm.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2344 -
C:\Windows\SysWOW64\Bmnlbcfg.exeC:\Windows\system32\Bmnlbcfg.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\Bmphhc32.exeC:\Windows\system32\Bmphhc32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Windows\SysWOW64\Chlfnp32.exeC:\Windows\system32\Chlfnp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820 -
C:\Windows\SysWOW64\Cohkpj32.exeC:\Windows\system32\Cohkpj32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Windows\SysWOW64\Cojhejbh.exeC:\Windows\system32\Cojhejbh.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:876 -
C:\Windows\SysWOW64\Cedpbd32.exeC:\Windows\system32\Cedpbd32.exe26⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\Cakqgeoi.exeC:\Windows\system32\Cakqgeoi.exe27⤵
- Loads dropped DLL
- Modifies registry class
PID:1340 -
C:\Windows\SysWOW64\Ckcepj32.exeC:\Windows\system32\Ckcepj32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\Depbfhpe.exeC:\Windows\system32\Depbfhpe.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\Dhbhmb32.exeC:\Windows\system32\Dhbhmb32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1132 -
C:\Windows\SysWOW64\Degiggjm.exeC:\Windows\system32\Degiggjm.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2724 -
C:\Windows\SysWOW64\Eamilh32.exeC:\Windows\system32\Eamilh32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\Ednbncmb.exeC:\Windows\system32\Ednbncmb.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468 -
C:\Windows\SysWOW64\Ejkkfjkj.exeC:\Windows\system32\Ejkkfjkj.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Eniclh32.exeC:\Windows\system32\Eniclh32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:2848 -
C:\Windows\SysWOW64\Ejpdai32.exeC:\Windows\system32\Ejpdai32.exe36⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Fheabelm.exeC:\Windows\system32\Fheabelm.exe37⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Foojop32.exeC:\Windows\system32\Foojop32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1092 -
C:\Windows\SysWOW64\Fmcjhdbc.exeC:\Windows\system32\Fmcjhdbc.exe39⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\Fbpbpkpj.exeC:\Windows\system32\Fbpbpkpj.exe40⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\Fnfcel32.exeC:\Windows\system32\Fnfcel32.exe41⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Fgohna32.exeC:\Windows\system32\Fgohna32.exe42⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\Fnipkkdl.exeC:\Windows\system32\Fnipkkdl.exe43⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\Fkmqdpce.exeC:\Windows\system32\Fkmqdpce.exe44⤵
- Executes dropped EXE
PID:476 -
C:\Windows\SysWOW64\Geeemeif.exeC:\Windows\system32\Geeemeif.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\Gmpjagfa.exeC:\Windows\system32\Gmpjagfa.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\Gfhnjm32.exeC:\Windows\system32\Gfhnjm32.exe47⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\Gqnbhf32.exeC:\Windows\system32\Gqnbhf32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:684 -
C:\Windows\SysWOW64\Gghkdp32.exeC:\Windows\system32\Gghkdp32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1820 -
C:\Windows\SysWOW64\Gpcoib32.exeC:\Windows\system32\Gpcoib32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Gjicfk32.exeC:\Windows\system32\Gjicfk32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\Gcahoqhf.exeC:\Windows\system32\Gcahoqhf.exe52⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\Hmjlhfof.exeC:\Windows\system32\Hmjlhfof.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Heealhla.exeC:\Windows\system32\Heealhla.exe54⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Hnmeen32.exeC:\Windows\system32\Hnmeen32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:2124 -
C:\Windows\SysWOW64\Hhejnc32.exeC:\Windows\system32\Hhejnc32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2772 -
C:\Windows\SysWOW64\Hhhgcc32.exeC:\Windows\system32\Hhhgcc32.exe57⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Hmeolj32.exeC:\Windows\system32\Hmeolj32.exe58⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Hhjcic32.exeC:\Windows\system32\Hhjcic32.exe59⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Ihmpobck.exeC:\Windows\system32\Ihmpobck.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Iphecepe.exeC:\Windows\system32\Iphecepe.exe61⤵
- Executes dropped EXE
PID:392 -
C:\Windows\SysWOW64\Ijmipn32.exeC:\Windows\system32\Ijmipn32.exe62⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\Ibhndp32.exeC:\Windows\system32\Ibhndp32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1780 -
C:\Windows\SysWOW64\Iegjqk32.exeC:\Windows\system32\Iegjqk32.exe64⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\Iiecgjba.exeC:\Windows\system32\Iiecgjba.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Ioakoq32.exeC:\Windows\system32\Ioakoq32.exe66⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Jlelhe32.exeC:\Windows\system32\Jlelhe32.exe67⤵PID:1604
-
C:\Windows\SysWOW64\Jodhdp32.exeC:\Windows\system32\Jodhdp32.exe68⤵PID:672
-
C:\Windows\SysWOW64\Jofejpmc.exeC:\Windows\system32\Jofejpmc.exe69⤵PID:2060
-
C:\Windows\SysWOW64\Jgaiobjn.exeC:\Windows\system32\Jgaiobjn.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3060 -
C:\Windows\SysWOW64\Jagnlkjd.exeC:\Windows\system32\Jagnlkjd.exe71⤵
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\Jkpbdq32.exeC:\Windows\system32\Jkpbdq32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1816 -
C:\Windows\SysWOW64\Jdhgnf32.exeC:\Windows\system32\Jdhgnf32.exe73⤵PID:1664
-
C:\Windows\SysWOW64\Jnpkflne.exeC:\Windows\system32\Jnpkflne.exe74⤵PID:896
-
C:\Windows\SysWOW64\Kcmcoblm.exeC:\Windows\system32\Kcmcoblm.exe75⤵PID:1388
-
C:\Windows\SysWOW64\Knbhlkkc.exeC:\Windows\system32\Knbhlkkc.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2052 -
C:\Windows\SysWOW64\Kcopdb32.exeC:\Windows\system32\Kcopdb32.exe77⤵PID:2584
-
C:\Windows\SysWOW64\Klhemhpk.exeC:\Windows\system32\Klhemhpk.exe78⤵PID:2524
-
C:\Windows\SysWOW64\Kbdmeoob.exeC:\Windows\system32\Kbdmeoob.exe79⤵PID:2596
-
C:\Windows\SysWOW64\Kkmand32.exeC:\Windows\system32\Kkmand32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Kdefgj32.exeC:\Windows\system32\Kdefgj32.exe81⤵
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Knnkpobc.exeC:\Windows\system32\Knnkpobc.exe82⤵PID:2460
-
C:\Windows\SysWOW64\Kdhcli32.exeC:\Windows\system32\Kdhcli32.exe83⤵
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Ldjpbign.exeC:\Windows\system32\Ldjpbign.exe84⤵PID:940
-
C:\Windows\SysWOW64\Lqqpgj32.exeC:\Windows\system32\Lqqpgj32.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Lkfddc32.exeC:\Windows\system32\Lkfddc32.exe86⤵
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\Lcaiiejc.exeC:\Windows\system32\Lcaiiejc.exe87⤵
- Modifies registry class
PID:2212 -
C:\Windows\SysWOW64\Lqejbiim.exeC:\Windows\system32\Lqejbiim.exe88⤵PID:772
-
C:\Windows\SysWOW64\Lmljgj32.exeC:\Windows\system32\Lmljgj32.exe89⤵
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\Mjpkqonj.exeC:\Windows\system32\Mjpkqonj.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1848 -
C:\Windows\SysWOW64\Mkaghg32.exeC:\Windows\system32\Mkaghg32.exe91⤵PID:2332
-
C:\Windows\SysWOW64\Mlfacfpc.exeC:\Windows\system32\Mlfacfpc.exe92⤵PID:2868
-
C:\Windows\SysWOW64\Maefamlh.exeC:\Windows\system32\Maefamlh.exe93⤵
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Mnifja32.exeC:\Windows\system32\Mnifja32.exe94⤵PID:1952
-
C:\Windows\SysWOW64\Nfdkoc32.exeC:\Windows\system32\Nfdkoc32.exe95⤵
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Npmphinm.exeC:\Windows\system32\Npmphinm.exe96⤵
- Drops file in System32 directory
PID:2828 -
C:\Windows\SysWOW64\Nmqpam32.exeC:\Windows\system32\Nmqpam32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2656 -
C:\Windows\SysWOW64\Ndkhngdd.exeC:\Windows\system32\Ndkhngdd.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2732 -
C:\Windows\SysWOW64\Nlfmbibo.exeC:\Windows\system32\Nlfmbibo.exe99⤵
- Modifies registry class
PID:2284 -
C:\Windows\SysWOW64\Nfkapb32.exeC:\Windows\system32\Nfkapb32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2472 -
C:\Windows\SysWOW64\Noffdd32.exeC:\Windows\system32\Noffdd32.exe101⤵
- Drops file in System32 directory
PID:1492 -
C:\Windows\SysWOW64\Neqnqofm.exeC:\Windows\system32\Neqnqofm.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2604 -
C:\Windows\SysWOW64\Oagoep32.exeC:\Windows\system32\Oagoep32.exe103⤵PID:1504
-
C:\Windows\SysWOW64\Okpcoe32.exeC:\Windows\system32\Okpcoe32.exe104⤵PID:1100
-
C:\Windows\SysWOW64\Oonldcih.exeC:\Windows\system32\Oonldcih.exe105⤵PID:2776
-
C:\Windows\SysWOW64\Odjdmjgo.exeC:\Windows\system32\Odjdmjgo.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1060 -
C:\Windows\SysWOW64\Oanefo32.exeC:\Windows\system32\Oanefo32.exe107⤵PID:400
-
C:\Windows\SysWOW64\Okgjodmi.exeC:\Windows\system32\Okgjodmi.exe108⤵PID:1560
-
C:\Windows\SysWOW64\Oaqbln32.exeC:\Windows\system32\Oaqbln32.exe109⤵PID:320
-
C:\Windows\SysWOW64\Pgnjde32.exeC:\Windows\system32\Pgnjde32.exe110⤵PID:1224
-
C:\Windows\SysWOW64\Pcdkif32.exeC:\Windows\system32\Pcdkif32.exe111⤵PID:2856
-
C:\Windows\SysWOW64\Pcghof32.exeC:\Windows\system32\Pcghof32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2300 -
C:\Windows\SysWOW64\Plolgk32.exeC:\Windows\system32\Plolgk32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2672 -
C:\Windows\SysWOW64\Pciddedl.exeC:\Windows\system32\Pciddedl.exe114⤵PID:2520
-
C:\Windows\SysWOW64\Plaimk32.exeC:\Windows\system32\Plaimk32.exe115⤵
- Drops file in System32 directory
PID:2292 -
C:\Windows\SysWOW64\Pejmfqan.exeC:\Windows\system32\Pejmfqan.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2876 -
C:\Windows\SysWOW64\Qnebjc32.exeC:\Windows\system32\Qnebjc32.exe117⤵
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\Qgmfchei.exeC:\Windows\system32\Qgmfchei.exe118⤵
- Modifies registry class
PID:2148 -
C:\Windows\SysWOW64\Qngopb32.exeC:\Windows\system32\Qngopb32.exe119⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\Qhmcmk32.exeC:\Windows\system32\Qhmcmk32.exe120⤵PID:2704
-
C:\Windows\SysWOW64\Agpcihcf.exeC:\Windows\system32\Agpcihcf.exe121⤵PID:2260
-
C:\Windows\SysWOW64\Abegfa32.exeC:\Windows\system32\Abegfa32.exe122⤵PID:2984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-