Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 06:06
Behavioral task
behavioral1
Sample
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe
-
Size
357KB
-
MD5
35e08bfe1b1a555bc16a3bc234a0f590
-
SHA1
cd09ff7e2fd1d2e4ebbdb11a1603bda8f8d9ef88
-
SHA256
304d1f0894aeecca55fe4fc0e6f17f2d3b67a8ee809448836e346c50015c893b
-
SHA512
1a36d8b5d59d8299bd5060149b28c784ea26beed5fff4fbeb986f11928ba74ba02b55effbe72dc1bb2cec2c55474b0ab5792b2b4e56d137acebfe78e80747411
-
SSDEEP
6144:UBtA8wbg02bmj31n6xJmPMwZoXpKtCe8AUReheFlfSZR0SvsuFrGoyeg3kl+fiXt:qtADbg02KZoXpKtCe1eehil6ZR5ZrQe7
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Cdanpb32.exeFncmmmma.exeNjdqka32.exeBdhleh32.exeJpgmpk32.exeDdfcje32.exeLobgoh32.exeBigimdjh.exeGjicfk32.exeKdhcli32.exeNhdhif32.exeOalkih32.exeIonefb32.exePiliii32.exeEkknjcfh.exeNdnlnm32.exeMiehak32.exeDhmhhmlm.exeLcjlnpmo.exeJmkmjoec.exeNmlgfnal.exeAficjnpm.exeGoiongbc.exeCogfqe32.exeHhejnc32.exeLiqoflfh.exeNmqpam32.exeLddlkg32.exeGcedad32.exeGpnmjd32.exeQobbofgn.exeDdpobo32.exeEjaphpnp.exeDknajh32.exeGcgnnlle.exeMjpkqonj.exeBjmeiq32.exeJagpdd32.exeKapohbfp.exeBnielm32.exeKjoifb32.exeFchijone.exeFgohna32.exeIflmjihl.exeKhkbbc32.exeCebcmdlg.exeFmegncpp.exeFbbofjnh.exeDemaoj32.exeFgjjad32.exeHqnjek32.exeLdllgiek.exeHcigco32.exeEibgpnjk.exeHgeelf32.exeMamgmofp.exeKohnoc32.exeQcogbdkg.exeKocpbfei.exeDfbnoc32.exePojbkh32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdanpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fncmmmma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njdqka32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdhleh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jpgmpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddfcje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lobgoh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bigimdjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gjicfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kdhcli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhdhif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oalkih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ionefb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Piliii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekknjcfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndnlnm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miehak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmhhmlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lcjlnpmo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmkmjoec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmlgfnal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aficjnpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goiongbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cogfqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhejnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Liqoflfh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmqpam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lddlkg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcedad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpnmjd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qobbofgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddpobo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejaphpnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dknajh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcgnnlle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mjpkqonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjmeiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jagpdd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kapohbfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnielm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kjoifb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fchijone.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgohna32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjpkqonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iflmjihl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khkbbc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cebcmdlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fmegncpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fbbofjnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Demaoj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgjjad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqnjek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldllgiek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcigco32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eibgpnjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hgeelf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mamgmofp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kohnoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbbofjnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcogbdkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kocpbfei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfbnoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejaphpnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pojbkh32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Aaloddnn.exe family_berbew \Windows\SysWOW64\Alhmjbhj.exe family_berbew \Windows\SysWOW64\Bnielm32.exe family_berbew C:\Windows\SysWOW64\Bbikgk32.exe family_berbew \Windows\SysWOW64\Boplllob.exe family_berbew C:\Windows\SysWOW64\Cdoajb32.exe family_berbew C:\Windows\SysWOW64\Cdanpb32.exe family_berbew \Windows\SysWOW64\Clmbddgp.exe family_berbew \Windows\SysWOW64\Cophko32.exe family_berbew \Windows\SysWOW64\Ddomif32.exe family_berbew \Windows\SysWOW64\Dngabk32.exe family_berbew \Windows\SysWOW64\Ddfcje32.exe family_berbew \Windows\SysWOW64\Ddhpod32.exe family_berbew \Windows\SysWOW64\Elcdcgcc.exe family_berbew \Windows\SysWOW64\Ekknjcfh.exe family_berbew \Windows\SysWOW64\Emkkdf32.exe family_berbew C:\Windows\SysWOW64\Fokdfajl.exe family_berbew C:\Windows\SysWOW64\Fcpfedki.exe family_berbew C:\Windows\SysWOW64\Fcbbjcif.exe family_berbew C:\Windows\SysWOW64\Fbgpkpnn.exe family_berbew C:\Windows\SysWOW64\Fncmmmma.exe family_berbew C:\Windows\SysWOW64\Gpnmjd32.exe family_berbew C:\Windows\SysWOW64\Gbjlaplk.exe family_berbew C:\Windows\SysWOW64\Gbqbaofc.exe family_berbew behavioral1/memory/2160-318-0x0000000000440000-0x0000000000475000-memory.dmp family_berbew behavioral1/memory/1800-307-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Gbnflo32.exe family_berbew C:\Windows\SysWOW64\Hafock32.exe family_berbew behavioral1/memory/1764-339-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Helngnie.exe family_berbew C:\Windows\SysWOW64\Ibckfa32.exe family_berbew C:\Windows\SysWOW64\Iknpkd32.exe family_berbew behavioral1/memory/2992-361-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Ilnmdgkj.exe family_berbew behavioral1/memory/2640-371-0x00000000002C0000-0x00000000002F5000-memory.dmp family_berbew C:\Windows\SysWOW64\Ionefb32.exe family_berbew behavioral1/memory/2768-383-0x00000000002C0000-0x00000000002F5000-memory.dmp family_berbew behavioral1/memory/2768-382-0x00000000002C0000-0x00000000002F5000-memory.dmp family_berbew behavioral1/memory/2844-390-0x0000000000260000-0x0000000000295000-memory.dmp family_berbew C:\Windows\SysWOW64\Ikefkcmo.exe family_berbew C:\Windows\SysWOW64\Jpdkii32.exe family_berbew C:\Windows\SysWOW64\Jpfhoi32.exe family_berbew C:\Windows\SysWOW64\Jpiedieo.exe family_berbew C:\Windows\SysWOW64\Jlbboiip.exe family_berbew C:\Windows\SysWOW64\Kbokgpgg.exe family_berbew behavioral1/memory/1568-444-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Kkileele.exe family_berbew behavioral1/memory/2464-459-0x00000000001B0000-0x00000000001E5000-memory.dmp family_berbew behavioral1/memory/2464-458-0x00000000001B0000-0x00000000001E5000-memory.dmp family_berbew C:\Windows\SysWOW64\Kjoifb32.exe family_berbew behavioral1/memory/1832-471-0x0000000000220000-0x0000000000255000-memory.dmp family_berbew C:\Windows\SysWOW64\Kjaelaok.exe family_berbew C:\Windows\SysWOW64\Lfjcfb32.exe family_berbew C:\Windows\SysWOW64\Lobgoh32.exe family_berbew C:\Windows\SysWOW64\Lkihdioa.exe family_berbew C:\Windows\SysWOW64\Lnjafd32.exe family_berbew C:\Windows\SysWOW64\Lgbeoibb.exe family_berbew C:\Windows\SysWOW64\Mgebdipp.exe family_berbew C:\Windows\SysWOW64\Mamgmofp.exe family_berbew C:\Windows\SysWOW64\Mnaggcej.exe family_berbew C:\Windows\SysWOW64\Mfllkece.exe family_berbew C:\Windows\SysWOW64\Mfoiqe32.exe family_berbew C:\Windows\SysWOW64\Mfaefd32.exe family_berbew C:\Windows\SysWOW64\Nbhfke32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Aaloddnn.exeAlhmjbhj.exeBnielm32.exeBbikgk32.exeBoplllob.exeCdoajb32.exeCdanpb32.exeClmbddgp.exeCophko32.exeDdomif32.exeDngabk32.exeDdfcje32.exeDdhpod32.exeElcdcgcc.exeEkknjcfh.exeEmkkdf32.exeFokdfajl.exeFncmmmma.exeFcpfedki.exeFcbbjcif.exeFbgpkpnn.exeGbjlaplk.exeGpnmjd32.exeGbnflo32.exeGbqbaofc.exeHafock32.exeHelngnie.exeIbckfa32.exeIknpkd32.exeIlnmdgkj.exeIonefb32.exeIkefkcmo.exeJpdkii32.exeJpfhoi32.exeJpiedieo.exeJlbboiip.exeKbokgpgg.exeKkileele.exeKjoifb32.exeKjaelaok.exeLfjcfb32.exeLobgoh32.exeLkihdioa.exeLnjafd32.exeLgbeoibb.exeMgebdipp.exeMamgmofp.exeMnaggcej.exeMfllkece.exeMfoiqe32.exeMfaefd32.exeNbhfke32.exeNlpkdkkd.exeNehomq32.exeNdnlnm32.exeNkhdkgnj.exeNmhmlbkk.exeOklnff32.exeOmmfga32.exeOcjophem.exeOlbchn32.exeOpplolac.exeOemegc32.exePeoalc32.exepid process 2996 Aaloddnn.exe 2608 Alhmjbhj.exe 2584 Bnielm32.exe 2884 Bbikgk32.exe 2456 Boplllob.exe 1640 Cdoajb32.exe 592 Cdanpb32.exe 1584 Clmbddgp.exe 2860 Cophko32.exe 2104 Ddomif32.exe 1796 Dngabk32.exe 1868 Ddfcje32.exe 2392 Ddhpod32.exe 1100 Elcdcgcc.exe 2276 Ekknjcfh.exe 2112 Emkkdf32.exe 2776 Fokdfajl.exe 548 Fncmmmma.exe 1512 Fcpfedki.exe 696 Fcbbjcif.exe 1328 Fbgpkpnn.exe 1656 Gbjlaplk.exe 1800 Gpnmjd32.exe 2160 Gbnflo32.exe 884 Gbqbaofc.exe 1764 Hafock32.exe 2948 Helngnie.exe 2992 Ibckfa32.exe 2640 Iknpkd32.exe 2768 Ilnmdgkj.exe 2844 Ionefb32.exe 2828 Ikefkcmo.exe 2888 Jpdkii32.exe 2448 Jpfhoi32.exe 1020 Jpiedieo.exe 1568 Jlbboiip.exe 2464 Kbokgpgg.exe 1832 Kkileele.exe 1952 Kjoifb32.exe 1864 Kjaelaok.exe 2028 Lfjcfb32.exe 932 Lobgoh32.exe 1112 Lkihdioa.exe 1316 Lnjafd32.exe 1240 Lgbeoibb.exe 1824 Mgebdipp.exe 980 Mamgmofp.exe 2808 Mnaggcej.exe 1944 Mfllkece.exe 2716 Mfoiqe32.exe 616 Mfaefd32.exe 2072 Nbhfke32.exe 2156 Nlpkdkkd.exe 1552 Nehomq32.exe 2516 Ndnlnm32.exe 2688 Nkhdkgnj.exe 2492 Nmhmlbkk.exe 2424 Oklnff32.exe 2876 Ommfga32.exe 564 Ocjophem.exe 2812 Olbchn32.exe 2320 Opplolac.exe 1412 Oemegc32.exe 2664 Peoalc32.exe -
Loads dropped DLL 64 IoCs
Processes:
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exeAaloddnn.exeAlhmjbhj.exeBnielm32.exeBbikgk32.exeBoplllob.exeCdoajb32.exeCdanpb32.exeClmbddgp.exeCophko32.exeDdomif32.exeDngabk32.exeDdfcje32.exeDdhpod32.exeElcdcgcc.exeEkknjcfh.exeEmkkdf32.exeFokdfajl.exeFncmmmma.exeFcpfedki.exeFcbbjcif.exeFbgpkpnn.exeGbjlaplk.exeGpnmjd32.exeGbnflo32.exeGbqbaofc.exeHafock32.exeHelngnie.exeIbckfa32.exeIknpkd32.exeIlnmdgkj.exeIonefb32.exepid process 2692 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe 2692 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe 2996 Aaloddnn.exe 2996 Aaloddnn.exe 2608 Alhmjbhj.exe 2608 Alhmjbhj.exe 2584 Bnielm32.exe 2584 Bnielm32.exe 2884 Bbikgk32.exe 2884 Bbikgk32.exe 2456 Boplllob.exe 2456 Boplllob.exe 1640 Cdoajb32.exe 1640 Cdoajb32.exe 592 Cdanpb32.exe 592 Cdanpb32.exe 1584 Clmbddgp.exe 1584 Clmbddgp.exe 2860 Cophko32.exe 2860 Cophko32.exe 2104 Ddomif32.exe 2104 Ddomif32.exe 1796 Dngabk32.exe 1796 Dngabk32.exe 1868 Ddfcje32.exe 1868 Ddfcje32.exe 2392 Ddhpod32.exe 2392 Ddhpod32.exe 1100 Elcdcgcc.exe 1100 Elcdcgcc.exe 2276 Ekknjcfh.exe 2276 Ekknjcfh.exe 2112 Emkkdf32.exe 2112 Emkkdf32.exe 2776 Fokdfajl.exe 2776 Fokdfajl.exe 548 Fncmmmma.exe 548 Fncmmmma.exe 1512 Fcpfedki.exe 1512 Fcpfedki.exe 696 Fcbbjcif.exe 696 Fcbbjcif.exe 1328 Fbgpkpnn.exe 1328 Fbgpkpnn.exe 1656 Gbjlaplk.exe 1656 Gbjlaplk.exe 1800 Gpnmjd32.exe 1800 Gpnmjd32.exe 2160 Gbnflo32.exe 2160 Gbnflo32.exe 884 Gbqbaofc.exe 884 Gbqbaofc.exe 1764 Hafock32.exe 1764 Hafock32.exe 2948 Helngnie.exe 2948 Helngnie.exe 2992 Ibckfa32.exe 2992 Ibckfa32.exe 2640 Iknpkd32.exe 2640 Iknpkd32.exe 2768 Ilnmdgkj.exe 2768 Ilnmdgkj.exe 2844 Ionefb32.exe 2844 Ionefb32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dmdnbecj.exeGkcekfad.exeKapohbfp.exeLdoimh32.exeLdjpbign.exePgpgjepk.exeDlifadkk.exeMgebdipp.exeFfibkj32.exeAckmih32.exeDdfcje32.exeMnaggcej.exeKnbhlkkc.exeKpdjaecc.exeCkmnbg32.exeFkkfgi32.exeEamilh32.exeEacljf32.exeLcjlnpmo.exeEpnhpglg.exeEccpoo32.exeEclbcj32.exeIoohokoo.exeEodicd32.exeDmhdkdlg.exeGfhgpg32.exeOimmjffj.exePdldnomh.exeNbpeoc32.exeIocgfhhc.exeNdnlnm32.exeGnkmqkbi.exeKkeecogo.exeBjmeiq32.exePiliii32.exeBoemlbpk.exeKllnhg32.exeGcgnnlle.exeDfbnoc32.exeEgonhf32.exeAknngo32.exeCogfqe32.exeBdhleh32.exeGpnmjd32.exeDpegcq32.exeNpdfhhhe.exeBfqpecma.exeEaebeoan.exeNfigck32.exeOalkih32.exeDafoikjb.exeElldgehk.exeLokgcf32.exeFlhmfbim.exeFigmjq32.exeMciabmlo.exeHjmlhbbg.exeJpgmpk32.exeNbjeinje.exeOfadnq32.exeCgidfcdk.exeDemaoj32.exeJmkmjoec.exedescription ioc process File created C:\Windows\SysWOW64\Dgmbkk32.exe Dmdnbecj.exe File created C:\Windows\SysWOW64\Eickphoo.dll Gkcekfad.exe File opened for modification C:\Windows\SysWOW64\Kocpbfei.exe Kapohbfp.exe File opened for modification C:\Windows\SysWOW64\Ljkaeo32.exe Ldoimh32.exe File opened for modification C:\Windows\SysWOW64\Ljghjpfe.exe Ldjpbign.exe File created C:\Windows\SysWOW64\Damfcpfg.dll Pgpgjepk.exe File created C:\Windows\SysWOW64\Dafoikjb.exe Dlifadkk.exe File created C:\Windows\SysWOW64\Hakofo32.dll Mgebdipp.exe File created C:\Windows\SysWOW64\Acddagag.dll Ffibkj32.exe File created C:\Windows\SysWOW64\Ldkkdd32.dll Ackmih32.exe File created C:\Windows\SysWOW64\Gehiioaj.exe Gkcekfad.exe File created C:\Windows\SysWOW64\Kmlehc32.dll Ddfcje32.exe File opened for modification C:\Windows\SysWOW64\Mfllkece.exe Mnaggcej.exe File created C:\Windows\SysWOW64\Mgglgc32.dll Knbhlkkc.exe File opened for modification C:\Windows\SysWOW64\Khkbbc32.exe Kpdjaecc.exe File created C:\Windows\SysWOW64\Ekddecnj.dll Ckmnbg32.exe File created C:\Windows\SysWOW64\Goiongbc.exe Fkkfgi32.exe File opened for modification C:\Windows\SysWOW64\Edlfhc32.exe Eamilh32.exe File opened for modification C:\Windows\SysWOW64\Eaeipfei.exe Eacljf32.exe File opened for modification C:\Windows\SysWOW64\Llbqfe32.exe Lcjlnpmo.exe File created C:\Windows\SysWOW64\Licpomcb.dll Epnhpglg.exe File opened for modification C:\Windows\SysWOW64\Elldgehk.exe Eccpoo32.exe File created C:\Windows\SysWOW64\Eiekpd32.exe Eclbcj32.exe File created C:\Windows\SysWOW64\Mlfbgb32.dll Ioohokoo.exe File created C:\Windows\SysWOW64\Egonhf32.exe Eodicd32.exe File created C:\Windows\SysWOW64\Ajfgpl32.dll Dmhdkdlg.exe File created C:\Windows\SysWOW64\Cfhakqek.dll Gfhgpg32.exe File opened for modification C:\Windows\SysWOW64\Obeacl32.exe Oimmjffj.exe File opened for modification C:\Windows\SysWOW64\Qfmafg32.exe Pdldnomh.exe File created C:\Windows\SysWOW64\Pfpemp32.dll Nbpeoc32.exe File opened for modification C:\Windows\SysWOW64\Ifmocb32.exe Iocgfhhc.exe File opened for modification C:\Windows\SysWOW64\Nkhdkgnj.exe Ndnlnm32.exe File opened for modification C:\Windows\SysWOW64\Gegabegc.exe Gnkmqkbi.exe File created C:\Windows\SysWOW64\Mbellj32.dll Kkeecogo.exe File created C:\Windows\SysWOW64\Oaoplfhc.dll Bjmeiq32.exe File created C:\Windows\SysWOW64\Jcfoeb32.dll Piliii32.exe File opened for modification C:\Windows\SysWOW64\Bogjaamh.exe Boemlbpk.exe File created C:\Windows\SysWOW64\Fckada32.dll Kllnhg32.exe File created C:\Windows\SysWOW64\Apldjp32.dll Gcgnnlle.exe File created C:\Windows\SysWOW64\Dpjbgh32.exe Dfbnoc32.exe File created C:\Windows\SysWOW64\Eaebeoan.exe Egonhf32.exe File created C:\Windows\SysWOW64\Gdecfn32.dll Aknngo32.exe File created C:\Windows\SysWOW64\Ciokijfd.exe Cogfqe32.exe File opened for modification C:\Windows\SysWOW64\Cgidfcdk.exe Bdhleh32.exe File created C:\Windows\SysWOW64\Gbnflo32.exe Gpnmjd32.exe File created C:\Windows\SysWOW64\Dinklffl.exe Dpegcq32.exe File created C:\Windows\SysWOW64\Jegime32.dll Npdfhhhe.exe File created C:\Windows\SysWOW64\Bajqfq32.exe Bfqpecma.exe File created C:\Windows\SysWOW64\Ekmfne32.exe Eaebeoan.exe File created C:\Windows\SysWOW64\Npbklabl.exe Nfigck32.exe File opened for modification C:\Windows\SysWOW64\Ohipla32.exe Oalkih32.exe File created C:\Windows\SysWOW64\Dfcgbb32.exe Dafoikjb.exe File created C:\Windows\SysWOW64\Fidfcc32.dll Elldgehk.exe File opened for modification C:\Windows\SysWOW64\Mjpkqonj.exe Lokgcf32.exe File opened for modification C:\Windows\SysWOW64\Fcbecl32.exe Flhmfbim.exe File created C:\Windows\SysWOW64\Jbpgka32.dll Figmjq32.exe File created C:\Windows\SysWOW64\Mdmkoepk.exe Mciabmlo.exe File opened for modification C:\Windows\SysWOW64\Hgqlafap.exe Hjmlhbbg.exe File created C:\Windows\SysWOW64\Hapbpm32.dll Jpgmpk32.exe File created C:\Windows\SysWOW64\Napbjjom.exe Nbjeinje.exe File opened for modification C:\Windows\SysWOW64\Oaghki32.exe Ofadnq32.exe File created C:\Windows\SysWOW64\Cqaiph32.exe Cgidfcdk.exe File opened for modification C:\Windows\SysWOW64\Dlgjldnm.exe Demaoj32.exe File opened for modification C:\Windows\SysWOW64\Jbhebfck.exe Jmkmjoec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1756 2800 WerFault.exe Lbjofi32.exe -
Modifies registry class 64 IoCs
Processes:
Icdcllpc.exeGockgdeh.exeIiecgjba.exeImokehhl.exeLjkaeo32.exeMjpkqonj.exeBkpeci32.exeIoohokoo.exeNapbjjom.exeNdqkleln.exeMnaggcej.exeHhhgcc32.exeIclbpj32.exePhqmgg32.exeJhjbqo32.exeMcckcbgp.exeNmkplgnq.exeEgonhf32.exeJeqopcld.exeHnmacpfj.exeAmcbankf.exeJbhcim32.exePphkbj32.exeMobfgdcl.exeAlhmjbhj.exeEamilh32.exeKlfjpa32.exeCogfqe32.exeHgciff32.exeCpcnonob.exeDobgihgp.exeMgebdipp.exeJagpdd32.exeCkbpqe32.exeHnmeen32.exeLddlkg32.exeFlqmbd32.exeKpfplo32.exeNijpdfhm.exeGiaidnkf.exeGoqnae32.exeNlpkdkkd.exeEccpoo32.exeQgmfchei.exeFofpoo32.exeGnkmqkbi.exeDmhdkdlg.exeGhajacmo.exeAhbekjcf.exeJajmjcoe.exeJpdkii32.exeOklnff32.exeOhhmcinf.exeDlifadkk.exeHonnki32.exeDkadjn32.exeLdllgiek.exeMchoid32.exeGfhgpg32.exeDlgjldnm.exeKhldkllj.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Icdcllpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gockgdeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abojgp32.dll" Iiecgjba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qggpmn32.dll" Imokehhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Almdmc32.dll" Ljkaeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjpkqonj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bkpeci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ioohokoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnoefj32.dll" Napbjjom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ndqkleln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mnaggcej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hhhgcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbpifm32.dll" Iclbpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Phqmgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckohkhoi.dll" Jhjbqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kheoph32.dll" Mcckcbgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nmkplgnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dngjbb32.dll" Egonhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jeqopcld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hnmacpfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Amcbankf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbhcim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgcfig32.dll" Pphkbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mobfgdcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Alhmjbhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipfeceln.dll" Eamilh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klfjpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cogfqe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hgciff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cpcnonob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dobgihgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mgebdipp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nmkplgnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpnifncd.dll" Jagpdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jagpdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clgmpqdg.dll" Ckbpqe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hnmeen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjdaldla.dll" Lddlkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcdaen32.dll" Flqmbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kpfplo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nijpdfhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjbpqjma.dll" Giaidnkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Goqnae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nlpkdkkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eccpoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qgmfchei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciqnaaen.dll" Fofpoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjoppjjm.dll" Gnkmqkbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmhdkdlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jojfgkfk.dll" Ghajacmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ahbekjcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdhdfgep.dll" Jajmjcoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpdkii32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oklnff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ohhmcinf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mndofg32.dll" Dlifadkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iddiakkl.dll" Honnki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dkadjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caphpgkj.dll" Ldllgiek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kongke32.dll" Nmkplgnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mchoid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gfhgpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dlgjldnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Khldkllj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exeAaloddnn.exeAlhmjbhj.exeBnielm32.exeBbikgk32.exeBoplllob.exeCdoajb32.exeCdanpb32.exeClmbddgp.exeCophko32.exeDdomif32.exeDngabk32.exeDdfcje32.exeDdhpod32.exeElcdcgcc.exeEkknjcfh.exedescription pid process target process PID 2692 wrote to memory of 2996 2692 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Aaloddnn.exe PID 2692 wrote to memory of 2996 2692 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Aaloddnn.exe PID 2692 wrote to memory of 2996 2692 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Aaloddnn.exe PID 2692 wrote to memory of 2996 2692 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Aaloddnn.exe PID 2996 wrote to memory of 2608 2996 Aaloddnn.exe Alhmjbhj.exe PID 2996 wrote to memory of 2608 2996 Aaloddnn.exe Alhmjbhj.exe PID 2996 wrote to memory of 2608 2996 Aaloddnn.exe Alhmjbhj.exe PID 2996 wrote to memory of 2608 2996 Aaloddnn.exe Alhmjbhj.exe PID 2608 wrote to memory of 2584 2608 Alhmjbhj.exe Bnielm32.exe PID 2608 wrote to memory of 2584 2608 Alhmjbhj.exe Bnielm32.exe PID 2608 wrote to memory of 2584 2608 Alhmjbhj.exe Bnielm32.exe PID 2608 wrote to memory of 2584 2608 Alhmjbhj.exe Bnielm32.exe PID 2584 wrote to memory of 2884 2584 Bnielm32.exe Bbikgk32.exe PID 2584 wrote to memory of 2884 2584 Bnielm32.exe Bbikgk32.exe PID 2584 wrote to memory of 2884 2584 Bnielm32.exe Bbikgk32.exe PID 2584 wrote to memory of 2884 2584 Bnielm32.exe Bbikgk32.exe PID 2884 wrote to memory of 2456 2884 Bbikgk32.exe Boplllob.exe PID 2884 wrote to memory of 2456 2884 Bbikgk32.exe Boplllob.exe PID 2884 wrote to memory of 2456 2884 Bbikgk32.exe Boplllob.exe PID 2884 wrote to memory of 2456 2884 Bbikgk32.exe Boplllob.exe PID 2456 wrote to memory of 1640 2456 Boplllob.exe Cdoajb32.exe PID 2456 wrote to memory of 1640 2456 Boplllob.exe Cdoajb32.exe PID 2456 wrote to memory of 1640 2456 Boplllob.exe Cdoajb32.exe PID 2456 wrote to memory of 1640 2456 Boplllob.exe Cdoajb32.exe PID 1640 wrote to memory of 592 1640 Cdoajb32.exe Cdanpb32.exe PID 1640 wrote to memory of 592 1640 Cdoajb32.exe Cdanpb32.exe PID 1640 wrote to memory of 592 1640 Cdoajb32.exe Cdanpb32.exe PID 1640 wrote to memory of 592 1640 Cdoajb32.exe Cdanpb32.exe PID 592 wrote to memory of 1584 592 Cdanpb32.exe Clmbddgp.exe PID 592 wrote to memory of 1584 592 Cdanpb32.exe Clmbddgp.exe PID 592 wrote to memory of 1584 592 Cdanpb32.exe Clmbddgp.exe PID 592 wrote to memory of 1584 592 Cdanpb32.exe Clmbddgp.exe PID 1584 wrote to memory of 2860 1584 Clmbddgp.exe Cophko32.exe PID 1584 wrote to memory of 2860 1584 Clmbddgp.exe Cophko32.exe PID 1584 wrote to memory of 2860 1584 Clmbddgp.exe Cophko32.exe PID 1584 wrote to memory of 2860 1584 Clmbddgp.exe Cophko32.exe PID 2860 wrote to memory of 2104 2860 Cophko32.exe Ddomif32.exe PID 2860 wrote to memory of 2104 2860 Cophko32.exe Ddomif32.exe PID 2860 wrote to memory of 2104 2860 Cophko32.exe Ddomif32.exe PID 2860 wrote to memory of 2104 2860 Cophko32.exe Ddomif32.exe PID 2104 wrote to memory of 1796 2104 Ddomif32.exe Dngabk32.exe PID 2104 wrote to memory of 1796 2104 Ddomif32.exe Dngabk32.exe PID 2104 wrote to memory of 1796 2104 Ddomif32.exe Dngabk32.exe PID 2104 wrote to memory of 1796 2104 Ddomif32.exe Dngabk32.exe PID 1796 wrote to memory of 1868 1796 Dngabk32.exe Ddfcje32.exe PID 1796 wrote to memory of 1868 1796 Dngabk32.exe Ddfcje32.exe PID 1796 wrote to memory of 1868 1796 Dngabk32.exe Ddfcje32.exe PID 1796 wrote to memory of 1868 1796 Dngabk32.exe Ddfcje32.exe PID 1868 wrote to memory of 2392 1868 Ddfcje32.exe Ddhpod32.exe PID 1868 wrote to memory of 2392 1868 Ddfcje32.exe Ddhpod32.exe PID 1868 wrote to memory of 2392 1868 Ddfcje32.exe Ddhpod32.exe PID 1868 wrote to memory of 2392 1868 Ddfcje32.exe Ddhpod32.exe PID 2392 wrote to memory of 1100 2392 Ddhpod32.exe Elcdcgcc.exe PID 2392 wrote to memory of 1100 2392 Ddhpod32.exe Elcdcgcc.exe PID 2392 wrote to memory of 1100 2392 Ddhpod32.exe Elcdcgcc.exe PID 2392 wrote to memory of 1100 2392 Ddhpod32.exe Elcdcgcc.exe PID 1100 wrote to memory of 2276 1100 Elcdcgcc.exe Ekknjcfh.exe PID 1100 wrote to memory of 2276 1100 Elcdcgcc.exe Ekknjcfh.exe PID 1100 wrote to memory of 2276 1100 Elcdcgcc.exe Ekknjcfh.exe PID 1100 wrote to memory of 2276 1100 Elcdcgcc.exe Ekknjcfh.exe PID 2276 wrote to memory of 2112 2276 Ekknjcfh.exe Emkkdf32.exe PID 2276 wrote to memory of 2112 2276 Ekknjcfh.exe Emkkdf32.exe PID 2276 wrote to memory of 2112 2276 Ekknjcfh.exe Emkkdf32.exe PID 2276 wrote to memory of 2112 2276 Ekknjcfh.exe Emkkdf32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\Aaloddnn.exeC:\Windows\system32\Aaloddnn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Alhmjbhj.exeC:\Windows\system32\Alhmjbhj.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Bnielm32.exeC:\Windows\system32\Bnielm32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Bbikgk32.exeC:\Windows\system32\Bbikgk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Boplllob.exeC:\Windows\system32\Boplllob.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Cdoajb32.exeC:\Windows\system32\Cdoajb32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Cdanpb32.exeC:\Windows\system32\Cdanpb32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\Clmbddgp.exeC:\Windows\system32\Clmbddgp.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\Cophko32.exeC:\Windows\system32\Cophko32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Ddomif32.exeC:\Windows\system32\Ddomif32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Dngabk32.exeC:\Windows\system32\Dngabk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Ddfcje32.exeC:\Windows\system32\Ddfcje32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\Ddhpod32.exeC:\Windows\system32\Ddhpod32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Elcdcgcc.exeC:\Windows\system32\Elcdcgcc.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\Ekknjcfh.exeC:\Windows\system32\Ekknjcfh.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\Emkkdf32.exeC:\Windows\system32\Emkkdf32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112 -
C:\Windows\SysWOW64\Fokdfajl.exeC:\Windows\system32\Fokdfajl.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Windows\SysWOW64\Fncmmmma.exeC:\Windows\system32\Fncmmmma.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:548 -
C:\Windows\SysWOW64\Fcpfedki.exeC:\Windows\system32\Fcpfedki.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\Fcbbjcif.exeC:\Windows\system32\Fcbbjcif.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696 -
C:\Windows\SysWOW64\Fbgpkpnn.exeC:\Windows\system32\Fbgpkpnn.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328 -
C:\Windows\SysWOW64\Gbjlaplk.exeC:\Windows\system32\Gbjlaplk.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\Gpnmjd32.exeC:\Windows\system32\Gpnmjd32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Gbnflo32.exeC:\Windows\system32\Gbnflo32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160 -
C:\Windows\SysWOW64\Gbqbaofc.exeC:\Windows\system32\Gbqbaofc.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Windows\SysWOW64\Hafock32.exeC:\Windows\system32\Hafock32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Windows\SysWOW64\Helngnie.exeC:\Windows\system32\Helngnie.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Windows\SysWOW64\Ibckfa32.exeC:\Windows\system32\Ibckfa32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2992 -
C:\Windows\SysWOW64\Iknpkd32.exeC:\Windows\system32\Iknpkd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640 -
C:\Windows\SysWOW64\Ilnmdgkj.exeC:\Windows\system32\Ilnmdgkj.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Windows\SysWOW64\Ionefb32.exeC:\Windows\system32\Ionefb32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2844 -
C:\Windows\SysWOW64\Ikefkcmo.exeC:\Windows\system32\Ikefkcmo.exe33⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Jpdkii32.exeC:\Windows\system32\Jpdkii32.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Jpfhoi32.exeC:\Windows\system32\Jpfhoi32.exe35⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Jpiedieo.exeC:\Windows\system32\Jpiedieo.exe36⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Jlbboiip.exeC:\Windows\system32\Jlbboiip.exe37⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\Kbokgpgg.exeC:\Windows\system32\Kbokgpgg.exe38⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Kkileele.exeC:\Windows\system32\Kkileele.exe39⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\Kjoifb32.exeC:\Windows\system32\Kjoifb32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Kjaelaok.exeC:\Windows\system32\Kjaelaok.exe41⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\Lfjcfb32.exeC:\Windows\system32\Lfjcfb32.exe42⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Lobgoh32.exeC:\Windows\system32\Lobgoh32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\Lkihdioa.exeC:\Windows\system32\Lkihdioa.exe44⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\Lnjafd32.exeC:\Windows\system32\Lnjafd32.exe45⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\Lgbeoibb.exeC:\Windows\system32\Lgbeoibb.exe46⤵
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\Mgebdipp.exeC:\Windows\system32\Mgebdipp.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1824 -
C:\Windows\SysWOW64\Mamgmofp.exeC:\Windows\system32\Mamgmofp.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:980 -
C:\Windows\SysWOW64\Mnaggcej.exeC:\Windows\system32\Mnaggcej.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Mfllkece.exeC:\Windows\system32\Mfllkece.exe50⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\Mfoiqe32.exeC:\Windows\system32\Mfoiqe32.exe51⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Mfaefd32.exeC:\Windows\system32\Mfaefd32.exe52⤵
- Executes dropped EXE
PID:616 -
C:\Windows\SysWOW64\Nbhfke32.exeC:\Windows\system32\Nbhfke32.exe53⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Nlpkdkkd.exeC:\Windows\system32\Nlpkdkkd.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2156 -
C:\Windows\SysWOW64\Nehomq32.exeC:\Windows\system32\Nehomq32.exe55⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\Ndnlnm32.exeC:\Windows\system32\Ndnlnm32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\Nkhdkgnj.exeC:\Windows\system32\Nkhdkgnj.exe57⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Nmhmlbkk.exeC:\Windows\system32\Nmhmlbkk.exe58⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\Oklnff32.exeC:\Windows\system32\Oklnff32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Ommfga32.exeC:\Windows\system32\Ommfga32.exe60⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\Ocjophem.exeC:\Windows\system32\Ocjophem.exe61⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Olbchn32.exeC:\Windows\system32\Olbchn32.exe62⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Opplolac.exeC:\Windows\system32\Opplolac.exe63⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Oemegc32.exeC:\Windows\system32\Oemegc32.exe64⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\Peoalc32.exeC:\Windows\system32\Peoalc32.exe65⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\Pohfehdi.exeC:\Windows\system32\Pohfehdi.exe66⤵PID:1820
-
C:\Windows\SysWOW64\Phpjnnki.exeC:\Windows\system32\Phpjnnki.exe67⤵PID:2708
-
C:\Windows\SysWOW64\Pojbkh32.exeC:\Windows\system32\Pojbkh32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2132 -
C:\Windows\SysWOW64\Phbgcnig.exeC:\Windows\system32\Phbgcnig.exe69⤵PID:2116
-
C:\Windows\SysWOW64\Pakllc32.exeC:\Windows\system32\Pakllc32.exe70⤵PID:1836
-
C:\Windows\SysWOW64\Pjfpafmb.exeC:\Windows\system32\Pjfpafmb.exe71⤵PID:1332
-
C:\Windows\SysWOW64\Pdldnomh.exeC:\Windows\system32\Pdldnomh.exe72⤵
- Drops file in System32 directory
PID:956 -
C:\Windows\SysWOW64\Qfmafg32.exeC:\Windows\system32\Qfmafg32.exe73⤵PID:300
-
C:\Windows\SysWOW64\Qoeeolig.exeC:\Windows\system32\Qoeeolig.exe74⤵PID:1744
-
C:\Windows\SysWOW64\Aeidgbaf.exeC:\Windows\system32\Aeidgbaf.exe75⤵PID:1624
-
C:\Windows\SysWOW64\Aababceh.exeC:\Windows\system32\Aababceh.exe76⤵PID:2564
-
C:\Windows\SysWOW64\Bccjdnbi.exeC:\Windows\system32\Bccjdnbi.exe77⤵PID:1712
-
C:\Windows\SysWOW64\Bpjkiogm.exeC:\Windows\system32\Bpjkiogm.exe78⤵PID:2416
-
C:\Windows\SysWOW64\Bjallg32.exeC:\Windows\system32\Bjallg32.exe79⤵PID:468
-
C:\Windows\SysWOW64\Bigimdjh.exeC:\Windows\system32\Bigimdjh.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1996 -
C:\Windows\SysWOW64\Bbonei32.exeC:\Windows\system32\Bbonei32.exe81⤵PID:2076
-
C:\Windows\SysWOW64\Cpcnonob.exeC:\Windows\system32\Cpcnonob.exe82⤵
- Modifies registry class
PID:2824 -
C:\Windows\SysWOW64\Cjmopkla.exeC:\Windows\system32\Cjmopkla.exe83⤵PID:2668
-
C:\Windows\SysWOW64\Cebcmdlg.exeC:\Windows\system32\Cebcmdlg.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1816 -
C:\Windows\SysWOW64\Cmmhaf32.exeC:\Windows\system32\Cmmhaf32.exe85⤵PID:836
-
C:\Windows\SysWOW64\Cheido32.exeC:\Windows\system32\Cheido32.exe86⤵PID:2188
-
C:\Windows\SysWOW64\Danmmd32.exeC:\Windows\system32\Danmmd32.exe87⤵PID:2140
-
C:\Windows\SysWOW64\Dmdnbecj.exeC:\Windows\system32\Dmdnbecj.exe88⤵
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\Dgmbkk32.exeC:\Windows\system32\Dgmbkk32.exe89⤵PID:2748
-
C:\Windows\SysWOW64\Dpegcq32.exeC:\Windows\system32\Dpegcq32.exe90⤵
- Drops file in System32 directory
PID:2036 -
C:\Windows\SysWOW64\Dinklffl.exeC:\Windows\system32\Dinklffl.exe91⤵PID:2088
-
C:\Windows\SysWOW64\Daipqhdg.exeC:\Windows\system32\Daipqhdg.exe92⤵PID:704
-
C:\Windows\SysWOW64\Dkadjn32.exeC:\Windows\system32\Dkadjn32.exe93⤵
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Eheecbia.exeC:\Windows\system32\Eheecbia.exe94⤵PID:2940
-
C:\Windows\SysWOW64\Eamilh32.exeC:\Windows\system32\Eamilh32.exe95⤵
- Drops file in System32 directory
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Edlfhc32.exeC:\Windows\system32\Edlfhc32.exe96⤵PID:2420
-
C:\Windows\SysWOW64\Enfgfh32.exeC:\Windows\system32\Enfgfh32.exe97⤵PID:2572
-
C:\Windows\SysWOW64\Eccpoo32.exeC:\Windows\system32\Eccpoo32.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:2384 -
C:\Windows\SysWOW64\Elldgehk.exeC:\Windows\system32\Elldgehk.exe99⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\Egahen32.exeC:\Windows\system32\Egahen32.exe100⤵PID:3060
-
C:\Windows\SysWOW64\Fchijone.exeC:\Windows\system32\Fchijone.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1344 -
C:\Windows\SysWOW64\Flqmbd32.exeC:\Windows\system32\Flqmbd32.exe102⤵
- Modifies registry class
PID:944 -
C:\Windows\SysWOW64\Ffibkj32.exeC:\Windows\system32\Ffibkj32.exe103⤵
- Drops file in System32 directory
PID:2644 -
C:\Windows\SysWOW64\Fkejcq32.exeC:\Windows\system32\Fkejcq32.exe104⤵PID:2128
-
C:\Windows\SysWOW64\Fbpbpkpj.exeC:\Windows\system32\Fbpbpkpj.exe105⤵PID:2936
-
C:\Windows\SysWOW64\Fmegncpp.exeC:\Windows\system32\Fmegncpp.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:828 -
C:\Windows\SysWOW64\Fbbofjnh.exeC:\Windows\system32\Fbbofjnh.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:900 -
C:\Windows\SysWOW64\Fgohna32.exeC:\Windows\system32\Fgohna32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1352 -
C:\Windows\SysWOW64\Fofpoo32.exeC:\Windows\system32\Fofpoo32.exe109⤵
- Modifies registry class
PID:2148 -
C:\Windows\SysWOW64\Findhdcb.exeC:\Windows\system32\Findhdcb.exe110⤵PID:2248
-
C:\Windows\SysWOW64\Gnkmqkbi.exeC:\Windows\system32\Gnkmqkbi.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:2596 -
C:\Windows\SysWOW64\Gegabegc.exeC:\Windows\system32\Gegabegc.exe112⤵PID:2520
-
C:\Windows\SysWOW64\Gfhnjm32.exeC:\Windows\system32\Gfhnjm32.exe113⤵PID:524
-
C:\Windows\SysWOW64\Gcmoda32.exeC:\Windows\system32\Gcmoda32.exe114⤵PID:2388
-
C:\Windows\SysWOW64\Gjfgqk32.exeC:\Windows\system32\Gjfgqk32.exe115⤵PID:2264
-
C:\Windows\SysWOW64\Gcokiaji.exeC:\Windows\system32\Gcokiaji.exe116⤵PID:2004
-
C:\Windows\SysWOW64\Gjicfk32.exeC:\Windows\system32\Gjicfk32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2932 -
C:\Windows\SysWOW64\Gmgpbf32.exeC:\Windows\system32\Gmgpbf32.exe118⤵PID:2012
-
C:\Windows\SysWOW64\Hebdfind.exeC:\Windows\system32\Hebdfind.exe119⤵PID:436
-
C:\Windows\SysWOW64\Hfbaql32.exeC:\Windows\system32\Hfbaql32.exe120⤵PID:1300
-
C:\Windows\SysWOW64\Hnmeen32.exeC:\Windows\system32\Hnmeen32.exe121⤵
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Hhejnc32.exeC:\Windows\system32\Hhejnc32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1312
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-