Analysis
-
max time kernel
137s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 06:06
Behavioral task
behavioral1
Sample
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe
-
Size
357KB
-
MD5
35e08bfe1b1a555bc16a3bc234a0f590
-
SHA1
cd09ff7e2fd1d2e4ebbdb11a1603bda8f8d9ef88
-
SHA256
304d1f0894aeecca55fe4fc0e6f17f2d3b67a8ee809448836e346c50015c893b
-
SHA512
1a36d8b5d59d8299bd5060149b28c784ea26beed5fff4fbeb986f11928ba74ba02b55effbe72dc1bb2cec2c55474b0ab5792b2b4e56d137acebfe78e80747411
-
SSDEEP
6144:UBtA8wbg02bmj31n6xJmPMwZoXpKtCe8AUReheFlfSZR0SvsuFrGoyeg3kl+fiXt:qtADbg02KZoXpKtCe1eehil6ZR5ZrQe7
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ibmmhdhm.exeIpckgh32.exeIbagcc32.exeNcgkcl32.exeMdiklqhm.exeMaaepd32.exeNceonl32.exeNqiogp32.exeGfcgge32.exeJfkoeppq.exeLgkhlnbn.exeMgekbljc.exeKkbkamnl.exeMdfofakp.exeNgedij32.exeKgmlkp32.exeLcdegnep.exeMnapdf32.exeKbfiep32.exeLpfijcfl.exeNjljefql.exeHjfihc32.exeHpgkkioa.exeHaidklda.exeJpaghf32.exeLmqgnhmp.exeMgnnhk32.exeNklfoi32.exeNbkhfc32.exeGmkbnp32.exeJdemhe32.exeKagichjo.exeLgikfn32.exeMaohkd32.exeHaggelfd.exeMajopeii.exeGmaioo32.exeLnhmng32.exeHjjbcbqj.exeNnmopdep.exe35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exeIjdeiaio.exeMnlfigcc.exeMglack32.exeKdaldd32.exeKgdbkohf.exeLpappc32.exeLknjmkdo.exeGjclbc32.exeHcqjfh32.exeLijdhiaa.exeMdkhapfj.exeMgidml32.exeGoiojk32.exeIidipnal.exeImihfl32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibmmhdhm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipckgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ibagcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncgkcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdiklqhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqiogp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfcgge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfkoeppq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgkhlnbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mgekbljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkbkamnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgmlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lcdegnep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnapdf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngedij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbfiep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpfijcfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njljefql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjfihc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpgkkioa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Haidklda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpaghf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmqgnhmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdfofakp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nklfoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbkhfc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmkbnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdemhe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kagichjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgikfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Maohkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmkbnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Haggelfd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcdegnep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Majopeii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmaioo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lnhmng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjjbcbqj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maaepd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njljefql.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ijdeiaio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mnlfigcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kdaldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgdbkohf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpappc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lknjmkdo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjclbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hcqjfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lijdhiaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdkhapfj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgmlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mgidml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Goiojk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iidipnal.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imihfl32.exe -
Malware Dropper & Backdoor - Berbew 36 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Gmkbnp32.exe family_berbew C:\Windows\SysWOW64\Goiojk32.exe family_berbew C:\Windows\SysWOW64\Gfcgge32.exe family_berbew C:\Windows\SysWOW64\Giacca32.exe family_berbew C:\Windows\SysWOW64\Gpklpkio.exe family_berbew C:\Windows\SysWOW64\Gjclbc32.exe family_berbew C:\Windows\SysWOW64\Gmaioo32.exe family_berbew C:\Windows\SysWOW64\Hjfihc32.exe family_berbew C:\Windows\SysWOW64\Hcnnaikp.exe family_berbew C:\Windows\SysWOW64\Hjhfnccl.exe family_berbew C:\Windows\SysWOW64\Hcqjfh32.exe family_berbew C:\Windows\SysWOW64\Hjjbcbqj.exe family_berbew C:\Windows\SysWOW64\Hpgkkioa.exe family_berbew C:\Windows\SysWOW64\Haggelfd.exe family_berbew C:\Windows\SysWOW64\Hbhdmd32.exe family_berbew C:\Windows\SysWOW64\Haidklda.exe family_berbew C:\Windows\SysWOW64\Iidipnal.exe family_berbew C:\Windows\SysWOW64\Ibmmhdhm.exe family_berbew C:\Windows\SysWOW64\Ijdeiaio.exe family_berbew C:\Windows\SysWOW64\Imbaemhc.exe family_berbew C:\Windows\SysWOW64\Ipckgh32.exe family_berbew C:\Windows\SysWOW64\Ibagcc32.exe family_berbew C:\Windows\SysWOW64\Idacmfkj.exe family_berbew C:\Windows\SysWOW64\Imihfl32.exe family_berbew C:\Windows\SysWOW64\Jbfpobpb.exe family_berbew C:\Windows\SysWOW64\Jdemhe32.exe family_berbew C:\Windows\SysWOW64\Jpaghf32.exe family_berbew C:\Windows\SysWOW64\Jfkoeppq.exe family_berbew C:\Windows\SysWOW64\Kgmlkp32.exe family_berbew C:\Windows\SysWOW64\Kdaldd32.exe family_berbew C:\Windows\SysWOW64\Kaemnhla.exe family_berbew C:\Windows\SysWOW64\Kbfiep32.exe family_berbew C:\Windows\SysWOW64\Lcbiao32.exe family_berbew C:\Windows\SysWOW64\Ljnnch32.exe family_berbew C:\Windows\SysWOW64\Mgidml32.exe family_berbew C:\Windows\SysWOW64\Maohkd32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Gmkbnp32.exeGoiojk32.exeGfcgge32.exeGiacca32.exeGpklpkio.exeGjclbc32.exeGmaioo32.exeHjfihc32.exeHcnnaikp.exeHjhfnccl.exeHcqjfh32.exeHjjbcbqj.exeHpgkkioa.exeHaggelfd.exeHbhdmd32.exeHaidklda.exeIidipnal.exeIbmmhdhm.exeIjdeiaio.exeImbaemhc.exeIpckgh32.exeIbagcc32.exeIdacmfkj.exeImihfl32.exeJbfpobpb.exeJdemhe32.exeJpaghf32.exeJfkoeppq.exeKgmlkp32.exeKdaldd32.exeKaemnhla.exeKbfiep32.exeKagichjo.exeKdffocib.exeKgdbkohf.exeKmnjhioc.exeKpmfddnf.exeKkbkamnl.exeLmqgnhmp.exeLpocjdld.exeLgikfn32.exeLkdggmlj.exeLpappc32.exeLgkhlnbn.exeLijdhiaa.exeLpcmec32.exeLcbiao32.exeLnhmng32.exeLpfijcfl.exeLcdegnep.exeLjnnch32.exeLcgblncm.exeLknjmkdo.exeMnlfigcc.exeMdfofakp.exeMgekbljc.exeMjcgohig.exeMajopeii.exeMdiklqhm.exeMkbchk32.exeMnapdf32.exeMdkhapfj.exeMgidml32.exeMaohkd32.exepid process 2092 Gmkbnp32.exe 2540 Goiojk32.exe 4308 Gfcgge32.exe 2408 Giacca32.exe 1788 Gpklpkio.exe 3188 Gjclbc32.exe 2800 Gmaioo32.exe 3796 Hjfihc32.exe 4672 Hcnnaikp.exe 1040 Hjhfnccl.exe 2344 Hcqjfh32.exe 3000 Hjjbcbqj.exe 1392 Hpgkkioa.exe 3204 Haggelfd.exe 1252 Hbhdmd32.exe 3764 Haidklda.exe 4584 Iidipnal.exe 1556 Ibmmhdhm.exe 2196 Ijdeiaio.exe 884 Imbaemhc.exe 4688 Ipckgh32.exe 1160 Ibagcc32.exe 1272 Idacmfkj.exe 3792 Imihfl32.exe 3436 Jbfpobpb.exe 1780 Jdemhe32.exe 1224 Jpaghf32.exe 4324 Jfkoeppq.exe 3972 Kgmlkp32.exe 2564 Kdaldd32.exe 3708 Kaemnhla.exe 4568 Kbfiep32.exe 4980 Kagichjo.exe 2260 Kdffocib.exe 2688 Kgdbkohf.exe 1704 Kmnjhioc.exe 1424 Kpmfddnf.exe 4364 Kkbkamnl.exe 2020 Lmqgnhmp.exe 2292 Lpocjdld.exe 4460 Lgikfn32.exe 912 Lkdggmlj.exe 4684 Lpappc32.exe 4680 Lgkhlnbn.exe 1796 Lijdhiaa.exe 4284 Lpcmec32.exe 1936 Lcbiao32.exe 532 Lnhmng32.exe 3872 Lpfijcfl.exe 4500 Lcdegnep.exe 1544 Ljnnch32.exe 3372 Lcgblncm.exe 1984 Lknjmkdo.exe 1600 Mnlfigcc.exe 5092 Mdfofakp.exe 4724 Mgekbljc.exe 4372 Mjcgohig.exe 624 Majopeii.exe 1152 Mdiklqhm.exe 1772 Mkbchk32.exe 5104 Mnapdf32.exe 3604 Mdkhapfj.exe 3488 Mgidml32.exe 3884 Maohkd32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Imihfl32.exeIdacmfkj.exeMaaepd32.exeNdghmo32.exeJbfpobpb.exeLpfijcfl.exeMdiklqhm.exeGfcgge32.exeKgdbkohf.exeNnjbke32.exeNnmopdep.exeNjcpee32.exeGmaioo32.exeIidipnal.exeKagichjo.exeHjjbcbqj.exeKpmfddnf.exeLpappc32.exeGmkbnp32.exeLpcmec32.exeIbmmhdhm.exeMaohkd32.exeNqiogp32.exeImbaemhc.exeLcbiao32.exeLcdegnep.exeLcgblncm.exeKmnjhioc.exeNklfoi32.exeNbkhfc32.exeMjcgohig.exeKkbkamnl.exeLkdggmlj.exeLjnnch32.exeMajopeii.exeNceonl32.exeNcgkcl32.exeNgedij32.exeGiacca32.exeKgmlkp32.exeHpgkkioa.exeIbagcc32.exeLgikfn32.exeGpklpkio.exeHjhfnccl.exeKaemnhla.exeNqfbaq32.exeHcqjfh32.exeLgkhlnbn.exeMnlfigcc.exedescription ioc process File created C:\Windows\SysWOW64\Jbfpobpb.exe Imihfl32.exe File opened for modification C:\Windows\SysWOW64\Imihfl32.exe Idacmfkj.exe File opened for modification C:\Windows\SysWOW64\Mdpalp32.exe Maaepd32.exe File created C:\Windows\SysWOW64\Paadnmaq.dll Ndghmo32.exe File created C:\Windows\SysWOW64\Jdemhe32.exe Jbfpobpb.exe File opened for modification C:\Windows\SysWOW64\Lcdegnep.exe Lpfijcfl.exe File created C:\Windows\SysWOW64\Mkbchk32.exe Mdiklqhm.exe File created C:\Windows\SysWOW64\Bkmdbdbp.dll Gfcgge32.exe File opened for modification C:\Windows\SysWOW64\Jdemhe32.exe Jbfpobpb.exe File created C:\Windows\SysWOW64\Oimhnoch.dll Kgdbkohf.exe File created C:\Windows\SysWOW64\Nqiogp32.exe Nnjbke32.exe File created C:\Windows\SysWOW64\Bdknoa32.dll Nnmopdep.exe File opened for modification C:\Windows\SysWOW64\Nbkhfc32.exe Njcpee32.exe File opened for modification C:\Windows\SysWOW64\Hjfihc32.exe Gmaioo32.exe File opened for modification C:\Windows\SysWOW64\Ibmmhdhm.exe Iidipnal.exe File opened for modification C:\Windows\SysWOW64\Kdffocib.exe Kagichjo.exe File opened for modification C:\Windows\SysWOW64\Hpgkkioa.exe Hjjbcbqj.exe File created C:\Windows\SysWOW64\Kdffocib.exe Kagichjo.exe File created C:\Windows\SysWOW64\Gcdihi32.dll Kpmfddnf.exe File created C:\Windows\SysWOW64\Ndclfb32.dll Lpappc32.exe File opened for modification C:\Windows\SysWOW64\Nqiogp32.exe Nnjbke32.exe File created C:\Windows\SysWOW64\Dadofijl.dll Gmkbnp32.exe File created C:\Windows\SysWOW64\Lcbiao32.exe Lpcmec32.exe File created C:\Windows\SysWOW64\Qngfmkdl.dll Ibmmhdhm.exe File created C:\Windows\SysWOW64\Oaehlf32.dll Maohkd32.exe File opened for modification C:\Windows\SysWOW64\Ncgkcl32.exe Nqiogp32.exe File created C:\Windows\SysWOW64\Ipckgh32.exe Imbaemhc.exe File created C:\Windows\SysWOW64\Kmnjhioc.exe Kgdbkohf.exe File opened for modification C:\Windows\SysWOW64\Lnhmng32.exe Lcbiao32.exe File created C:\Windows\SysWOW64\Gefncbmc.dll Lcdegnep.exe File created C:\Windows\SysWOW64\Lknjmkdo.exe Lcgblncm.exe File created C:\Windows\SysWOW64\Pponmema.dll Nnjbke32.exe File created C:\Windows\SysWOW64\Kpmfddnf.exe Kmnjhioc.exe File opened for modification C:\Windows\SysWOW64\Nnjbke32.exe Nklfoi32.exe File opened for modification C:\Windows\SysWOW64\Ncldnkae.exe Nbkhfc32.exe File opened for modification C:\Windows\SysWOW64\Goiojk32.exe Gmkbnp32.exe File created C:\Windows\SysWOW64\Hjfihc32.exe Gmaioo32.exe File created C:\Windows\SysWOW64\Lnohlokp.dll Mjcgohig.exe File opened for modification C:\Windows\SysWOW64\Lmqgnhmp.exe Kkbkamnl.exe File created C:\Windows\SysWOW64\Lpappc32.exe Lkdggmlj.exe File created C:\Windows\SysWOW64\Lcgblncm.exe Ljnnch32.exe File opened for modification C:\Windows\SysWOW64\Mdiklqhm.exe Majopeii.exe File created C:\Windows\SysWOW64\Nklfoi32.exe Nceonl32.exe File opened for modification C:\Windows\SysWOW64\Nkncdifl.exe Ncgkcl32.exe File created C:\Windows\SysWOW64\Ddpfgd32.dll Ngedij32.exe File created C:\Windows\SysWOW64\Nbkhfc32.exe Njcpee32.exe File created C:\Windows\SysWOW64\Gpklpkio.exe Giacca32.exe File created C:\Windows\SysWOW64\Kdaldd32.exe Kgmlkp32.exe File created C:\Windows\SysWOW64\Bnckcnhb.dll Kgmlkp32.exe File created C:\Windows\SysWOW64\Ljnnch32.exe Lcdegnep.exe File created C:\Windows\SysWOW64\Fhpdhp32.dll Maaepd32.exe File created C:\Windows\SysWOW64\Nkncdifl.exe Ncgkcl32.exe File opened for modification C:\Windows\SysWOW64\Haggelfd.exe Hpgkkioa.exe File created C:\Windows\SysWOW64\Gmbkmemo.dll Iidipnal.exe File opened for modification C:\Windows\SysWOW64\Idacmfkj.exe Ibagcc32.exe File created C:\Windows\SysWOW64\Qgejif32.dll Lgikfn32.exe File created C:\Windows\SysWOW64\Qbplof32.dll Gpklpkio.exe File created C:\Windows\SysWOW64\Pkbjnl32.dll Hjhfnccl.exe File created C:\Windows\SysWOW64\Ppaaagol.dll Kaemnhla.exe File created C:\Windows\SysWOW64\Jnngob32.dll Lcgblncm.exe File created C:\Windows\SysWOW64\Nceonl32.exe Nqfbaq32.exe File created C:\Windows\SysWOW64\Denfkg32.dll Hcqjfh32.exe File opened for modification C:\Windows\SysWOW64\Lijdhiaa.exe Lgkhlnbn.exe File created C:\Windows\SysWOW64\Mdfofakp.exe Mnlfigcc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5348 5220 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
Ibagcc32.exeLnhmng32.exeLknjmkdo.exeHcqjfh32.exeNdghmo32.exeNjcpee32.exeNkncdifl.exe35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exeMkbchk32.exeJbfpobpb.exeLpocjdld.exeNqfbaq32.exeHjhfnccl.exeIdacmfkj.exeMaaepd32.exeMdpalp32.exeGpklpkio.exeMglack32.exeLcbiao32.exeLpfijcfl.exeMjcgohig.exeGmkbnp32.exeJfkoeppq.exeLkdggmlj.exeNnmopdep.exeHjjbcbqj.exeIidipnal.exeMaohkd32.exeNbkhfc32.exeNcgkcl32.exeNgedij32.exeGjclbc32.exeLijdhiaa.exeLcgblncm.exeIpckgh32.exeNjljefql.exeNklfoi32.exeKgdbkohf.exeMnlfigcc.exeGmaioo32.exeIjdeiaio.exeMgekbljc.exeMnapdf32.exeMdkhapfj.exeHbhdmd32.exeKagichjo.exeLpappc32.exeNceonl32.exeGoiojk32.exeJdemhe32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpqnnk32.dll" Ibagcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hcqjfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ndghmo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgfgaq32.dll" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnfmmb32.dll" 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbfpobpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpocjdld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nqfbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjhfnccl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Denfkg32.dll" Hcqjfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Idacmfkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Maaepd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mdpalp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gpklpkio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jbfpobpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bebboiqi.dll" Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnapla32.dll" Lcbiao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eeandl32.dll" Lpfijcfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnohlokp.dll" Mjcgohig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gmkbnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jfkoeppq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lkdggmlj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjjbcbqj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iidipnal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ibagcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nbkhfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dadofijl.dll" Gmkbnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ncgkcl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ngedij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gjclbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lijdhiaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lcgblncm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipckgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Njljefql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nklfoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kgdbkohf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flfmin32.dll" Mnlfigcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjcgohig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdgdjjem.dll" Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mkbchk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gmaioo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdcbljie.dll" Ijdeiaio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oimhnoch.dll" Kgdbkohf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mgekbljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mnapdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnacjn32.dll" Mdkhapfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkfpkkqa.dll" Gjclbc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hbhdmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lkdggmlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kagichjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndclfb32.dll" Lpappc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nceonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nklfoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Goiojk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbplof32.dll" Gpklpkio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jdemhe32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exeGmkbnp32.exeGoiojk32.exeGfcgge32.exeGiacca32.exeGpklpkio.exeGjclbc32.exeGmaioo32.exeHjfihc32.exeHcnnaikp.exeHjhfnccl.exeHcqjfh32.exeHjjbcbqj.exeHpgkkioa.exeHaggelfd.exeHbhdmd32.exeHaidklda.exeIidipnal.exeIbmmhdhm.exeIjdeiaio.exeImbaemhc.exeIpckgh32.exedescription pid process target process PID 5000 wrote to memory of 2092 5000 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Gmkbnp32.exe PID 5000 wrote to memory of 2092 5000 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Gmkbnp32.exe PID 5000 wrote to memory of 2092 5000 35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe Gmkbnp32.exe PID 2092 wrote to memory of 2540 2092 Gmkbnp32.exe Goiojk32.exe PID 2092 wrote to memory of 2540 2092 Gmkbnp32.exe Goiojk32.exe PID 2092 wrote to memory of 2540 2092 Gmkbnp32.exe Goiojk32.exe PID 2540 wrote to memory of 4308 2540 Goiojk32.exe Gfcgge32.exe PID 2540 wrote to memory of 4308 2540 Goiojk32.exe Gfcgge32.exe PID 2540 wrote to memory of 4308 2540 Goiojk32.exe Gfcgge32.exe PID 4308 wrote to memory of 2408 4308 Gfcgge32.exe Giacca32.exe PID 4308 wrote to memory of 2408 4308 Gfcgge32.exe Giacca32.exe PID 4308 wrote to memory of 2408 4308 Gfcgge32.exe Giacca32.exe PID 2408 wrote to memory of 1788 2408 Giacca32.exe Gpklpkio.exe PID 2408 wrote to memory of 1788 2408 Giacca32.exe Gpklpkio.exe PID 2408 wrote to memory of 1788 2408 Giacca32.exe Gpklpkio.exe PID 1788 wrote to memory of 3188 1788 Gpklpkio.exe Gjclbc32.exe PID 1788 wrote to memory of 3188 1788 Gpklpkio.exe Gjclbc32.exe PID 1788 wrote to memory of 3188 1788 Gpklpkio.exe Gjclbc32.exe PID 3188 wrote to memory of 2800 3188 Gjclbc32.exe Gmaioo32.exe PID 3188 wrote to memory of 2800 3188 Gjclbc32.exe Gmaioo32.exe PID 3188 wrote to memory of 2800 3188 Gjclbc32.exe Gmaioo32.exe PID 2800 wrote to memory of 3796 2800 Gmaioo32.exe Hjfihc32.exe PID 2800 wrote to memory of 3796 2800 Gmaioo32.exe Hjfihc32.exe PID 2800 wrote to memory of 3796 2800 Gmaioo32.exe Hjfihc32.exe PID 3796 wrote to memory of 4672 3796 Hjfihc32.exe Hcnnaikp.exe PID 3796 wrote to memory of 4672 3796 Hjfihc32.exe Hcnnaikp.exe PID 3796 wrote to memory of 4672 3796 Hjfihc32.exe Hcnnaikp.exe PID 4672 wrote to memory of 1040 4672 Hcnnaikp.exe Hjhfnccl.exe PID 4672 wrote to memory of 1040 4672 Hcnnaikp.exe Hjhfnccl.exe PID 4672 wrote to memory of 1040 4672 Hcnnaikp.exe Hjhfnccl.exe PID 1040 wrote to memory of 2344 1040 Hjhfnccl.exe Hcqjfh32.exe PID 1040 wrote to memory of 2344 1040 Hjhfnccl.exe Hcqjfh32.exe PID 1040 wrote to memory of 2344 1040 Hjhfnccl.exe Hcqjfh32.exe PID 2344 wrote to memory of 3000 2344 Hcqjfh32.exe Hjjbcbqj.exe PID 2344 wrote to memory of 3000 2344 Hcqjfh32.exe Hjjbcbqj.exe PID 2344 wrote to memory of 3000 2344 Hcqjfh32.exe Hjjbcbqj.exe PID 3000 wrote to memory of 1392 3000 Hjjbcbqj.exe Hpgkkioa.exe PID 3000 wrote to memory of 1392 3000 Hjjbcbqj.exe Hpgkkioa.exe PID 3000 wrote to memory of 1392 3000 Hjjbcbqj.exe Hpgkkioa.exe PID 1392 wrote to memory of 3204 1392 Hpgkkioa.exe Haggelfd.exe PID 1392 wrote to memory of 3204 1392 Hpgkkioa.exe Haggelfd.exe PID 1392 wrote to memory of 3204 1392 Hpgkkioa.exe Haggelfd.exe PID 3204 wrote to memory of 1252 3204 Haggelfd.exe Hbhdmd32.exe PID 3204 wrote to memory of 1252 3204 Haggelfd.exe Hbhdmd32.exe PID 3204 wrote to memory of 1252 3204 Haggelfd.exe Hbhdmd32.exe PID 1252 wrote to memory of 3764 1252 Hbhdmd32.exe Haidklda.exe PID 1252 wrote to memory of 3764 1252 Hbhdmd32.exe Haidklda.exe PID 1252 wrote to memory of 3764 1252 Hbhdmd32.exe Haidklda.exe PID 3764 wrote to memory of 4584 3764 Haidklda.exe Iidipnal.exe PID 3764 wrote to memory of 4584 3764 Haidklda.exe Iidipnal.exe PID 3764 wrote to memory of 4584 3764 Haidklda.exe Iidipnal.exe PID 4584 wrote to memory of 1556 4584 Iidipnal.exe Ibmmhdhm.exe PID 4584 wrote to memory of 1556 4584 Iidipnal.exe Ibmmhdhm.exe PID 4584 wrote to memory of 1556 4584 Iidipnal.exe Ibmmhdhm.exe PID 1556 wrote to memory of 2196 1556 Ibmmhdhm.exe Ijdeiaio.exe PID 1556 wrote to memory of 2196 1556 Ibmmhdhm.exe Ijdeiaio.exe PID 1556 wrote to memory of 2196 1556 Ibmmhdhm.exe Ijdeiaio.exe PID 2196 wrote to memory of 884 2196 Ijdeiaio.exe Imbaemhc.exe PID 2196 wrote to memory of 884 2196 Ijdeiaio.exe Imbaemhc.exe PID 2196 wrote to memory of 884 2196 Ijdeiaio.exe Imbaemhc.exe PID 884 wrote to memory of 4688 884 Imbaemhc.exe Ipckgh32.exe PID 884 wrote to memory of 4688 884 Imbaemhc.exe Ipckgh32.exe PID 884 wrote to memory of 4688 884 Imbaemhc.exe Ipckgh32.exe PID 4688 wrote to memory of 1160 4688 Ipckgh32.exe Ibagcc32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35e08bfe1b1a555bc16a3bc234a0f590_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\Gmkbnp32.exeC:\Windows\system32\Gmkbnp32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Goiojk32.exeC:\Windows\system32\Goiojk32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Gfcgge32.exeC:\Windows\system32\Gfcgge32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\Giacca32.exeC:\Windows\system32\Giacca32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Gpklpkio.exeC:\Windows\system32\Gpklpkio.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\Gjclbc32.exeC:\Windows\system32\Gjclbc32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\Gmaioo32.exeC:\Windows\system32\Gmaioo32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Hjfihc32.exeC:\Windows\system32\Hjfihc32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\Hcnnaikp.exeC:\Windows\system32\Hcnnaikp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\Hjhfnccl.exeC:\Windows\system32\Hjhfnccl.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\Hcqjfh32.exeC:\Windows\system32\Hcqjfh32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Hjjbcbqj.exeC:\Windows\system32\Hjjbcbqj.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Hpgkkioa.exeC:\Windows\system32\Hpgkkioa.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\Haggelfd.exeC:\Windows\system32\Haggelfd.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\Hbhdmd32.exeC:\Windows\system32\Hbhdmd32.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\Haidklda.exeC:\Windows\system32\Haidklda.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\Iidipnal.exeC:\Windows\system32\Iidipnal.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Ibmmhdhm.exeC:\Windows\system32\Ibmmhdhm.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\Ijdeiaio.exeC:\Windows\system32\Ijdeiaio.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Imbaemhc.exeC:\Windows\system32\Imbaemhc.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\Ibagcc32.exeC:\Windows\system32\Ibagcc32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1160 -
C:\Windows\SysWOW64\Idacmfkj.exeC:\Windows\system32\Idacmfkj.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\Imihfl32.exeC:\Windows\system32\Imihfl32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3792 -
C:\Windows\SysWOW64\Jbfpobpb.exeC:\Windows\system32\Jbfpobpb.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3436 -
C:\Windows\SysWOW64\Jdemhe32.exeC:\Windows\system32\Jdemhe32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1224 -
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4324 -
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3972 -
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\Kaemnhla.exeC:\Windows\system32\Kaemnhla.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3708 -
C:\Windows\SysWOW64\Kbfiep32.exeC:\Windows\system32\Kbfiep32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4980 -
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe35⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1424 -
C:\Windows\SysWOW64\Kkbkamnl.exeC:\Windows\system32\Kkbkamnl.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4364 -
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:2292 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4460 -
C:\Windows\SysWOW64\Lkdggmlj.exeC:\Windows\system32\Lkdggmlj.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4684 -
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4680 -
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4284 -
C:\Windows\SysWOW64\Lcbiao32.exeC:\Windows\system32\Lcbiao32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1936 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:532 -
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3872 -
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4500 -
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1544 -
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3372 -
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1600 -
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4724 -
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4372 -
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:624 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\Mkbchk32.exeC:\Windows\system32\Mkbchk32.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:1772 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3604 -
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3884 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5112 -
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe68⤵
- Modifies registry class
PID:3036 -
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1896 -
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4540 -
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:1460 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4712 -
C:\Windows\SysWOW64\Nklfoi32.exeC:\Windows\system32\Nklfoi32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3132 -
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe74⤵
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2964 -
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:232 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe77⤵
- Modifies registry class
PID:4924 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4516 -
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3780 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:3992 -
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5128 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe83⤵PID:5176
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe84⤵PID:5220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 41685⤵
- Program crash
PID:5348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5220 -ip 52201⤵PID:5296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD50df3a51f475e60d837d385ed2f015606
SHA1f1285945c51c9ff19b373f48ffe0694d1e0cc365
SHA25653b59f2c3c7bebe55ba5d127b1506d2f8220ba3f895692eafe4b01520c72c2d3
SHA512cd565817992f53db83b64a96cf66d3dc678b807e6ccc4634b5989f70d6a3db964448a4fd3108f8a38d75a4a554ebc264e74e1979548659dd0ad964770342fbbb
-
Filesize
357KB
MD5cd65f7207565f9e8811863c06f5daa7b
SHA1b6a830bc5a9fe582c40e28a8a2039a6aabfbc8d2
SHA25633447d9082128cb7782914f62eeceff9555a92543a1d4829eb7459857e67421b
SHA512eb9d50f567bfc73ceda9bcd8b2d4f5518af3157f4c6d4bcbf7d46fbf13e44961a164906786fe390b47e9ac4edbc18250d708448762d5d25628eb2820802079ce
-
Filesize
357KB
MD565d3f9a6afe900016bc55054d71c33c1
SHA18063baf5f94323602fe6f3cfad2d04e35933019d
SHA256d440205f0439b4e75b03e94f53b2d1a76be20738eaabcda2e6634e00712c8261
SHA512ea8f84ee29c0821659dd414ef1a6767da4442b65d69b64735ec740df2cb58ef0a5c066a1922f9505b1b28be085e2c78bacb3c2f71932aa70794bec899e218f12
-
Filesize
357KB
MD55d216647e6051ea7c5bdff746bf1d6b3
SHA1a22fc87a372ede3f2b78a69e9f65ee0e2f7a2075
SHA256be5eafdf282b3e0fbe90eb26faf8650d3e09b4d0669816e839109bbb33c402c6
SHA51255ea156f3919a778c75b9d8e78d9b60b99ef1b0219d9315630ff43bc135cb827f17a9448fa696632b5523a2d85d8b760f83dd146542fa7af3ceeb3d0879afade
-
Filesize
357KB
MD5e2a97b4d4b16a7f4dc017a1b3024172d
SHA1b68f67e679cc8a26e1dc6aab7da1fc7ed449be1a
SHA2569a8badd40fe0adfc498636a26f6ddb07eb3ef32f7bb707e2d81a344703dbe49d
SHA5125c83e41ec3383acae1ee8cdcb7cde2abb7eb19290fecf0b95cae45221c51cae4469cc135b395f289f40130ea1f5c073746f03923719009e5dc4639d78569ab6d
-
Filesize
357KB
MD50c34bb7dcaf9b83e851fec83efba4633
SHA178e5fbdc233e3299dd4523569b098d45efaf2c2c
SHA2569864058be15e4d47ab5e47680c271d540564dd8740b1a326465079872e37b899
SHA51225f5233aaeb0f88568577ebc3eeb0920e197a6baa5a241dd22a0e3234237e9a8133e4fbe8cfb8846465eb0e893e82c2ec317c0670c1d83e3afb3522fc1acb816
-
Filesize
357KB
MD527e69b841a2d4397c1071c15b4bbe3f5
SHA19556503fb1a0c554b17a46ab43b43c6ae577abb5
SHA2566c35deb0fc636283773a40699e67e50417fcf0687fa7fdd5e75134b6dec89e1d
SHA512a27a2accb84cfae4bf932324951e3a9c97b8f6a812a999659caecd1dc6c2d7de94e01797ae18200ca4c8c7ff1128dc0c97a964343f009fae4fe311ee93245ceb
-
Filesize
357KB
MD569dea8d9e58904afc2bf30c319bb574a
SHA1d9b6bad9b582d03b0fc00d10e6f49030b6a6995b
SHA2560823571895149297dfade45d7b936ddcb4a324ea360abbdafe265aa300f96f0a
SHA51230d888e5f46c80e8172cb286fb61e15f3ae836a0d525a712d1e7d3f1fbf9ef04d74eecfc670360c9b7133bb66235616ed60195698bbac489f9451642167e5212
-
Filesize
357KB
MD5db98cfc0d2a4c1fc605c0ea1524c31ad
SHA1f50b7dc068411f63d9ff3b0a8a2de93eea4787ee
SHA256b80477ee72ccef8bfc005ed3d5e462746fd2915e350a8a238c0a40711c8c066e
SHA5129a3d25a4d8f5b0ab1757640ede555c9f88988ef58aa8abd150cea7459a8d1195daf5430f4c399c1a653944a71e455da033cfdde9092cd8097fbfb698e4194693
-
Filesize
357KB
MD5a8e26e4e2ab81105ab235501e377ec08
SHA15b22e5974c63fe03d864fceaf78e0d84444b9a9a
SHA25663a417711e13ebba543c7c8f3668babdbdc68038a0001471f73b2259806a3566
SHA512eefb0f79ef0d368444d8b1e893dbc68359a5777cccebe3686f663ecd21d77887c0db42edb0a6919cc6f54cf67925338c22a58d84814df84430ade3f7a30cc61f
-
Filesize
357KB
MD5563f59ec5e4b0b0c7849c4decd9fa24b
SHA1f63a1a0608f6544e89636aa1d125b7b686721367
SHA256b2dbf3b5da021166880ed22cabeaa0c134d2b4179876cf3831d0711bf48735d6
SHA51206b5cbf63bc9e97c8a490a1211e7d757635efcd479e9b9e6b62233125e3471e9bce304589cd3f396be59469b94f19a8b748a0fed76eff7af6922d49e7689cdd3
-
Filesize
357KB
MD5caab7ba14f61c6d77f6566f1cfab3628
SHA1cb5d61368543c3a322ad4912a77dd028bdd2c81c
SHA256864c1397e1d34d30ac036c909c6f165e66640f9405a63ef1726915e304e09dcf
SHA512caf7e6f0fa05e75348876c7869e35ad60e40ff794a8fe402c862146d3478e8e2e24768c9ae26d050d1bbc428f1a8a0bff28aff5237af65f2648c63617018ee36
-
Filesize
357KB
MD5e06148be24264a92303f84282e9783ca
SHA1897337c341599ad99594014ac5bfa621c7532d7f
SHA2567dc6d5b45a1715de902638bf67205756e6a7348426e0541703de654f68d72e80
SHA512d7cec373a8038a9637c76a0cba581d251659be3d100010dcd826bd26fecd163ad240063218139b47798e03dcd84307c4516f310715365d551d8ff35bcf8a2b60
-
Filesize
357KB
MD5939ae2c8c7269578a4edfa875192b2af
SHA14b6ad92e98386a429412f007e124e28bc5de42a7
SHA256f1c3ef57ba2a897bf504dfce992f3bfa9b80a617fafe0dc6be958aaeb29c7dff
SHA512d65671a466ab32c6a8717b36973168f3fd4eda7e5737bc6ad266f0b724b919186ac739baf05f9d5e6dd59b27b5e01e1984cf0246a6f149c00326b73a7d3ead61
-
Filesize
357KB
MD5be3ad987cf6d1df9ab14b71c23092e06
SHA12a28801788128d1e947ccde493457ae1838c6af2
SHA256b127d9d845553273a78a98be2b9d05961779b74d3e65e1dcda5bc0ff29dddcc8
SHA512cf2f4ef1f80d9fb3aad706b34d83f7442eff7109ea69a2f7aea464bc68867f65b14b40b42e7e803e6598a9a604e59f2de845f351fd20ddd82b288e7ea3ded550
-
Filesize
357KB
MD5ebbe337c173c695d0d497b5fd24d0327
SHA165b1095c13dbb98580b31d782b476a48b3509157
SHA25619f97470738cf0b47ef6fa86d4a318b9a4f44e0fcc240aadbcb5758f356a1447
SHA512d9fd1ab8bf317d216dbd4303a17280d2dee164ab141b0f32cf00fb85f5f2308d652cd4ea65e19e9a2cb8aeff73f84b07e1f90b3b4ac7bf19b553dc4cac9aacc7
-
Filesize
357KB
MD5b0f570b711d931126ea9f1f367d06f9d
SHA16344382ec2819a87ffcdfa82f0aec554efa184a9
SHA256d595e7f3b52e2967661a6730d36ad1bd2f54e78cb469cbb560997adde48f7b4d
SHA512c91be64b9db3a51f7de27da03471da97135b53a93f52ca42009b930e4860a73395eee7aa72a317aa0dfd65db6b10b78ef7436618465812252b426fb9a792a542
-
Filesize
357KB
MD5f7293a13ef02c5bd04af64ec6ad4974f
SHA113cbf6c4c202a6fbbab34cbb98b8e6a313c11974
SHA2563ad63201e4a0cf20f2d1ec98e68c2714113eb6ad211dbd323f831276b8ccc88c
SHA512f2a733307556e85e0ee1fd141de820495a4dedd1b5b8f8fcac0415f1bacbddf053f9fc626c09a3c4a3d9e54df4f612f6698385b3e4121927c968c390bbc6e4f4
-
Filesize
357KB
MD576745a152e0a9c8056bf4aac5dd55351
SHA17184254310ae76e69fb39b1bd078a321aec3db0c
SHA25632a7c3f3882b22400b322dccc5353be09057149d422ebcad11c3331e4af13abb
SHA5126e6a0fda79ea660fa9e25d74fa55a219d5729131c0d144cbc4e745599037edd18b884936354f8e3e0162be9d099f8dbdaf080808902d54cc5d579b9c49018401
-
Filesize
357KB
MD54e558bf5412ac8dcb52204f71390bd2e
SHA199c4a8c4148b4348338b669be02b38ff339bdcf7
SHA256a2e0759487ea8b6114cb0ead92a02f7fe2d15efb99013ea26b926c49e1aca9f3
SHA51299b5029901c98acb730787b9724f2c725f2e8153014d873f9a96c98a74eeb71acf11957c73ad70a2b111d803322bdfacd2e9c62f3c25bd3aaee38bcdbda04b1b
-
Filesize
357KB
MD5bcc178cda704b54d0feb427f020a5fbd
SHA16ece6f65ff866265194ae384a2954ee0b8e5253f
SHA256e0e3ea40feca1902fabf2ade590b6315f4b475335e513f5113d3e5a07a344f01
SHA512410ef965129770d30e632e20d781394ae09af79d6408d27ac2ccc1f8d454cec49172c92de630dfc45a0e32be3eca726e51b6617e957ab3cb638c254d336584f5
-
Filesize
357KB
MD57645781c733a775e960ee612873cc705
SHA15a9d27865aa4780055d0c43a9ef325b48b78dd74
SHA256f56cb6ca90dc2e4ec62cd85f5d188bbba7be72e92561bde52a406f5a0a2b27ea
SHA51290972fae82fe9e4ed846c27f8d293cf966402f0ed4602762997f527832a2bf42228e3db12c175709fe153c5a0a79c8ec3553042f09b9bc8afd5524f4e9b9519f
-
Filesize
357KB
MD5c3bebdd7847affa493139c1c1dd0d821
SHA155bd8268e69a13f72000f8f250baa6ee4687e7a6
SHA2567f02e9de0f48c2ad2a66591c5760c280651552de420aa9d285568301a9958ec2
SHA51210f58fd89137fba35a399134c9550bc599ee4a944c2f00fc2a7b1c22b5b42cad4e9cf256a99de7894d33de8eb81ee4e627dcf7fabc875f791d319a9995bc751a
-
Filesize
357KB
MD54beb9d83a442e10c84bb40e8bbfef8e5
SHA18997751f7d38772f088c23dca3394051c90db0b6
SHA2568e1a986759a7f4d4296e89631d6d42dbe5bdd3ddb8c363ed0953b116e19674d5
SHA512fb5f228dd30020bfe5606f8cdf10ee665bb14ad16ce909afdd23ddb783018ae6491c453215b01f9714fe0634669161dc81dfa6d474da593ce7766e58ba27cce8
-
Filesize
357KB
MD54649700efa1ddea284605b91de412159
SHA17e8fa3c9123cc43a97ec4853034dbcd7d0a3ff74
SHA256b63d71c6e32f8575253b20ca0c646b30d1656b6c7aaacefe96092715a478b0b3
SHA512b80679e60c9e927586ac372787fbb2b7637775c56b86a649548f1759d8bb75cf02d753473c6d2874890c1748915aa439d48ec56f2c81d3999e549849c22379d7
-
Filesize
357KB
MD50a770e7c8fecf8e27122e74bbe162bb7
SHA1ff6ab280e49f729b9f6bfa43a5d0baa1193e43b3
SHA256ee90174ed9e95b99bae5d69dc4c75dbedee5fcae411c2f7bd86245e9e9e06f29
SHA512e25d88829834a54b85062aef91c26f30a0690ef6fc9822ac885c0a0d01885ddd2477eba7183edbd39db8f782061a17ecbf339d558139849f8da4ea1099af31af
-
Filesize
357KB
MD57bc65b779e8efb9b83b931f0f63614d0
SHA1a289302d60d86446d9eda016ca459f7c9426466f
SHA256051e88a5e846c687483856a9779b1ba7c66382d957402da9179e796b34f6fba3
SHA5125d8c96a3f30fd95d0c0fc02e7c1af46ce9c64efeef8f302d2d36f7b3b2643fe2f9288d98dfccdeb3c4fc3081c045785cf5d64023134c0dca7a6fc98b12d05e55
-
Filesize
357KB
MD5941b2c19835198e71193225df0dceb8d
SHA1d3a54e6a1bec28ece0d0665603e957af0f16ec80
SHA25659eb0c286923ae409876ed719c717c600203eba026998920c41932ebe0d077ab
SHA5122925c46cdc123e258e6165653824741bda1c569f73497a1e20e1e3d2a8a3c81cdd953a455c1a1c28c7bc0fa83383ab450e21e8090363913ecb9dfa78b8bc63ae
-
Filesize
357KB
MD53708902f3cb663933d133f300f2d2e75
SHA19accc9df835417810aebdb7acac220ee20931677
SHA2567c07f7948efd203c2ba0f880636c373ed42dca3183a38165e5199cc25bf73d0b
SHA51275dbff54f4dfbbc95152aa33b450c326cf5b35314555b82d66eaced706da74b17020181cbd53b36650f884e8571b1bdebd65b7648dc68377f2e9db9ea4f2d515
-
Filesize
357KB
MD5584e7eab405719bbf44eba672c6126ce
SHA16de38e653e470aaf42eeea4aca543e2f8a1e578f
SHA256d3dc271290a8f920912614d0c0ae222917663ab5b85d8075a67cda1fbb3ef2e9
SHA5121853747df106f95c9fc7e34900a63882bc033370e652e32f55758a6f240e7b5aca98444be72a1326b25288ffc44012e800ced7c3e7fce8e8795f0808c5f67c74
-
Filesize
357KB
MD5e5c6b77b1cfad8ee792c970dca8a3aeb
SHA1c862c1d6554ade7d8acf1b8f72247cf89bdded1f
SHA25619760bcf91a074d58be292869a676ef4b67f597eab1b5190e3f8ce624dad3d87
SHA5126ca39594dff04e2c9bce6016709f77aee0fd2dd231b9ee1387bf7fbaa50dd8f615bd54cfc6e9120f1ec767102e9f988969c96f68f12294eabb1a802eaf346047
-
Filesize
357KB
MD585f127b71fdf68199c20e6e652379763
SHA1fb6a9b5303fb31814ccf6a8b6afad5a363dec6e3
SHA256a7dd742f0b6d8225dd0ee97444958402fa987b13389af240da39e2ea99a9d398
SHA51213998809f43443a99019d02c2bdf160dfd1087006bb4844ec14d9cd55f57ec18dcec1419f46ccb1c49a86a0bded47725769cdef98066a806421f77b9414062ea
-
Filesize
357KB
MD56152672dfd61eb2639f1ccfc74433307
SHA1572ee79b0d14de3acddfe992d1a528a93a27b3f6
SHA256d40edeb68a8f0153bc7c42991b46dad4bcc25c52ddc9712979191e627eadab3a
SHA51272dd1cc07546a63b651e417f12a54cde6c2e65bf1da7526ee9ca7e1be7545a7b4a223a98daac871623a6a2904b6e2a33090f14a3c4acedb159020d252df4b505
-
Filesize
357KB
MD54ba8c4deb6ecaf3e430a722fcdbe0aee
SHA18569ea78e9c0626ef8f25fff1438279c897ccb04
SHA2566dbdae116afb426d3e19898c1e86fada3760dfcc5237374834e1a60b3fd7f971
SHA51291ea2217b202b18665dcb97e631abebeed2ad1dad7397bfda9bdebf6899f4202478701fa747d6ad87a8960d7a1d8f5eb48fe84f22f0917b4c435d60f5157f6bf
-
Filesize
357KB
MD5f3fdfb73ddf2c215ac6143dc11268d06
SHA19dec30be7b4d4716a79b313cf41c367e9ed45b02
SHA25675095c24992675fe221c4ff9adfad4f20b064f0bebe58019f688f11388c4c6e2
SHA512653160b8e07172b467a812970b913d6abee8406940839e62be3aa1130f2f0a82322955dfdc3d9eb770fe562e44614072d8b2bc3009a3845e7aa1fa43ef971d76
-
Filesize
357KB
MD52b5e33c625ffd358c3eae226f4f4c98d
SHA1b43d38414881a89360191c1f25c3ce0f476da854
SHA25637752c8679796fa85631c72c1e3d0e6d3c588acd52e21062cf4dc1f0aed1c481
SHA512ceb54e59e2acdfc056715567617fd1993e047a05ee0091ec9685c30523becad15413e9be919b0cf03cc19991cd97f5aae196c68987e55c0833f506a1eb8d5780
-
Filesize
7KB
MD5d113526e36ce797fa2a16cd867f4272c
SHA14165d0212168ea16ac457a393be717f7774ef4bc
SHA25604402268a1717885999a4b15d35a7a8dc6b3f35d9cd5304ff58532516e6596dd
SHA51241187c72c0b9d98320577ac77389104e8d0e7bb7be944fa02bbbb5c447fc2a9049405b5af49e070f1fefa0443d307f2a3718b0e2933705fc328d0640fa0c075b