Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 08:11
Behavioral task
behavioral1
Sample
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe
-
Size
125KB
-
MD5
4287f1f26f5e36e33e73b7fb32d78c00
-
SHA1
7769c720726c9ad9a31d0b6bd0aabb77d179b57c
-
SHA256
d9e3aa37acc7a438582010127eeafe01c9d035e9236992404de336fbe34165c4
-
SHA512
5e740a70c460baa0672e7859d5cdc1b2695b5cdae69355ed580766efdd7783f906bac1a71851d803058f2a36f3a6fb9a72208d777df47fe154c954b5fe1bb689
-
SSDEEP
3072:Uo8FuBFiGU98DMjEXc5nQcd1WdTCn93OGey/ZhJakrPF:18FuboaDMjEMQceTCndOGeKTaG
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Amfcikek.exeFilldb32.exeHpkjko32.exeJfghif32.exeQlkdkd32.exeKcbakpdo.exeKgnnln32.exeQcpofbjl.exeDjbiicon.exeHejoiedd.exeKemejc32.exeOklkmnbp.exeBbokmqie.exeBghjhp32.exeEhgppi32.exeEkhhadmk.exeMpbaebdd.exeDndlim32.exeEjmebq32.exeEqdajkkb.exeFmpkjkma.exeFnbkddem.exeLbcnhjnj.exeLecgje32.exeNoqamn32.exePcnbablo.exeEiaiqn32.exeHckcmjep.exeHogmmjfo.exeJmocpado.exeOjahnj32.exePedleg32.exeAhlgfdeq.exeDkkpbgli.exeEdpmjj32.exeOnhgbmfb.exeAemkjiem.exeHlakpp32.exeKneicieh.exeDoehqead.exeKifpdelo.exeLbqabkql.exeIokfhi32.exeLeonofpp.exeOkikfagn.exeQedhdjnh.exeDgaqgh32.exeDcknbh32.exeIqalka32.exeLhbcfa32.exeOlmhdf32.exeCojema32.exeDfamcogo.exeEmnndlod.exeJqfffqpm.exeBidjnkdg.exeCddaphkn.exeGoddhg32.exeMdkqqa32.exeMijfnh32.exeOcimgp32.exeOikojfgk.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amfcikek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Filldb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpkjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpkjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfghif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlkdkd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcbakpdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgnnln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qcpofbjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djbiicon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hejoiedd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kemejc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oklkmnbp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbokmqie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bghjhp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehgppi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekhhadmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mpbaebdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dndlim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejmebq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eqdajkkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fmpkjkma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnbkddem.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbcnhjnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lecgje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noqamn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pcnbablo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eiaiqn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hckcmjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hogmmjfo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmocpado.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ojahnj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pedleg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahlgfdeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkkpbgli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edpmjj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onhgbmfb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aemkjiem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hlakpp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kneicieh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doehqead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kifpdelo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbqabkql.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iokfhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Leonofpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okikfagn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qedhdjnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dgaqgh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcknbh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqalka32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhbcfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okikfagn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Olmhdf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cojema32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfamcogo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emnndlod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqfffqpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bidjnkdg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cddaphkn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goddhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mdkqqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mijfnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ocimgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oikojfgk.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/2864-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew \Windows\SysWOW64\Bnbjopoi.exe family_berbew behavioral1/memory/2864-6-0x0000000000310000-0x0000000000357000-memory.dmp family_berbew behavioral1/memory/2352-18-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/2352-21-0x0000000000450000-0x0000000000497000-memory.dmp family_berbew \Windows\SysWOW64\Bkfjhd32.exe family_berbew \Windows\SysWOW64\Bdooajdc.exe family_berbew behavioral1/memory/2132-34-0x0000000000250000-0x0000000000297000-memory.dmp family_berbew \Windows\SysWOW64\Ckignd32.exe family_berbew behavioral1/memory/2748-53-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew \Windows\SysWOW64\Cfbhnaho.exe family_berbew behavioral1/memory/2748-62-0x0000000000250000-0x0000000000297000-memory.dmp family_berbew \Windows\SysWOW64\Coklgg32.exe family_berbew behavioral1/memory/2736-75-0x00000000002E0000-0x0000000000327000-memory.dmp family_berbew behavioral1/memory/2736-73-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew \Windows\SysWOW64\Clomqk32.exe family_berbew behavioral1/memory/2468-93-0x0000000000330000-0x0000000000377000-memory.dmp family_berbew \Windows\SysWOW64\Cjbmjplb.exe family_berbew behavioral1/memory/2988-106-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew \Windows\SysWOW64\Copfbfjj.exe family_berbew behavioral1/memory/2988-114-0x0000000000340000-0x0000000000387000-memory.dmp family_berbew \Windows\SysWOW64\Cfinoq32.exe family_berbew \Windows\SysWOW64\Chhjkl32.exe family_berbew behavioral1/memory/380-137-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/2684-145-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Cndbcc32.exe family_berbew behavioral1/memory/2328-158-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Ddokpmfo.exe family_berbew behavioral1/memory/1324-172-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/2252-188-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew \Windows\SysWOW64\Dodonf32.exe family_berbew \Windows\SysWOW64\Dqelenlc.exe family_berbew behavioral1/memory/2192-210-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/808-221-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/1100-232-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/1788-242-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Dgaqgh32.exe family_berbew C:\Windows\SysWOW64\Ddeaalpg.exe family_berbew C:\Windows\SysWOW64\Dgdmmgpj.exe family_berbew behavioral1/memory/1396-290-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Djbiicon.exe family_berbew behavioral1/memory/764-302-0x00000000002B0000-0x00000000002F7000-memory.dmp family_berbew behavioral1/memory/1768-317-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Dcknbh32.exe family_berbew C:\Windows\SysWOW64\Eqonkmdh.exe family_berbew behavioral1/memory/2648-339-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/2532-338-0x00000000002B0000-0x00000000002F7000-memory.dmp family_berbew behavioral1/memory/2532-337-0x00000000002B0000-0x00000000002F7000-memory.dmp family_berbew behavioral1/memory/2580-363-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Eeqdep32.exe family_berbew behavioral1/memory/2324-383-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Eecqjpee.exe family_berbew behavioral1/memory/1712-398-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Enkece32.exe family_berbew C:\Windows\SysWOW64\Eiaiqn32.exe family_berbew behavioral1/memory/2896-459-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Faokjpfd.exe family_berbew behavioral1/memory/1296-481-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/400-496-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral1/memory/1868-503-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Ffnphf32.exe family_berbew C:\Windows\SysWOW64\Facdeo32.exe family_berbew C:\Windows\SysWOW64\Fbdqmghm.exe family_berbew C:\Windows\SysWOW64\Ffpmnf32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Bnbjopoi.exeBkfjhd32.exeBdooajdc.exeCkignd32.exeCfbhnaho.exeCoklgg32.exeClomqk32.exeCjbmjplb.exeCopfbfjj.exeCfinoq32.exeChhjkl32.exeCndbcc32.exeDdokpmfo.exeDgmglh32.exeDodonf32.exeDqelenlc.exeDhmcfkme.exeDkkpbgli.exeDqhhknjp.exeDgaqgh32.exeDjpmccqq.exeDmoipopd.exeDdeaalpg.exeDgdmmgpj.exeDjbiicon.exeDcknbh32.exeEqonkmdh.exeEpaogi32.exeEijcpoac.exeEpdkli32.exeEeqdep32.exeEmhlfmgj.exeEecqjpee.exeElmigj32.exeEnkece32.exeEiaiqn32.exeEnnaieib.exeEbinic32.exeFhffaj32.exeFjdbnf32.exeFaokjpfd.exeFnbkddem.exeFpdhklkl.exeFfnphf32.exeFilldb32.exeFacdeo32.exeFbdqmghm.exeFfpmnf32.exeFlmefm32.exeFddmgjpo.exeFfbicfoc.exeFiaeoang.exeGloblmmj.exeGbijhg32.exeGfefiemq.exeGhfbqn32.exeGpmjak32.exeGbkgnfbd.exeGangic32.exeGejcjbah.exeGldkfl32.exeGobgcg32.exeGelppaof.exeGdopkn32.exepid process 2352 Bnbjopoi.exe 2132 Bkfjhd32.exe 2596 Bdooajdc.exe 2748 Ckignd32.exe 2736 Cfbhnaho.exe 2468 Coklgg32.exe 1656 Clomqk32.exe 2988 Cjbmjplb.exe 1976 Copfbfjj.exe 380 Cfinoq32.exe 2684 Chhjkl32.exe 2328 Cndbcc32.exe 1324 Ddokpmfo.exe 2252 Dgmglh32.exe 2348 Dodonf32.exe 2192 Dqelenlc.exe 808 Dhmcfkme.exe 1100 Dkkpbgli.exe 1788 Dqhhknjp.exe 2388 Dgaqgh32.exe 2100 Djpmccqq.exe 2416 Dmoipopd.exe 1396 Ddeaalpg.exe 764 Dgdmmgpj.exe 1404 Djbiicon.exe 1768 Dcknbh32.exe 2532 Eqonkmdh.exe 2648 Epaogi32.exe 2196 Eijcpoac.exe 2580 Epdkli32.exe 2984 Eeqdep32.exe 2324 Emhlfmgj.exe 1712 Eecqjpee.exe 2828 Elmigj32.exe 2528 Enkece32.exe 1540 Eiaiqn32.exe 2688 Ennaieib.exe 1284 Ebinic32.exe 2896 Fhffaj32.exe 1292 Fjdbnf32.exe 1296 Faokjpfd.exe 400 Fnbkddem.exe 1868 Fpdhklkl.exe 720 Ffnphf32.exe 1544 Filldb32.exe 1256 Facdeo32.exe 1376 Fbdqmghm.exe 1672 Ffpmnf32.exe 832 Flmefm32.exe 2588 Fddmgjpo.exe 2444 Ffbicfoc.exe 2740 Fiaeoang.exe 2068 Globlmmj.exe 1452 Gbijhg32.exe 2628 Gfefiemq.exe 2272 Ghfbqn32.exe 2796 Gpmjak32.exe 1312 Gbkgnfbd.exe 2076 Gangic32.exe 1824 Gejcjbah.exe 1484 Gldkfl32.exe 2776 Gobgcg32.exe 632 Gelppaof.exe 1264 Gdopkn32.exe -
Loads dropped DLL 64 IoCs
Processes:
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exeBnbjopoi.exeBkfjhd32.exeBdooajdc.exeCkignd32.exeCfbhnaho.exeCoklgg32.exeClomqk32.exeCjbmjplb.exeCopfbfjj.exeCfinoq32.exeChhjkl32.exeCndbcc32.exeDdokpmfo.exeDgmglh32.exeDodonf32.exeDqelenlc.exeDhmcfkme.exeDkkpbgli.exeDqhhknjp.exeDgaqgh32.exeDjpmccqq.exeDmoipopd.exeDdeaalpg.exeDgdmmgpj.exeDjbiicon.exeDcknbh32.exeEqonkmdh.exeEpaogi32.exeEijcpoac.exeEpdkli32.exeEeqdep32.exepid process 2864 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe 2864 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe 2352 Bnbjopoi.exe 2352 Bnbjopoi.exe 2132 Bkfjhd32.exe 2132 Bkfjhd32.exe 2596 Bdooajdc.exe 2596 Bdooajdc.exe 2748 Ckignd32.exe 2748 Ckignd32.exe 2736 Cfbhnaho.exe 2736 Cfbhnaho.exe 2468 Coklgg32.exe 2468 Coklgg32.exe 1656 Clomqk32.exe 1656 Clomqk32.exe 2988 Cjbmjplb.exe 2988 Cjbmjplb.exe 1976 Copfbfjj.exe 1976 Copfbfjj.exe 380 Cfinoq32.exe 380 Cfinoq32.exe 2684 Chhjkl32.exe 2684 Chhjkl32.exe 2328 Cndbcc32.exe 2328 Cndbcc32.exe 1324 Ddokpmfo.exe 1324 Ddokpmfo.exe 2252 Dgmglh32.exe 2252 Dgmglh32.exe 2348 Dodonf32.exe 2348 Dodonf32.exe 2192 Dqelenlc.exe 2192 Dqelenlc.exe 808 Dhmcfkme.exe 808 Dhmcfkme.exe 1100 Dkkpbgli.exe 1100 Dkkpbgli.exe 1788 Dqhhknjp.exe 1788 Dqhhknjp.exe 2388 Dgaqgh32.exe 2388 Dgaqgh32.exe 2100 Djpmccqq.exe 2100 Djpmccqq.exe 2416 Dmoipopd.exe 2416 Dmoipopd.exe 1396 Ddeaalpg.exe 1396 Ddeaalpg.exe 764 Dgdmmgpj.exe 764 Dgdmmgpj.exe 1404 Djbiicon.exe 1404 Djbiicon.exe 1768 Dcknbh32.exe 1768 Dcknbh32.exe 2532 Eqonkmdh.exe 2532 Eqonkmdh.exe 2648 Epaogi32.exe 2648 Epaogi32.exe 2196 Eijcpoac.exe 2196 Eijcpoac.exe 2580 Epdkli32.exe 2580 Epdkli32.exe 2984 Eeqdep32.exe 2984 Eeqdep32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Eijcpoac.exeMdpjlajk.exeNacgdhlp.exeEdpmjj32.exeObafnlpn.exePnajilng.exeDgaqgh32.exeDjpmccqq.exeGejcjbah.exeGddifnbk.exeNgnbgplj.exeOopnlacm.exeCcahbp32.exeDqelenlc.exeIknnbklc.exeQcpofbjl.exeAoepcn32.exeAmhpnkch.exeBfcampgf.exeFfpmnf32.exeGaemjbcg.exeHkkalk32.exeKmjfdejp.exeLihmjejl.exeNhfipcid.exeGpmjak32.exeNceclqan.exeOcimgp32.exeAefeijle.exeLimfed32.exeMeccii32.exeOjolhk32.exeOfelmloo.exePbfpik32.exeDjbiicon.exeHhjhkq32.exeDfmdho32.exeKgkafo32.exeMmhodf32.exeOgblbo32.exeFpdhklkl.exeKgpjanje.exeKcfkfo32.exeLpdbloof.exeOqmmpd32.exePmanoifd.exeJcbellac.exeJqfffqpm.exeMcegmm32.exeNncahjgl.exeEndhhp32.exeEjmebq32.exeKnjbnh32.exePqhpdhcc.exeBocolb32.exeChbjffad.exeLafndg32.exeOkgnab32.exeQmfgjh32.exeDhdcji32.exeEkelld32.exedescription ioc process File created C:\Windows\SysWOW64\Epdkli32.exe Eijcpoac.exe File created C:\Windows\SysWOW64\Bgagbb32.dll Mdpjlajk.exe File opened for modification C:\Windows\SysWOW64\Npfgpe32.exe Nacgdhlp.exe File created C:\Windows\SysWOW64\Ffpncj32.dll Edpmjj32.exe File opened for modification C:\Windows\SysWOW64\Odobjg32.exe Obafnlpn.exe File created C:\Windows\SysWOW64\Hiilgb32.dll Pnajilng.exe File created C:\Windows\SysWOW64\Klidkobf.dll Dgaqgh32.exe File created C:\Windows\SysWOW64\Naeqjnho.dll Djpmccqq.exe File opened for modification C:\Windows\SysWOW64\Gldkfl32.exe Gejcjbah.exe File created C:\Windows\SysWOW64\Hknach32.exe Gddifnbk.exe File created C:\Windows\SysWOW64\Miikgeea.dll Ngnbgplj.exe File created C:\Windows\SysWOW64\Ionkallc.dll Oopnlacm.exe File opened for modification C:\Windows\SysWOW64\Cadhnmnm.exe Ccahbp32.exe File created C:\Windows\SysWOW64\Dhmcfkme.exe Dqelenlc.exe File opened for modification C:\Windows\SysWOW64\Inljnfkg.exe Iknnbklc.exe File created C:\Windows\SysWOW64\Nglknl32.dll Qcpofbjl.exe File created C:\Windows\SysWOW64\Amhpnkch.exe Aoepcn32.exe File opened for modification C:\Windows\SysWOW64\Aadloj32.exe Amhpnkch.exe File created C:\Windows\SysWOW64\Bkommo32.exe Bfcampgf.exe File opened for modification C:\Windows\SysWOW64\Flmefm32.exe Ffpmnf32.exe File opened for modification C:\Windows\SysWOW64\Gddifnbk.exe Gaemjbcg.exe File opened for modification C:\Windows\SysWOW64\Hogmmjfo.exe Hkkalk32.exe File created C:\Windows\SysWOW64\Keanebkb.exe Kmjfdejp.exe File created C:\Windows\SysWOW64\Llfifq32.exe Lihmjejl.exe File created C:\Windows\SysWOW64\Kpbbidem.dll Nhfipcid.exe File opened for modification C:\Windows\SysWOW64\Gbkgnfbd.exe Gpmjak32.exe File created C:\Windows\SysWOW64\Oklkmnbp.exe Nceclqan.exe File created C:\Windows\SysWOW64\Chfpgj32.dll Ocimgp32.exe File opened for modification C:\Windows\SysWOW64\Aibajhdn.exe Aefeijle.exe File created C:\Windows\SysWOW64\Bibkki32.dll Limfed32.exe File created C:\Windows\SysWOW64\Mhbped32.exe Meccii32.exe File created C:\Windows\SysWOW64\Kgoboqcm.dll Ojolhk32.exe File created C:\Windows\SysWOW64\Mnhlblil.dll Ofelmloo.exe File created C:\Windows\SysWOW64\Ehkdaf32.dll Pbfpik32.exe File created C:\Windows\SysWOW64\Pafagk32.dll Djbiicon.exe File opened for modification C:\Windows\SysWOW64\Hlfdkoin.exe Hhjhkq32.exe File created C:\Windows\SysWOW64\Djhphncm.exe Dfmdho32.exe File created C:\Windows\SysWOW64\Kjjmbj32.exe Kgkafo32.exe File created C:\Windows\SysWOW64\Hlnbfd32.dll Mmhodf32.exe File opened for modification C:\Windows\SysWOW64\Ofelmloo.exe Ogblbo32.exe File opened for modification C:\Windows\SysWOW64\Ofjfhk32.exe Oopnlacm.exe File created C:\Windows\SysWOW64\Kegiig32.dll Fpdhklkl.exe File opened for modification C:\Windows\SysWOW64\Kfbkmk32.exe Kgpjanje.exe File opened for modification C:\Windows\SysWOW64\Kgbggnhc.exe Kcfkfo32.exe File created C:\Windows\SysWOW64\Khcmap32.dll Lpdbloof.exe File created C:\Windows\SysWOW64\Oopnlacm.exe Oqmmpd32.exe File created C:\Windows\SysWOW64\Peiepfgg.exe Pmanoifd.exe File opened for modification C:\Windows\SysWOW64\Jfqahgpg.exe Jcbellac.exe File created C:\Windows\SysWOW64\Ollfnfje.dll Jqfffqpm.exe File created C:\Windows\SysWOW64\Mgqcmlgl.exe Mcegmm32.exe File created C:\Windows\SysWOW64\Naoniipe.exe Nncahjgl.exe File opened for modification C:\Windows\SysWOW64\Ebodiofk.exe Endhhp32.exe File opened for modification C:\Windows\SysWOW64\Enhacojl.exe Ejmebq32.exe File created C:\Windows\SysWOW64\Cekkkkhe.dll Knjbnh32.exe File created C:\Windows\SysWOW64\Nlbeqb32.exe Nhfipcid.exe File created C:\Windows\SysWOW64\Pedleg32.exe Pqhpdhcc.exe File opened for modification C:\Windows\SysWOW64\Bbokmqie.exe Bocolb32.exe File created C:\Windows\SysWOW64\Hdjlnm32.dll Chbjffad.exe File created C:\Windows\SysWOW64\Goedqe32.dll Lafndg32.exe File created C:\Windows\SysWOW64\Ocnfbo32.exe Okgnab32.exe File created C:\Windows\SysWOW64\Qabcjgkh.exe Qmfgjh32.exe File created C:\Windows\SysWOW64\Mhofcjea.dll Dhdcji32.exe File created C:\Windows\SysWOW64\Ejhlgaeh.exe Ekelld32.exe File opened for modification C:\Windows\SysWOW64\Egoife32.exe Edpmjj32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2760 5484 WerFault.exe Fkckeh32.exe -
Modifies registry class 64 IoCs
Processes:
Kgpjanje.exeOkikfagn.exePqkmjh32.exePclfkc32.exeDbhnhp32.exeEdkcojga.exeEpaogi32.exeHlfdkoin.exeMihiih32.exeNncahjgl.exeNhiffc32.exeAfcenm32.exeAnccmo32.exeBlgpef32.exeEpdkli32.exeChpmpg32.exeDojald32.exeCafecmlj.exeJoifam32.exeOddpfc32.exePkpagq32.exeAadloj32.exeClilkfnb.exeDbfabp32.exeEplkpgnh.exeHcnpbi32.exeEkhhadmk.exeGacpdbej.exeKngfih32.exeJmjjea32.exeHicodd32.exeJehkodcm.exeJfghif32.exeNpfgpe32.exeOgblbo32.exeCnaocmmi.exeFhffaj32.exeDcknbh32.exeOjfaijcc.exePqhpdhcc.exeDhmcfkme.exeDndlim32.exeCclkfdnc.exeLflmci32.exeNaajoinb.exeAbmbhn32.exeHlakpp32.exeIokfhi32.exeLimfed32.exeMcbjgn32.exeOfjfhk32.exePkndaa32.exeEjhlgaeh.exe4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exeLbqabkql.exeAmhpnkch.exeBkommo32.exeBifgdk32.exeDkcofe32.exeJkpgfn32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kgpjanje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egahmk32.dll" Okikfagn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohhkga32.dll" Pqkmjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pclfkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dbhnhp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Edkcojga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Epaogi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hlfdkoin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mihiih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkkgfioo.dll" Nncahjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhiffc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Afcenm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Anccmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilpedi32.dll" Blgpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Epdkli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Chpmpg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dojald32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cafecmlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Joifam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oddpfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pkpagq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aadloj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Clilkfnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dbfabp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eplkpgnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hcnpbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ekhhadmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gacpdbej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kngfih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kklemhne.dll" Jmjjea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hicodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjdijm32.dll" Jehkodcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jfghif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Npfgpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ogblbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cnaocmmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fhffaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dcknbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogblbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojfaijcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pqhpdhcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eplkpgnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhmcfkme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dndlim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cclkfdnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lflmci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iigpciig.dll" Naajoinb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Abmbhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Anccmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oehfcmhd.dll" Cnaocmmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hlakpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehllae32.dll" Iokfhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Limfed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mcbjgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Heldepab.dll" Ofjfhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhnffb32.dll" Pkndaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ejhlgaeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lbqabkql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncdbcl32.dll" Amhpnkch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bkommo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bifgdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkhgfq32.dll" Dkcofe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chgdod32.dll" Jkpgfn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exeBnbjopoi.exeBkfjhd32.exeBdooajdc.exeCkignd32.exeCfbhnaho.exeCoklgg32.exeClomqk32.exeCjbmjplb.exeCopfbfjj.exeCfinoq32.exeChhjkl32.exeCndbcc32.exeDdokpmfo.exeDgmglh32.exeDodonf32.exedescription pid process target process PID 2864 wrote to memory of 2352 2864 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Bnbjopoi.exe PID 2864 wrote to memory of 2352 2864 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Bnbjopoi.exe PID 2864 wrote to memory of 2352 2864 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Bnbjopoi.exe PID 2864 wrote to memory of 2352 2864 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Bnbjopoi.exe PID 2352 wrote to memory of 2132 2352 Bnbjopoi.exe Bkfjhd32.exe PID 2352 wrote to memory of 2132 2352 Bnbjopoi.exe Bkfjhd32.exe PID 2352 wrote to memory of 2132 2352 Bnbjopoi.exe Bkfjhd32.exe PID 2352 wrote to memory of 2132 2352 Bnbjopoi.exe Bkfjhd32.exe PID 2132 wrote to memory of 2596 2132 Bkfjhd32.exe Bdooajdc.exe PID 2132 wrote to memory of 2596 2132 Bkfjhd32.exe Bdooajdc.exe PID 2132 wrote to memory of 2596 2132 Bkfjhd32.exe Bdooajdc.exe PID 2132 wrote to memory of 2596 2132 Bkfjhd32.exe Bdooajdc.exe PID 2596 wrote to memory of 2748 2596 Bdooajdc.exe Ckignd32.exe PID 2596 wrote to memory of 2748 2596 Bdooajdc.exe Ckignd32.exe PID 2596 wrote to memory of 2748 2596 Bdooajdc.exe Ckignd32.exe PID 2596 wrote to memory of 2748 2596 Bdooajdc.exe Ckignd32.exe PID 2748 wrote to memory of 2736 2748 Ckignd32.exe Cfbhnaho.exe PID 2748 wrote to memory of 2736 2748 Ckignd32.exe Cfbhnaho.exe PID 2748 wrote to memory of 2736 2748 Ckignd32.exe Cfbhnaho.exe PID 2748 wrote to memory of 2736 2748 Ckignd32.exe Cfbhnaho.exe PID 2736 wrote to memory of 2468 2736 Cfbhnaho.exe Coklgg32.exe PID 2736 wrote to memory of 2468 2736 Cfbhnaho.exe Coklgg32.exe PID 2736 wrote to memory of 2468 2736 Cfbhnaho.exe Coklgg32.exe PID 2736 wrote to memory of 2468 2736 Cfbhnaho.exe Coklgg32.exe PID 2468 wrote to memory of 1656 2468 Coklgg32.exe Clomqk32.exe PID 2468 wrote to memory of 1656 2468 Coklgg32.exe Clomqk32.exe PID 2468 wrote to memory of 1656 2468 Coklgg32.exe Clomqk32.exe PID 2468 wrote to memory of 1656 2468 Coklgg32.exe Clomqk32.exe PID 1656 wrote to memory of 2988 1656 Clomqk32.exe Cjbmjplb.exe PID 1656 wrote to memory of 2988 1656 Clomqk32.exe Cjbmjplb.exe PID 1656 wrote to memory of 2988 1656 Clomqk32.exe Cjbmjplb.exe PID 1656 wrote to memory of 2988 1656 Clomqk32.exe Cjbmjplb.exe PID 2988 wrote to memory of 1976 2988 Cjbmjplb.exe Copfbfjj.exe PID 2988 wrote to memory of 1976 2988 Cjbmjplb.exe Copfbfjj.exe PID 2988 wrote to memory of 1976 2988 Cjbmjplb.exe Copfbfjj.exe PID 2988 wrote to memory of 1976 2988 Cjbmjplb.exe Copfbfjj.exe PID 1976 wrote to memory of 380 1976 Copfbfjj.exe Cfinoq32.exe PID 1976 wrote to memory of 380 1976 Copfbfjj.exe Cfinoq32.exe PID 1976 wrote to memory of 380 1976 Copfbfjj.exe Cfinoq32.exe PID 1976 wrote to memory of 380 1976 Copfbfjj.exe Cfinoq32.exe PID 380 wrote to memory of 2684 380 Cfinoq32.exe Chhjkl32.exe PID 380 wrote to memory of 2684 380 Cfinoq32.exe Chhjkl32.exe PID 380 wrote to memory of 2684 380 Cfinoq32.exe Chhjkl32.exe PID 380 wrote to memory of 2684 380 Cfinoq32.exe Chhjkl32.exe PID 2684 wrote to memory of 2328 2684 Chhjkl32.exe Cndbcc32.exe PID 2684 wrote to memory of 2328 2684 Chhjkl32.exe Cndbcc32.exe PID 2684 wrote to memory of 2328 2684 Chhjkl32.exe Cndbcc32.exe PID 2684 wrote to memory of 2328 2684 Chhjkl32.exe Cndbcc32.exe PID 2328 wrote to memory of 1324 2328 Cndbcc32.exe Ddokpmfo.exe PID 2328 wrote to memory of 1324 2328 Cndbcc32.exe Ddokpmfo.exe PID 2328 wrote to memory of 1324 2328 Cndbcc32.exe Ddokpmfo.exe PID 2328 wrote to memory of 1324 2328 Cndbcc32.exe Ddokpmfo.exe PID 1324 wrote to memory of 2252 1324 Ddokpmfo.exe Dgmglh32.exe PID 1324 wrote to memory of 2252 1324 Ddokpmfo.exe Dgmglh32.exe PID 1324 wrote to memory of 2252 1324 Ddokpmfo.exe Dgmglh32.exe PID 1324 wrote to memory of 2252 1324 Ddokpmfo.exe Dgmglh32.exe PID 2252 wrote to memory of 2348 2252 Dgmglh32.exe Dodonf32.exe PID 2252 wrote to memory of 2348 2252 Dgmglh32.exe Dodonf32.exe PID 2252 wrote to memory of 2348 2252 Dgmglh32.exe Dodonf32.exe PID 2252 wrote to memory of 2348 2252 Dgmglh32.exe Dodonf32.exe PID 2348 wrote to memory of 2192 2348 Dodonf32.exe Dqelenlc.exe PID 2348 wrote to memory of 2192 2348 Dodonf32.exe Dqelenlc.exe PID 2348 wrote to memory of 2192 2348 Dodonf32.exe Dqelenlc.exe PID 2348 wrote to memory of 2192 2348 Dodonf32.exe Dqelenlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Bnbjopoi.exeC:\Windows\system32\Bnbjopoi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Bkfjhd32.exeC:\Windows\system32\Bkfjhd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Bdooajdc.exeC:\Windows\system32\Bdooajdc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Cfbhnaho.exeC:\Windows\system32\Cfbhnaho.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Coklgg32.exeC:\Windows\system32\Coklgg32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Clomqk32.exeC:\Windows\system32\Clomqk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Cjbmjplb.exeC:\Windows\system32\Cjbmjplb.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\Copfbfjj.exeC:\Windows\system32\Copfbfjj.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\Cfinoq32.exeC:\Windows\system32\Cfinoq32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\Chhjkl32.exeC:\Windows\system32\Chhjkl32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Dodonf32.exeC:\Windows\system32\Dodonf32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Dqelenlc.exeC:\Windows\system32\Dqelenlc.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Dhmcfkme.exeC:\Windows\system32\Dhmcfkme.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:808 -
C:\Windows\SysWOW64\Dkkpbgli.exeC:\Windows\system32\Dkkpbgli.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1100 -
C:\Windows\SysWOW64\Dqhhknjp.exeC:\Windows\system32\Dqhhknjp.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Windows\SysWOW64\Dgaqgh32.exeC:\Windows\system32\Dgaqgh32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2388 -
C:\Windows\SysWOW64\Djpmccqq.exeC:\Windows\system32\Djpmccqq.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416 -
C:\Windows\SysWOW64\Ddeaalpg.exeC:\Windows\system32\Ddeaalpg.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396 -
C:\Windows\SysWOW64\Dgdmmgpj.exeC:\Windows\system32\Dgdmmgpj.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764 -
C:\Windows\SysWOW64\Djbiicon.exeC:\Windows\system32\Djbiicon.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1404 -
C:\Windows\SysWOW64\Dcknbh32.exeC:\Windows\system32\Dcknbh32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\Eqonkmdh.exeC:\Windows\system32\Eqonkmdh.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\Epaogi32.exeC:\Windows\system32\Epaogi32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\Epdkli32.exeC:\Windows\system32\Epdkli32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2580 -
C:\Windows\SysWOW64\Eeqdep32.exeC:\Windows\system32\Eeqdep32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe33⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\Eecqjpee.exeC:\Windows\system32\Eecqjpee.exe34⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Elmigj32.exeC:\Windows\system32\Elmigj32.exe35⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Enkece32.exeC:\Windows\system32\Enkece32.exe36⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe38⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Ebinic32.exeC:\Windows\system32\Ebinic32.exe39⤵
- Executes dropped EXE
PID:1284 -
C:\Windows\SysWOW64\Fhffaj32.exeC:\Windows\system32\Fhffaj32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:2896 -
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe41⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\Faokjpfd.exeC:\Windows\system32\Faokjpfd.exe42⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Fnbkddem.exeC:\Windows\system32\Fnbkddem.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\Fpdhklkl.exeC:\Windows\system32\Fpdhklkl.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1868 -
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe45⤵
- Executes dropped EXE
PID:720 -
C:\Windows\SysWOW64\Filldb32.exeC:\Windows\system32\Filldb32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Facdeo32.exeC:\Windows\system32\Facdeo32.exe47⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\Fbdqmghm.exeC:\Windows\system32\Fbdqmghm.exe48⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\Ffpmnf32.exeC:\Windows\system32\Ffpmnf32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe50⤵
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe51⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Ffbicfoc.exeC:\Windows\system32\Ffbicfoc.exe52⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe53⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\SysWOW64\Globlmmj.exeC:\Windows\system32\Globlmmj.exe54⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Gbijhg32.exeC:\Windows\system32\Gbijhg32.exe55⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe56⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\Ghfbqn32.exeC:\Windows\system32\Ghfbqn32.exe57⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe59⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Gangic32.exeC:\Windows\system32\Gangic32.exe60⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe62⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Gobgcg32.exeC:\Windows\system32\Gobgcg32.exe63⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe64⤵
- Executes dropped EXE
PID:632 -
C:\Windows\SysWOW64\Gdopkn32.exeC:\Windows\system32\Gdopkn32.exe65⤵
- Executes dropped EXE
PID:1264 -
C:\Windows\SysWOW64\Ghkllmoi.exeC:\Windows\system32\Ghkllmoi.exe66⤵PID:924
-
C:\Windows\SysWOW64\Gkihhhnm.exeC:\Windows\system32\Gkihhhnm.exe67⤵PID:1820
-
C:\Windows\SysWOW64\Goddhg32.exeC:\Windows\system32\Goddhg32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:448 -
C:\Windows\SysWOW64\Gacpdbej.exeC:\Windows\system32\Gacpdbej.exe69⤵
- Modifies registry class
PID:488 -
C:\Windows\SysWOW64\Gdamqndn.exeC:\Windows\system32\Gdamqndn.exe70⤵PID:860
-
C:\Windows\SysWOW64\Ggpimica.exeC:\Windows\system32\Ggpimica.exe71⤵PID:2852
-
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe72⤵PID:2500
-
C:\Windows\SysWOW64\Gogangdc.exeC:\Windows\system32\Gogangdc.exe73⤵PID:1532
-
C:\Windows\SysWOW64\Gaemjbcg.exeC:\Windows\system32\Gaemjbcg.exe74⤵
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\Gddifnbk.exeC:\Windows\system32\Gddifnbk.exe75⤵
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Hknach32.exeC:\Windows\system32\Hknach32.exe76⤵PID:2720
-
C:\Windows\SysWOW64\Hmlnoc32.exeC:\Windows\system32\Hmlnoc32.exe77⤵PID:2932
-
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:588 -
C:\Windows\SysWOW64\Hdfflm32.exeC:\Windows\system32\Hdfflm32.exe79⤵PID:2508
-
C:\Windows\SysWOW64\Hgdbhi32.exeC:\Windows\system32\Hgdbhi32.exe80⤵PID:324
-
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe81⤵
- Modifies registry class
PID:864 -
C:\Windows\SysWOW64\Hlakpp32.exeC:\Windows\system32\Hlakpp32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\Hdhbam32.exeC:\Windows\system32\Hdhbam32.exe83⤵PID:1700
-
C:\Windows\SysWOW64\Hckcmjep.exeC:\Windows\system32\Hckcmjep.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:776 -
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2464 -
C:\Windows\SysWOW64\Hiekid32.exeC:\Windows\system32\Hiekid32.exe86⤵PID:2636
-
C:\Windows\SysWOW64\Hnagjbdf.exeC:\Windows\system32\Hnagjbdf.exe87⤵PID:2972
-
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe88⤵PID:2696
-
C:\Windows\SysWOW64\Hcnpbi32.exeC:\Windows\system32\Hcnpbi32.exe89⤵
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe90⤵PID:1444
-
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe91⤵
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe92⤵
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Hcplhi32.exeC:\Windows\system32\Hcplhi32.exe93⤵PID:2392
-
C:\Windows\SysWOW64\Henidd32.exeC:\Windows\system32\Henidd32.exe94⤵PID:2892
-
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe95⤵PID:1508
-
C:\Windows\SysWOW64\Hkkalk32.exeC:\Windows\system32\Hkkalk32.exe96⤵
- Drops file in System32 directory
PID:1336 -
C:\Windows\SysWOW64\Hogmmjfo.exeC:\Windows\system32\Hogmmjfo.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2640 -
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe98⤵PID:2504
-
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe99⤵PID:3000
-
C:\Windows\SysWOW64\Ihoafpmp.exeC:\Windows\system32\Ihoafpmp.exe100⤵PID:2560
-
C:\Windows\SysWOW64\Iknnbklc.exeC:\Windows\system32\Iknnbklc.exe101⤵
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\Inljnfkg.exeC:\Windows\system32\Inljnfkg.exe102⤵PID:3060
-
C:\Windows\SysWOW64\Idfbkq32.exeC:\Windows\system32\Idfbkq32.exe103⤵PID:1676
-
C:\Windows\SysWOW64\Ihankokm.exeC:\Windows\system32\Ihankokm.exe104⤵PID:2824
-
C:\Windows\SysWOW64\Ikpjgkjq.exeC:\Windows\system32\Ikpjgkjq.exe105⤵PID:2056
-
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2212 -
C:\Windows\SysWOW64\Iajcde32.exeC:\Windows\system32\Iajcde32.exe107⤵PID:2264
-
C:\Windows\SysWOW64\Idhopq32.exeC:\Windows\system32\Idhopq32.exe108⤵PID:2872
-
C:\Windows\SysWOW64\Iggkllpe.exeC:\Windows\system32\Iggkllpe.exe109⤵PID:2472
-
C:\Windows\SysWOW64\Inqcif32.exeC:\Windows\system32\Inqcif32.exe110⤵PID:1248
-
C:\Windows\SysWOW64\Iqopea32.exeC:\Windows\system32\Iqopea32.exe111⤵PID:2160
-
C:\Windows\SysWOW64\Idklfpon.exeC:\Windows\system32\Idklfpon.exe112⤵PID:2944
-
C:\Windows\SysWOW64\Igihbknb.exeC:\Windows\system32\Igihbknb.exe113⤵PID:1960
-
C:\Windows\SysWOW64\Ikddbj32.exeC:\Windows\system32\Ikddbj32.exe114⤵PID:984
-
C:\Windows\SysWOW64\Incpoe32.exeC:\Windows\system32\Incpoe32.exe115⤵PID:2248
-
C:\Windows\SysWOW64\Iqalka32.exeC:\Windows\system32\Iqalka32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:612 -
C:\Windows\SysWOW64\Idmhkpml.exeC:\Windows\system32\Idmhkpml.exe117⤵PID:1332
-
C:\Windows\SysWOW64\Igkdgk32.exeC:\Windows\system32\Igkdgk32.exe118⤵PID:2744
-
C:\Windows\SysWOW64\Ifnechbj.exeC:\Windows\system32\Ifnechbj.exe119⤵PID:2124
-
C:\Windows\SysWOW64\Jnemdecl.exeC:\Windows\system32\Jnemdecl.exe120⤵PID:1940
-
C:\Windows\SysWOW64\Jqdipqbp.exeC:\Windows\system32\Jqdipqbp.exe121⤵PID:1620
-
C:\Windows\SysWOW64\Jcbellac.exeC:\Windows\system32\Jcbellac.exe122⤵
- Drops file in System32 directory
PID:636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-