Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 07:39
Behavioral task
behavioral1
Sample
3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe
-
Size
565KB
-
MD5
3f2277041e9dcf1396fe1bc29d970fc0
-
SHA1
9db4e339ae85067c3abc4d00f0e0f57df66163d0
-
SHA256
3280a9aef5f6144579ecb718cec3a449f027c651e5e5c3f59beefc3794c949ab
-
SHA512
4c8ca818659c26716442d887fd45d85b42212437da694d865b149329074d948566d2014ecfd9a0d54a9eff44d640add2151d27805feef8ec0dffa0e54a429420
-
SSDEEP
12288:BPdh1QFcf6JFtuFjAh//+zrWAIAqWim/+zrWAI5KF8OX:nszDtuFjAh/mvFimm09OX
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Nenobfak.exeOkchhc32.exeFiaeoang.exeQfokbnip.exeEjkima32.exeIlqpdm32.exeKebgia32.exeHggomh32.exeMlgigdoh.exeHpbiommg.exeCjpqdp32.exeFaagpp32.exeKmaled32.exeFpngfgle.exeIeidmbcc.exePnlqnl32.exeAaobdjof.exeGnmgmbhb.exeOjkboo32.exeCpeofk32.exeEgdilkbf.exeKeednado.exeMbmjah32.exeQbbfopeg.exeEmeopn32.exeLpdbloof.exeDogefd32.exeDqelenlc.exeHellne32.exeHiknhbcg.exeLkppbl32.exeQpgpkcpp.exeEqpgol32.exeLchnnp32.exeOcimgp32.exeEkelld32.exeFbmcbbki.exeNpojdpef.exeFacdeo32.exeLhpfqama.exeNglfapnl.exeBbokmqie.exeDjmicm32.exeLeimip32.exePenfelgm.exeGlgaok32.exeBhahlj32.exeJdpndnei.exeLibicbma.exePbmmcq32.exeDqlafm32.exeJjjacf32.exeJicgpb32.exeMimbdhhb.exeJhljdm32.exeDkmmhf32.exeNefpnhlc.exeInngcfid.exeKkijmm32.exeBmkmdk32.exeBekkcljk.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nenobfak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okchhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiaeoang.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfokbnip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejkima32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ilqpdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kebgia32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hggomh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlgigdoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpbiommg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cjpqdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Faagpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmaled32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpngfgle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ieidmbcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnlqnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aaobdjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gnmgmbhb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojkboo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpeofk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Egdilkbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Keednado.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbmjah32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbbfopeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Emeopn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpdbloof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogefd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqelenlc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hellne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hiknhbcg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkppbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qpgpkcpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eqpgol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lchnnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ocimgp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekelld32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbmcbbki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npojdpef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Facdeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lhpfqama.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nglfapnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbokmqie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djmicm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leimip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Penfelgm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glgaok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhahlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdpndnei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libicbma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbmmcq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dqlafm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jjjacf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jicgpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mimbdhhb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhljdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkmmhf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nefpnhlc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inngcfid.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkijmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieidmbcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkmmhf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjjacf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmkmdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bekkcljk.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/2948-0-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2948-6-0x0000000000260000-0x00000000002A4000-memory.dmp family_berbew \Windows\SysWOW64\Kibjkgca.exe family_berbew C:\Windows\SysWOW64\Kdlkld32.exe family_berbew behavioral1/memory/3024-27-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Llccmb32.exe family_berbew behavioral1/memory/3024-40-0x0000000000350000-0x0000000000394000-memory.dmp family_berbew \Windows\SysWOW64\Ldqegd32.exe family_berbew behavioral1/memory/2740-54-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Ladeqhjd.exe family_berbew behavioral1/memory/2600-68-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Lchnnp32.exe family_berbew behavioral1/memory/2600-75-0x0000000000290000-0x00000000002D4000-memory.dmp family_berbew \Windows\SysWOW64\Mgfgdn32.exe family_berbew behavioral1/memory/2876-95-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Mhjpaf32.exe family_berbew behavioral1/memory/2420-109-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Mlgigdoh.exe family_berbew behavioral1/memory/2420-117-0x0000000000300000-0x0000000000344000-memory.dmp family_berbew behavioral1/memory/1984-124-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Mdcnlglc.exe family_berbew behavioral1/memory/2388-137-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Nnnojlpa.exe family_berbew behavioral1/memory/2772-156-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Nplkfgoe.exe family_berbew behavioral1/memory/1212-166-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Njgldmdc.exe family_berbew C:\Windows\SysWOW64\Nqqdag32.exe family_berbew behavioral1/memory/2812-194-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2016-193-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Nofabc32.exe family_berbew behavioral1/memory/2996-208-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew \Windows\SysWOW64\Ofbfdmeb.exe family_berbew behavioral1/memory/1504-222-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/1504-229-0x0000000000250000-0x0000000000294000-memory.dmp family_berbew C:\Windows\SysWOW64\Okoomd32.exe family_berbew behavioral1/memory/1900-237-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Obkdonic.exe family_berbew behavioral1/memory/1900-243-0x00000000002C0000-0x0000000000304000-memory.dmp family_berbew behavioral1/memory/1900-242-0x00000000002C0000-0x0000000000304000-memory.dmp family_berbew behavioral1/memory/1104-244-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Okchhc32.exe family_berbew behavioral1/memory/400-259-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Oqqapjnk.exe family_berbew behavioral1/memory/1996-266-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Ogjimd32.exe family_berbew behavioral1/memory/2272-280-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Oenifh32.exe family_berbew behavioral1/memory/1012-288-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Ojkboo32.exe family_berbew behavioral1/memory/1284-303-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Paejki32.exe family_berbew behavioral1/memory/2548-310-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Pipopl32.exe family_berbew behavioral1/memory/2548-319-0x00000000002A0000-0x00000000002E4000-memory.dmp family_berbew behavioral1/memory/892-321-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2548-320-0x00000000002A0000-0x00000000002E4000-memory.dmp family_berbew C:\Windows\SysWOW64\Paggai32.exe family_berbew behavioral1/memory/892-331-0x0000000000450000-0x0000000000494000-memory.dmp family_berbew behavioral1/memory/2332-332-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/892-330-0x0000000000450000-0x0000000000494000-memory.dmp family_berbew behavioral1/memory/3060-346-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew C:\Windows\SysWOW64\Ppmdbe32.exe family_berbew behavioral1/memory/1628-339-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Kibjkgca.exeKdlkld32.exeLlccmb32.exeLdqegd32.exeLadeqhjd.exeLchnnp32.exeMgfgdn32.exeMhjpaf32.exeMlgigdoh.exeMdcnlglc.exeNnnojlpa.exeNplkfgoe.exeNjgldmdc.exeNqqdag32.exeNofabc32.exeOfbfdmeb.exeOkoomd32.exeObkdonic.exeOkchhc32.exeOqqapjnk.exeOgjimd32.exeOenifh32.exeOjkboo32.exePaejki32.exePipopl32.exePaggai32.exePpmdbe32.exePlcdgfbo.exePbmmcq32.exePelipl32.exePndniaop.exePenfelgm.exeQbbfopeg.exeQljkhe32.exeQnigda32.exeAdeplhib.exeAmndem32.exeAjbdna32.exeAmpqjm32.exeAdjigg32.exeAigaon32.exeAlenki32.exeAbpfhcje.exeAiinen32.exeAoffmd32.exeAilkjmpo.exeBoiccdnf.exeBagpopmj.exeBhahlj32.exeBokphdld.exeBdhhqk32.exeBloqah32.exeBalijo32.exeBghabf32.exeBopicc32.exeBanepo32.exeBgknheej.exeBnefdp32.exeBdooajdc.exeCgmkmecg.exeCngcjo32.exeCpeofk32.exeCjndop32.exeCllpkl32.exepid process 3040 Kibjkgca.exe 3024 Kdlkld32.exe 2720 Llccmb32.exe 2740 Ldqegd32.exe 2600 Ladeqhjd.exe 2508 Lchnnp32.exe 2876 Mgfgdn32.exe 2420 Mhjpaf32.exe 1984 Mlgigdoh.exe 2388 Mdcnlglc.exe 2772 Nnnojlpa.exe 1212 Nplkfgoe.exe 2016 Njgldmdc.exe 2812 Nqqdag32.exe 2996 Nofabc32.exe 1504 Ofbfdmeb.exe 1900 Okoomd32.exe 1104 Obkdonic.exe 400 Okchhc32.exe 1996 Oqqapjnk.exe 2272 Ogjimd32.exe 1012 Oenifh32.exe 1284 Ojkboo32.exe 2548 Paejki32.exe 892 Pipopl32.exe 2332 Paggai32.exe 3060 Ppmdbe32.exe 2664 Plcdgfbo.exe 2608 Pbmmcq32.exe 2596 Pelipl32.exe 2504 Pndniaop.exe 2460 Penfelgm.exe 1672 Qbbfopeg.exe 1724 Qljkhe32.exe 2452 Qnigda32.exe 1892 Adeplhib.exe 1716 Amndem32.exe 2364 Ajbdna32.exe 2368 Ampqjm32.exe 2824 Adjigg32.exe 2884 Aigaon32.exe 2808 Alenki32.exe 3020 Abpfhcje.exe 852 Aiinen32.exe 2408 Aoffmd32.exe 1788 Ailkjmpo.exe 1072 Boiccdnf.exe 912 Bagpopmj.exe 2260 Bhahlj32.exe 2256 Bokphdld.exe 1412 Bdhhqk32.exe 2980 Bloqah32.exe 2932 Balijo32.exe 2676 Bghabf32.exe 2644 Bopicc32.exe 2464 Banepo32.exe 2864 Bgknheej.exe 2868 Bnefdp32.exe 1708 Bdooajdc.exe 1868 Cgmkmecg.exe 1652 Cngcjo32.exe 2372 Cpeofk32.exe 632 Cjndop32.exe 1208 Cllpkl32.exe -
Loads dropped DLL 64 IoCs
Processes:
3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exeKibjkgca.exeKdlkld32.exeLlccmb32.exeLdqegd32.exeLadeqhjd.exeLchnnp32.exeMgfgdn32.exeMhjpaf32.exeMlgigdoh.exeMdcnlglc.exeNnnojlpa.exeNplkfgoe.exeNjgldmdc.exeNqqdag32.exeNofabc32.exeOfbfdmeb.exeOkoomd32.exeObkdonic.exeOkchhc32.exeOqqapjnk.exeOgjimd32.exeOenifh32.exeOjkboo32.exePaejki32.exePipopl32.exePbiciana.exePpmdbe32.exePlcdgfbo.exePbmmcq32.exePelipl32.exePndniaop.exepid process 2948 3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe 2948 3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe 3040 Kibjkgca.exe 3040 Kibjkgca.exe 3024 Kdlkld32.exe 3024 Kdlkld32.exe 2720 Llccmb32.exe 2720 Llccmb32.exe 2740 Ldqegd32.exe 2740 Ldqegd32.exe 2600 Ladeqhjd.exe 2600 Ladeqhjd.exe 2508 Lchnnp32.exe 2508 Lchnnp32.exe 2876 Mgfgdn32.exe 2876 Mgfgdn32.exe 2420 Mhjpaf32.exe 2420 Mhjpaf32.exe 1984 Mlgigdoh.exe 1984 Mlgigdoh.exe 2388 Mdcnlglc.exe 2388 Mdcnlglc.exe 2772 Nnnojlpa.exe 2772 Nnnojlpa.exe 1212 Nplkfgoe.exe 1212 Nplkfgoe.exe 2016 Njgldmdc.exe 2016 Njgldmdc.exe 2812 Nqqdag32.exe 2812 Nqqdag32.exe 2996 Nofabc32.exe 2996 Nofabc32.exe 1504 Ofbfdmeb.exe 1504 Ofbfdmeb.exe 1900 Okoomd32.exe 1900 Okoomd32.exe 1104 Obkdonic.exe 1104 Obkdonic.exe 400 Okchhc32.exe 400 Okchhc32.exe 1996 Oqqapjnk.exe 1996 Oqqapjnk.exe 2272 Ogjimd32.exe 2272 Ogjimd32.exe 1012 Oenifh32.exe 1012 Oenifh32.exe 1284 Ojkboo32.exe 1284 Ojkboo32.exe 2548 Paejki32.exe 2548 Paejki32.exe 892 Pipopl32.exe 892 Pipopl32.exe 1628 Pbiciana.exe 1628 Pbiciana.exe 3060 Ppmdbe32.exe 3060 Ppmdbe32.exe 2664 Plcdgfbo.exe 2664 Plcdgfbo.exe 2608 Pbmmcq32.exe 2608 Pbmmcq32.exe 2596 Pelipl32.exe 2596 Pelipl32.exe 2504 Pndniaop.exe 2504 Pndniaop.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gfefiemq.exeIncpoe32.exeNcjqhmkm.exePjenhm32.exeBdgafdfp.exeCcahbp32.exeCeodnl32.exeCckace32.exeMaedhd32.exeFenmdm32.exeNdkmpe32.exeOjfaijcc.exeDdgjdk32.exeKkaiqk32.exeKpmlkp32.exeHacmcfge.exeAamfnkai.exeAjjcbpdd.exeHaiccald.exeOqqapjnk.exeHcifgjgc.exeJkdpanhg.exeLecgje32.exeNolhan32.exeEjkima32.exeQbbfopeg.exePqkmjh32.exeQedhdjnh.exeIoaifhid.exeKmgbdo32.exeMkklljmg.exeNjgldmdc.exeLckdanld.exeNglfapnl.exeOgblbo32.exeHoopae32.exeMpjqiq32.exeCjpqdp32.exePaejki32.exeBanepo32.exeJqfffqpm.exeKgpjanje.exeLbqabkql.exeDcenlceh.exeGebbnpfp.exeOenifh32.exeLphhenhc.exeIimjmbae.exeGdopkn32.exeOjolhk32.exeOcnfbo32.exeGdgcpi32.exeEjgcdb32.exeLkppbl32.exeAaobdjof.exeGnmgmbhb.exeHiknhbcg.exeJnpinc32.exeKfmjgeaj.exeNenobfak.exedescription ioc process File created C:\Windows\SysWOW64\Gicbeald.exe Gfefiemq.exe File created C:\Windows\SysWOW64\Bmoado32.dll Incpoe32.exe File opened for modification C:\Windows\SysWOW64\Namqci32.exe Ncjqhmkm.exe File created C:\Windows\SysWOW64\Oimpgolj.dll Pjenhm32.exe File created C:\Windows\SysWOW64\Pmbdhi32.dll Bdgafdfp.exe File created C:\Windows\SysWOW64\Ceodnl32.exe Ccahbp32.exe File created C:\Windows\SysWOW64\Cklmgb32.exe Ceodnl32.exe File created C:\Windows\SysWOW64\Mbiiek32.dll Cckace32.exe File opened for modification C:\Windows\SysWOW64\Mholen32.exe Maedhd32.exe File opened for modification C:\Windows\SysWOW64\Flgeqgog.exe Fenmdm32.exe File created C:\Windows\SysWOW64\Nkeelohh.exe Ndkmpe32.exe File created C:\Windows\SysWOW64\Nblnkb32.dll Ojfaijcc.exe File created C:\Windows\SysWOW64\Nnfbei32.dll Ddgjdk32.exe File opened for modification C:\Windows\SysWOW64\Kjdilgpc.exe Kkaiqk32.exe File created C:\Windows\SysWOW64\Mholen32.exe Maedhd32.exe File created C:\Windows\SysWOW64\Kfimidmd.dll Kpmlkp32.exe File created C:\Windows\SysWOW64\Hlhaqogk.exe Hacmcfge.exe File created C:\Windows\SysWOW64\Aidnohbk.exe Aamfnkai.exe File created C:\Windows\SysWOW64\Ncdbcl32.dll Ajjcbpdd.exe File opened for modification C:\Windows\SysWOW64\Hedocp32.exe Haiccald.exe File created C:\Windows\SysWOW64\Ogjimd32.exe Oqqapjnk.exe File opened for modification C:\Windows\SysWOW64\Hicodd32.exe Hcifgjgc.exe File created C:\Windows\SysWOW64\Jjpdcc32.dll Jkdpanhg.exe File created C:\Windows\SysWOW64\Lhbcfa32.exe Lecgje32.exe File created C:\Windows\SysWOW64\Nefpnhlc.exe Nolhan32.exe File created C:\Windows\SysWOW64\Enfenplo.exe Ejkima32.exe File created C:\Windows\SysWOW64\Cibcni32.dll Qbbfopeg.exe File opened for modification C:\Windows\SysWOW64\Pciifc32.exe Pqkmjh32.exe File created C:\Windows\SysWOW64\Amkpegnj.exe Qedhdjnh.exe File created C:\Windows\SysWOW64\Ifkacb32.exe Ioaifhid.exe File created C:\Windows\SysWOW64\Pbefefec.dll Kmgbdo32.exe File opened for modification C:\Windows\SysWOW64\Maedhd32.exe Mkklljmg.exe File created C:\Windows\SysWOW64\Damgbk32.dll Njgldmdc.exe File created C:\Windows\SysWOW64\Pfdjfphi.dll Lckdanld.exe File created C:\Windows\SysWOW64\Nkgbbo32.exe Nglfapnl.exe File created C:\Windows\SysWOW64\Ojahnj32.exe Ogblbo32.exe File created C:\Windows\SysWOW64\Mbnipnaf.dll Haiccald.exe File opened for modification C:\Windows\SysWOW64\Hanlnp32.exe Hoopae32.exe File opened for modification C:\Windows\SysWOW64\Ndemjoae.exe Mpjqiq32.exe File created C:\Windows\SysWOW64\Hkfmal32.dll Cjpqdp32.exe File created C:\Windows\SysWOW64\Bbdoqc32.dll Paejki32.exe File opened for modification C:\Windows\SysWOW64\Bgknheej.exe Banepo32.exe File opened for modification C:\Windows\SysWOW64\Jbgbni32.exe Jqfffqpm.exe File created C:\Windows\SysWOW64\Kmmcjehm.exe Kgpjanje.exe File created C:\Windows\SysWOW64\Bhhognbb.dll Lbqabkql.exe File opened for modification C:\Windows\SysWOW64\Ddgjdk32.exe Dcenlceh.exe File opened for modification C:\Windows\SysWOW64\Ginnnooi.exe Gebbnpfp.exe File created C:\Windows\SysWOW64\Cmmhnnlm.dll Oenifh32.exe File opened for modification C:\Windows\SysWOW64\Liplnc32.exe Lphhenhc.exe File created C:\Windows\SysWOW64\Mbbcbk32.dll Iimjmbae.exe File created C:\Windows\SysWOW64\Qhbpij32.dll Gdopkn32.exe File created C:\Windows\SysWOW64\Olmhdf32.exe Ojolhk32.exe File created C:\Windows\SysWOW64\Kmccegik.dll Ocnfbo32.exe File created C:\Windows\SysWOW64\Nkemkhcd.dll Pqkmjh32.exe File opened for modification C:\Windows\SysWOW64\Gnmgmbhb.exe Gdgcpi32.exe File created C:\Windows\SysWOW64\Hedocp32.exe Haiccald.exe File created C:\Windows\SysWOW64\Emeopn32.exe Ejgcdb32.exe File created C:\Windows\SysWOW64\Bqdgkecq.dll Lkppbl32.exe File opened for modification C:\Windows\SysWOW64\Ajhgmpfg.exe Aaobdjof.exe File created C:\Windows\SysWOW64\Ghelfg32.exe Gnmgmbhb.exe File created C:\Windows\SysWOW64\Nblihc32.dll Hiknhbcg.exe File created C:\Windows\SysWOW64\Jqnejn32.exe Jnpinc32.exe File opened for modification C:\Windows\SysWOW64\Kmgbdo32.exe Kfmjgeaj.exe File created C:\Windows\SysWOW64\Lamajm32.dll Nenobfak.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5740 5716 WerFault.exe Nlhgoqhh.exe -
Modifies registry class 64 IoCs
Processes:
Dndlim32.exeIchllgfb.exeJqdipqbp.exeKgkafo32.exeLgmcqkkh.exeLiplnc32.exeLibicbma.exeClcflkic.exeLjibgg32.exeMdpjlajk.exeOjcecjee.exePqkmjh32.exeIdhopq32.exeIkbgmj32.exeDogefd32.exeGljnej32.exeHeihnoph.exeLfpclh32.exeIkpjgkjq.exeJqfffqpm.exeJdpndnei.exeNqqdag32.exeDcknbh32.exeJbgbni32.exeKemejc32.exeMkclhl32.exeMlgigdoh.exeEgdilkbf.exeDjnpnc32.exeDcenlceh.exeIcjhagdp.exeGddifnbk.exeJjjacf32.exeEkelld32.exeFiglolbf.exeBghabf32.exeAfohaa32.exeOkikfagn.exeQpgpkcpp.exeOqkqkdne.exeOmbapedi.exeAnlmmp32.exeJmplcp32.exeMhhfdo32.exeNigome32.exeLecgje32.exePnomcl32.exeFebfomdd.exeNaimccpo.exeJjlnif32.exeLajhofao.exeKcfkfo32.exeMigbnb32.exeBgknheej.exeCjndop32.exeIfcbodli.exeEndhhp32.exeEnfenplo.exeHomclekn.exeOfbfdmeb.exeNdmjedoi.exeCkoilb32.exeIoaifhid.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eofjhkoj.dll" Dndlim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ichllgfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jqdipqbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kgkafo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lgmcqkkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olliabba.dll" Liplnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pecomlgc.dll" Libicbma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Clcflkic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ljibgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oincig32.dll" Mdpjlajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojcecjee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pqkmjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Idhopq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ikbgmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dogefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkdjlion.dll" Gljnej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Heihnoph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lfpclh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ongdpbkl.dll" Ikpjgkjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jqfffqpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jdpndnei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnebmi32.dll" Nqqdag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmqgncdn.dll" Dcknbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbgbni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kemejc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkclhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcopljni.dll" Mlgigdoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Egdilkbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Djnpnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dcenlceh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icjhagdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gddifnbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljdjcj32.dll" Jjjacf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekelld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Figlolbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbbhkqaj.dll" Bghabf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nemacb32.dll" Afohaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Okikfagn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qpgpkcpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oqkqkdne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ombapedi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Anlmmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Badffggh.dll" Jmplcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njfppiho.dll" Mhhfdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nigome32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lecgje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pnomcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhghcb32.dll" Febfomdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hljdna32.dll" Naimccpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jjlnif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijqnib32.dll" Lajhofao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kcfkfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Migbnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bgknheej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cjndop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ifcbodli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Endhhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imehcohk.dll" Enfenplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Homclekn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kedlancd.dll" Ofbfdmeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofbfdmeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gonahjjd.dll" Ndmjedoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmnlfg32.dll" Ckoilb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nookinfk.dll" Ioaifhid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exeKibjkgca.exeKdlkld32.exeLlccmb32.exeLdqegd32.exeLadeqhjd.exeLchnnp32.exeMgfgdn32.exeMhjpaf32.exeMlgigdoh.exeMdcnlglc.exeNnnojlpa.exeNplkfgoe.exeNjgldmdc.exeNqqdag32.exeNofabc32.exedescription pid process target process PID 2948 wrote to memory of 3040 2948 3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe Kibjkgca.exe PID 2948 wrote to memory of 3040 2948 3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe Kibjkgca.exe PID 2948 wrote to memory of 3040 2948 3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe Kibjkgca.exe PID 2948 wrote to memory of 3040 2948 3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe Kibjkgca.exe PID 3040 wrote to memory of 3024 3040 Kibjkgca.exe Kdlkld32.exe PID 3040 wrote to memory of 3024 3040 Kibjkgca.exe Kdlkld32.exe PID 3040 wrote to memory of 3024 3040 Kibjkgca.exe Kdlkld32.exe PID 3040 wrote to memory of 3024 3040 Kibjkgca.exe Kdlkld32.exe PID 3024 wrote to memory of 2720 3024 Kdlkld32.exe Llccmb32.exe PID 3024 wrote to memory of 2720 3024 Kdlkld32.exe Llccmb32.exe PID 3024 wrote to memory of 2720 3024 Kdlkld32.exe Llccmb32.exe PID 3024 wrote to memory of 2720 3024 Kdlkld32.exe Llccmb32.exe PID 2720 wrote to memory of 2740 2720 Llccmb32.exe Ldqegd32.exe PID 2720 wrote to memory of 2740 2720 Llccmb32.exe Ldqegd32.exe PID 2720 wrote to memory of 2740 2720 Llccmb32.exe Ldqegd32.exe PID 2720 wrote to memory of 2740 2720 Llccmb32.exe Ldqegd32.exe PID 2740 wrote to memory of 2600 2740 Ldqegd32.exe Ladeqhjd.exe PID 2740 wrote to memory of 2600 2740 Ldqegd32.exe Ladeqhjd.exe PID 2740 wrote to memory of 2600 2740 Ldqegd32.exe Ladeqhjd.exe PID 2740 wrote to memory of 2600 2740 Ldqegd32.exe Ladeqhjd.exe PID 2600 wrote to memory of 2508 2600 Ladeqhjd.exe Lchnnp32.exe PID 2600 wrote to memory of 2508 2600 Ladeqhjd.exe Lchnnp32.exe PID 2600 wrote to memory of 2508 2600 Ladeqhjd.exe Lchnnp32.exe PID 2600 wrote to memory of 2508 2600 Ladeqhjd.exe Lchnnp32.exe PID 2508 wrote to memory of 2876 2508 Lchnnp32.exe Mgfgdn32.exe PID 2508 wrote to memory of 2876 2508 Lchnnp32.exe Mgfgdn32.exe PID 2508 wrote to memory of 2876 2508 Lchnnp32.exe Mgfgdn32.exe PID 2508 wrote to memory of 2876 2508 Lchnnp32.exe Mgfgdn32.exe PID 2876 wrote to memory of 2420 2876 Mgfgdn32.exe Mhjpaf32.exe PID 2876 wrote to memory of 2420 2876 Mgfgdn32.exe Mhjpaf32.exe PID 2876 wrote to memory of 2420 2876 Mgfgdn32.exe Mhjpaf32.exe PID 2876 wrote to memory of 2420 2876 Mgfgdn32.exe Mhjpaf32.exe PID 2420 wrote to memory of 1984 2420 Mhjpaf32.exe Mlgigdoh.exe PID 2420 wrote to memory of 1984 2420 Mhjpaf32.exe Mlgigdoh.exe PID 2420 wrote to memory of 1984 2420 Mhjpaf32.exe Mlgigdoh.exe PID 2420 wrote to memory of 1984 2420 Mhjpaf32.exe Mlgigdoh.exe PID 1984 wrote to memory of 2388 1984 Mlgigdoh.exe Mdcnlglc.exe PID 1984 wrote to memory of 2388 1984 Mlgigdoh.exe Mdcnlglc.exe PID 1984 wrote to memory of 2388 1984 Mlgigdoh.exe Mdcnlglc.exe PID 1984 wrote to memory of 2388 1984 Mlgigdoh.exe Mdcnlglc.exe PID 2388 wrote to memory of 2772 2388 Mdcnlglc.exe Nnnojlpa.exe PID 2388 wrote to memory of 2772 2388 Mdcnlglc.exe Nnnojlpa.exe PID 2388 wrote to memory of 2772 2388 Mdcnlglc.exe Nnnojlpa.exe PID 2388 wrote to memory of 2772 2388 Mdcnlglc.exe Nnnojlpa.exe PID 2772 wrote to memory of 1212 2772 Nnnojlpa.exe Nplkfgoe.exe PID 2772 wrote to memory of 1212 2772 Nnnojlpa.exe Nplkfgoe.exe PID 2772 wrote to memory of 1212 2772 Nnnojlpa.exe Nplkfgoe.exe PID 2772 wrote to memory of 1212 2772 Nnnojlpa.exe Nplkfgoe.exe PID 1212 wrote to memory of 2016 1212 Nplkfgoe.exe Njgldmdc.exe PID 1212 wrote to memory of 2016 1212 Nplkfgoe.exe Njgldmdc.exe PID 1212 wrote to memory of 2016 1212 Nplkfgoe.exe Njgldmdc.exe PID 1212 wrote to memory of 2016 1212 Nplkfgoe.exe Njgldmdc.exe PID 2016 wrote to memory of 2812 2016 Njgldmdc.exe Nqqdag32.exe PID 2016 wrote to memory of 2812 2016 Njgldmdc.exe Nqqdag32.exe PID 2016 wrote to memory of 2812 2016 Njgldmdc.exe Nqqdag32.exe PID 2016 wrote to memory of 2812 2016 Njgldmdc.exe Nqqdag32.exe PID 2812 wrote to memory of 2996 2812 Nqqdag32.exe Nofabc32.exe PID 2812 wrote to memory of 2996 2812 Nqqdag32.exe Nofabc32.exe PID 2812 wrote to memory of 2996 2812 Nqqdag32.exe Nofabc32.exe PID 2812 wrote to memory of 2996 2812 Nqqdag32.exe Nofabc32.exe PID 2996 wrote to memory of 1504 2996 Nofabc32.exe Ofbfdmeb.exe PID 2996 wrote to memory of 1504 2996 Nofabc32.exe Ofbfdmeb.exe PID 2996 wrote to memory of 1504 2996 Nofabc32.exe Ofbfdmeb.exe PID 2996 wrote to memory of 1504 2996 Nofabc32.exe Ofbfdmeb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3f2277041e9dcf1396fe1bc29d970fc0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\Kibjkgca.exeC:\Windows\system32\Kibjkgca.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\Kdlkld32.exeC:\Windows\system32\Kdlkld32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Llccmb32.exeC:\Windows\system32\Llccmb32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Ldqegd32.exeC:\Windows\system32\Ldqegd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Ladeqhjd.exeC:\Windows\system32\Ladeqhjd.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Lchnnp32.exeC:\Windows\system32\Lchnnp32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Mgfgdn32.exeC:\Windows\system32\Mgfgdn32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\Mhjpaf32.exeC:\Windows\system32\Mhjpaf32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\Mlgigdoh.exeC:\Windows\system32\Mlgigdoh.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Mdcnlglc.exeC:\Windows\system32\Mdcnlglc.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Nnnojlpa.exeC:\Windows\system32\Nnnojlpa.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Nplkfgoe.exeC:\Windows\system32\Nplkfgoe.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Njgldmdc.exeC:\Windows\system32\Njgldmdc.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\Nqqdag32.exeC:\Windows\system32\Nqqdag32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\Nofabc32.exeC:\Windows\system32\Nofabc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Ofbfdmeb.exeC:\Windows\system32\Ofbfdmeb.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1504 -
C:\Windows\SysWOW64\Okoomd32.exeC:\Windows\system32\Okoomd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900 -
C:\Windows\SysWOW64\Obkdonic.exeC:\Windows\system32\Obkdonic.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1104 -
C:\Windows\SysWOW64\Okchhc32.exeC:\Windows\system32\Okchhc32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:400 -
C:\Windows\SysWOW64\Oqqapjnk.exeC:\Windows\system32\Oqqapjnk.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\Ogjimd32.exeC:\Windows\system32\Ogjimd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Windows\SysWOW64\Oenifh32.exeC:\Windows\system32\Oenifh32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1012 -
C:\Windows\SysWOW64\Ojkboo32.exeC:\Windows\system32\Ojkboo32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1284 -
C:\Windows\SysWOW64\Paejki32.exeC:\Windows\system32\Paejki32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\Pipopl32.exeC:\Windows\system32\Pipopl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Windows\SysWOW64\Paggai32.exeC:\Windows\system32\Paggai32.exe27⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Pbiciana.exeC:\Windows\system32\Pbiciana.exe28⤵
- Loads dropped DLL
PID:1628 -
C:\Windows\SysWOW64\Ppmdbe32.exeC:\Windows\system32\Ppmdbe32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\Plcdgfbo.exeC:\Windows\system32\Plcdgfbo.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Windows\SysWOW64\Pbmmcq32.exeC:\Windows\system32\Pbmmcq32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2608 -
C:\Windows\SysWOW64\Pelipl32.exeC:\Windows\system32\Pelipl32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596 -
C:\Windows\SysWOW64\Pndniaop.exeC:\Windows\system32\Pndniaop.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2504 -
C:\Windows\SysWOW64\Penfelgm.exeC:\Windows\system32\Penfelgm.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Qbbfopeg.exeC:\Windows\system32\Qbbfopeg.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\Qljkhe32.exeC:\Windows\system32\Qljkhe32.exe36⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Qnigda32.exeC:\Windows\system32\Qnigda32.exe37⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe38⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Amndem32.exeC:\Windows\system32\Amndem32.exe39⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\Ajbdna32.exeC:\Windows\system32\Ajbdna32.exe40⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Ampqjm32.exeC:\Windows\system32\Ampqjm32.exe41⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Adjigg32.exeC:\Windows\system32\Adjigg32.exe42⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Aigaon32.exeC:\Windows\system32\Aigaon32.exe43⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\Alenki32.exeC:\Windows\system32\Alenki32.exe44⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Abpfhcje.exeC:\Windows\system32\Abpfhcje.exe45⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\Aiinen32.exeC:\Windows\system32\Aiinen32.exe46⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\Aoffmd32.exeC:\Windows\system32\Aoffmd32.exe47⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\Ailkjmpo.exeC:\Windows\system32\Ailkjmpo.exe48⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe49⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\SysWOW64\Bagpopmj.exeC:\Windows\system32\Bagpopmj.exe50⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\Bhahlj32.exeC:\Windows\system32\Bhahlj32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Bokphdld.exeC:\Windows\system32\Bokphdld.exe52⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\Bdhhqk32.exeC:\Windows\system32\Bdhhqk32.exe53⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\Bloqah32.exeC:\Windows\system32\Bloqah32.exe54⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Balijo32.exeC:\Windows\system32\Balijo32.exe55⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Bopicc32.exeC:\Windows\system32\Bopicc32.exe57⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\Banepo32.exeC:\Windows\system32\Banepo32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Bgknheej.exeC:\Windows\system32\Bgknheej.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2864 -
C:\Windows\SysWOW64\Bnefdp32.exeC:\Windows\system32\Bnefdp32.exe60⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\Bdooajdc.exeC:\Windows\system32\Bdooajdc.exe61⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Cgmkmecg.exeC:\Windows\system32\Cgmkmecg.exe62⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\Cngcjo32.exeC:\Windows\system32\Cngcjo32.exe63⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Cpeofk32.exeC:\Windows\system32\Cpeofk32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2372 -
C:\Windows\SysWOW64\Cjndop32.exeC:\Windows\system32\Cjndop32.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:632 -
C:\Windows\SysWOW64\Cllpkl32.exeC:\Windows\system32\Cllpkl32.exe66⤵
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe67⤵PID:1176
-
C:\Windows\SysWOW64\Cjpqdp32.exeC:\Windows\system32\Cjpqdp32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1120 -
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe69⤵PID:920
-
C:\Windows\SysWOW64\Cjbmjplb.exeC:\Windows\system32\Cjbmjplb.exe70⤵PID:544
-
C:\Windows\SysWOW64\Ckdjbh32.exeC:\Windows\system32\Ckdjbh32.exe71⤵PID:1792
-
C:\Windows\SysWOW64\Cckace32.exeC:\Windows\system32\Cckace32.exe72⤵
- Drops file in System32 directory
PID:1796 -
C:\Windows\SysWOW64\Clcflkic.exeC:\Windows\system32\Clcflkic.exe73⤵
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe74⤵PID:2848
-
C:\Windows\SysWOW64\Dflkdp32.exeC:\Windows\system32\Dflkdp32.exe75⤵PID:1620
-
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe76⤵PID:2920
-
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe77⤵PID:1352
-
C:\Windows\SysWOW64\Dqelenlc.exeC:\Windows\system32\Dqelenlc.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2232 -
C:\Windows\SysWOW64\Djnpnc32.exeC:\Windows\system32\Djnpnc32.exe79⤵
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\Dcfdgiid.exeC:\Windows\system32\Dcfdgiid.exe80⤵PID:1640
-
C:\Windows\SysWOW64\Dkmmhf32.exeC:\Windows\system32\Dkmmhf32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1976 -
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe82⤵PID:1820
-
C:\Windows\SysWOW64\Dgdmmgpj.exeC:\Windows\system32\Dgdmmgpj.exe83⤵PID:1520
-
C:\Windows\SysWOW64\Dnneja32.exeC:\Windows\system32\Dnneja32.exe84⤵PID:1172
-
C:\Windows\SysWOW64\Dqlafm32.exeC:\Windows\system32\Dqlafm32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1268 -
C:\Windows\SysWOW64\Dcknbh32.exeC:\Windows\system32\Dcknbh32.exe86⤵
- Modifies registry class
PID:1836 -
C:\Windows\SysWOW64\Emcbkn32.exeC:\Windows\system32\Emcbkn32.exe87⤵PID:1572
-
C:\Windows\SysWOW64\Epaogi32.exeC:\Windows\system32\Epaogi32.exe88⤵PID:748
-
C:\Windows\SysWOW64\Ejgcdb32.exeC:\Windows\system32\Ejgcdb32.exe89⤵
- Drops file in System32 directory
PID:1320 -
C:\Windows\SysWOW64\Emeopn32.exeC:\Windows\system32\Emeopn32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2916 -
C:\Windows\SysWOW64\Ecpgmhai.exeC:\Windows\system32\Ecpgmhai.exe91⤵PID:2708
-
C:\Windows\SysWOW64\Eilpeooq.exeC:\Windows\system32\Eilpeooq.exe92⤵PID:2992
-
C:\Windows\SysWOW64\Epfhbign.exeC:\Windows\system32\Epfhbign.exe93⤵PID:2636
-
C:\Windows\SysWOW64\Efppoc32.exeC:\Windows\system32\Efppoc32.exe94⤵PID:2512
-
C:\Windows\SysWOW64\Elmigj32.exeC:\Windows\system32\Elmigj32.exe95⤵PID:1756
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe96⤵PID:2648
-
C:\Windows\SysWOW64\Eajaoq32.exeC:\Windows\system32\Eajaoq32.exe97⤵PID:1548
-
C:\Windows\SysWOW64\Egdilkbf.exeC:\Windows\system32\Egdilkbf.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2816 -
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe99⤵PID:1512
-
C:\Windows\SysWOW64\Fehjeo32.exeC:\Windows\system32\Fehjeo32.exe100⤵PID:928
-
C:\Windows\SysWOW64\Flabbihl.exeC:\Windows\system32\Flabbihl.exe101⤵PID:1000
-
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe102⤵PID:344
-
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe103⤵PID:1692
-
C:\Windows\SysWOW64\Fjgoce32.exeC:\Windows\system32\Fjgoce32.exe104⤵PID:2132
-
C:\Windows\SysWOW64\Faagpp32.exeC:\Windows\system32\Faagpp32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1524 -
C:\Windows\SysWOW64\Fhkpmjln.exeC:\Windows\system32\Fhkpmjln.exe106⤵PID:1904
-
C:\Windows\SysWOW64\Facdeo32.exeC:\Windows\system32\Facdeo32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1728 -
C:\Windows\SysWOW64\Fbdqmghm.exeC:\Windows\system32\Fbdqmghm.exe108⤵PID:2716
-
C:\Windows\SysWOW64\Fioija32.exeC:\Windows\system32\Fioija32.exe109⤵PID:2520
-
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe110⤵PID:2236
-
C:\Windows\SysWOW64\Ffbicfoc.exeC:\Windows\system32\Ffbicfoc.exe111⤵PID:2532
-
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1864 -
C:\Windows\SysWOW64\Gpknlk32.exeC:\Windows\system32\Gpknlk32.exe113⤵PID:360
-
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe114⤵
- Drops file in System32 directory
PID:1448 -
C:\Windows\SysWOW64\Gicbeald.exeC:\Windows\system32\Gicbeald.exe115⤵PID:2300
-
C:\Windows\SysWOW64\Gpmjak32.exeC:\Windows\system32\Gpmjak32.exe116⤵PID:2552
-
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe117⤵PID:280
-
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe118⤵PID:2012
-
C:\Windows\SysWOW64\Gaqcoc32.exeC:\Windows\system32\Gaqcoc32.exe119⤵PID:1680
-
C:\Windows\SysWOW64\Gdopkn32.exeC:\Windows\system32\Gdopkn32.exe120⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Goddhg32.exeC:\Windows\system32\Goddhg32.exe121⤵PID:1616
-
C:\Windows\SysWOW64\Gacpdbej.exeC:\Windows\system32\Gacpdbej.exe122⤵PID:2480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-