Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:58
Behavioral task
behavioral1
Sample
5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe
-
Size
94KB
-
MD5
5d6e9ecebaa07acfd4221c417a3534c0
-
SHA1
2c04cb2561b07f4608af3cddc9670e98b41bce81
-
SHA256
652245e435118aa1cf279ec10811a7d8de742ad17df62d116af11708569f2c15
-
SHA512
4b783274f35c266c5ffc096a8f9724c74f38d512167743631d9f1d05c7923db107e7f0dfeeb37bf301ef7c278294e91ff86293472b164e13e888378ea16ef281
-
SSDEEP
1536:x2zUczsk5K8/BDtBRSWfLPHq39KUIC0uGmVJHQj1BEsCOyiKbZ9rQJg:x6U0skg8/xkWfjH6KU90uGimj1ieybvN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Iogopi32.exeNfgklkoc.exeNqoloc32.exeQbonoghb.exeCdjblf32.exeJejbhk32.exeGbbajjlp.exeLhgdmb32.exeMhoahh32.exePfccogfc.exeCdaile32.exeLklnconj.exeMllccpfj.exeBlnjecfl.exeIpkdek32.exeJblmgf32.exeGnohnffc.exeMkgmoncl.exeBnlhncgi.exeFecadghc.exeEcbeip32.exeKalcik32.exeAfeban32.exeCpqlfa32.exeAmkhmoap.exeBigbmpco.exeQfjcep32.exeDedkogqm.exeDinael32.exeFqbeoc32.exePcbdcf32.exeIccpniqp.exeAmnebo32.exeDnljkk32.exeEafbmgad.exeDdcogo32.exeJbojlfdp.exeOjemig32.exeGbiockdj.exeKheekkjl.exeNbbnbemf.exeQhhpop32.exeMdbnmbhj.exeAflpkpjm.exeFbbicl32.exeAbcgjg32.exePfhmjf32.exeHccggl32.exeIjbbfc32.exeBacjdbch.exeHbldphde.exeQjhbfd32.exeKoljgppp.exeBfaigclq.exeEgpnooan.exeKdhbpf32.exeKcmfnd32.exeFncibg32.exeFglnkm32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iogopi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfgklkoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqoloc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qbonoghb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdjblf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jejbhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbbajjlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbbajjlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhgdmb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhoahh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfccogfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdaile32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lklnconj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mllccpfj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blnjecfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipkdek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jblmgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnohnffc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkgmoncl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnlhncgi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fecadghc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecbeip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kalcik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afeban32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpqlfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amkhmoap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bigbmpco.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfjcep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dedkogqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dinael32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqbeoc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcbdcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfccogfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iccpniqp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amnebo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnljkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eafbmgad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddcogo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbojlfdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojemig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbiockdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kheekkjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbbnbemf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhhpop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fecadghc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdbnmbhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aflpkpjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbbicl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abcgjg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfgklkoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfhmjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hccggl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijbbfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bacjdbch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbldphde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjhbfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koljgppp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfaigclq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egpnooan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdhbpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbldphde.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcmfnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fncibg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fglnkm32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral2/memory/1600-0-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Pfandnla.exe family_berbew behavioral2/memory/4428-8-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Pplobcpp.exe family_berbew behavioral2/memory/1488-16-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Pdjgha32.exe family_berbew behavioral2/memory/1288-24-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Qhhpop32.exe family_berbew behavioral2/memory/1004-32-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Akkffkhk.exe family_berbew behavioral2/memory/3060-40-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Aknbkjfh.exe family_berbew behavioral2/memory/1092-48-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Aajhndkb.exe family_berbew behavioral2/memory/2204-56-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Agimkk32.exe family_berbew behavioral2/memory/936-64-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Bpdnjple.exe family_berbew behavioral2/memory/4760-72-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Bacjdbch.exe family_berbew behavioral2/memory/4328-80-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Baegibae.exe family_berbew behavioral2/memory/1596-89-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Bnlhncgi.exe family_berbew behavioral2/memory/4140-96-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Cpmapodj.exe family_berbew behavioral2/memory/2544-104-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Cnaaib32.exe family_berbew behavioral2/memory/4256-112-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Enfckp32.exe family_berbew behavioral2/memory/1436-121-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Fqppci32.exe family_berbew behavioral2/memory/4960-129-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Fdnhih32.exe family_berbew behavioral2/memory/4828-136-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Fbbicl32.exe family_berbew behavioral2/memory/2684-144-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Fgoakc32.exe family_berbew behavioral2/memory/2236-152-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Fecadghc.exe family_berbew C:\Windows\SysWOW64\Fajbjh32.exe family_berbew behavioral2/memory/3748-160-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/4092-168-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Gbiockdj.exe family_berbew behavioral2/memory/636-176-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Gejhef32.exe family_berbew behavioral2/memory/4980-187-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Gihpkd32.exe family_berbew behavioral2/memory/3920-193-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Gbbajjlp.exe family_berbew behavioral2/memory/2184-200-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hahokfag.exe family_berbew behavioral2/memory/2872-209-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hnlodjpa.exe family_berbew behavioral2/memory/3808-217-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hnnljj32.exe family_berbew behavioral2/memory/1948-224-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hbldphde.exe family_berbew behavioral2/memory/388-233-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral2/memory/4460-241-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hnbeeiji.exe family_berbew C:\Windows\SysWOW64\Ilfennic.exe family_berbew behavioral2/memory/728-248-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Iogopi32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Pfandnla.exePplobcpp.exePdjgha32.exeQhhpop32.exeAkkffkhk.exeAknbkjfh.exeAajhndkb.exeAgimkk32.exeBpdnjple.exeBacjdbch.exeBaegibae.exeBnlhncgi.exeCpmapodj.exeCnaaib32.exeEnfckp32.exeFqppci32.exeFdnhih32.exeFbbicl32.exeFgoakc32.exeFecadghc.exeFajbjh32.exeGbiockdj.exeGejhef32.exeGihpkd32.exeGbbajjlp.exeHahokfag.exeHnlodjpa.exeHnnljj32.exeHbldphde.exeHnbeeiji.exeIlfennic.exeIogopi32.exeIlkoim32.exeIpihpkkd.exeIpkdek32.exeJblmgf32.exeJbojlfdp.exeJlikkkhn.exeKheekkjl.exeKcmfnd32.exeKhiofk32.exeLakfeodm.exeLfiokmkc.exeMhoahh32.exeMhanngbl.exeMcfbkpab.exeNfgklkoc.exeNfihbk32.exeNqoloc32.exeNcpeaoih.exeNmjfodne.exeOqhoeb32.exeOonlfo32.exeOjemig32.exePcbkml32.exePfccogfc.exePmmlla32.exePmphaaln.exePfhmjf32.exeQbonoghb.exeQmdblp32.exeQjhbfd32.exeAbcgjg32.exeAmikgpcc.exepid process 4428 Pfandnla.exe 1488 Pplobcpp.exe 1288 Pdjgha32.exe 1004 Qhhpop32.exe 3060 Akkffkhk.exe 1092 Aknbkjfh.exe 2204 Aajhndkb.exe 936 Agimkk32.exe 4760 Bpdnjple.exe 4328 Bacjdbch.exe 1596 Baegibae.exe 4140 Bnlhncgi.exe 2544 Cpmapodj.exe 4256 Cnaaib32.exe 1436 Enfckp32.exe 4960 Fqppci32.exe 4828 Fdnhih32.exe 2684 Fbbicl32.exe 2236 Fgoakc32.exe 3748 Fecadghc.exe 4092 Fajbjh32.exe 636 Gbiockdj.exe 4980 Gejhef32.exe 3920 Gihpkd32.exe 2184 Gbbajjlp.exe 2872 Hahokfag.exe 3808 Hnlodjpa.exe 1948 Hnnljj32.exe 388 Hbldphde.exe 4460 Hnbeeiji.exe 728 Ilfennic.exe 2244 Iogopi32.exe 448 Ilkoim32.exe 384 Ipihpkkd.exe 3336 Ipkdek32.exe 3520 Jblmgf32.exe 2884 Jbojlfdp.exe 3752 Jlikkkhn.exe 3320 Kheekkjl.exe 1384 Kcmfnd32.exe 4184 Khiofk32.exe 3912 Lakfeodm.exe 904 Lfiokmkc.exe 4640 Mhoahh32.exe 2140 Mhanngbl.exe 620 Mcfbkpab.exe 220 Nfgklkoc.exe 3524 Nfihbk32.exe 4396 Nqoloc32.exe 3636 Ncpeaoih.exe 4296 Nmjfodne.exe 4492 Oqhoeb32.exe 4508 Oonlfo32.exe 2856 Ojemig32.exe 1536 Pcbkml32.exe 3600 Pfccogfc.exe 2876 Pmmlla32.exe 4260 Pmphaaln.exe 1188 Pfhmjf32.exe 3744 Qbonoghb.exe 4596 Qmdblp32.exe 2368 Qjhbfd32.exe 4968 Abcgjg32.exe 3164 Amikgpcc.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fglnkm32.exeFdpnda32.exeJnbgaa32.exePiolkm32.exeBfaigclq.exeDinael32.exeMhanngbl.exeLlpchaqg.exeBikeni32.exeCehlcikj.exePplobcpp.exeCpmapodj.exeEnhifi32.exeJogqlpde.exeMafofggd.exeGbbajjlp.exePfccogfc.exeGkefmjcj.exeKahinkaf.exeLamlphoo.exe5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exeBacjdbch.exeMekdffee.exeNchhfild.exeHbldphde.exeOonlfo32.exeBiiobo32.exePdjgha32.exeAmnebo32.exeDjegekil.exePdqcenmg.exeBldgoeog.exeFajbjh32.exeJblmgf32.exeBbaclegm.exeBpedeiff.exeCdjblf32.exeDpmcmf32.exeEafbmgad.exeJhoeef32.exeQbonoghb.exeBboffejp.exeGbbkocid.exeMedglemj.exeAkihcfid.exeNmjfodne.exeKopcbo32.exeHnnljj32.exeAbcgjg32.exeBnlhncgi.exeGqpapacd.exeQhhpop32.exeKdhbpf32.exeCibkohef.exeDdqbbo32.exeIlkoim32.exeIpkdek32.exedescription ioc process File created C:\Windows\SysWOW64\Bejceb32.dll Fglnkm32.exe File created C:\Windows\SysWOW64\Gnohnffc.exe Fdpnda32.exe File opened for modification C:\Windows\SysWOW64\Jacpcl32.exe Jnbgaa32.exe File opened for modification C:\Windows\SysWOW64\Poidhg32.exe Piolkm32.exe File opened for modification C:\Windows\SysWOW64\Cgfbbb32.exe Bfaigclq.exe File created C:\Windows\SysWOW64\Dnljkk32.exe Dinael32.exe File opened for modification C:\Windows\SysWOW64\Mcfbkpab.exe Mhanngbl.exe File created C:\Windows\SysWOW64\Lamlphoo.exe Llpchaqg.exe File created C:\Windows\SysWOW64\Bpgjpb32.exe Bikeni32.exe File created C:\Windows\SysWOW64\Nkeoha32.dll Bikeni32.exe File opened for modification C:\Windows\SysWOW64\Cbmlmmjd.exe Cehlcikj.exe File created C:\Windows\SysWOW64\Lmnbjama.dll Pplobcpp.exe File opened for modification C:\Windows\SysWOW64\Cnaaib32.exe Cpmapodj.exe File opened for modification C:\Windows\SysWOW64\Egpnooan.exe Enhifi32.exe File opened for modification C:\Windows\SysWOW64\Jhoeef32.exe Jogqlpde.exe File created C:\Windows\SysWOW64\Mllccpfj.exe Mafofggd.exe File created C:\Windows\SysWOW64\Ccegac32.dll Gbbajjlp.exe File created C:\Windows\SysWOW64\Pfgbakef.dll Pfccogfc.exe File opened for modification C:\Windows\SysWOW64\Gqbneq32.exe Gkefmjcj.exe File created C:\Windows\SysWOW64\Koljgppp.exe Kahinkaf.exe File opened for modification C:\Windows\SysWOW64\Koljgppp.exe Kahinkaf.exe File created C:\Windows\SysWOW64\Lhgdmb32.exe Lamlphoo.exe File created C:\Windows\SysWOW64\Pfandnla.exe 5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Baegibae.exe Bacjdbch.exe File created C:\Windows\SysWOW64\Eoggpbpn.dll Mekdffee.exe File created C:\Windows\SysWOW64\Jfbnnelf.dll Nchhfild.exe File opened for modification C:\Windows\SysWOW64\Bpgjpb32.exe Bikeni32.exe File opened for modification C:\Windows\SysWOW64\Hnbeeiji.exe Hbldphde.exe File created C:\Windows\SysWOW64\Ojemig32.exe Oonlfo32.exe File opened for modification C:\Windows\SysWOW64\Bbaclegm.exe Biiobo32.exe File opened for modification C:\Windows\SysWOW64\Qhhpop32.exe Pdjgha32.exe File opened for modification C:\Windows\SysWOW64\Ampaho32.exe Amnebo32.exe File opened for modification C:\Windows\SysWOW64\Dgihop32.exe Djegekil.exe File created C:\Windows\SysWOW64\Pcbdcf32.exe Pdqcenmg.exe File created C:\Windows\SysWOW64\Bemlhj32.exe Bldgoeog.exe File created C:\Windows\SysWOW64\Bbdcakkc.dll Fajbjh32.exe File created C:\Windows\SysWOW64\Dbkqqe32.dll Jblmgf32.exe File opened for modification C:\Windows\SysWOW64\Bpedeiff.exe Bbaclegm.exe File opened for modification C:\Windows\SysWOW64\Binhnomg.exe Bpedeiff.exe File created C:\Windows\SysWOW64\Nepmal32.dll Cdjblf32.exe File opened for modification C:\Windows\SysWOW64\Djegekil.exe Dpmcmf32.exe File opened for modification C:\Windows\SysWOW64\Enlcahgh.exe Eafbmgad.exe File opened for modification C:\Windows\SysWOW64\Kahinkaf.exe Jhoeef32.exe File created C:\Windows\SysWOW64\Qmdblp32.exe Qbonoghb.exe File created C:\Windows\SysWOW64\Eknphfld.dll Bboffejp.exe File created C:\Windows\SysWOW64\Ljnakk32.dll Jhoeef32.exe File created C:\Windows\SysWOW64\Hccggl32.exe Gbbkocid.exe File created C:\Windows\SysWOW64\Ffmnibme.dll Medglemj.exe File created C:\Windows\SysWOW64\Dqjhif32.dll Akihcfid.exe File created C:\Windows\SysWOW64\Mckmcadl.dll Nmjfodne.exe File created C:\Windows\SysWOW64\Egpnooan.exe Enhifi32.exe File created C:\Windows\SysWOW64\Kocphojh.exe Kopcbo32.exe File opened for modification C:\Windows\SysWOW64\Hbldphde.exe Hnnljj32.exe File created C:\Windows\SysWOW64\Defgao32.dll Abcgjg32.exe File created C:\Windows\SysWOW64\Cpmapodj.exe Bnlhncgi.exe File created C:\Windows\SysWOW64\Gkefmjcj.exe Gqpapacd.exe File created C:\Windows\SysWOW64\Bpcaaeme.dll Qhhpop32.exe File opened for modification C:\Windows\SysWOW64\Lhgdmb32.exe Lamlphoo.exe File created C:\Windows\SysWOW64\Bbaclegm.exe Biiobo32.exe File created C:\Windows\SysWOW64\Kalcik32.exe Kdhbpf32.exe File created C:\Windows\SysWOW64\Ndfchkio.dll Cibkohef.exe File created C:\Windows\SysWOW64\Ddcogo32.exe Ddqbbo32.exe File created C:\Windows\SysWOW64\Ipihpkkd.exe Ilkoim32.exe File opened for modification C:\Windows\SysWOW64\Jblmgf32.exe Ipkdek32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5264 6916 WerFault.exe Dbkhnk32.exe -
Modifies registry class 64 IoCs
Processes:
Jbojlfdp.exeOjemig32.exeBfabmmhe.exeHahokfag.exeKhkdad32.exeHeepfn32.exePplobcpp.exeBaegibae.exeGejhef32.exeMhanngbl.exePfccogfc.exeBfaigclq.exeFglnkm32.exeJhoeef32.exeAbcgjg32.exeDpmcmf32.exeBnlhncgi.exeCdjblf32.exeKoljgppp.exeBfhofnpp.exeQfgfpp32.exeKcmfnd32.exePcbkml32.exeBinhnomg.exeFqbeoc32.exeJejbhk32.exeJnbgaa32.exeNhgmcp32.exePiolkm32.exeFecadghc.exeDgihop32.exeIjbbfc32.exeKahinkaf.exeKopcbo32.exePmmlla32.exeJogqlpde.exeAkkffkhk.exeGbiockdj.exeDnljkk32.exeCdaile32.exeLlpchaqg.exeLhgdmb32.exeMkgmoncl.exeAimhmkgn.exeBacjdbch.exeQfjcep32.exeDdqbbo32.exeCbmlmmjd.exeHnlodjpa.exeAmpaho32.exeFdpnda32.exeHalaloif.exeBpbpecen.exeAdjjeieh.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbojlfdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojemig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipekmlhg.dll" Bfabmmhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hahokfag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khkdad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pddlig32.dll" Heepfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmnbjama.dll" Pplobcpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baegibae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gejhef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhanngbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfccogfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfaigclq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bejceb32.dll" Fglnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jhoeef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abcgjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikpndppf.dll" Dpmcmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eehnaq32.dll" Bnlhncgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdjblf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koljgppp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfhofnpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qfgfpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcmfnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chjjqebm.dll" Pcbkml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nodeaima.dll" Binhnomg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gokfdpdo.dll" Fqbeoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jejbhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elmoqj32.dll" Jnbgaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhgmcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Piolkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlhbih32.dll" Fecadghc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Defgao32.dll" Abcgjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcidlo32.dll" Bfaigclq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfbhcl32.dll" Dgihop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijbbfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kahinkaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkjbah32.dll" Kopcbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlmadjhb.dll" Pmmlla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jogqlpde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kopcbo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akkffkhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngckdnpn.dll" Gbiockdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bailkjga.dll" Dnljkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dccfme32.dll" Cdaile32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjijdf32.dll" Llpchaqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhgdmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkgmoncl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aimhmkgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfabmmhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkamodje.dll" Bacjdbch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koljgppp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iilpao32.dll" Qfjcep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebldoh32.dll" Ddqbbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbmlmmjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnlodjpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ampaho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohgohiia.dll" Fdpnda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Halaloif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnbgaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmccbngq.dll" Aimhmkgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpbpecen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eccphn32.dll" Hahokfag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkhcdb32.dll" Hnlodjpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbojlfdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnhekleo.dll" Adjjeieh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exePfandnla.exePplobcpp.exePdjgha32.exeQhhpop32.exeAkkffkhk.exeAknbkjfh.exeAajhndkb.exeAgimkk32.exeBpdnjple.exeBacjdbch.exeBaegibae.exeBnlhncgi.exeCpmapodj.exeCnaaib32.exeEnfckp32.exeFqppci32.exeFdnhih32.exeFbbicl32.exeFgoakc32.exeFecadghc.exeFajbjh32.exedescription pid process target process PID 1600 wrote to memory of 4428 1600 5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe Pfandnla.exe PID 1600 wrote to memory of 4428 1600 5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe Pfandnla.exe PID 1600 wrote to memory of 4428 1600 5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe Pfandnla.exe PID 4428 wrote to memory of 1488 4428 Pfandnla.exe Pplobcpp.exe PID 4428 wrote to memory of 1488 4428 Pfandnla.exe Pplobcpp.exe PID 4428 wrote to memory of 1488 4428 Pfandnla.exe Pplobcpp.exe PID 1488 wrote to memory of 1288 1488 Pplobcpp.exe Pdjgha32.exe PID 1488 wrote to memory of 1288 1488 Pplobcpp.exe Pdjgha32.exe PID 1488 wrote to memory of 1288 1488 Pplobcpp.exe Pdjgha32.exe PID 1288 wrote to memory of 1004 1288 Pdjgha32.exe Qhhpop32.exe PID 1288 wrote to memory of 1004 1288 Pdjgha32.exe Qhhpop32.exe PID 1288 wrote to memory of 1004 1288 Pdjgha32.exe Qhhpop32.exe PID 1004 wrote to memory of 3060 1004 Qhhpop32.exe Akkffkhk.exe PID 1004 wrote to memory of 3060 1004 Qhhpop32.exe Akkffkhk.exe PID 1004 wrote to memory of 3060 1004 Qhhpop32.exe Akkffkhk.exe PID 3060 wrote to memory of 1092 3060 Akkffkhk.exe Aknbkjfh.exe PID 3060 wrote to memory of 1092 3060 Akkffkhk.exe Aknbkjfh.exe PID 3060 wrote to memory of 1092 3060 Akkffkhk.exe Aknbkjfh.exe PID 1092 wrote to memory of 2204 1092 Aknbkjfh.exe Aajhndkb.exe PID 1092 wrote to memory of 2204 1092 Aknbkjfh.exe Aajhndkb.exe PID 1092 wrote to memory of 2204 1092 Aknbkjfh.exe Aajhndkb.exe PID 2204 wrote to memory of 936 2204 Aajhndkb.exe Agimkk32.exe PID 2204 wrote to memory of 936 2204 Aajhndkb.exe Agimkk32.exe PID 2204 wrote to memory of 936 2204 Aajhndkb.exe Agimkk32.exe PID 936 wrote to memory of 4760 936 Agimkk32.exe Bpdnjple.exe PID 936 wrote to memory of 4760 936 Agimkk32.exe Bpdnjple.exe PID 936 wrote to memory of 4760 936 Agimkk32.exe Bpdnjple.exe PID 4760 wrote to memory of 4328 4760 Bpdnjple.exe Bacjdbch.exe PID 4760 wrote to memory of 4328 4760 Bpdnjple.exe Bacjdbch.exe PID 4760 wrote to memory of 4328 4760 Bpdnjple.exe Bacjdbch.exe PID 4328 wrote to memory of 1596 4328 Bacjdbch.exe Baegibae.exe PID 4328 wrote to memory of 1596 4328 Bacjdbch.exe Baegibae.exe PID 4328 wrote to memory of 1596 4328 Bacjdbch.exe Baegibae.exe PID 1596 wrote to memory of 4140 1596 Baegibae.exe Bnlhncgi.exe PID 1596 wrote to memory of 4140 1596 Baegibae.exe Bnlhncgi.exe PID 1596 wrote to memory of 4140 1596 Baegibae.exe Bnlhncgi.exe PID 4140 wrote to memory of 2544 4140 Bnlhncgi.exe Cpmapodj.exe PID 4140 wrote to memory of 2544 4140 Bnlhncgi.exe Cpmapodj.exe PID 4140 wrote to memory of 2544 4140 Bnlhncgi.exe Cpmapodj.exe PID 2544 wrote to memory of 4256 2544 Cpmapodj.exe Cnaaib32.exe PID 2544 wrote to memory of 4256 2544 Cpmapodj.exe Cnaaib32.exe PID 2544 wrote to memory of 4256 2544 Cpmapodj.exe Cnaaib32.exe PID 4256 wrote to memory of 1436 4256 Cnaaib32.exe Enfckp32.exe PID 4256 wrote to memory of 1436 4256 Cnaaib32.exe Enfckp32.exe PID 4256 wrote to memory of 1436 4256 Cnaaib32.exe Enfckp32.exe PID 1436 wrote to memory of 4960 1436 Enfckp32.exe Fqppci32.exe PID 1436 wrote to memory of 4960 1436 Enfckp32.exe Fqppci32.exe PID 1436 wrote to memory of 4960 1436 Enfckp32.exe Fqppci32.exe PID 4960 wrote to memory of 4828 4960 Fqppci32.exe Fdnhih32.exe PID 4960 wrote to memory of 4828 4960 Fqppci32.exe Fdnhih32.exe PID 4960 wrote to memory of 4828 4960 Fqppci32.exe Fdnhih32.exe PID 4828 wrote to memory of 2684 4828 Fdnhih32.exe Fbbicl32.exe PID 4828 wrote to memory of 2684 4828 Fdnhih32.exe Fbbicl32.exe PID 4828 wrote to memory of 2684 4828 Fdnhih32.exe Fbbicl32.exe PID 2684 wrote to memory of 2236 2684 Fbbicl32.exe Fgoakc32.exe PID 2684 wrote to memory of 2236 2684 Fbbicl32.exe Fgoakc32.exe PID 2684 wrote to memory of 2236 2684 Fbbicl32.exe Fgoakc32.exe PID 2236 wrote to memory of 3748 2236 Fgoakc32.exe Fecadghc.exe PID 2236 wrote to memory of 3748 2236 Fgoakc32.exe Fecadghc.exe PID 2236 wrote to memory of 3748 2236 Fgoakc32.exe Fecadghc.exe PID 3748 wrote to memory of 4092 3748 Fecadghc.exe Fajbjh32.exe PID 3748 wrote to memory of 4092 3748 Fecadghc.exe Fajbjh32.exe PID 3748 wrote to memory of 4092 3748 Fecadghc.exe Fajbjh32.exe PID 4092 wrote to memory of 636 4092 Fajbjh32.exe Gbiockdj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5d6e9ecebaa07acfd4221c417a3534c0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\Pfandnla.exeC:\Windows\system32\Pfandnla.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Pplobcpp.exeC:\Windows\system32\Pplobcpp.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Pdjgha32.exeC:\Windows\system32\Pdjgha32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\Qhhpop32.exeC:\Windows\system32\Qhhpop32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\Akkffkhk.exeC:\Windows\system32\Akkffkhk.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Aknbkjfh.exeC:\Windows\system32\Aknbkjfh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\Aajhndkb.exeC:\Windows\system32\Aajhndkb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Agimkk32.exeC:\Windows\system32\Agimkk32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\Bpdnjple.exeC:\Windows\system32\Bpdnjple.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\Bacjdbch.exeC:\Windows\system32\Bacjdbch.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\Baegibae.exeC:\Windows\system32\Baegibae.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\Bnlhncgi.exeC:\Windows\system32\Bnlhncgi.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\Cpmapodj.exeC:\Windows\system32\Cpmapodj.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\Cnaaib32.exeC:\Windows\system32\Cnaaib32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\Enfckp32.exeC:\Windows\system32\Enfckp32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Fqppci32.exeC:\Windows\system32\Fqppci32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Fdnhih32.exeC:\Windows\system32\Fdnhih32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\Fbbicl32.exeC:\Windows\system32\Fbbicl32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Fgoakc32.exeC:\Windows\system32\Fgoakc32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Fecadghc.exeC:\Windows\system32\Fecadghc.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\Fajbjh32.exeC:\Windows\system32\Fajbjh32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\Gbiockdj.exeC:\Windows\system32\Gbiockdj.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:636 -
C:\Windows\SysWOW64\Gejhef32.exeC:\Windows\system32\Gejhef32.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:4980 -
C:\Windows\SysWOW64\Gihpkd32.exeC:\Windows\system32\Gihpkd32.exe25⤵
- Executes dropped EXE
PID:3920 -
C:\Windows\SysWOW64\Gbbajjlp.exeC:\Windows\system32\Gbbajjlp.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\Hahokfag.exeC:\Windows\system32\Hahokfag.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:2872 -
C:\Windows\SysWOW64\Hnlodjpa.exeC:\Windows\system32\Hnlodjpa.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:3808 -
C:\Windows\SysWOW64\Hnnljj32.exeC:\Windows\system32\Hnnljj32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\Hbldphde.exeC:\Windows\system32\Hbldphde.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:388 -
C:\Windows\SysWOW64\Hnbeeiji.exeC:\Windows\system32\Hnbeeiji.exe31⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\Ilfennic.exeC:\Windows\system32\Ilfennic.exe32⤵
- Executes dropped EXE
PID:728 -
C:\Windows\SysWOW64\Iogopi32.exeC:\Windows\system32\Iogopi32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Ilkoim32.exeC:\Windows\system32\Ilkoim32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:448 -
C:\Windows\SysWOW64\Ipihpkkd.exeC:\Windows\system32\Ipihpkkd.exe35⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\Ipkdek32.exeC:\Windows\system32\Ipkdek32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3336 -
C:\Windows\SysWOW64\Jblmgf32.exeC:\Windows\system32\Jblmgf32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3520 -
C:\Windows\SysWOW64\Jbojlfdp.exeC:\Windows\system32\Jbojlfdp.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Jlikkkhn.exeC:\Windows\system32\Jlikkkhn.exe39⤵
- Executes dropped EXE
PID:3752 -
C:\Windows\SysWOW64\Kheekkjl.exeC:\Windows\system32\Kheekkjl.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3320 -
C:\Windows\SysWOW64\Kcmfnd32.exeC:\Windows\system32\Kcmfnd32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Khiofk32.exeC:\Windows\system32\Khiofk32.exe42⤵
- Executes dropped EXE
PID:4184 -
C:\Windows\SysWOW64\Lakfeodm.exeC:\Windows\system32\Lakfeodm.exe43⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\Lfiokmkc.exeC:\Windows\system32\Lfiokmkc.exe44⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Mhoahh32.exeC:\Windows\system32\Mhoahh32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\Mhanngbl.exeC:\Windows\system32\Mhanngbl.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Mcfbkpab.exeC:\Windows\system32\Mcfbkpab.exe47⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Nfgklkoc.exeC:\Windows\system32\Nfgklkoc.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Nfihbk32.exeC:\Windows\system32\Nfihbk32.exe49⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Nqoloc32.exeC:\Windows\system32\Nqoloc32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\Ncpeaoih.exeC:\Windows\system32\Ncpeaoih.exe51⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\SysWOW64\Nmjfodne.exeC:\Windows\system32\Nmjfodne.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4296 -
C:\Windows\SysWOW64\Oqhoeb32.exeC:\Windows\system32\Oqhoeb32.exe53⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\Oonlfo32.exeC:\Windows\system32\Oonlfo32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4508 -
C:\Windows\SysWOW64\Ojemig32.exeC:\Windows\system32\Ojemig32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\Pcbkml32.exeC:\Windows\system32\Pcbkml32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\Pfccogfc.exeC:\Windows\system32\Pfccogfc.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3600 -
C:\Windows\SysWOW64\Pmmlla32.exeC:\Windows\system32\Pmmlla32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Pmphaaln.exeC:\Windows\system32\Pmphaaln.exe59⤵
- Executes dropped EXE
PID:4260 -
C:\Windows\SysWOW64\Pfhmjf32.exeC:\Windows\system32\Pfhmjf32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\Qbonoghb.exeC:\Windows\system32\Qbonoghb.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3744 -
C:\Windows\SysWOW64\Qmdblp32.exeC:\Windows\system32\Qmdblp32.exe62⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\Qjhbfd32.exeC:\Windows\system32\Qjhbfd32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Abcgjg32.exeC:\Windows\system32\Abcgjg32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\Amikgpcc.exeC:\Windows\system32\Amikgpcc.exe65⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\Amkhmoap.exeC:\Windows\system32\Amkhmoap.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2456 -
C:\Windows\SysWOW64\Abhqefpg.exeC:\Windows\system32\Abhqefpg.exe67⤵PID:232
-
C:\Windows\SysWOW64\Amnebo32.exeC:\Windows\system32\Amnebo32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4996 -
C:\Windows\SysWOW64\Ampaho32.exeC:\Windows\system32\Ampaho32.exe69⤵
- Modifies registry class
PID:5196 -
C:\Windows\SysWOW64\Adjjeieh.exeC:\Windows\system32\Adjjeieh.exe70⤵
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Bigbmpco.exeC:\Windows\system32\Bigbmpco.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5288 -
C:\Windows\SysWOW64\Bboffejp.exeC:\Windows\system32\Bboffejp.exe72⤵
- Drops file in System32 directory
PID:5324 -
C:\Windows\SysWOW64\Biiobo32.exeC:\Windows\system32\Biiobo32.exe73⤵
- Drops file in System32 directory
PID:5364 -
C:\Windows\SysWOW64\Bbaclegm.exeC:\Windows\system32\Bbaclegm.exe74⤵
- Drops file in System32 directory
PID:5412 -
C:\Windows\SysWOW64\Bpedeiff.exeC:\Windows\system32\Bpedeiff.exe75⤵
- Drops file in System32 directory
PID:5456 -
C:\Windows\SysWOW64\Binhnomg.exeC:\Windows\system32\Binhnomg.exe76⤵
- Modifies registry class
PID:5512 -
C:\Windows\SysWOW64\Bfaigclq.exeC:\Windows\system32\Bfaigclq.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5552 -
C:\Windows\SysWOW64\Cgfbbb32.exeC:\Windows\system32\Cgfbbb32.exe78⤵PID:5592
-
C:\Windows\SysWOW64\Cdjblf32.exeC:\Windows\system32\Cdjblf32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5632 -
C:\Windows\SysWOW64\Cgklmacf.exeC:\Windows\system32\Cgklmacf.exe80⤵PID:5676
-
C:\Windows\SysWOW64\Ccblbb32.exeC:\Windows\system32\Ccblbb32.exe81⤵PID:5720
-
C:\Windows\SysWOW64\Cdaile32.exeC:\Windows\system32\Cdaile32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5760 -
C:\Windows\SysWOW64\Dinael32.exeC:\Windows\system32\Dinael32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5804 -
C:\Windows\SysWOW64\Dnljkk32.exeC:\Windows\system32\Dnljkk32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5848 -
C:\Windows\SysWOW64\Dpmcmf32.exeC:\Windows\system32\Dpmcmf32.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:5892 -
C:\Windows\SysWOW64\Djegekil.exeC:\Windows\system32\Djegekil.exe86⤵
- Drops file in System32 directory
PID:5936 -
C:\Windows\SysWOW64\Dgihop32.exeC:\Windows\system32\Dgihop32.exe87⤵
- Modifies registry class
PID:5980 -
C:\Windows\SysWOW64\Ejjaqk32.exeC:\Windows\system32\Ejjaqk32.exe88⤵PID:6024
-
C:\Windows\SysWOW64\Ecbeip32.exeC:\Windows\system32\Ecbeip32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6068 -
C:\Windows\SysWOW64\Enhifi32.exeC:\Windows\system32\Enhifi32.exe90⤵
- Drops file in System32 directory
PID:6112 -
C:\Windows\SysWOW64\Egpnooan.exeC:\Windows\system32\Egpnooan.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:792 -
C:\Windows\SysWOW64\Eafbmgad.exeC:\Windows\system32\Eafbmgad.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5220 -
C:\Windows\SysWOW64\Enlcahgh.exeC:\Windows\system32\Enlcahgh.exe93⤵PID:5344
-
C:\Windows\SysWOW64\Fncibg32.exeC:\Windows\system32\Fncibg32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5400 -
C:\Windows\SysWOW64\Fqbeoc32.exeC:\Windows\system32\Fqbeoc32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5504 -
C:\Windows\SysWOW64\Fglnkm32.exeC:\Windows\system32\Fglnkm32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5580 -
C:\Windows\SysWOW64\Fdpnda32.exeC:\Windows\system32\Fdpnda32.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:5612 -
C:\Windows\SysWOW64\Gnohnffc.exeC:\Windows\system32\Gnohnffc.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5728 -
C:\Windows\SysWOW64\Gqpapacd.exeC:\Windows\system32\Gqpapacd.exe99⤵
- Drops file in System32 directory
PID:5796 -
C:\Windows\SysWOW64\Gkefmjcj.exeC:\Windows\system32\Gkefmjcj.exe100⤵
- Drops file in System32 directory
PID:5872 -
C:\Windows\SysWOW64\Gqbneq32.exeC:\Windows\system32\Gqbneq32.exe101⤵PID:5948
-
C:\Windows\SysWOW64\Gbbkocid.exeC:\Windows\system32\Gbbkocid.exe102⤵
- Drops file in System32 directory
PID:6056 -
C:\Windows\SysWOW64\Hccggl32.exeC:\Windows\system32\Hccggl32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6104 -
C:\Windows\SysWOW64\Hcedmkmp.exeC:\Windows\system32\Hcedmkmp.exe104⤵PID:5224
-
C:\Windows\SysWOW64\Hjolie32.exeC:\Windows\system32\Hjolie32.exe105⤵PID:5352
-
C:\Windows\SysWOW64\Heepfn32.exeC:\Windows\system32\Heepfn32.exe106⤵
- Modifies registry class
PID:5452 -
C:\Windows\SysWOW64\Halaloif.exeC:\Windows\system32\Halaloif.exe107⤵
- Modifies registry class
PID:5572 -
C:\Windows\SysWOW64\Hgeihiac.exeC:\Windows\system32\Hgeihiac.exe108⤵PID:5716
-
C:\Windows\SysWOW64\Hghfnioq.exeC:\Windows\system32\Hghfnioq.exe109⤵PID:5748
-
C:\Windows\SysWOW64\Icogcjde.exeC:\Windows\system32\Icogcjde.exe110⤵PID:5988
-
C:\Windows\SysWOW64\Ibpgqa32.exeC:\Windows\system32\Ibpgqa32.exe111⤵PID:6032
-
C:\Windows\SysWOW64\Ilhkigcd.exeC:\Windows\system32\Ilhkigcd.exe112⤵PID:5188
-
C:\Windows\SysWOW64\Iccpniqp.exeC:\Windows\system32\Iccpniqp.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4436 -
C:\Windows\SysWOW64\Inkaqb32.exeC:\Windows\system32\Inkaqb32.exe114⤵PID:5560
-
C:\Windows\SysWOW64\Ijbbfc32.exeC:\Windows\system32\Ijbbfc32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5772 -
C:\Windows\SysWOW64\Jaljbmkd.exeC:\Windows\system32\Jaljbmkd.exe116⤵PID:5968
-
C:\Windows\SysWOW64\Jejbhk32.exeC:\Windows\system32\Jejbhk32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6096 -
C:\Windows\SysWOW64\Jnbgaa32.exeC:\Windows\system32\Jnbgaa32.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:5308 -
C:\Windows\SysWOW64\Jacpcl32.exeC:\Windows\system32\Jacpcl32.exe119⤵PID:5664
-
C:\Windows\SysWOW64\Jogqlpde.exeC:\Windows\system32\Jogqlpde.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:6016 -
C:\Windows\SysWOW64\Jhoeef32.exeC:\Windows\system32\Jhoeef32.exe121⤵
- Drops file in System32 directory
- Modifies registry class
PID:5312 -
C:\Windows\SysWOW64\Kahinkaf.exeC:\Windows\system32\Kahinkaf.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:5844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-