Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 02:46
Behavioral task
behavioral1
Sample
55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe
-
Size
6.7MB
-
MD5
55a114dfbdd6f631abdd5accc0705000
-
SHA1
77b2e696c5c0cf718e43ce015d9f193d3ab29acb
-
SHA256
11f369cf0a8c79c8901c258958c3684801d1ac3323ce430ff914d1607821f522
-
SHA512
b6dcd24ef2cc589fe19bc705279f0b888bcac7961b26e91628c7ffaf3bd4e8b5326d4d8b96b855b988dc3a512cfa4ab94a85996c3673d90a61716fc3fd400b9e
-
SSDEEP
196608:gaSHFaZRBEYyqmS2DiHPKQgwUgUjvho4wzlF65i6YxE+a3:gaSHFaZRBEYyqmS2DiHPKQg3jvZwNVO3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jedccfqg.exeDpiplm32.exeEbfign32.exeMljmhflh.exeGdhjpjjd.exeFgffka32.exeHcfcmnce.exeGiokid32.exeHejqldci.exeJnmglk32.exeLhammfci.exeQhbhapha.exeBggnijof.exeJoaojf32.exeJcgnbaeo.exeNmjfodne.exePmhbqbae.exeDggkipii.exeDpopbepi.exeJbppgona.exeQbmpjkqk.exeJgbhdkml.exeMjiloqjb.exeFiaogfai.exeKaioidkh.exeNmkmjjaa.exePgnblm32.exeCeeaim32.exeLimioiia.exeDeqcbpld.exeAokcjngj.exeKgqdfi32.exeBbmbgb32.exeNflkbanj.exeBacjdbch.exeNcmhko32.exeKhabke32.exeJqbbno32.exeEjdonq32.exeIhpcinld.exeJhoeef32.exePncanhaf.exeFkgejncb.exeGgbmafnm.exeHkodak32.exeOplfkeob.exeOfckhj32.exeLahbei32.exeCifmoa32.exeEllicihn.exeGekeie32.exeAmlogfel.exeDkekjdck.exeLlcghg32.exeEnfckp32.exeDnngpj32.exeDdmhhd32.exeGqkhda32.exeMadbagif.exeNdejcemn.exeBgodjiio.exeEihlahjd.exeCofnik32.exeNclbpf32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jedccfqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpiplm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebfign32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mljmhflh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdhjpjjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgffka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcfcmnce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Giokid32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hejqldci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnmglk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhammfci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhbhapha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bggnijof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joaojf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcgnbaeo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmjfodne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmhbqbae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dggkipii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpopbepi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbppgona.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbmpjkqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgbhdkml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjiloqjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fiaogfai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaioidkh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmkmjjaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgnblm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceeaim32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Limioiia.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deqcbpld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aokcjngj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgqdfi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbmbgb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nflkbanj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bacjdbch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncmhko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khabke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jqbbno32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejdonq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihpcinld.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhoeef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pncanhaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkgejncb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggbmafnm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkodak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oplfkeob.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofckhj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lahbei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cifmoa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ellicihn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gekeie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amlogfel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkekjdck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llcghg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enfckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnngpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddmhhd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqkhda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Madbagif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndejcemn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgodjiio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eihlahjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cofnik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nclbpf32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Ijegcm32.exe family_berbew C:\Windows\SysWOW64\Icnklbmj.exe family_berbew C:\Windows\SysWOW64\Jklinohd.exe family_berbew C:\Windows\SysWOW64\Jcgnbaeo.exe family_berbew C:\Windows\SysWOW64\Meepdp32.exe family_berbew C:\Windows\SysWOW64\Ojbacd32.exe family_berbew C:\Windows\SysWOW64\Pdhbmh32.exe family_berbew C:\Windows\SysWOW64\Plbfdekd.exe family_berbew C:\Windows\SysWOW64\Phigif32.exe family_berbew C:\Windows\SysWOW64\Blgifbil.exe family_berbew C:\Windows\SysWOW64\Cofnik32.exe family_berbew C:\Windows\SysWOW64\Deqcbpld.exe family_berbew C:\Windows\SysWOW64\Eicedn32.exe family_berbew C:\Windows\SysWOW64\Fbpchb32.exe family_berbew C:\Windows\SysWOW64\Fngcmcfe.exe family_berbew C:\Windows\SysWOW64\Hemdlj32.exe family_berbew C:\Windows\SysWOW64\Jcdjbk32.exe family_berbew C:\Windows\SysWOW64\Jedccfqg.exe family_berbew C:\Windows\SysWOW64\Kcbfcigf.exe family_berbew C:\Windows\SysWOW64\Ljhnlb32.exe family_berbew C:\Windows\SysWOW64\Mnhdgpii.exe family_berbew C:\Windows\SysWOW64\Nclbpf32.exe family_berbew C:\Windows\SysWOW64\Nmdgikhi.exe family_berbew C:\Windows\SysWOW64\Nflkbanj.exe family_berbew C:\Windows\SysWOW64\Nnfpinmi.exe family_berbew C:\Windows\SysWOW64\Ngndaccj.exe family_berbew C:\Windows\SysWOW64\Oplfkeob.exe family_berbew C:\Windows\SysWOW64\Ombcji32.exe family_berbew C:\Windows\SysWOW64\Ocjoadei.exe family_berbew C:\Windows\SysWOW64\Nfcabp32.exe family_berbew C:\Windows\SysWOW64\Nmkmjjaa.exe family_berbew C:\Windows\SysWOW64\Npepkf32.exe family_berbew C:\Windows\SysWOW64\Mjcngpjh.exe family_berbew C:\Windows\SysWOW64\Iialhaad.exe family_berbew C:\Windows\SysWOW64\Mjggal32.exe family_berbew C:\Windows\SysWOW64\Mqjbddpl.exe family_berbew C:\Windows\SysWOW64\Ofckhj32.exe family_berbew C:\Windows\SysWOW64\Ofjqihnn.exe family_berbew C:\Windows\SysWOW64\Pfccogfc.exe family_berbew C:\Windows\SysWOW64\Qjffpe32.exe family_berbew C:\Windows\SysWOW64\Abjmkf32.exe family_berbew C:\Windows\SysWOW64\Bjhkmbho.exe family_berbew C:\Windows\SysWOW64\Ddmhhd32.exe family_berbew C:\Windows\SysWOW64\Enjfli32.exe family_berbew C:\Windows\SysWOW64\Fkjfakng.exe family_berbew C:\Windows\SysWOW64\Gqkhda32.exe family_berbew C:\Windows\SysWOW64\Hqghqpnl.exe family_berbew C:\Windows\SysWOW64\Iajmmm32.exe family_berbew C:\Windows\SysWOW64\Kehojiej.exe family_berbew C:\Windows\SysWOW64\Lkqgno32.exe family_berbew C:\Windows\SysWOW64\Madbagif.exe family_berbew C:\Windows\SysWOW64\Mcfkpjng.exe family_berbew C:\Windows\SysWOW64\Nlgbon32.exe family_berbew C:\Windows\SysWOW64\Ofdqcc32.exe family_berbew C:\Windows\SysWOW64\Ohhfknjf.exe family_berbew C:\Windows\SysWOW64\Pbgqdb32.exe family_berbew C:\Windows\SysWOW64\Qifbll32.exe family_berbew C:\Windows\SysWOW64\Akihcfid.exe family_berbew C:\Windows\SysWOW64\Bfhofnpp.exe family_berbew C:\Windows\SysWOW64\Bmfqngcg.exe family_berbew C:\Windows\SysWOW64\Dmkcpdao.exe family_berbew C:\Windows\SysWOW64\Eleimp32.exe family_berbew C:\Windows\SysWOW64\Eippgckc.exe family_berbew C:\Windows\SysWOW64\Fncbha32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Ijegcm32.exeIcnklbmj.exeJklinohd.exeJcgnbaeo.exeMeepdp32.exeOjbacd32.exePdhbmh32.exePlbfdekd.exePhigif32.exeBlgifbil.exeCofnik32.exeDeqcbpld.exeEicedn32.exeFbpchb32.exeFngcmcfe.exeHemdlj32.exeJcdjbk32.exeJedccfqg.exeKcbfcigf.exeLjhnlb32.exeMnhdgpii.exeMjcngpjh.exeNclbpf32.exeNmdgikhi.exeNflkbanj.exeNpepkf32.exeNnfpinmi.exeNgndaccj.exeNmkmjjaa.exeNfcabp32.exeOplfkeob.exeOcjoadei.exeOmbcji32.exeOfkgcobj.exeOaplqh32.exeOjhpimhp.exeOcaebc32.exePnfiplog.exePhonha32.exePagbaglh.exePjpfjl32.exePdhkcb32.exePmpolgoi.exePfiddm32.exePpahmb32.exeQobhkjdi.exeQhjmdp32.exeQacameaj.exeAkkffkhk.exeAdcjop32.exeAmlogfel.exeAgdcpkll.exeAajhndkb.exeAkblfj32.exeAdkqoohc.exeAopemh32.exeBhhiemoj.exeBmeandma.exeBgnffj32.exeBacjdbch.exeBklomh32.exeBphgeo32.exeBoihcf32.exeBhblllfo.exepid process 3240 Ijegcm32.exe 4452 Icnklbmj.exe 212 Jklinohd.exe 2668 Jcgnbaeo.exe 4140 Meepdp32.exe 1196 Ojbacd32.exe 2520 Pdhbmh32.exe 4544 Plbfdekd.exe 2964 Phigif32.exe 756 Blgifbil.exe 3068 Cofnik32.exe 3164 Deqcbpld.exe 2780 Eicedn32.exe 4552 Fbpchb32.exe 3036 Fngcmcfe.exe 4460 Hemdlj32.exe 4780 Jcdjbk32.exe 2844 Jedccfqg.exe 3580 Kcbfcigf.exe 4752 Ljhnlb32.exe 3720 Mnhdgpii.exe 2572 Mjcngpjh.exe 2952 Nclbpf32.exe 4548 Nmdgikhi.exe 3520 Nflkbanj.exe 3020 Npepkf32.exe 3524 Nnfpinmi.exe 912 Ngndaccj.exe 1412 Nmkmjjaa.exe 1820 Nfcabp32.exe 2568 Oplfkeob.exe 5132 Ocjoadei.exe 5172 Ombcji32.exe 5212 Ofkgcobj.exe 5252 Oaplqh32.exe 5288 Ojhpimhp.exe 5324 Ocaebc32.exe 5360 Pnfiplog.exe 5396 Phonha32.exe 5432 Pagbaglh.exe 5468 Pjpfjl32.exe 5504 Pdhkcb32.exe 5540 Pmpolgoi.exe 5576 Pfiddm32.exe 5612 Ppahmb32.exe 5648 Qobhkjdi.exe 5684 Qhjmdp32.exe 5720 Qacameaj.exe 5756 Akkffkhk.exe 5792 Adcjop32.exe 5828 Amlogfel.exe 5864 Agdcpkll.exe 5900 Aajhndkb.exe 5936 Akblfj32.exe 5972 Adkqoohc.exe 6008 Aopemh32.exe 6044 Bhhiemoj.exe 6080 Bmeandma.exe 6116 Bgnffj32.exe 4748 Bacjdbch.exe 5156 Bklomh32.exe 5224 Bphgeo32.exe 5280 Boihcf32.exe 5348 Bhblllfo.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bhhiemoj.exeIjkled32.exeMadbagif.exeJnmglk32.exeEecfah32.exeOjhpimhp.exeDkekjdck.exeGacepg32.exeDkedonpo.exeNoaeqjpe.exeFgmllpng.exeEjnbdp32.exeHnbeeiji.exeJmbdmg32.exeFlekihpc.exeKcbkpj32.exePphckb32.exePjahchpb.exeFbjcplhj.exeLikcdpop.exeIjegcm32.exeFbpchb32.exeAkblfj32.exeGihpkd32.exeCpfmlghd.exeJhoeef32.exeLdckan32.exeQnopjfgi.exeDioiki32.exeIapbodql.exeCgqlcg32.exeOblhcj32.exeCkdkhq32.exeQifbll32.exeDfonnk32.exeJghhjq32.exeHhlnjpdi.exeJodlof32.exeBnoddcef.exeIialhaad.exePkklbh32.exeCjaiac32.exeHikkdc32.exeCdmfllhn.exePiceflpi.exeCiogobcm.exeAdkqoohc.exeBoihcf32.exeMqjbddpl.exeEahobg32.exeKaaldjil.exeFghcqq32.exeJcihjl32.exeDggkipii.exeHjdedepg.exeAgaoca32.exeBfghlhmd.exeDlicflic.exeLiifnp32.exeFaopah32.exedescription ioc process File created C:\Windows\SysWOW64\Qnbidcgp.dll Bhhiemoj.exe File created C:\Windows\SysWOW64\Iccpniqp.exe Ijkled32.exe File created C:\Windows\SysWOW64\Mcfkpjng.exe Madbagif.exe File created C:\Windows\SysWOW64\Jcjodbgl.exe Jnmglk32.exe File created C:\Windows\SysWOW64\Folkjnbc.exe Eecfah32.exe File created C:\Windows\SysWOW64\Ocaebc32.exe Ojhpimhp.exe File opened for modification C:\Windows\SysWOW64\Ddnobj32.exe Dkekjdck.exe File opened for modification C:\Windows\SysWOW64\Gngeik32.exe Gacepg32.exe File created C:\Windows\SysWOW64\Dnhpfk32.dll Dkedonpo.exe File created C:\Windows\SysWOW64\Ndnnianm.exe Noaeqjpe.exe File created C:\Windows\SysWOW64\Kpcnhngo.dll Fgmllpng.exe File created C:\Windows\SysWOW64\Nbjadm32.dll Ejnbdp32.exe File opened for modification C:\Windows\SysWOW64\Ilfennic.exe Hnbeeiji.exe File created C:\Windows\SysWOW64\Ogiobn32.dll Jmbdmg32.exe File created C:\Windows\SysWOW64\Fgjpfqpi.exe Flekihpc.exe File opened for modification C:\Windows\SysWOW64\Kmkpipaf.exe Kcbkpj32.exe File opened for modification C:\Windows\SysWOW64\Pjahchpb.exe Pphckb32.exe File created C:\Windows\SysWOW64\Gnfmkhcj.dll Pjahchpb.exe File created C:\Windows\SysWOW64\Fhflhcfa.exe Fbjcplhj.exe File created C:\Windows\SysWOW64\Lfodmdni.exe Likcdpop.exe File created C:\Windows\SysWOW64\Icnklbmj.exe Ijegcm32.exe File opened for modification C:\Windows\SysWOW64\Fngcmcfe.exe Fbpchb32.exe File opened for modification C:\Windows\SysWOW64\Adkqoohc.exe Akblfj32.exe File created C:\Windows\SysWOW64\Eibmbgdm.dll Gihpkd32.exe File created C:\Windows\SysWOW64\Dmjmekgn.exe Cpfmlghd.exe File created C:\Windows\SysWOW64\Khabke32.exe Jhoeef32.exe File created C:\Windows\SysWOW64\Jmlbab32.dll Ldckan32.exe File created C:\Windows\SysWOW64\Dfgmki32.dll Qnopjfgi.exe File created C:\Windows\SysWOW64\Nopkoobi.dll Dioiki32.exe File created C:\Windows\SysWOW64\Iocchhof.exe Iapbodql.exe File created C:\Windows\SysWOW64\Dpiplm32.exe Cgqlcg32.exe File created C:\Windows\SysWOW64\Ofjqihnn.exe Oblhcj32.exe File opened for modification C:\Windows\SysWOW64\Ckggnp32.exe Ckdkhq32.exe File created C:\Windows\SysWOW64\Qmckbjdl.exe Qifbll32.exe File created C:\Windows\SysWOW64\Oihlnd32.dll Dfonnk32.exe File created C:\Windows\SysWOW64\Hjaacbec.dll Jghhjq32.exe File created C:\Windows\SysWOW64\Hikkdc32.exe Hhlnjpdi.exe File created C:\Windows\SysWOW64\Omhnja32.dll Jodlof32.exe File created C:\Windows\SysWOW64\Cggimh32.exe Bnoddcef.exe File created C:\Windows\SysWOW64\Gacepg32.exe Gihpkd32.exe File created C:\Windows\SysWOW64\Ljbnfleo.exe Iialhaad.exe File opened for modification C:\Windows\SysWOW64\Piolkm32.exe Pkklbh32.exe File created C:\Windows\SysWOW64\Jghhjq32.exe Jmbdmg32.exe File created C:\Windows\SysWOW64\Ciefek32.exe Cjaiac32.exe File opened for modification C:\Windows\SysWOW64\Hkodak32.exe Hikkdc32.exe File opened for modification C:\Windows\SysWOW64\Cnfkdb32.exe Cdmfllhn.exe File created C:\Windows\SysWOW64\Qifbll32.exe Piceflpi.exe File opened for modification C:\Windows\SysWOW64\Cbglgg32.exe Ciogobcm.exe File created C:\Windows\SysWOW64\Faebcoda.dll Flekihpc.exe File created C:\Windows\SysWOW64\Aopemh32.exe Adkqoohc.exe File opened for modification C:\Windows\SysWOW64\Bhblllfo.exe Boihcf32.exe File created C:\Windows\SysWOW64\Fanmld32.dll Mqjbddpl.exe File created C:\Windows\SysWOW64\Fggdpnkf.exe Eahobg32.exe File created C:\Windows\SysWOW64\Leoejh32.exe Kaaldjil.exe File created C:\Windows\SysWOW64\Flopmh32.dll Fghcqq32.exe File created C:\Windows\SysWOW64\Mkjpnc32.dll Jcihjl32.exe File created C:\Windows\SysWOW64\Dchkpa32.dll Hikkdc32.exe File opened for modification C:\Windows\SysWOW64\Dpopbepi.exe Dggkipii.exe File created C:\Windows\SysWOW64\Ompbfo32.dll Hjdedepg.exe File created C:\Windows\SysWOW64\Aokcjngj.exe Agaoca32.exe File created C:\Windows\SysWOW64\Ekifdefc.dll Bfghlhmd.exe File created C:\Windows\SysWOW64\Dfngcdhi.exe Dlicflic.exe File created C:\Windows\SysWOW64\Jjdiadlg.dll Liifnp32.exe File opened for modification C:\Windows\SysWOW64\Fkgejncb.exe Faopah32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7724 8008 WerFault.exe Mbldhn32.exe -
Modifies registry class 64 IoCs
Processes:
Mjcngpjh.exeChkjpm32.exeJnmglk32.exeDhgjll32.exeHhlnjpdi.exeIccpniqp.exeBmfqngcg.exeDkekjdck.exeCmpjoloh.exeMlgjhp32.exeDghadidj.exeEleimp32.exeKfanflne.exeOaplqh32.exePjpfjl32.exeHladlc32.exeIjigfaol.exeNhkpdi32.exePgaelcgm.exeMclhjkfa.exeCkfofe32.exeEicedn32.exeGbkkik32.exeLamlphoo.exeDeqcbpld.exeGcnnllcg.exeDlicflic.exeQnopjfgi.exeMjggal32.exeIjkled32.exeAbjfqpji.exeGeklckkd.exeNclbpf32.exeLogicn32.exeMadbagif.exeCpqlfa32.exeDpgbgpbe.exeEippgckc.exePdgckg32.exeFgjpfqpi.exeAdepji32.exeCdhffg32.exeLikcdpop.exeBlgddd32.exeFlboch32.exeFghcqq32.exeIfnbph32.exeOjajin32.exeApeknk32.exeAcdioc32.exeCdnelpod.exeJapmcfcc.exeHhdcmp32.exeMaaekg32.exeGpjjpe32.exeLiifnp32.exeFkofga32.exeFboecfii.exeAkblfj32.exeJmbdmg32.exePojjcp32.exeBpomem32.exeDioiki32.exeAmlogfel.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbjpeo32.dll" Mjcngpjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcalmk32.dll" Chkjpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnmglk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhgjll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhlnjpdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iccpniqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmfqngcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgamhc32.dll" Dkekjdck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dooaccfg.dll" Cmpjoloh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nngihj32.dll" Mlgjhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dejhkj32.dll" Dghadidj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqoddlib.dll" Eleimp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpklcffg.dll" Kfanflne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oaplqh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjpfjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hladlc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afnpjk32.dll" Ijigfaol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhkpdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgaelcgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipdkapdh.dll" Mclhjkfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckfofe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqopkcbn.dll" Eicedn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbkkik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lamlphoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deqcbpld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcnnllcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caccgepo.dll" Dlicflic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qnopjfgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjggal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijkled32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoclajjj.dll" Abjfqpji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Geklckkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nclbpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Logicn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Madbagif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpqlfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpgbgpbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmnfcojj.dll" Eippgckc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdgckg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgjpfqpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adepji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogajpp32.dll" Cdhffg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Likcdpop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blgddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flboch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fghcqq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifnbph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpghll32.dll" Ojajin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apeknk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acdioc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdnelpod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Japmcfcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhdcmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maaekg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aejjddko.dll" Gpjjpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liifnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkofga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fboecfii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akblfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmbdmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjemgpnb.dll" Pojjcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbjcmpdk.dll" Bpomem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nopkoobi.dll" Dioiki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkmjlphl.dll" Amlogfel.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exeIjegcm32.exeIcnklbmj.exeJklinohd.exeJcgnbaeo.exeMeepdp32.exeOjbacd32.exePdhbmh32.exePlbfdekd.exePhigif32.exeBlgifbil.exeCofnik32.exeDeqcbpld.exeEicedn32.exeFbpchb32.exeFngcmcfe.exeHemdlj32.exeJcdjbk32.exeJedccfqg.exeKcbfcigf.exeLjhnlb32.exeMnhdgpii.exedescription pid process target process PID 2960 wrote to memory of 3240 2960 55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe Ijegcm32.exe PID 2960 wrote to memory of 3240 2960 55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe Ijegcm32.exe PID 2960 wrote to memory of 3240 2960 55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe Ijegcm32.exe PID 3240 wrote to memory of 4452 3240 Ijegcm32.exe Icnklbmj.exe PID 3240 wrote to memory of 4452 3240 Ijegcm32.exe Icnklbmj.exe PID 3240 wrote to memory of 4452 3240 Ijegcm32.exe Icnklbmj.exe PID 4452 wrote to memory of 212 4452 Icnklbmj.exe Jklinohd.exe PID 4452 wrote to memory of 212 4452 Icnklbmj.exe Jklinohd.exe PID 4452 wrote to memory of 212 4452 Icnklbmj.exe Jklinohd.exe PID 212 wrote to memory of 2668 212 Jklinohd.exe Jcgnbaeo.exe PID 212 wrote to memory of 2668 212 Jklinohd.exe Jcgnbaeo.exe PID 212 wrote to memory of 2668 212 Jklinohd.exe Jcgnbaeo.exe PID 2668 wrote to memory of 4140 2668 Jcgnbaeo.exe Meepdp32.exe PID 2668 wrote to memory of 4140 2668 Jcgnbaeo.exe Meepdp32.exe PID 2668 wrote to memory of 4140 2668 Jcgnbaeo.exe Meepdp32.exe PID 4140 wrote to memory of 1196 4140 Meepdp32.exe Ojbacd32.exe PID 4140 wrote to memory of 1196 4140 Meepdp32.exe Ojbacd32.exe PID 4140 wrote to memory of 1196 4140 Meepdp32.exe Ojbacd32.exe PID 1196 wrote to memory of 2520 1196 Ojbacd32.exe Pdhbmh32.exe PID 1196 wrote to memory of 2520 1196 Ojbacd32.exe Pdhbmh32.exe PID 1196 wrote to memory of 2520 1196 Ojbacd32.exe Pdhbmh32.exe PID 2520 wrote to memory of 4544 2520 Pdhbmh32.exe Plbfdekd.exe PID 2520 wrote to memory of 4544 2520 Pdhbmh32.exe Plbfdekd.exe PID 2520 wrote to memory of 4544 2520 Pdhbmh32.exe Plbfdekd.exe PID 4544 wrote to memory of 2964 4544 Plbfdekd.exe Phigif32.exe PID 4544 wrote to memory of 2964 4544 Plbfdekd.exe Phigif32.exe PID 4544 wrote to memory of 2964 4544 Plbfdekd.exe Phigif32.exe PID 2964 wrote to memory of 756 2964 Phigif32.exe Blgifbil.exe PID 2964 wrote to memory of 756 2964 Phigif32.exe Blgifbil.exe PID 2964 wrote to memory of 756 2964 Phigif32.exe Blgifbil.exe PID 756 wrote to memory of 3068 756 Blgifbil.exe Cofnik32.exe PID 756 wrote to memory of 3068 756 Blgifbil.exe Cofnik32.exe PID 756 wrote to memory of 3068 756 Blgifbil.exe Cofnik32.exe PID 3068 wrote to memory of 3164 3068 Cofnik32.exe Deqcbpld.exe PID 3068 wrote to memory of 3164 3068 Cofnik32.exe Deqcbpld.exe PID 3068 wrote to memory of 3164 3068 Cofnik32.exe Deqcbpld.exe PID 3164 wrote to memory of 2780 3164 Deqcbpld.exe Eicedn32.exe PID 3164 wrote to memory of 2780 3164 Deqcbpld.exe Eicedn32.exe PID 3164 wrote to memory of 2780 3164 Deqcbpld.exe Eicedn32.exe PID 2780 wrote to memory of 4552 2780 Eicedn32.exe Fbpchb32.exe PID 2780 wrote to memory of 4552 2780 Eicedn32.exe Fbpchb32.exe PID 2780 wrote to memory of 4552 2780 Eicedn32.exe Fbpchb32.exe PID 4552 wrote to memory of 3036 4552 Fbpchb32.exe Fngcmcfe.exe PID 4552 wrote to memory of 3036 4552 Fbpchb32.exe Fngcmcfe.exe PID 4552 wrote to memory of 3036 4552 Fbpchb32.exe Fngcmcfe.exe PID 3036 wrote to memory of 4460 3036 Fngcmcfe.exe Hemdlj32.exe PID 3036 wrote to memory of 4460 3036 Fngcmcfe.exe Hemdlj32.exe PID 3036 wrote to memory of 4460 3036 Fngcmcfe.exe Hemdlj32.exe PID 4460 wrote to memory of 4780 4460 Hemdlj32.exe Jcdjbk32.exe PID 4460 wrote to memory of 4780 4460 Hemdlj32.exe Jcdjbk32.exe PID 4460 wrote to memory of 4780 4460 Hemdlj32.exe Jcdjbk32.exe PID 4780 wrote to memory of 2844 4780 Jcdjbk32.exe Jedccfqg.exe PID 4780 wrote to memory of 2844 4780 Jcdjbk32.exe Jedccfqg.exe PID 4780 wrote to memory of 2844 4780 Jcdjbk32.exe Jedccfqg.exe PID 2844 wrote to memory of 3580 2844 Jedccfqg.exe Kcbfcigf.exe PID 2844 wrote to memory of 3580 2844 Jedccfqg.exe Kcbfcigf.exe PID 2844 wrote to memory of 3580 2844 Jedccfqg.exe Kcbfcigf.exe PID 3580 wrote to memory of 4752 3580 Kcbfcigf.exe Ljhnlb32.exe PID 3580 wrote to memory of 4752 3580 Kcbfcigf.exe Ljhnlb32.exe PID 3580 wrote to memory of 4752 3580 Kcbfcigf.exe Ljhnlb32.exe PID 4752 wrote to memory of 3720 4752 Ljhnlb32.exe Mnhdgpii.exe PID 4752 wrote to memory of 3720 4752 Ljhnlb32.exe Mnhdgpii.exe PID 4752 wrote to memory of 3720 4752 Ljhnlb32.exe Mnhdgpii.exe PID 3720 wrote to memory of 2572 3720 Mnhdgpii.exe Mjcngpjh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\55a114dfbdd6f631abdd5accc0705000_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Ijegcm32.exeC:\Windows\system32\Ijegcm32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\Icnklbmj.exeC:\Windows\system32\Icnklbmj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\Jklinohd.exeC:\Windows\system32\Jklinohd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Jcgnbaeo.exeC:\Windows\system32\Jcgnbaeo.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Meepdp32.exeC:\Windows\system32\Meepdp32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\Ojbacd32.exeC:\Windows\system32\Ojbacd32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Pdhbmh32.exeC:\Windows\system32\Pdhbmh32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Plbfdekd.exeC:\Windows\system32\Plbfdekd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\Phigif32.exeC:\Windows\system32\Phigif32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Blgifbil.exeC:\Windows\system32\Blgifbil.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\Cofnik32.exeC:\Windows\system32\Cofnik32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\Deqcbpld.exeC:\Windows\system32\Deqcbpld.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\Eicedn32.exeC:\Windows\system32\Eicedn32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Fbpchb32.exeC:\Windows\system32\Fbpchb32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\Fngcmcfe.exeC:\Windows\system32\Fngcmcfe.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Hemdlj32.exeC:\Windows\system32\Hemdlj32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\Jcdjbk32.exeC:\Windows\system32\Jcdjbk32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\Jedccfqg.exeC:\Windows\system32\Jedccfqg.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Kcbfcigf.exeC:\Windows\system32\Kcbfcigf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\Ljhnlb32.exeC:\Windows\system32\Ljhnlb32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\Mnhdgpii.exeC:\Windows\system32\Mnhdgpii.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\Mjcngpjh.exeC:\Windows\system32\Mjcngpjh.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\Nclbpf32.exeC:\Windows\system32\Nclbpf32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\Nmdgikhi.exeC:\Windows\system32\Nmdgikhi.exe25⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\Nflkbanj.exeC:\Windows\system32\Nflkbanj.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\Npepkf32.exeC:\Windows\system32\Npepkf32.exe27⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\Nnfpinmi.exeC:\Windows\system32\Nnfpinmi.exe28⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Ngndaccj.exeC:\Windows\system32\Ngndaccj.exe29⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\Nmkmjjaa.exeC:\Windows\system32\Nmkmjjaa.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\Nfcabp32.exeC:\Windows\system32\Nfcabp32.exe31⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Oplfkeob.exeC:\Windows\system32\Oplfkeob.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Ojajin32.exeC:\Windows\system32\Ojajin32.exe33⤵
- Modifies registry class
PID:3456 -
C:\Windows\SysWOW64\Ocjoadei.exeC:\Windows\system32\Ocjoadei.exe34⤵
- Executes dropped EXE
PID:5132 -
C:\Windows\SysWOW64\Ombcji32.exeC:\Windows\system32\Ombcji32.exe35⤵
- Executes dropped EXE
PID:5172 -
C:\Windows\SysWOW64\Ofkgcobj.exeC:\Windows\system32\Ofkgcobj.exe36⤵
- Executes dropped EXE
PID:5212 -
C:\Windows\SysWOW64\Oaplqh32.exeC:\Windows\system32\Oaplqh32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:5252 -
C:\Windows\SysWOW64\Ojhpimhp.exeC:\Windows\system32\Ojhpimhp.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5288 -
C:\Windows\SysWOW64\Ocaebc32.exeC:\Windows\system32\Ocaebc32.exe39⤵
- Executes dropped EXE
PID:5324 -
C:\Windows\SysWOW64\Pnfiplog.exeC:\Windows\system32\Pnfiplog.exe40⤵
- Executes dropped EXE
PID:5360 -
C:\Windows\SysWOW64\Phonha32.exeC:\Windows\system32\Phonha32.exe41⤵
- Executes dropped EXE
PID:5396 -
C:\Windows\SysWOW64\Pagbaglh.exeC:\Windows\system32\Pagbaglh.exe42⤵
- Executes dropped EXE
PID:5432 -
C:\Windows\SysWOW64\Pjpfjl32.exeC:\Windows\system32\Pjpfjl32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:5468 -
C:\Windows\SysWOW64\Pdhkcb32.exeC:\Windows\system32\Pdhkcb32.exe44⤵
- Executes dropped EXE
PID:5504 -
C:\Windows\SysWOW64\Pmpolgoi.exeC:\Windows\system32\Pmpolgoi.exe45⤵
- Executes dropped EXE
PID:5540 -
C:\Windows\SysWOW64\Pfiddm32.exeC:\Windows\system32\Pfiddm32.exe46⤵
- Executes dropped EXE
PID:5576 -
C:\Windows\SysWOW64\Ppahmb32.exeC:\Windows\system32\Ppahmb32.exe47⤵
- Executes dropped EXE
PID:5612 -
C:\Windows\SysWOW64\Qobhkjdi.exeC:\Windows\system32\Qobhkjdi.exe48⤵
- Executes dropped EXE
PID:5648 -
C:\Windows\SysWOW64\Qhjmdp32.exeC:\Windows\system32\Qhjmdp32.exe49⤵
- Executes dropped EXE
PID:5684 -
C:\Windows\SysWOW64\Qacameaj.exeC:\Windows\system32\Qacameaj.exe50⤵
- Executes dropped EXE
PID:5720 -
C:\Windows\SysWOW64\Akkffkhk.exeC:\Windows\system32\Akkffkhk.exe51⤵
- Executes dropped EXE
PID:5756 -
C:\Windows\SysWOW64\Adcjop32.exeC:\Windows\system32\Adcjop32.exe52⤵
- Executes dropped EXE
PID:5792 -
C:\Windows\SysWOW64\Amlogfel.exeC:\Windows\system32\Amlogfel.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5828 -
C:\Windows\SysWOW64\Agdcpkll.exeC:\Windows\system32\Agdcpkll.exe54⤵
- Executes dropped EXE
PID:5864 -
C:\Windows\SysWOW64\Aajhndkb.exeC:\Windows\system32\Aajhndkb.exe55⤵
- Executes dropped EXE
PID:5900 -
C:\Windows\SysWOW64\Akblfj32.exeC:\Windows\system32\Akblfj32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5936 -
C:\Windows\SysWOW64\Adkqoohc.exeC:\Windows\system32\Adkqoohc.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5972 -
C:\Windows\SysWOW64\Aopemh32.exeC:\Windows\system32\Aopemh32.exe58⤵
- Executes dropped EXE
PID:6008 -
C:\Windows\SysWOW64\Bhhiemoj.exeC:\Windows\system32\Bhhiemoj.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:6044 -
C:\Windows\SysWOW64\Bmeandma.exeC:\Windows\system32\Bmeandma.exe60⤵
- Executes dropped EXE
PID:6080 -
C:\Windows\SysWOW64\Bgnffj32.exeC:\Windows\system32\Bgnffj32.exe61⤵
- Executes dropped EXE
PID:6116 -
C:\Windows\SysWOW64\Bacjdbch.exeC:\Windows\system32\Bacjdbch.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\Bklomh32.exeC:\Windows\system32\Bklomh32.exe63⤵
- Executes dropped EXE
PID:5156 -
C:\Windows\SysWOW64\Bphgeo32.exeC:\Windows\system32\Bphgeo32.exe64⤵
- Executes dropped EXE
PID:5224 -
C:\Windows\SysWOW64\Boihcf32.exeC:\Windows\system32\Boihcf32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5280 -
C:\Windows\SysWOW64\Bhblllfo.exeC:\Windows\system32\Bhblllfo.exe66⤵
- Executes dropped EXE
PID:5348 -
C:\Windows\SysWOW64\Bnoddcef.exeC:\Windows\system32\Bnoddcef.exe67⤵
- Drops file in System32 directory
PID:5424 -
C:\Windows\SysWOW64\Cggimh32.exeC:\Windows\system32\Cggimh32.exe68⤵PID:5484
-
C:\Windows\SysWOW64\Cponen32.exeC:\Windows\system32\Cponen32.exe69⤵PID:5532
-
C:\Windows\SysWOW64\Coqncejg.exeC:\Windows\system32\Coqncejg.exe70⤵PID:5600
-
C:\Windows\SysWOW64\Cdmfllhn.exeC:\Windows\system32\Cdmfllhn.exe71⤵
- Drops file in System32 directory
PID:5668 -
C:\Windows\SysWOW64\Cnfkdb32.exeC:\Windows\system32\Cnfkdb32.exe72⤵PID:5728
-
C:\Windows\SysWOW64\Chkobkod.exeC:\Windows\system32\Chkobkod.exe73⤵PID:5800
-
C:\Windows\SysWOW64\Cacckp32.exeC:\Windows\system32\Cacckp32.exe74⤵PID:5856
-
C:\Windows\SysWOW64\Cgqlcg32.exeC:\Windows\system32\Cgqlcg32.exe75⤵
- Drops file in System32 directory
PID:5924 -
C:\Windows\SysWOW64\Dpiplm32.exeC:\Windows\system32\Dpiplm32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5992 -
C:\Windows\SysWOW64\Dojqjdbl.exeC:\Windows\system32\Dojqjdbl.exe77⤵PID:6060
-
C:\Windows\SysWOW64\Dhbebj32.exeC:\Windows\system32\Dhbebj32.exe78⤵PID:6124
-
C:\Windows\SysWOW64\Dnonkq32.exeC:\Windows\system32\Dnonkq32.exe79⤵PID:5140
-
C:\Windows\SysWOW64\Dggbcf32.exeC:\Windows\system32\Dggbcf32.exe80⤵PID:5268
-
C:\Windows\SysWOW64\Dqpfmlce.exeC:\Windows\system32\Dqpfmlce.exe81⤵PID:5384
-
C:\Windows\SysWOW64\Dkekjdck.exeC:\Windows\system32\Dkekjdck.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5512 -
C:\Windows\SysWOW64\Ddnobj32.exeC:\Windows\system32\Ddnobj32.exe83⤵PID:5592
-
C:\Windows\SysWOW64\Enfckp32.exeC:\Windows\system32\Enfckp32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5712 -
C:\Windows\SysWOW64\Ekjded32.exeC:\Windows\system32\Ekjded32.exe85⤵PID:5844
-
C:\Windows\SysWOW64\Edbiniff.exeC:\Windows\system32\Edbiniff.exe86⤵PID:5960
-
C:\Windows\SysWOW64\Ebfign32.exeC:\Windows\system32\Ebfign32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6088 -
C:\Windows\SysWOW64\Eojiqb32.exeC:\Windows\system32\Eojiqb32.exe88⤵PID:5184
-
C:\Windows\SysWOW64\Ehbnigjj.exeC:\Windows\system32\Ehbnigjj.exe89⤵PID:5340
-
C:\Windows\SysWOW64\Ebkbbmqj.exeC:\Windows\system32\Ebkbbmqj.exe90⤵PID:5556
-
C:\Windows\SysWOW64\Ekcgkb32.exeC:\Windows\system32\Ekcgkb32.exe91⤵PID:5772
-
C:\Windows\SysWOW64\Figgdg32.exeC:\Windows\system32\Figgdg32.exe92⤵PID:5944
-
C:\Windows\SysWOW64\Fqbliicp.exeC:\Windows\system32\Fqbliicp.exe93⤵PID:3972
-
C:\Windows\SysWOW64\Foclgq32.exeC:\Windows\system32\Foclgq32.exe94⤵PID:5456
-
C:\Windows\SysWOW64\Fgoakc32.exeC:\Windows\system32\Fgoakc32.exe95⤵PID:5880
-
C:\Windows\SysWOW64\Fqgedh32.exeC:\Windows\system32\Fqgedh32.exe96⤵PID:6136
-
C:\Windows\SysWOW64\Fnkfmm32.exeC:\Windows\system32\Fnkfmm32.exe97⤵PID:6156
-
C:\Windows\SysWOW64\Fkofga32.exeC:\Windows\system32\Fkofga32.exe98⤵
- Modifies registry class
PID:6188 -
C:\Windows\SysWOW64\Gegkpf32.exeC:\Windows\system32\Gegkpf32.exe99⤵PID:6228
-
C:\Windows\SysWOW64\Gbkkik32.exeC:\Windows\system32\Gbkkik32.exe100⤵
- Modifies registry class
PID:6264 -
C:\Windows\SysWOW64\Gkdpbpih.exeC:\Windows\system32\Gkdpbpih.exe101⤵PID:6300
-
C:\Windows\SysWOW64\Gihpkd32.exeC:\Windows\system32\Gihpkd32.exe102⤵
- Drops file in System32 directory
PID:6336 -
C:\Windows\SysWOW64\Gacepg32.exeC:\Windows\system32\Gacepg32.exe103⤵
- Drops file in System32 directory
PID:6372 -
C:\Windows\SysWOW64\Gngeik32.exeC:\Windows\system32\Gngeik32.exe104⤵PID:6408
-
C:\Windows\SysWOW64\Ghojbq32.exeC:\Windows\system32\Ghojbq32.exe105⤵PID:6440
-
C:\Windows\SysWOW64\Hahokfag.exeC:\Windows\system32\Hahokfag.exe106⤵PID:6480
-
C:\Windows\SysWOW64\Hpioin32.exeC:\Windows\system32\Hpioin32.exe107⤵PID:6516
-
C:\Windows\SysWOW64\Hhdcmp32.exeC:\Windows\system32\Hhdcmp32.exe108⤵
- Modifies registry class
PID:6548 -
C:\Windows\SysWOW64\Hbihjifh.exeC:\Windows\system32\Hbihjifh.exe109⤵PID:6588
-
C:\Windows\SysWOW64\Hpmhdmea.exeC:\Windows\system32\Hpmhdmea.exe110⤵PID:6624
-
C:\Windows\SysWOW64\Hejqldci.exeC:\Windows\system32\Hejqldci.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6660 -
C:\Windows\SysWOW64\Hnbeeiji.exeC:\Windows\system32\Hnbeeiji.exe112⤵
- Drops file in System32 directory
PID:6696 -
C:\Windows\SysWOW64\Ilfennic.exeC:\Windows\system32\Ilfennic.exe113⤵PID:6732
-
C:\Windows\SysWOW64\Ieojgc32.exeC:\Windows\system32\Ieojgc32.exe114⤵PID:6768
-
C:\Windows\SysWOW64\Ipdndloi.exeC:\Windows\system32\Ipdndloi.exe115⤵PID:6804
-
C:\Windows\SysWOW64\Ihpcinld.exeC:\Windows\system32\Ihpcinld.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6840 -
C:\Windows\SysWOW64\Iialhaad.exeC:\Windows\system32\Iialhaad.exe117⤵
- Drops file in System32 directory
PID:6392 -
C:\Windows\SysWOW64\Ljbnfleo.exeC:\Windows\system32\Ljbnfleo.exe118⤵PID:6464
-
C:\Windows\SysWOW64\Lckboblp.exeC:\Windows\system32\Lckboblp.exe119⤵PID:3856
-
C:\Windows\SysWOW64\Llcghg32.exeC:\Windows\system32\Llcghg32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6616 -
C:\Windows\SysWOW64\Mjggal32.exeC:\Windows\system32\Mjggal32.exe121⤵
- Modifies registry class
PID:6688 -
C:\Windows\SysWOW64\Mljmhflh.exeC:\Windows\system32\Mljmhflh.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-