Analysis
-
max time kernel
130s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 02:27
Behavioral task
behavioral1
Sample
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe
-
Size
664KB
-
MD5
52baf0723f9f35f901a0955048ed4e20
-
SHA1
115e43a9c627ae9478997a4dc9ec10d465b2070a
-
SHA256
22376047e86a694868f239cd4cf50209a00698ec07a2898cb663256cf10a6467
-
SHA512
45aad05214dda22fecd791b27d5ee2f207fcc048d5d25b0cf4042ceb3d1fe8b3bc5c368c5787b9eecb46d33a88b413a46a80a837928acf5ec5069c145460d872
-
SSDEEP
12288:nGqUUCpV6yYP4rbpV6yYPg058KpV6yYPNUir2MhNl6zX3w9As/xO23WM6tJmDYjF:n1UUCW4XWleKWNUir2MhNl6zX3w9As/8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ipnalhii.exeAldomc32.exeNngokoej.exeJaimbj32.exeJpojcf32.exeCjmgfgdf.exeDeagdn32.exeCacmah32.exeGcddpdpo.exeImfdff32.exeDfiafg32.exeHihicplj.exeMnlfigcc.exeMajopeii.exeBaaplhef.exePqdqof32.exeHbhdmd32.exePnfkma32.exeGdhmnlcj.exeMgimcebb.exeKphmie32.exeKgdbkohf.exePgopffec.exeElagacbk.exeEmjjgbjp.exeGjapmdid.exeIjkljp32.exeGbjhlfhb.exeBbifelba.exeLlemdo32.exeDdjejl32.exeDdonekbl.exeHbckbepg.exeBdolhc32.exeEapedd32.exeFooeif32.exeEcphimfb.exeEcmeig32.exeDfpgffpm.exeBldgdago.exeOgnpebpj.exeDdakjkqi.exeMaaepd32.exeQcgffqei.exeAminee32.exeFojlngce.exePjcbbmif.exePclgkb32.exeDkgqfl32.exeOnfbfc32.exeElgfgl32.exeEadopc32.exeGhopckpi.exeJfoiokfb.exeJfffjqdf.exeCahfmgoo.exeMipcob32.exePncgmkmj.exeIbmmhdhm.exeAegikj32.exeDadeieea.exeAgjhgngj.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipnalhii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aldomc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nngokoej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jaimbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jpojcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjmgfgdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cacmah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcddpdpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Imfdff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfiafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hihicplj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mnlfigcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Majopeii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Baaplhef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqdqof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbhdmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pnfkma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdhmnlcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgimcebb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kphmie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgdbkohf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pgopffec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elagacbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Emjjgbjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gjapmdid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gbjhlfhb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbifelba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Llemdo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjejl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbckbepg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdolhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eapedd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fooeif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ecphimfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bdolhc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecmeig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bldgdago.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gdhmnlcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ognpebpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Maaepd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcgffqei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aminee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fojlngce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjcbbmif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pclgkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkgqfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Onfbfc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elgfgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eadopc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghopckpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jfoiokfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jfffjqdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cahfmgoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mipcob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pncgmkmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ibmmhdhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aegikj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dadeieea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agjhgngj.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Dljqpd32.exe family_berbew C:\Windows\SysWOW64\Dcdimopp.exe family_berbew C:\Windows\SysWOW64\Dokjbp32.exe family_berbew C:\Windows\SysWOW64\Dfdbojmq.exe family_berbew C:\Windows\SysWOW64\Dpjflb32.exe family_berbew C:\Windows\SysWOW64\Elagacbk.exe family_berbew C:\Windows\SysWOW64\Epopgbia.exe family_berbew C:\Windows\SysWOW64\Ejgdpg32.exe family_berbew C:\Windows\SysWOW64\Ecphimfb.exe family_berbew C:\Windows\SysWOW64\Efneehef.exe family_berbew C:\Windows\SysWOW64\Eofinnkf.exe family_berbew C:\Windows\SysWOW64\Emjjgbjp.exe family_berbew C:\Windows\SysWOW64\Ecdbdl32.exe family_berbew C:\Windows\SysWOW64\Fcgoilpj.exe family_berbew C:\Windows\SysWOW64\Fjqgff32.exe family_berbew C:\Windows\SysWOW64\Fifdgblo.exe family_berbew C:\Windows\SysWOW64\Ffjdqg32.exe family_berbew C:\Windows\SysWOW64\Fobiilai.exe family_berbew C:\Windows\SysWOW64\Fijmbb32.exe family_berbew C:\Windows\SysWOW64\Fodeolof.exe family_berbew C:\Windows\SysWOW64\Gimjhafg.exe family_berbew C:\Windows\SysWOW64\Gcbnejem.exe family_berbew C:\Windows\SysWOW64\Goiojk32.exe family_berbew C:\Windows\SysWOW64\Gjocgdkg.exe family_berbew C:\Windows\SysWOW64\Gbjhlfhb.exe family_berbew C:\Windows\SysWOW64\Gjapmdid.exe family_berbew C:\Windows\SysWOW64\Gjclbc32.exe family_berbew C:\Windows\SysWOW64\Gameonno.exe family_berbew C:\Windows\SysWOW64\Hihicplj.exe family_berbew C:\Windows\SysWOW64\Hpbaqj32.exe family_berbew C:\Windows\SysWOW64\Hfljmdjc.exe family_berbew C:\Windows\SysWOW64\Hbckbepg.exe family_berbew C:\Windows\SysWOW64\Icljbg32.exe family_berbew C:\Windows\SysWOW64\Jmpngk32.exe family_berbew C:\Windows\SysWOW64\Jpaghf32.exe family_berbew C:\Windows\SysWOW64\Kmgdgjek.exe family_berbew C:\Windows\SysWOW64\Kphmie32.exe family_berbew C:\Windows\SysWOW64\Lgikfn32.exe family_berbew C:\Windows\SysWOW64\Mnlfigcc.exe family_berbew C:\Windows\SysWOW64\Mpolqa32.exe family_berbew C:\Windows\SysWOW64\Mpaifalo.exe family_berbew C:\Windows\SysWOW64\Mkgmcjld.exe family_berbew C:\Windows\SysWOW64\Ngcgcjnc.exe family_berbew C:\Windows\SysWOW64\Nqmhbpba.exe family_berbew C:\Windows\SysWOW64\Nbmelbid.exe family_berbew C:\Windows\SysWOW64\Oqbamo32.exe family_berbew C:\Windows\SysWOW64\Onfbfc32.exe family_berbew C:\Windows\SysWOW64\Obidhaog.exe family_berbew C:\Windows\SysWOW64\Pabkdmpi.exe family_berbew C:\Windows\SysWOW64\Pagdol32.exe family_berbew C:\Windows\SysWOW64\Qnkdhpjn.exe family_berbew C:\Windows\SysWOW64\Qgciaf32.exe family_berbew C:\Windows\SysWOW64\Anpncp32.exe family_berbew C:\Windows\SysWOW64\Aacckjaf.exe family_berbew C:\Windows\SysWOW64\Bbifelba.exe family_berbew C:\Windows\SysWOW64\Cdiooblp.exe family_berbew C:\Windows\SysWOW64\Dkgqfl32.exe family_berbew C:\Windows\SysWOW64\Ddgkpp32.exe family_berbew C:\Windows\SysWOW64\Ednaqo32.exe family_berbew C:\Windows\SysWOW64\Fcckif32.exe family_berbew C:\Windows\SysWOW64\Fkalchij.exe family_berbew C:\Windows\SysWOW64\Fkffog32.exe family_berbew C:\Windows\SysWOW64\Hopnqdan.exe family_berbew C:\Windows\SysWOW64\Hflcbngh.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Dljqpd32.exeDcdimopp.exeDokjbp32.exeDfdbojmq.exeDpjflb32.exeElagacbk.exeEpopgbia.exeEjgdpg32.exeEcphimfb.exeEfneehef.exeEofinnkf.exeEmjjgbjp.exeEcdbdl32.exeFcgoilpj.exeFjqgff32.exeFifdgblo.exeFfjdqg32.exeFobiilai.exeFijmbb32.exeFodeolof.exeGimjhafg.exeGcbnejem.exeGoiojk32.exeGjocgdkg.exeGbjhlfhb.exeGjapmdid.exeGjclbc32.exeGameonno.exeHihicplj.exeHpbaqj32.exeHfljmdjc.exeHbckbepg.exeHccglh32.exeHfachc32.exeHippdo32.exeHpihai32.exeHbhdmd32.exeHjolnb32.exeHmmhjm32.exeIcgqggce.exeImpepm32.exeIpnalhii.exeIbmmhdhm.exeIjdeiaio.exeIannfk32.exeIcljbg32.exeIfjfnb32.exeImdnklfp.exeIpckgh32.exeIbagcc32.exeIikopmkd.exeIabgaklg.exeIdacmfkj.exeIjkljp32.exeJaedgjjd.exeJdcpcf32.exeJjmhppqd.exeJmkdlkph.exeJpjqhgol.exeJfdida32.exeJaimbj32.exeJdhine32.exeJfffjqdf.exeJmpngk32.exepid process 892 Dljqpd32.exe 380 Dcdimopp.exe 2132 Dokjbp32.exe 4728 Dfdbojmq.exe 4604 Dpjflb32.exe 2216 Elagacbk.exe 3324 Epopgbia.exe 2824 Ejgdpg32.exe 2088 Ecphimfb.exe 4064 Efneehef.exe 3120 Eofinnkf.exe 3308 Emjjgbjp.exe 4372 Ecdbdl32.exe 5088 Fcgoilpj.exe 2364 Fjqgff32.exe 1924 Fifdgblo.exe 2936 Ffjdqg32.exe 4888 Fobiilai.exe 1488 Fijmbb32.exe 2204 Fodeolof.exe 3460 Gimjhafg.exe 2932 Gcbnejem.exe 3664 Goiojk32.exe 3752 Gjocgdkg.exe 5040 Gbjhlfhb.exe 1656 Gjapmdid.exe 2956 Gjclbc32.exe 1708 Gameonno.exe 1132 Hihicplj.exe 3352 Hpbaqj32.exe 4732 Hfljmdjc.exe 3744 Hbckbepg.exe 1260 Hccglh32.exe 3684 Hfachc32.exe 3316 Hippdo32.exe 2984 Hpihai32.exe 840 Hbhdmd32.exe 3652 Hjolnb32.exe 4864 Hmmhjm32.exe 4540 Icgqggce.exe 1872 Impepm32.exe 3096 Ipnalhii.exe 4556 Ibmmhdhm.exe 1376 Ijdeiaio.exe 2148 Iannfk32.exe 3528 Icljbg32.exe 3148 Ifjfnb32.exe 1960 Imdnklfp.exe 64 Ipckgh32.exe 5044 Ibagcc32.exe 3700 Iikopmkd.exe 4796 Iabgaklg.exe 1372 Idacmfkj.exe 372 Ijkljp32.exe 3228 Jaedgjjd.exe 2260 Jdcpcf32.exe 60 Jjmhppqd.exe 4488 Jmkdlkph.exe 4672 Jpjqhgol.exe 3172 Jfdida32.exe 3488 Jaimbj32.exe 2988 Jdhine32.exe 4720 Jfffjqdf.exe 1880 Jmpngk32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Hcpclbfa.exeOgnpebpj.exeAabmqd32.exeMkgmcjld.exeGlhonj32.exeFcckif32.exeKlgqcqkl.exeKplpjn32.exeNqfbaq32.exePaegjl32.exePjffbc32.exeGdhmnlcj.exeHmjdjgjo.exeKlljnp32.exeLmdina32.exeOflgep32.exeLcdegnep.exeNbmelbid.exeNqiogp32.exeOgaceh32.exePeqcjkfp.exeHbpgbo32.exeLphoelqn.exeMcpnhfhf.exeDljqpd32.exeKckbqpnj.exeDdakjkqi.exeDdmaok32.exeFobiilai.exeGbdgfa32.exePqpnombl.exeCeoibflm.exeFhqcam32.exeEcdbdl32.exeQeemej32.exeJfdida32.exeOdbgim32.exePkaiqf32.exeCacmah32.exeHeapdjlp.exeFjqgff32.exeJmbklj32.exeNdghmo32.exeChpada32.exeKdnidn32.exeOdapnf32.exeAeiofcji.exeHccglh32.exeJpjqhgol.exeBjagjhnc.exeHofdacke.exeBebblb32.exeLnjjdgee.exeEchknh32.exeFkffog32.exeGkhbdg32.exeImdnklfp.exeDhnnep32.exeJefbfgig.exeKbfbkj32.exedescription ioc process File created C:\Windows\SysWOW64\Heapdjlp.exe Hcpclbfa.exe File created C:\Windows\SysWOW64\Dfdjmlhn.dll Ognpebpj.exe File opened for modification C:\Windows\SysWOW64\Aglemn32.exe Aabmqd32.exe File created C:\Windows\SysWOW64\Bebboiqi.dll Mkgmcjld.exe File created C:\Windows\SysWOW64\Gkkojgao.exe Glhonj32.exe File created C:\Windows\SysWOW64\Fhqcam32.exe Fcckif32.exe File opened for modification C:\Windows\SysWOW64\Kdnidn32.exe Klgqcqkl.exe File created C:\Windows\SysWOW64\Bdkfmkdc.dll Kplpjn32.exe File opened for modification C:\Windows\SysWOW64\Nceonl32.exe Nqfbaq32.exe File created C:\Windows\SysWOW64\Pkjnpq32.dll Paegjl32.exe File created C:\Windows\SysWOW64\Pnbbbabh.exe Pjffbc32.exe File created C:\Windows\SysWOW64\Ifmafkkf.dll Gdhmnlcj.exe File created C:\Windows\SysWOW64\Hfcicmqp.exe Hmjdjgjo.exe File opened for modification C:\Windows\SysWOW64\Kbfbkj32.exe Klljnp32.exe File opened for modification C:\Windows\SysWOW64\Lbabgh32.exe Lmdina32.exe File created C:\Windows\SysWOW64\Ohbkfake.dll Oflgep32.exe File created C:\Windows\SysWOW64\Bheenp32.dll Lcdegnep.exe File opened for modification C:\Windows\SysWOW64\Ojhiqefo.exe Nbmelbid.exe File created C:\Windows\SysWOW64\Ngcgcjnc.exe Nqiogp32.exe File opened for modification C:\Windows\SysWOW64\Ojopad32.exe Ogaceh32.exe File created C:\Windows\SysWOW64\Pgopffec.exe Peqcjkfp.exe File created C:\Windows\SysWOW64\Hflcbngh.exe Hbpgbo32.exe File created C:\Windows\SysWOW64\Nniadn32.dll Lphoelqn.exe File created C:\Windows\SysWOW64\Nepgjaeg.exe Mcpnhfhf.exe File created C:\Windows\SysWOW64\Jehocmdp.dll Dljqpd32.exe File opened for modification C:\Windows\SysWOW64\Liekmj32.exe Kckbqpnj.exe File created C:\Windows\SysWOW64\Kmdjdl32.dll Ddakjkqi.exe File created C:\Windows\SysWOW64\Cogflbdn.dll Ddmaok32.exe File created C:\Windows\SysWOW64\Fijmbb32.exe Fobiilai.exe File opened for modification C:\Windows\SysWOW64\Gfpcgpae.exe Gbdgfa32.exe File opened for modification C:\Windows\SysWOW64\Pcojkhap.exe Pqpnombl.exe File created C:\Windows\SysWOW64\Cliaoq32.exe Ceoibflm.exe File created C:\Windows\SysWOW64\Fojlngce.exe Fhqcam32.exe File created C:\Windows\SysWOW64\Fcgoilpj.exe Ecdbdl32.exe File created C:\Windows\SysWOW64\Ojopad32.exe Ogaceh32.exe File created C:\Windows\SysWOW64\Mjipjg32.dll Qeemej32.exe File opened for modification C:\Windows\SysWOW64\Jaimbj32.exe Jfdida32.exe File created C:\Windows\SysWOW64\Ogaceh32.exe Odbgim32.exe File created C:\Windows\SysWOW64\Pnpemb32.exe Pkaiqf32.exe File created C:\Windows\SysWOW64\Cilkoi32.dll Cacmah32.exe File created C:\Windows\SysWOW64\Hofdacke.exe Heapdjlp.exe File created C:\Windows\SysWOW64\Mcplce32.dll Fjqgff32.exe File created C:\Windows\SysWOW64\Nilhco32.dll Jmbklj32.exe File opened for modification C:\Windows\SysWOW64\Njcpee32.exe Ndghmo32.exe File created C:\Windows\SysWOW64\Hbcaee32.dll Ceoibflm.exe File created C:\Windows\SysWOW64\Keoakjca.dll Chpada32.exe File created C:\Windows\SysWOW64\Kfmepi32.exe Kdnidn32.exe File created C:\Windows\SysWOW64\Qfbgbeai.dll Odapnf32.exe File opened for modification C:\Windows\SysWOW64\Ajfhnjhq.exe Aeiofcji.exe File created C:\Windows\SysWOW64\Hfachc32.exe Hccglh32.exe File opened for modification C:\Windows\SysWOW64\Jfdida32.exe Jpjqhgol.exe File opened for modification C:\Windows\SysWOW64\Bcjlcn32.exe Bjagjhnc.exe File created C:\Windows\SysWOW64\Choehhlk.dll Hofdacke.exe File created C:\Windows\SysWOW64\Bmngqdpj.exe Bebblb32.exe File opened for modification C:\Windows\SysWOW64\Lphfpbdi.exe Lnjjdgee.exe File opened for modification C:\Windows\SysWOW64\Eaklidoi.exe Echknh32.exe File created C:\Windows\SysWOW64\Fbpnkama.exe Fkffog32.exe File created C:\Windows\SysWOW64\Gcojed32.exe Gkhbdg32.exe File opened for modification C:\Windows\SysWOW64\Gmoeoidl.exe Gdhmnlcj.exe File created C:\Windows\SysWOW64\Kdnidn32.exe Klgqcqkl.exe File created C:\Windows\SysWOW64\Ikjmhmfd.dll Imdnklfp.exe File created C:\Windows\SysWOW64\Ipenkiei.dll Dhnnep32.exe File created C:\Windows\SysWOW64\Jjbedgde.dll Jefbfgig.exe File created C:\Windows\SysWOW64\Kmkfhc32.exe Kbfbkj32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 12176 12096 WerFault.exe Dmllipeg.exe -
Modifies registry class 64 IoCs
Processes:
Lbjlfi32.exeHippdo32.exeIpnalhii.exeKmgdgjek.exeColffknh.exeFhgjblfq.exeNpfkgjdn.exeIabgaklg.exeAnpncp32.exeDbaemi32.exeLbabgh32.exeDmefhako.exeHbhdmd32.exeObdkma32.exeCfpnph32.exeJfdida32.exeLknjmkdo.exeGoiojk32.exeAlhhhcal.exeOdapnf32.exeDeoaid32.exeElppfmoo.exeEdkdkplj.exeGbjhlfhb.exeAacckjaf.exeBejogg32.exeDadeieea.exePgioqq32.exeDogogcpo.exeBjpaooda.exeJpppnp32.exeMchhggno.exeDdjejl32.exeMpaifalo.exePgmcqggf.exeBdfibe32.exeDafbne32.exeFckajehi.exeGkoiefmj.exeNklfoi32.exeLiddbc32.exeEpopgbia.exeOgcpjhoq.exeCknnpm32.exeDaaicfgd.exeAgjhgngj.exeBebblb32.exeHccglh32.exeMjcgohig.exeAgffge32.exeAejfpjne.exeEdnaqo32.exeJlpkba32.exeLboeaifi.exeOponmilc.exeIjdeiaio.exeJmpngk32.exeOjhiqefo.exePabkdmpi.exeAldomc32.exeCjpckf32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfkfpo32.dll" Lbjlfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hippdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ipnalhii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kmgdgjek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Becbkfdh.dll" Colffknh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fhgjblfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Npfkgjdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iabgaklg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Anpncp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dbaemi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lbabgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjelcfha.dll" Dmefhako.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkbhbe32.dll" Hbhdmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egjpehcm.dll" Obdkma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Leqcod32.dll" Jfdida32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dapgdeib.dll" Npfkgjdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Goiojk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Alhhhcal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Odapnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjpqmmkb.dll" Deoaid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Elppfmoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Edkdkplj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gbjhlfhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aacckjaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bejogg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cecenn32.dll" Dadeieea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pgioqq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kahdohfm.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bjpaooda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jpppnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mchhggno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddjejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mpaifalo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pgmcqggf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bdfibe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dafbne32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fckajehi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnfeqknj.dll" Gkoiefmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nklfoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Liddbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfdcbdnc.dll" Epopgbia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcnakq32.dll" Ogcpjhoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cknnpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbldglg.dll" Daaicfgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Agjhgngj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bebblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pgioqq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hccglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnohlokp.dll" Mjcgohig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Agffge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aejfpjne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ednaqo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jlpkba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lboeaifi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oponmilc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbhdmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ijdeiaio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jmpngk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ojhiqefo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pabkdmpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aldomc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cjpckf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exeDljqpd32.exeDcdimopp.exeDokjbp32.exeDfdbojmq.exeDpjflb32.exeElagacbk.exeEpopgbia.exeEjgdpg32.exeEcphimfb.exeEfneehef.exeEofinnkf.exeEmjjgbjp.exeEcdbdl32.exeFcgoilpj.exeFjqgff32.exeFifdgblo.exeFfjdqg32.exeFobiilai.exeFijmbb32.exeFodeolof.exeGimjhafg.exedescription pid process target process PID 2992 wrote to memory of 892 2992 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe Dljqpd32.exe PID 2992 wrote to memory of 892 2992 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe Dljqpd32.exe PID 2992 wrote to memory of 892 2992 52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe Dljqpd32.exe PID 892 wrote to memory of 380 892 Dljqpd32.exe Dcdimopp.exe PID 892 wrote to memory of 380 892 Dljqpd32.exe Dcdimopp.exe PID 892 wrote to memory of 380 892 Dljqpd32.exe Dcdimopp.exe PID 380 wrote to memory of 2132 380 Dcdimopp.exe Dokjbp32.exe PID 380 wrote to memory of 2132 380 Dcdimopp.exe Dokjbp32.exe PID 380 wrote to memory of 2132 380 Dcdimopp.exe Dokjbp32.exe PID 2132 wrote to memory of 4728 2132 Dokjbp32.exe Dfdbojmq.exe PID 2132 wrote to memory of 4728 2132 Dokjbp32.exe Dfdbojmq.exe PID 2132 wrote to memory of 4728 2132 Dokjbp32.exe Dfdbojmq.exe PID 4728 wrote to memory of 4604 4728 Dfdbojmq.exe Dpjflb32.exe PID 4728 wrote to memory of 4604 4728 Dfdbojmq.exe Dpjflb32.exe PID 4728 wrote to memory of 4604 4728 Dfdbojmq.exe Dpjflb32.exe PID 4604 wrote to memory of 2216 4604 Dpjflb32.exe Elagacbk.exe PID 4604 wrote to memory of 2216 4604 Dpjflb32.exe Elagacbk.exe PID 4604 wrote to memory of 2216 4604 Dpjflb32.exe Elagacbk.exe PID 2216 wrote to memory of 3324 2216 Elagacbk.exe Epopgbia.exe PID 2216 wrote to memory of 3324 2216 Elagacbk.exe Epopgbia.exe PID 2216 wrote to memory of 3324 2216 Elagacbk.exe Epopgbia.exe PID 3324 wrote to memory of 2824 3324 Epopgbia.exe Ejgdpg32.exe PID 3324 wrote to memory of 2824 3324 Epopgbia.exe Ejgdpg32.exe PID 3324 wrote to memory of 2824 3324 Epopgbia.exe Ejgdpg32.exe PID 2824 wrote to memory of 2088 2824 Ejgdpg32.exe Ecphimfb.exe PID 2824 wrote to memory of 2088 2824 Ejgdpg32.exe Ecphimfb.exe PID 2824 wrote to memory of 2088 2824 Ejgdpg32.exe Ecphimfb.exe PID 2088 wrote to memory of 4064 2088 Ecphimfb.exe Efneehef.exe PID 2088 wrote to memory of 4064 2088 Ecphimfb.exe Efneehef.exe PID 2088 wrote to memory of 4064 2088 Ecphimfb.exe Efneehef.exe PID 4064 wrote to memory of 3120 4064 Efneehef.exe Eofinnkf.exe PID 4064 wrote to memory of 3120 4064 Efneehef.exe Eofinnkf.exe PID 4064 wrote to memory of 3120 4064 Efneehef.exe Eofinnkf.exe PID 3120 wrote to memory of 3308 3120 Eofinnkf.exe Emjjgbjp.exe PID 3120 wrote to memory of 3308 3120 Eofinnkf.exe Emjjgbjp.exe PID 3120 wrote to memory of 3308 3120 Eofinnkf.exe Emjjgbjp.exe PID 3308 wrote to memory of 4372 3308 Emjjgbjp.exe Ecdbdl32.exe PID 3308 wrote to memory of 4372 3308 Emjjgbjp.exe Ecdbdl32.exe PID 3308 wrote to memory of 4372 3308 Emjjgbjp.exe Ecdbdl32.exe PID 4372 wrote to memory of 5088 4372 Ecdbdl32.exe Fcgoilpj.exe PID 4372 wrote to memory of 5088 4372 Ecdbdl32.exe Fcgoilpj.exe PID 4372 wrote to memory of 5088 4372 Ecdbdl32.exe Fcgoilpj.exe PID 5088 wrote to memory of 2364 5088 Fcgoilpj.exe Fjqgff32.exe PID 5088 wrote to memory of 2364 5088 Fcgoilpj.exe Fjqgff32.exe PID 5088 wrote to memory of 2364 5088 Fcgoilpj.exe Fjqgff32.exe PID 2364 wrote to memory of 1924 2364 Fjqgff32.exe Fifdgblo.exe PID 2364 wrote to memory of 1924 2364 Fjqgff32.exe Fifdgblo.exe PID 2364 wrote to memory of 1924 2364 Fjqgff32.exe Fifdgblo.exe PID 1924 wrote to memory of 2936 1924 Fifdgblo.exe Ffjdqg32.exe PID 1924 wrote to memory of 2936 1924 Fifdgblo.exe Ffjdqg32.exe PID 1924 wrote to memory of 2936 1924 Fifdgblo.exe Ffjdqg32.exe PID 2936 wrote to memory of 4888 2936 Ffjdqg32.exe Fobiilai.exe PID 2936 wrote to memory of 4888 2936 Ffjdqg32.exe Fobiilai.exe PID 2936 wrote to memory of 4888 2936 Ffjdqg32.exe Fobiilai.exe PID 4888 wrote to memory of 1488 4888 Fobiilai.exe Fijmbb32.exe PID 4888 wrote to memory of 1488 4888 Fobiilai.exe Fijmbb32.exe PID 4888 wrote to memory of 1488 4888 Fobiilai.exe Fijmbb32.exe PID 1488 wrote to memory of 2204 1488 Fijmbb32.exe Fodeolof.exe PID 1488 wrote to memory of 2204 1488 Fijmbb32.exe Fodeolof.exe PID 1488 wrote to memory of 2204 1488 Fijmbb32.exe Fodeolof.exe PID 2204 wrote to memory of 3460 2204 Fodeolof.exe Gimjhafg.exe PID 2204 wrote to memory of 3460 2204 Fodeolof.exe Gimjhafg.exe PID 2204 wrote to memory of 3460 2204 Fodeolof.exe Gimjhafg.exe PID 3460 wrote to memory of 2932 3460 Gimjhafg.exe Gcbnejem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\52baf0723f9f35f901a0955048ed4e20_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Dljqpd32.exeC:\Windows\system32\Dljqpd32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\Dcdimopp.exeC:\Windows\system32\Dcdimopp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\Dokjbp32.exeC:\Windows\system32\Dokjbp32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Dfdbojmq.exeC:\Windows\system32\Dfdbojmq.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Dpjflb32.exeC:\Windows\system32\Dpjflb32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\Elagacbk.exeC:\Windows\system32\Elagacbk.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\Epopgbia.exeC:\Windows\system32\Epopgbia.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\Ejgdpg32.exeC:\Windows\system32\Ejgdpg32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Ecphimfb.exeC:\Windows\system32\Ecphimfb.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Efneehef.exeC:\Windows\system32\Efneehef.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\Eofinnkf.exeC:\Windows\system32\Eofinnkf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\Emjjgbjp.exeC:\Windows\system32\Emjjgbjp.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\Ecdbdl32.exeC:\Windows\system32\Ecdbdl32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\Fcgoilpj.exeC:\Windows\system32\Fcgoilpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\Fjqgff32.exeC:\Windows\system32\Fjqgff32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\Fifdgblo.exeC:\Windows\system32\Fifdgblo.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Ffjdqg32.exeC:\Windows\system32\Ffjdqg32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Fobiilai.exeC:\Windows\system32\Fobiilai.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\Fijmbb32.exeC:\Windows\system32\Fijmbb32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Fodeolof.exeC:\Windows\system32\Fodeolof.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Gimjhafg.exeC:\Windows\system32\Gimjhafg.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\Gcbnejem.exeC:\Windows\system32\Gcbnejem.exe23⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\Goiojk32.exeC:\Windows\system32\Goiojk32.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:3664 -
C:\Windows\SysWOW64\Gjocgdkg.exeC:\Windows\system32\Gjocgdkg.exe25⤵
- Executes dropped EXE
PID:3752 -
C:\Windows\SysWOW64\Gbjhlfhb.exeC:\Windows\system32\Gbjhlfhb.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5040 -
C:\Windows\SysWOW64\Gjapmdid.exeC:\Windows\system32\Gjapmdid.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Gjclbc32.exeC:\Windows\system32\Gjclbc32.exe28⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\Gameonno.exeC:\Windows\system32\Gameonno.exe29⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Hihicplj.exeC:\Windows\system32\Hihicplj.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Hpbaqj32.exeC:\Windows\system32\Hpbaqj32.exe31⤵
- Executes dropped EXE
PID:3352 -
C:\Windows\SysWOW64\Hfljmdjc.exeC:\Windows\system32\Hfljmdjc.exe32⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\Hbckbepg.exeC:\Windows\system32\Hbckbepg.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\Hccglh32.exeC:\Windows\system32\Hccglh32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\Hfachc32.exeC:\Windows\system32\Hfachc32.exe35⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\Hippdo32.exeC:\Windows\system32\Hippdo32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:3316 -
C:\Windows\SysWOW64\Hpihai32.exeC:\Windows\system32\Hpihai32.exe37⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Hbhdmd32.exeC:\Windows\system32\Hbhdmd32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:840 -
C:\Windows\SysWOW64\Hjolnb32.exeC:\Windows\system32\Hjolnb32.exe39⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\Hmmhjm32.exeC:\Windows\system32\Hmmhjm32.exe40⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\Icgqggce.exeC:\Windows\system32\Icgqggce.exe41⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\Impepm32.exeC:\Windows\system32\Impepm32.exe42⤵
- Executes dropped EXE
PID:1872 -
C:\Windows\SysWOW64\Ipnalhii.exeC:\Windows\system32\Ipnalhii.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3096 -
C:\Windows\SysWOW64\Ibmmhdhm.exeC:\Windows\system32\Ibmmhdhm.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\Ijdeiaio.exeC:\Windows\system32\Ijdeiaio.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Iannfk32.exeC:\Windows\system32\Iannfk32.exe46⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\Icljbg32.exeC:\Windows\system32\Icljbg32.exe47⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe48⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe50⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\Ibagcc32.exeC:\Windows\system32\Ibagcc32.exe51⤵
- Executes dropped EXE
PID:5044 -
C:\Windows\SysWOW64\Iikopmkd.exeC:\Windows\system32\Iikopmkd.exe52⤵
- Executes dropped EXE
PID:3700 -
C:\Windows\SysWOW64\Iabgaklg.exeC:\Windows\system32\Iabgaklg.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:4796 -
C:\Windows\SysWOW64\Idacmfkj.exeC:\Windows\system32\Idacmfkj.exe54⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\Ijkljp32.exeC:\Windows\system32\Ijkljp32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe56⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe57⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Jjmhppqd.exeC:\Windows\system32\Jjmhppqd.exe58⤵
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\Jmkdlkph.exeC:\Windows\system32\Jmkdlkph.exe59⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4672 -
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3172 -
C:\Windows\SysWOW64\Jaimbj32.exeC:\Windows\system32\Jaimbj32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Jdhine32.exeC:\Windows\system32\Jdhine32.exe63⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\Jfffjqdf.exeC:\Windows\system32\Jfffjqdf.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\Jmpngk32.exeC:\Windows\system32\Jmpngk32.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:1880 -
C:\Windows\SysWOW64\Jpojcf32.exeC:\Windows\system32\Jpojcf32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2528 -
C:\Windows\SysWOW64\Jfhbppbc.exeC:\Windows\system32\Jfhbppbc.exe67⤵PID:4516
-
C:\Windows\SysWOW64\Jmbklj32.exeC:\Windows\system32\Jmbklj32.exe68⤵
- Drops file in System32 directory
PID:540 -
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe69⤵PID:3192
-
C:\Windows\SysWOW64\Jkfkfohj.exeC:\Windows\system32\Jkfkfohj.exe70⤵PID:2928
-
C:\Windows\SysWOW64\Kmegbjgn.exeC:\Windows\system32\Kmegbjgn.exe71⤵PID:3480
-
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe72⤵PID:564
-
C:\Windows\SysWOW64\Kmgdgjek.exeC:\Windows\system32\Kmgdgjek.exe73⤵
- Modifies registry class
PID:4180 -
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe74⤵PID:3668
-
C:\Windows\SysWOW64\Kinemkko.exeC:\Windows\system32\Kinemkko.exe75⤵PID:3216
-
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3544 -
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe77⤵PID:4444
-
C:\Windows\SysWOW64\Kipabjil.exeC:\Windows\system32\Kipabjil.exe78⤵PID:1780
-
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe79⤵PID:4928
-
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2416 -
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe81⤵PID:2412
-
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe82⤵PID:3796
-
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe83⤵
- Drops file in System32 directory
PID:404 -
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe84⤵PID:392
-
C:\Windows\SysWOW64\Lalcng32.exeC:\Windows\system32\Lalcng32.exe85⤵PID:2432
-
C:\Windows\SysWOW64\Ldkojb32.exeC:\Windows\system32\Ldkojb32.exe86⤵PID:1036
-
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe87⤵PID:1568
-
C:\Windows\SysWOW64\Laopdgcg.exeC:\Windows\system32\Laopdgcg.exe88⤵PID:5160
-
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe89⤵PID:5232
-
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe90⤵PID:5288
-
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe91⤵PID:5352
-
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe92⤵PID:5396
-
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe93⤵PID:5444
-
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe94⤵PID:5520
-
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe95⤵PID:5580
-
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe96⤵
- Drops file in System32 directory
PID:5628 -
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe97⤵PID:5680
-
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe98⤵
- Drops file in System32 directory
PID:5736 -
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe99⤵PID:5784
-
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe100⤵PID:5824
-
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe101⤵
- Modifies registry class
PID:5868 -
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5924 -
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe103⤵PID:5976
-
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe104⤵PID:6016
-
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe105⤵
- Modifies registry class
PID:6060 -
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6100 -
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe107⤵PID:3288
-
C:\Windows\SysWOW64\Mkbchk32.exeC:\Windows\system32\Mkbchk32.exe108⤵PID:5224
-
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe109⤵PID:5300
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe110⤵PID:5388
-
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe111⤵PID:5468
-
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe112⤵PID:5564
-
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe113⤵
- Modifies registry class
PID:5688 -
C:\Windows\SysWOW64\Mcpebmkb.exeC:\Windows\system32\Mcpebmkb.exe114⤵PID:5744
-
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe115⤵
- Drops file in System32 directory
PID:5804 -
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5864 -
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe117⤵PID:5960
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe118⤵PID:5996
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe119⤵PID:6088
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe120⤵
- Drops file in System32 directory
PID:5152 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe121⤵PID:5272
-
C:\Windows\SysWOW64\Nklfoi32.exeC:\Windows\system32\Nklfoi32.exe122⤵
- Modifies registry class
PID:5440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-