Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 03:33
Behavioral task
behavioral1
Sample
5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
5c3ac56a7cfda5b9dc43391597ef7510
-
SHA1
90da05b2561d52edde23200715c8808940fe798a
-
SHA256
fd1aad8e52a29996e0d88a6df04875fdcb62483519803f12fb9baf65bb0d98cb
-
SHA512
3edd06b109e850d3f4999ccf17f3652ad456cd5e692cc7281421551ca3457d8c455aa96b5896377070ff33d7208b329f418b8a03d64a0f60b6ac76f14dfe8b8d
-
SSDEEP
12288:qGTCzXjOYpV6yYPI3cpV6yYPeHCXwpnsKvNA+XTvZHWuEo3oWL5g:ZCzXjOYWHWIpsKv2EvZHp3oWNg
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Aaohcj32.exeFajbjh32.exeNhhdnf32.exeKplpjn32.exeLgcjdd32.exeAaiqcnhg.exeKedoge32.exeEmdajb32.exeJmeede32.exeLlcghg32.exeMokfja32.exeEagaoh32.exePeahgl32.exeJocnlg32.exeMapppn32.exeAfjeceml.exeLelchgne.exeCocacl32.exeCdpjlb32.exeFoapaa32.exePghieg32.exeCaghhk32.exePapfgbmg.exeAmpaho32.exeGlhonj32.exeEhgqln32.exeCnicfe32.exeJbdlop32.exeMjjkaabc.exeNeafjdkn.exeAkglloai.exeNceefd32.exePpolhcnm.exeEkgqennl.exePdkcde32.exeGnlgleef.exeJdnoplhh.exeBkdcbd32.exeMcoljagj.exeJibmgi32.exeDbkqfe32.exeHekgfj32.exeDbocfo32.exeCcdnjp32.exeFcekfnkb.exeGbfldf32.exeEnbjad32.exeIknmla32.exeMcecjmkl.exeMchppmij.exeGlipgf32.exePjlcjf32.exeHloqml32.exeDinael32.exeEhcfaboo.exePonfka32.exeDckoia32.exePclgkb32.exePjpobg32.exeGdoihpbk.exeEbaplnie.exeGcghkm32.exeAjdbcano.exeAjbmdn32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aaohcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fajbjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nhhdnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kplpjn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgcjdd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaiqcnhg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kedoge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emdajb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmeede32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llcghg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mokfja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eagaoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Peahgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jocnlg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mapppn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Afjeceml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lelchgne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cocacl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdpjlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Foapaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pghieg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caghhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Papfgbmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ampaho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glhonj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ehgqln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnicfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jbdlop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjjkaabc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neafjdkn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akglloai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nceefd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppolhcnm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekgqennl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdkcde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnlgleef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdnoplhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bkdcbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcoljagj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jibmgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dbkqfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hekgfj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbocfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ccdnjp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcekfnkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbfldf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Enbjad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iknmla32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcecjmkl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mchppmij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Glipgf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjlcjf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hloqml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dinael32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehcfaboo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ponfka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dckoia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pclgkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjpobg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gdoihpbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ebaplnie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gcghkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajdbcano.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajbmdn32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Nnjbke32.exe family_berbew C:\Windows\SysWOW64\Nnolfdcn.exe family_berbew C:\Windows\SysWOW64\Ncldnkae.exe family_berbew C:\Windows\SysWOW64\Ondeac32.exe family_berbew C:\Windows\SysWOW64\Ncnadk32.exe family_berbew C:\Windows\SysWOW64\Pgemphmn.exe family_berbew C:\Windows\SysWOW64\Pbkamqmd.exe family_berbew C:\Windows\SysWOW64\Pghieg32.exe family_berbew C:\Windows\SysWOW64\Qgallfcq.exe family_berbew C:\Windows\SysWOW64\Qgciaf32.exe family_berbew C:\Windows\SysWOW64\Ajdbcano.exe family_berbew C:\Windows\SysWOW64\Acmflf32.exe family_berbew C:\Windows\SysWOW64\Aniajnnn.exe family_berbew C:\Windows\SysWOW64\Bnlnon32.exe family_berbew C:\Windows\SysWOW64\Blpnib32.exe family_berbew C:\Windows\SysWOW64\Bdmpcdfm.exe family_berbew C:\Windows\SysWOW64\Ceaehfjj.exe family_berbew C:\Windows\SysWOW64\Clkndpag.exe family_berbew C:\Windows\SysWOW64\Cdfbibnb.exe family_berbew C:\Windows\SysWOW64\Dekhneap.exe family_berbew C:\Windows\SysWOW64\Deanodkh.exe family_berbew C:\Windows\SysWOW64\Eefhjc32.exe family_berbew C:\Windows\SysWOW64\Eoolbinc.exe family_berbew C:\Windows\SysWOW64\Ehgqln32.exe family_berbew C:\Windows\SysWOW64\Edbklofb.exe family_berbew C:\Windows\SysWOW64\Fomhdg32.exe family_berbew C:\Windows\SysWOW64\Fomhdg32.exe family_berbew C:\Windows\SysWOW64\Fdlnbm32.exe family_berbew C:\Windows\SysWOW64\Glhonj32.exe family_berbew C:\Windows\SysWOW64\Glhonj32.exe family_berbew C:\Windows\SysWOW64\Gfembo32.exe family_berbew C:\Windows\SysWOW64\Gcimkc32.exe family_berbew C:\Windows\SysWOW64\Heocnk32.exe family_berbew C:\Windows\SysWOW64\Ibjjhn32.exe family_berbew C:\Windows\SysWOW64\Ickchq32.exe family_berbew C:\Windows\SysWOW64\Jfoiokfb.exe family_berbew C:\Windows\SysWOW64\Kbceejpf.exe family_berbew C:\Windows\SysWOW64\Kpjcdn32.exe family_berbew C:\Windows\SysWOW64\Lmppcbjd.exe family_berbew C:\Windows\SysWOW64\Lpcfkm32.exe family_berbew C:\Windows\SysWOW64\Mdhdajea.exe family_berbew C:\Windows\SysWOW64\Nfgmjqop.exe family_berbew C:\Windows\SysWOW64\Ojaelm32.exe family_berbew C:\Windows\SysWOW64\Pdkcde32.exe family_berbew C:\Windows\SysWOW64\Adgbpc32.exe family_berbew C:\Windows\SysWOW64\Aeklkchg.exe family_berbew C:\Windows\SysWOW64\Bjagjhnc.exe family_berbew C:\Windows\SysWOW64\Cfpnph32.exe family_berbew C:\Windows\SysWOW64\Deokon32.exe family_berbew C:\Windows\SysWOW64\Eonehbjg.exe family_berbew C:\Windows\SysWOW64\Eopbnbhd.exe family_berbew C:\Windows\SysWOW64\Edpgli32.exe family_berbew C:\Windows\SysWOW64\Fhbimf32.exe family_berbew C:\Windows\SysWOW64\Gaogak32.exe family_berbew C:\Windows\SysWOW64\Ggqida32.exe family_berbew C:\Windows\SysWOW64\Hnoklk32.exe family_berbew C:\Windows\SysWOW64\Inmgmijo.exe family_berbew C:\Windows\SysWOW64\Idjlpc32.exe family_berbew C:\Windows\SysWOW64\Jgonlm32.exe family_berbew C:\Windows\SysWOW64\Jgdhgmep.exe family_berbew C:\Windows\SysWOW64\Jblijebc.exe family_berbew C:\Windows\SysWOW64\Kihnmohm.exe family_berbew C:\Windows\SysWOW64\Lehaho32.exe family_berbew C:\Windows\SysWOW64\Mimpolee.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Nnjbke32.exeNnolfdcn.exeNcldnkae.exeNcnadk32.exeOndeac32.exePgemphmn.exePbkamqmd.exePghieg32.exeQgallfcq.exeQgciaf32.exeAjdbcano.exeAcmflf32.exeAniajnnn.exeBnlnon32.exeBlpnib32.exeBdmpcdfm.exeCeaehfjj.exeClkndpag.exeCdfbibnb.exeDekhneap.exeDeanodkh.exeEefhjc32.exeEoolbinc.exeEhgqln32.exeEdbklofb.exeFomhdg32.exeFdlnbm32.exeGlhonj32.exeGfembo32.exeGcimkc32.exeHeocnk32.exeIbjjhn32.exeImakkfdg.exeIckchq32.exeIeolehop.exeIpdqba32.exeJfoiokfb.exeJpgmha32.exeJefbfgig.exeJmmjgejj.exeJehokgge.exeJblpek32.exeJifhaenk.exeKfjhkjle.exeKdnidn32.exeKepelfam.exeKbceejpf.exeKedoge32.exeKpjcdn32.exeKfckahdj.exeKplpjn32.exeLmppcbjd.exeLlemdo32.exeLiimncmf.exeLpcfkm32.exeLebkhc32.exeLllcen32.exeMgagbf32.exeMipcob32.exeMpjlklok.exeMegdccmb.exeMmnldp32.exeMdhdajea.exeMpoefk32.exepid process 2816 Nnjbke32.exe 540 Nnolfdcn.exe 4084 Ncldnkae.exe 628 Ncnadk32.exe 4304 Ondeac32.exe 4620 Pgemphmn.exe 4572 Pbkamqmd.exe 1120 Pghieg32.exe 440 Qgallfcq.exe 4748 Qgciaf32.exe 2932 Ajdbcano.exe 404 Acmflf32.exe 4312 Aniajnnn.exe 944 Bnlnon32.exe 1484 Blpnib32.exe 1152 Bdmpcdfm.exe 4444 Ceaehfjj.exe 3580 Clkndpag.exe 3576 Cdfbibnb.exe 3696 Dekhneap.exe 4652 Deanodkh.exe 436 Eefhjc32.exe 3708 Eoolbinc.exe 1652 Ehgqln32.exe 4464 Edbklofb.exe 3956 Fomhdg32.exe 3524 Fdlnbm32.exe 2828 Glhonj32.exe 2432 Gfembo32.exe 2344 Gcimkc32.exe 2752 Heocnk32.exe 60 Ibjjhn32.exe 3572 Imakkfdg.exe 2256 Ickchq32.exe 2992 Ieolehop.exe 4860 Ipdqba32.exe 4196 Jfoiokfb.exe 632 Jpgmha32.exe 4108 Jefbfgig.exe 3552 Jmmjgejj.exe 2320 Jehokgge.exe 224 Jblpek32.exe 1944 Jifhaenk.exe 4016 Kfjhkjle.exe 3740 Kdnidn32.exe 4216 Kepelfam.exe 3184 Kbceejpf.exe 4696 Kedoge32.exe 4412 Kpjcdn32.exe 1972 Kfckahdj.exe 1128 Kplpjn32.exe 2428 Lmppcbjd.exe 3596 Llemdo32.exe 4384 Liimncmf.exe 4716 Lpcfkm32.exe 4404 Lebkhc32.exe 4064 Lllcen32.exe 744 Mgagbf32.exe 3612 Mipcob32.exe 2400 Mpjlklok.exe 4588 Megdccmb.exe 3736 Mmnldp32.exe 2272 Mdhdajea.exe 548 Mpoefk32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Olmeci32.exeBjagjhnc.exeJklinohd.exeEblimcdf.exeQjhbfd32.exeGkcigjel.exeMipcob32.exeQgcbgo32.exeCaghhk32.exeFmgejhgn.exeIngpmmgm.exeGghdaa32.exeBlpnib32.exeDnmhpg32.exeNggnadib.exePfandnla.exeAdfgdpmi.exePajeam32.exeAjfhnjhq.exeKefdbo32.exeAcilajpk.exeKgjgne32.exeHgkkkcbc.exeMcqjon32.exeCdolgfbp.exeCeaehfjj.exeEifaim32.exeIfbbig32.exeLlpmoiof.exeMiaboe32.exeFjhacf32.exeMjahlgpf.exeBakgoh32.exeMlefklpj.exeFhdfbfdh.exeLdipha32.exeCnhgjaml.exeNcdgcf32.exeFqbeoc32.exeAniajnnn.exeAgbkmijg.exeHhfedm32.exeLghcocol.exeMnfnlf32.exePffgom32.exePlcdiabk.exeNjghbl32.exeOlijhmgj.exeBhkfkmmg.exeGjaphgpl.exeAopmfk32.exeKpiljh32.exeEfkphnbd.exeKjjiej32.exeDinael32.exeFhbimf32.exeHdehni32.exeNgjbaj32.exeCocacl32.exeBfkbfd32.exeOdocigqg.exeFechomko.exedescription ioc process File created C:\Windows\SysWOW64\Ojaelm32.exe Olmeci32.exe File opened for modification C:\Windows\SysWOW64\Bnpppgdj.exe Bjagjhnc.exe File opened for modification C:\Windows\SysWOW64\Jqhafffk.exe Jklinohd.exe File created C:\Windows\SysWOW64\Nlnhqepf.dll Eblimcdf.exe File created C:\Windows\SysWOW64\Inmalg32.dll Qjhbfd32.exe File created C:\Windows\SysWOW64\Hjmgbm32.dll Gkcigjel.exe File created C:\Windows\SysWOW64\Mpjlklok.exe Mipcob32.exe File opened for modification C:\Windows\SysWOW64\Ajanck32.exe Qgcbgo32.exe File created C:\Windows\SysWOW64\Caienjfd.exe Caghhk32.exe File opened for modification C:\Windows\SysWOW64\Fpeafcfa.exe Fmgejhgn.exe File opened for modification C:\Windows\SysWOW64\Icdheded.exe Ingpmmgm.exe File created C:\Windows\SysWOW64\Gpolbo32.exe Gghdaa32.exe File opened for modification C:\Windows\SysWOW64\Bdmpcdfm.exe Blpnib32.exe File created C:\Windows\SysWOW64\Dmohno32.exe Dnmhpg32.exe File created C:\Windows\SysWOW64\Kmkdjo32.dll Nggnadib.exe File opened for modification C:\Windows\SysWOW64\Pmlfqh32.exe Pfandnla.exe File created C:\Windows\SysWOW64\Dgeaknci.dll Adfgdpmi.exe File created C:\Windows\SysWOW64\Dapnbcqo.dll Pajeam32.exe File created C:\Windows\SysWOW64\Amddjegd.exe Ajfhnjhq.exe File opened for modification C:\Windows\SysWOW64\Llpmoiof.exe Kefdbo32.exe File created C:\Windows\SysWOW64\Dbfbnkdn.dll Acilajpk.exe File created C:\Windows\SysWOW64\Achgjc32.dll Kgjgne32.exe File opened for modification C:\Windows\SysWOW64\Hmechmip.exe Hgkkkcbc.exe File created C:\Windows\SysWOW64\Mnfnlf32.exe Mcqjon32.exe File created C:\Windows\SysWOW64\Ckidcpjl.exe Cdolgfbp.exe File created C:\Windows\SysWOW64\Mgqddl32.dll Ceaehfjj.exe File created C:\Windows\SysWOW64\Ffiipfmi.dll Eifaim32.exe File opened for modification C:\Windows\SysWOW64\Inmgmijo.exe Ifbbig32.exe File opened for modification C:\Windows\SysWOW64\Lehaho32.exe Llpmoiof.exe File created C:\Windows\SysWOW64\Mnnkgl32.exe Miaboe32.exe File opened for modification C:\Windows\SysWOW64\Fpejlmcf.exe Fjhacf32.exe File created C:\Windows\SysWOW64\Mnmdme32.exe Mjahlgpf.exe File created C:\Windows\SysWOW64\Ckclhn32.exe Bakgoh32.exe File created C:\Windows\SysWOW64\Jgefkimp.dll Mlefklpj.exe File created C:\Windows\SysWOW64\Fonnop32.exe Fhdfbfdh.exe File created C:\Windows\SysWOW64\Lkchelci.exe Ldipha32.exe File created C:\Windows\SysWOW64\Ekiapmnp.dll Cnhgjaml.exe File created C:\Windows\SysWOW64\Jlingkpe.dll Ncdgcf32.exe File created C:\Windows\SysWOW64\Fjjjgh32.exe Fqbeoc32.exe File created C:\Windows\SysWOW64\Bnlnon32.exe Aniajnnn.exe File opened for modification C:\Windows\SysWOW64\Acilajpk.exe Agbkmijg.exe File created C:\Windows\SysWOW64\Hncmmd32.exe Hhfedm32.exe File opened for modification C:\Windows\SysWOW64\Lnbklm32.exe Lghcocol.exe File created C:\Windows\SysWOW64\Mkjnfkma.exe Mnfnlf32.exe File created C:\Windows\SysWOW64\Ppolhcnm.exe Pffgom32.exe File created C:\Windows\SysWOW64\Pflibgil.exe Plcdiabk.exe File created C:\Windows\SysWOW64\Kaaial32.dll Njghbl32.exe File created C:\Windows\SysWOW64\Oeaoab32.exe Olijhmgj.exe File created C:\Windows\SysWOW64\Epopbo32.dll Bhkfkmmg.exe File opened for modification C:\Windows\SysWOW64\Gjcmngnj.exe Gjaphgpl.exe File created C:\Windows\SysWOW64\Mkfepj32.dll Aopmfk32.exe File opened for modification C:\Windows\SysWOW64\Kefdbo32.exe Kpiljh32.exe File opened for modification C:\Windows\SysWOW64\Ehjlaaig.exe Efkphnbd.exe File created C:\Windows\SysWOW64\Kdpmbc32.exe Kjjiej32.exe File created C:\Windows\SysWOW64\Apmhiq32.exe Adfgdpmi.exe File opened for modification C:\Windows\SysWOW64\Dcffnbee.exe Dinael32.exe File opened for modification C:\Windows\SysWOW64\Amddjegd.exe Ajfhnjhq.exe File created C:\Windows\SysWOW64\Fajnfl32.exe Fhbimf32.exe File opened for modification C:\Windows\SysWOW64\Hlambk32.exe Hdehni32.exe File created C:\Windows\SysWOW64\Nndjndbh.exe Ngjbaj32.exe File created C:\Windows\SysWOW64\Jiibaffb.dll Cocacl32.exe File opened for modification C:\Windows\SysWOW64\Bmdkcnie.exe Bfkbfd32.exe File created C:\Windows\SysWOW64\Hiclgb32.dll Odocigqg.exe File created C:\Windows\SysWOW64\Lippqp32.dll Fechomko.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1116 9964 WerFault.exe Gbmadd32.exe -
Modifies registry class 64 IoCs
Processes:
Feapkk32.exePlndcl32.exeAoabad32.exeEqkondfl.exeCocacl32.exeEfpomccg.exeNqmfdj32.exeAgiamhdo.exeOjbacd32.exeLnoaaaad.exeLmppcbjd.exeGbeejp32.exeMcmabg32.exeEddnic32.exeKcidmkpq.exeNjhgbp32.exeCaageq32.exeCfpnph32.exePjpobg32.exeAkoqpg32.exeLjqhkckn.exeBdagpnbk.exeHejqldci.exeHmechmip.exeDmohno32.exeHoeieolb.exeMnhdgpii.exeCnicfe32.exeDejacond.exeBoklbi32.exeKbmoen32.exeFecadghc.exeLlcghg32.exeCienon32.exeCdolgfbp.exeGaamlecg.exeFimodc32.exeJgnqgqan.exeOqklkbbi.exeLmpkadnm.exeLgpoihnl.exeNpbceggm.exePffgom32.exeIpdqba32.exeHjlkge32.exeNjghbl32.exeEleepoob.exeOifppdpd.exeAfappe32.exeHeocnk32.exePakllc32.exeMjahlgpf.exeAjanck32.exeIgdgglfl.exeGjcmngnj.exePfdjinjo.exeDopigd32.exeKkjlic32.exeJpaleglc.exeKfnfjehl.exeAmhfkopc.exeLknojl32.exeDbocfo32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjnnje32.dll" Feapkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Plndcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aoabad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eqkondfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cocacl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Efpomccg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nqmfdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Agiamhdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ojbacd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lnoaaaad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lmppcbjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fenhjedb.dll" Gbeejp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lplhdc32.dll" Mcmabg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkcghg32.dll" Eddnic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kcidmkpq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Njhgbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Caageq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pjpobg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjfcen32.dll" Akoqpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilmifh32.dll" Efpomccg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oonnoglh.dll" Ljqhkckn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bljlpjaf.dll" Bdagpnbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hejqldci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ooaafghm.dll" Hmechmip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmohno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hoeieolb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mnhdgpii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cnicfe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Boklbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kbmoen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fecadghc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Laiimcij.dll" Llcghg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cienon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Faagecfk.dll" Cdolgfbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gaamlecg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fimodc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jgnqgqan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oqklkbbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lmpkadnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lgpoihnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Npbceggm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Occmjg32.dll" Pffgom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ipdqba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Becnaq32.dll" Hjlkge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaaial32.dll" Njghbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eleepoob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oifppdpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iblbgn32.dll" Afappe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Heocnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obimmnpq.dll" Pakllc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mjahlgpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ajanck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Igdgglfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gjcmngnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pfdjinjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnecgoki.dll" Kkjlic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jpaleglc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kfnfjehl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Amhfkopc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lknojl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkikinpo.dll" Dbocfo32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exeNnjbke32.exeNnolfdcn.exeNcldnkae.exeNcnadk32.exeOndeac32.exePgemphmn.exePbkamqmd.exePghieg32.exeQgallfcq.exeQgciaf32.exeAjdbcano.exeAcmflf32.exeAniajnnn.exeBnlnon32.exeBlpnib32.exeBdmpcdfm.exeCeaehfjj.exeClkndpag.exeCdfbibnb.exeDekhneap.exeDeanodkh.exedescription pid process target process PID 5004 wrote to memory of 2816 5004 5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe Nnjbke32.exe PID 5004 wrote to memory of 2816 5004 5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe Nnjbke32.exe PID 5004 wrote to memory of 2816 5004 5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe Nnjbke32.exe PID 2816 wrote to memory of 540 2816 Nnjbke32.exe Nnolfdcn.exe PID 2816 wrote to memory of 540 2816 Nnjbke32.exe Nnolfdcn.exe PID 2816 wrote to memory of 540 2816 Nnjbke32.exe Nnolfdcn.exe PID 540 wrote to memory of 4084 540 Nnolfdcn.exe Ncldnkae.exe PID 540 wrote to memory of 4084 540 Nnolfdcn.exe Ncldnkae.exe PID 540 wrote to memory of 4084 540 Nnolfdcn.exe Ncldnkae.exe PID 4084 wrote to memory of 628 4084 Ncldnkae.exe Ncnadk32.exe PID 4084 wrote to memory of 628 4084 Ncldnkae.exe Ncnadk32.exe PID 4084 wrote to memory of 628 4084 Ncldnkae.exe Ncnadk32.exe PID 628 wrote to memory of 4304 628 Ncnadk32.exe Ondeac32.exe PID 628 wrote to memory of 4304 628 Ncnadk32.exe Ondeac32.exe PID 628 wrote to memory of 4304 628 Ncnadk32.exe Ondeac32.exe PID 4304 wrote to memory of 4620 4304 Ondeac32.exe Pgemphmn.exe PID 4304 wrote to memory of 4620 4304 Ondeac32.exe Pgemphmn.exe PID 4304 wrote to memory of 4620 4304 Ondeac32.exe Pgemphmn.exe PID 4620 wrote to memory of 4572 4620 Pgemphmn.exe Pbkamqmd.exe PID 4620 wrote to memory of 4572 4620 Pgemphmn.exe Pbkamqmd.exe PID 4620 wrote to memory of 4572 4620 Pgemphmn.exe Pbkamqmd.exe PID 4572 wrote to memory of 1120 4572 Pbkamqmd.exe Pghieg32.exe PID 4572 wrote to memory of 1120 4572 Pbkamqmd.exe Pghieg32.exe PID 4572 wrote to memory of 1120 4572 Pbkamqmd.exe Pghieg32.exe PID 1120 wrote to memory of 440 1120 Pghieg32.exe Qgallfcq.exe PID 1120 wrote to memory of 440 1120 Pghieg32.exe Qgallfcq.exe PID 1120 wrote to memory of 440 1120 Pghieg32.exe Qgallfcq.exe PID 440 wrote to memory of 4748 440 Qgallfcq.exe Qgciaf32.exe PID 440 wrote to memory of 4748 440 Qgallfcq.exe Qgciaf32.exe PID 440 wrote to memory of 4748 440 Qgallfcq.exe Qgciaf32.exe PID 4748 wrote to memory of 2932 4748 Qgciaf32.exe Ajdbcano.exe PID 4748 wrote to memory of 2932 4748 Qgciaf32.exe Ajdbcano.exe PID 4748 wrote to memory of 2932 4748 Qgciaf32.exe Ajdbcano.exe PID 2932 wrote to memory of 404 2932 Ajdbcano.exe Acmflf32.exe PID 2932 wrote to memory of 404 2932 Ajdbcano.exe Acmflf32.exe PID 2932 wrote to memory of 404 2932 Ajdbcano.exe Acmflf32.exe PID 404 wrote to memory of 4312 404 Acmflf32.exe Aniajnnn.exe PID 404 wrote to memory of 4312 404 Acmflf32.exe Aniajnnn.exe PID 404 wrote to memory of 4312 404 Acmflf32.exe Aniajnnn.exe PID 4312 wrote to memory of 944 4312 Aniajnnn.exe Bnlnon32.exe PID 4312 wrote to memory of 944 4312 Aniajnnn.exe Bnlnon32.exe PID 4312 wrote to memory of 944 4312 Aniajnnn.exe Bnlnon32.exe PID 944 wrote to memory of 1484 944 Bnlnon32.exe Blpnib32.exe PID 944 wrote to memory of 1484 944 Bnlnon32.exe Blpnib32.exe PID 944 wrote to memory of 1484 944 Bnlnon32.exe Blpnib32.exe PID 1484 wrote to memory of 1152 1484 Blpnib32.exe Bdmpcdfm.exe PID 1484 wrote to memory of 1152 1484 Blpnib32.exe Bdmpcdfm.exe PID 1484 wrote to memory of 1152 1484 Blpnib32.exe Bdmpcdfm.exe PID 1152 wrote to memory of 4444 1152 Bdmpcdfm.exe Ceaehfjj.exe PID 1152 wrote to memory of 4444 1152 Bdmpcdfm.exe Ceaehfjj.exe PID 1152 wrote to memory of 4444 1152 Bdmpcdfm.exe Ceaehfjj.exe PID 4444 wrote to memory of 3580 4444 Ceaehfjj.exe Clkndpag.exe PID 4444 wrote to memory of 3580 4444 Ceaehfjj.exe Clkndpag.exe PID 4444 wrote to memory of 3580 4444 Ceaehfjj.exe Clkndpag.exe PID 3580 wrote to memory of 3576 3580 Clkndpag.exe Cdfbibnb.exe PID 3580 wrote to memory of 3576 3580 Clkndpag.exe Cdfbibnb.exe PID 3580 wrote to memory of 3576 3580 Clkndpag.exe Cdfbibnb.exe PID 3576 wrote to memory of 3696 3576 Cdfbibnb.exe Dekhneap.exe PID 3576 wrote to memory of 3696 3576 Cdfbibnb.exe Dekhneap.exe PID 3576 wrote to memory of 3696 3576 Cdfbibnb.exe Dekhneap.exe PID 3696 wrote to memory of 4652 3696 Dekhneap.exe Deanodkh.exe PID 3696 wrote to memory of 4652 3696 Dekhneap.exe Deanodkh.exe PID 3696 wrote to memory of 4652 3696 Dekhneap.exe Deanodkh.exe PID 4652 wrote to memory of 436 4652 Deanodkh.exe Eefhjc32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5c3ac56a7cfda5b9dc43391597ef7510_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\Ncnadk32.exeC:\Windows\system32\Ncnadk32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\Ondeac32.exeC:\Windows\system32\Ondeac32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\Pgemphmn.exeC:\Windows\system32\Pgemphmn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\Pbkamqmd.exeC:\Windows\system32\Pbkamqmd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\Qgallfcq.exeC:\Windows\system32\Qgallfcq.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\Qgciaf32.exeC:\Windows\system32\Qgciaf32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\Ajdbcano.exeC:\Windows\system32\Ajdbcano.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Acmflf32.exeC:\Windows\system32\Acmflf32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\Aniajnnn.exeC:\Windows\system32\Aniajnnn.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\Bnlnon32.exeC:\Windows\system32\Bnlnon32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\Blpnib32.exeC:\Windows\system32\Blpnib32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\Bdmpcdfm.exeC:\Windows\system32\Bdmpcdfm.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Ceaehfjj.exeC:\Windows\system32\Ceaehfjj.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Clkndpag.exeC:\Windows\system32\Clkndpag.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\Dekhneap.exeC:\Windows\system32\Dekhneap.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\Deanodkh.exeC:\Windows\system32\Deanodkh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe23⤵
- Executes dropped EXE
PID:436 -
C:\Windows\SysWOW64\Eoolbinc.exeC:\Windows\system32\Eoolbinc.exe24⤵
- Executes dropped EXE
PID:3708 -
C:\Windows\SysWOW64\Ehgqln32.exeC:\Windows\system32\Ehgqln32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Edbklofb.exeC:\Windows\system32\Edbklofb.exe26⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\Fomhdg32.exeC:\Windows\system32\Fomhdg32.exe27⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\Fdlnbm32.exeC:\Windows\system32\Fdlnbm32.exe28⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Glhonj32.exeC:\Windows\system32\Glhonj32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Gfembo32.exeC:\Windows\system32\Gfembo32.exe30⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\Gcimkc32.exeC:\Windows\system32\Gcimkc32.exe31⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\Heocnk32.exeC:\Windows\system32\Heocnk32.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Ibjjhn32.exeC:\Windows\system32\Ibjjhn32.exe33⤵
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\Imakkfdg.exeC:\Windows\system32\Imakkfdg.exe34⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\Ickchq32.exeC:\Windows\system32\Ickchq32.exe35⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\Ieolehop.exeC:\Windows\system32\Ieolehop.exe36⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Ipdqba32.exeC:\Windows\system32\Ipdqba32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Windows\SysWOW64\Jfoiokfb.exeC:\Windows\system32\Jfoiokfb.exe38⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\Jpgmha32.exeC:\Windows\system32\Jpgmha32.exe39⤵
- Executes dropped EXE
PID:632 -
C:\Windows\SysWOW64\Jioaqfcc.exeC:\Windows\system32\Jioaqfcc.exe40⤵PID:512
-
C:\Windows\SysWOW64\Jefbfgig.exeC:\Windows\system32\Jefbfgig.exe41⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\SysWOW64\Jmmjgejj.exeC:\Windows\system32\Jmmjgejj.exe42⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\Jehokgge.exeC:\Windows\system32\Jehokgge.exe43⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Jblpek32.exeC:\Windows\system32\Jblpek32.exe44⤵
- Executes dropped EXE
PID:224 -
C:\Windows\SysWOW64\Jifhaenk.exeC:\Windows\system32\Jifhaenk.exe45⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\Kfjhkjle.exeC:\Windows\system32\Kfjhkjle.exe46⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\Kdnidn32.exeC:\Windows\system32\Kdnidn32.exe47⤵
- Executes dropped EXE
PID:3740 -
C:\Windows\SysWOW64\Kepelfam.exeC:\Windows\system32\Kepelfam.exe48⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe49⤵
- Executes dropped EXE
PID:3184 -
C:\Windows\SysWOW64\Kedoge32.exeC:\Windows\system32\Kedoge32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\Kpjcdn32.exeC:\Windows\system32\Kpjcdn32.exe51⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\Kfckahdj.exeC:\Windows\system32\Kfckahdj.exe52⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\Kplpjn32.exeC:\Windows\system32\Kplpjn32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\Lmppcbjd.exeC:\Windows\system32\Lmppcbjd.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2428 -
C:\Windows\SysWOW64\Llemdo32.exeC:\Windows\system32\Llemdo32.exe55⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\Liimncmf.exeC:\Windows\system32\Liimncmf.exe56⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Lpcfkm32.exeC:\Windows\system32\Lpcfkm32.exe57⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\SysWOW64\Lebkhc32.exeC:\Windows\system32\Lebkhc32.exe58⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\Lllcen32.exeC:\Windows\system32\Lllcen32.exe59⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\Mgagbf32.exeC:\Windows\system32\Mgagbf32.exe60⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\Mipcob32.exeC:\Windows\system32\Mipcob32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3612 -
C:\Windows\SysWOW64\Mpjlklok.exeC:\Windows\system32\Mpjlklok.exe62⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Megdccmb.exeC:\Windows\system32\Megdccmb.exe63⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\Mmnldp32.exeC:\Windows\system32\Mmnldp32.exe64⤵
- Executes dropped EXE
PID:3736 -
C:\Windows\SysWOW64\Mdhdajea.exeC:\Windows\system32\Mdhdajea.exe65⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\Mpoefk32.exeC:\Windows\system32\Mpoefk32.exe66⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\Mcmabg32.exeC:\Windows\system32\Mcmabg32.exe67⤵
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\Migjoaaf.exeC:\Windows\system32\Migjoaaf.exe68⤵PID:2820
-
C:\Windows\SysWOW64\Mlefklpj.exeC:\Windows\system32\Mlefklpj.exe69⤵
- Drops file in System32 directory
PID:4388 -
C:\Windows\SysWOW64\Mdmnlj32.exeC:\Windows\system32\Mdmnlj32.exe70⤵PID:5132
-
C:\Windows\SysWOW64\Menjdbgj.exeC:\Windows\system32\Menjdbgj.exe71⤵PID:5172
-
C:\Windows\SysWOW64\Mlhbal32.exeC:\Windows\system32\Mlhbal32.exe72⤵PID:5220
-
C:\Windows\SysWOW64\Ncbknfed.exeC:\Windows\system32\Ncbknfed.exe73⤵PID:5264
-
C:\Windows\SysWOW64\Nngokoej.exeC:\Windows\system32\Nngokoej.exe74⤵PID:5308
-
C:\Windows\SysWOW64\Nljofl32.exeC:\Windows\system32\Nljofl32.exe75⤵PID:5352
-
C:\Windows\SysWOW64\Ncdgcf32.exeC:\Windows\system32\Ncdgcf32.exe76⤵
- Drops file in System32 directory
PID:5396 -
C:\Windows\SysWOW64\Nlmllkja.exeC:\Windows\system32\Nlmllkja.exe77⤵PID:5440
-
C:\Windows\SysWOW64\Neeqea32.exeC:\Windows\system32\Neeqea32.exe78⤵PID:5484
-
C:\Windows\SysWOW64\Nfgmjqop.exeC:\Windows\system32\Nfgmjqop.exe79⤵PID:5528
-
C:\Windows\SysWOW64\Odkjng32.exeC:\Windows\system32\Odkjng32.exe80⤵PID:5572
-
C:\Windows\SysWOW64\Ogkcpbam.exeC:\Windows\system32\Ogkcpbam.exe81⤵PID:5612
-
C:\Windows\SysWOW64\Odocigqg.exeC:\Windows\system32\Odocigqg.exe82⤵
- Drops file in System32 directory
PID:5660 -
C:\Windows\SysWOW64\Olkhmi32.exeC:\Windows\system32\Olkhmi32.exe83⤵PID:5704
-
C:\Windows\SysWOW64\Olmeci32.exeC:\Windows\system32\Olmeci32.exe84⤵
- Drops file in System32 directory
PID:5748 -
C:\Windows\SysWOW64\Ojaelm32.exeC:\Windows\system32\Ojaelm32.exe85⤵PID:5788
-
C:\Windows\SysWOW64\Pcijeb32.exeC:\Windows\system32\Pcijeb32.exe86⤵PID:5832
-
C:\Windows\SysWOW64\Pclgkb32.exeC:\Windows\system32\Pclgkb32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5876 -
C:\Windows\SysWOW64\Pdkcde32.exeC:\Windows\system32\Pdkcde32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5920 -
C:\Windows\SysWOW64\Pdmpje32.exeC:\Windows\system32\Pdmpje32.exe89⤵PID:5964
-
C:\Windows\SysWOW64\Pgnilpah.exeC:\Windows\system32\Pgnilpah.exe90⤵PID:6008
-
C:\Windows\SysWOW64\Qmkadgpo.exeC:\Windows\system32\Qmkadgpo.exe91⤵PID:6052
-
C:\Windows\SysWOW64\Qdbiedpa.exeC:\Windows\system32\Qdbiedpa.exe92⤵PID:6096
-
C:\Windows\SysWOW64\Qgcbgo32.exeC:\Windows\system32\Qgcbgo32.exe93⤵
- Drops file in System32 directory
PID:5140 -
C:\Windows\SysWOW64\Ajanck32.exeC:\Windows\system32\Ajanck32.exe94⤵
- Modifies registry class
PID:5260 -
C:\Windows\SysWOW64\Ampkof32.exeC:\Windows\system32\Ampkof32.exe95⤵PID:5328
-
C:\Windows\SysWOW64\Adgbpc32.exeC:\Windows\system32\Adgbpc32.exe96⤵PID:4080
-
C:\Windows\SysWOW64\Aeiofcji.exeC:\Windows\system32\Aeiofcji.exe97⤵PID:2364
-
C:\Windows\SysWOW64\Agglboim.exeC:\Windows\system32\Agglboim.exe98⤵PID:5472
-
C:\Windows\SysWOW64\Ajfhnjhq.exeC:\Windows\system32\Ajfhnjhq.exe99⤵
- Drops file in System32 directory
PID:5520 -
C:\Windows\SysWOW64\Amddjegd.exeC:\Windows\system32\Amddjegd.exe100⤵PID:5596
-
C:\Windows\SysWOW64\Aeklkchg.exeC:\Windows\system32\Aeklkchg.exe101⤵PID:2936
-
C:\Windows\SysWOW64\Acqimo32.exeC:\Windows\system32\Acqimo32.exe102⤵PID:5724
-
C:\Windows\SysWOW64\Aminee32.exeC:\Windows\system32\Aminee32.exe103⤵PID:5796
-
C:\Windows\SysWOW64\Bcebhoii.exeC:\Windows\system32\Bcebhoii.exe104⤵PID:5872
-
C:\Windows\SysWOW64\Bnkgeg32.exeC:\Windows\system32\Bnkgeg32.exe105⤵PID:5928
-
C:\Windows\SysWOW64\Bgcknmop.exeC:\Windows\system32\Bgcknmop.exe106⤵PID:5992
-
C:\Windows\SysWOW64\Bjagjhnc.exeC:\Windows\system32\Bjagjhnc.exe107⤵
- Drops file in System32 directory
PID:6044 -
C:\Windows\SysWOW64\Bnpppgdj.exeC:\Windows\system32\Bnpppgdj.exe108⤵PID:5112
-
C:\Windows\SysWOW64\Bmemac32.exeC:\Windows\system32\Bmemac32.exe109⤵PID:5256
-
C:\Windows\SysWOW64\Cjinkg32.exeC:\Windows\system32\Cjinkg32.exe110⤵PID:3260
-
C:\Windows\SysWOW64\Cfpnph32.exeC:\Windows\system32\Cfpnph32.exe111⤵
- Modifies registry class
PID:5392 -
C:\Windows\SysWOW64\Cnicfe32.exeC:\Windows\system32\Cnicfe32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5516 -
C:\Windows\SysWOW64\Chagok32.exeC:\Windows\system32\Chagok32.exe113⤵PID:5648
-
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe114⤵PID:5712
-
C:\Windows\SysWOW64\Cegdnopg.exeC:\Windows\system32\Cegdnopg.exe115⤵PID:5824
-
C:\Windows\SysWOW64\Dopigd32.exeC:\Windows\system32\Dopigd32.exe116⤵
- Modifies registry class
PID:5944 -
C:\Windows\SysWOW64\Dejacond.exeC:\Windows\system32\Dejacond.exe117⤵
- Modifies registry class
PID:6036 -
C:\Windows\SysWOW64\Dfknkg32.exeC:\Windows\system32\Dfknkg32.exe118⤵PID:6140
-
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe119⤵PID:5360
-
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe120⤵PID:5452
-
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe121⤵PID:1376
-
C:\Windows\SysWOW64\Egdqae32.exeC:\Windows\system32\Egdqae32.exe122⤵PID:5780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-