Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 05:58
Behavioral task
behavioral1
Sample
21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe
-
Size
115KB
-
MD5
21904453b86bacb5222badb97d687df0
-
SHA1
3b784bb2d7450cf4c3b3463f0f25484582ecb6cf
-
SHA256
3cc89c0e4acfe3f337307b9fe02c16161d9ae46ae35b543fe5c61054dbe8c333
-
SHA512
94428d8b64d38cc055cfde232af37f8361c495cc1c2c141852175744ab88e1aa979585a3654a95930250cc5eb0906e7cc1748f7e61b7157311d5b720e2bf0096
-
SSDEEP
3072:bcNKxL27oXcTXeFW2VTbWymWU6SMQehalNgFuk0:bcNoL27vXef6ymWU5MClN5
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Qppaclio.exeGdjibj32.exeGpnfge32.exeHldiinke.exeKlpakj32.exePfepdg32.exeFnbcgn32.exeLllagh32.exeMqhfoebo.exeEifhdd32.exePkbjjbda.exeDdjmba32.exeAfpjel32.exeGbeejp32.exeKolabf32.exeEahobg32.exeCponen32.exeIeojgc32.exeOcdnln32.exeEaaiahei.exeLebijnak.exeDajbaika.exeCdnmfclj.exeIibccgep.exePjkmomfn.exeDkekjdck.exeGlfmgp32.exeKpnjah32.exeMablfnne.exeDcibca32.exeKcejco32.exePeahgl32.exeKcbfcigf.exeMfnoqc32.exeCocjiehd.exeFgmdec32.exeKpqggh32.exeAfappe32.exeEmjgim32.exeIbfnqmpf.exeQlgpod32.exeLomqcjie.exeFdbkja32.exeBoeebnhp.exeJocnlg32.exeHeegad32.exeApjdikqd.exeJnjejjgh.exeGifkpknp.exeHplbickp.exeQjfmkk32.exeLmaamn32.exeDhikci32.exeObjkmkjj.exeFgiaemic.exeIliinc32.exeJhnojl32.exeAkqfkp32.exeCfnjpfcl.exeJoahqn32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qppaclio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdjibj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpnfge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hldiinke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klpakj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfepdg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnbcgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lllagh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqhfoebo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eifhdd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkbjjbda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkbjjbda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjmba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afpjel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbeejp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kolabf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eahobg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cponen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieojgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocdnln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaaiahei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lebijnak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dajbaika.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdnmfclj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iibccgep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjkmomfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkekjdck.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glfmgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpnjah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mablfnne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcibca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcejco32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peahgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcbfcigf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfnoqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cocjiehd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgmdec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpqggh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afappe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emjgim32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibfnqmpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cocjiehd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlgpod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lomqcjie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdbkja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boeebnhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jocnlg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heegad32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apjdikqd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnjejjgh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gifkpknp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hplbickp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfnoqc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjfmkk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcbfcigf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmaamn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhikci32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Objkmkjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgiaemic.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iliinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jhnojl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akqfkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfnjpfcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joahqn32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Cimmggfl.exe family_berbew C:\Windows\SysWOW64\Cbgnemjj.exe family_berbew C:\Windows\SysWOW64\Dfefkkqp.exe family_berbew C:\Windows\SysWOW64\Djcoai32.exe family_berbew C:\Windows\SysWOW64\Dihlbf32.exe family_berbew C:\Windows\SysWOW64\Dlieda32.exe family_berbew C:\Windows\SysWOW64\Ejlbhh32.exe family_berbew C:\Windows\SysWOW64\Eiaoid32.exe family_berbew C:\Windows\SysWOW64\Emphocjj.exe family_berbew C:\Windows\SysWOW64\Eifhdd32.exe family_berbew C:\Windows\SysWOW64\Efjimhnh.exe family_berbew C:\Windows\SysWOW64\Fmfnpa32.exe family_berbew C:\Windows\SysWOW64\Fpggamqc.exe family_berbew C:\Windows\SysWOW64\Fdepgkgj.exe family_berbew C:\Windows\SysWOW64\Fdglmkeg.exe family_berbew C:\Windows\SysWOW64\Gdjibj32.exe family_berbew C:\Windows\SysWOW64\Gpqjglii.exe family_berbew C:\Windows\SysWOW64\Glgjlm32.exe family_berbew C:\Windows\SysWOW64\Gljgbllj.exe family_berbew C:\Windows\SysWOW64\Gdcliikj.exe family_berbew C:\Windows\SysWOW64\Idfaefkd.exe family_berbew C:\Windows\SysWOW64\Inqbclob.exe family_berbew C:\Windows\SysWOW64\Jnjejjgh.exe family_berbew C:\Windows\SysWOW64\Jnlbojee.exe family_berbew C:\Windows\SysWOW64\Kjccdkki.exe family_berbew C:\Windows\SysWOW64\Kcndbp32.exe family_berbew C:\Windows\SysWOW64\Kdmqmc32.exe family_berbew C:\Windows\SysWOW64\Kdpmbc32.exe family_berbew C:\Windows\SysWOW64\Kcejco32.exe family_berbew C:\Windows\SysWOW64\Lcggio32.exe family_berbew C:\Windows\SysWOW64\Lqkgbcff.exe family_berbew C:\Windows\SysWOW64\Ldipha32.exe family_berbew C:\Windows\SysWOW64\Mepfiq32.exe family_berbew C:\Windows\SysWOW64\Neqopnhb.exe family_berbew C:\Windows\SysWOW64\Oeheqm32.exe family_berbew C:\Windows\SysWOW64\Okkdic32.exe family_berbew C:\Windows\SysWOW64\Pkbjjbda.exe family_berbew C:\Windows\SysWOW64\Pldcjeia.exe family_berbew C:\Windows\SysWOW64\Qklmpalf.exe family_berbew C:\Windows\SysWOW64\Akccap32.exe family_berbew C:\Windows\SysWOW64\Aekddhcb.exe family_berbew C:\Windows\SysWOW64\Cfnjpfcl.exe family_berbew C:\Windows\SysWOW64\Cohkokgj.exe family_berbew C:\Windows\SysWOW64\Ddjmba32.exe family_berbew C:\Windows\SysWOW64\Enigke32.exe family_berbew C:\Windows\SysWOW64\Eokqkh32.exe family_berbew C:\Windows\SysWOW64\Fnnjmbpm.exe family_berbew C:\Windows\SysWOW64\Hbohpn32.exe family_berbew C:\Windows\SysWOW64\Hpchib32.exe family_berbew C:\Windows\SysWOW64\Ickglm32.exe family_berbew C:\Windows\SysWOW64\Jmeede32.exe family_berbew C:\Windows\SysWOW64\Klahfp32.exe family_berbew C:\Windows\SysWOW64\Lmaamn32.exe family_berbew C:\Windows\SysWOW64\Nflkbanj.exe family_berbew C:\Windows\SysWOW64\Ocjoadei.exe family_berbew C:\Windows\SysWOW64\Opclldhj.exe family_berbew C:\Windows\SysWOW64\Pfandnla.exe family_berbew C:\Windows\SysWOW64\Pmnbfhal.exe family_berbew C:\Windows\SysWOW64\Qjfmkk32.exe family_berbew C:\Windows\SysWOW64\Aokkahlo.exe family_berbew C:\Windows\SysWOW64\Bdojjo32.exe family_berbew C:\Windows\SysWOW64\Coegoe32.exe family_berbew C:\Windows\SysWOW64\Ddifgk32.exe family_berbew C:\Windows\SysWOW64\Dhikci32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Cimmggfl.exeCbgnemjj.exeDfefkkqp.exeDjcoai32.exeDihlbf32.exeDlieda32.exeEjlbhh32.exeEiaoid32.exeEmphocjj.exeEifhdd32.exeEfjimhnh.exeFmfnpa32.exeFpggamqc.exeFdepgkgj.exeFdglmkeg.exeGdjibj32.exeGpqjglii.exeGlgjlm32.exeGljgbllj.exeGdcliikj.exeIdfaefkd.exeInqbclob.exeJnjejjgh.exeJnlbojee.exeKjccdkki.exeKcndbp32.exeKdmqmc32.exeKdpmbc32.exeKcejco32.exeLcggio32.exeLqkgbcff.exeLdipha32.exeLndagg32.exeMepfiq32.exeMgaokl32.exeMjahlgpf.exeManmoq32.exeNlcalieg.exeNeqopnhb.exeNhahaiec.exeNjpdnedf.exeOeheqm32.exeOjgjndno.exeOlfghg32.exeOkkdic32.exePeahgl32.exePlmmif32.exePkbjjbda.exePlbfdekd.exePldcjeia.exeQlgpod32.exeQklmpalf.exeAknifq32.exeAkqfkp32.exeAkccap32.exeAdkgje32.exeAekddhcb.exeBnfihkqm.exeBoeebnhp.exeBohbhmfm.exeBkobmnka.exeCkclhn32.exeClchbqoo.exeCdnmfclj.exepid process 1196 Cimmggfl.exe 2376 Cbgnemjj.exe 1200 Dfefkkqp.exe 4072 Djcoai32.exe 2124 Dihlbf32.exe 3464 Dlieda32.exe 4176 Ejlbhh32.exe 3572 Eiaoid32.exe 3752 Emphocjj.exe 3620 Eifhdd32.exe 5096 Efjimhnh.exe 3032 Fmfnpa32.exe 4792 Fpggamqc.exe 2576 Fdepgkgj.exe 4684 Fdglmkeg.exe 4508 Gdjibj32.exe 2192 Gpqjglii.exe 4400 Glgjlm32.exe 560 Gljgbllj.exe 4700 Gdcliikj.exe 4240 Idfaefkd.exe 3260 Inqbclob.exe 1088 Jnjejjgh.exe 864 Jnlbojee.exe 1964 Kjccdkki.exe 1132 Kcndbp32.exe 2332 Kdmqmc32.exe 4896 Kdpmbc32.exe 3944 Kcejco32.exe 996 Lcggio32.exe 2360 Lqkgbcff.exe 872 Ldipha32.exe 3232 Lndagg32.exe 1004 Mepfiq32.exe 4364 Mgaokl32.exe 3652 Mjahlgpf.exe 552 Manmoq32.exe 4784 Nlcalieg.exe 4708 Neqopnhb.exe 4944 Nhahaiec.exe 4572 Njpdnedf.exe 4536 Oeheqm32.exe 684 Ojgjndno.exe 4384 Olfghg32.exe 2032 Okkdic32.exe 2964 Peahgl32.exe 3744 Plmmif32.exe 3868 Pkbjjbda.exe 3328 Plbfdekd.exe 1884 Pldcjeia.exe 2836 Qlgpod32.exe 4956 Qklmpalf.exe 4728 Aknifq32.exe 4948 Akqfkp32.exe 4256 Akccap32.exe 224 Adkgje32.exe 3716 Aekddhcb.exe 4644 Bnfihkqm.exe 2204 Boeebnhp.exe 3576 Bohbhmfm.exe 3640 Bkobmnka.exe 3392 Ckclhn32.exe 756 Clchbqoo.exe 3376 Cdnmfclj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Mqfpckhm.exeEbkbbmqj.exeFnbcgn32.exeHpchib32.exeIfomll32.exeCfpffeaj.exeEqgmmk32.exeGbbajjlp.exePkbjjbda.exeNhegig32.exeEnpmld32.exeLndagg32.exeNnafno32.exeAfpjel32.exeFqeioiam.exeKjccdkki.exeAabkbono.exeDjgdkk32.exeIibccgep.exeMmhgmmbf.exeMcgiefen.exeCponen32.exeEhlhih32.exeOqmhqapg.exeDfiildio.exeMgnlkfal.exeAdhdjpjf.exeMledmg32.exeFnnjmbpm.exePcegclgp.exeEgpnooan.exeEifhdd32.exePeahgl32.exeJoahqn32.exeEqlfhjig.exeMapppn32.exeOfgdcipq.exeMepfiq32.exeCkclhn32.exeGeldkfpi.exeMqhfoebo.exeAalmimfd.exeEnopghee.exeNeqopnhb.exeIhpcinld.exeJnlbojee.exeOjgjndno.exeHplbickp.exeAokkahlo.exeBfaigclq.exeCofnik32.exeNfgklkoc.exeEmphocjj.exeEnigke32.exePcpnhl32.exeIdfaefkd.exeKoaagkcb.exeLlqjbhdc.exeCohkokgj.exeNmhijd32.exeCkggnp32.exeKfnfjehl.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Mcgiefen.exe Mqfpckhm.exe File created C:\Windows\SysWOW64\Ghehjh32.dll Ebkbbmqj.exe File created C:\Windows\SysWOW64\Kmfpdfnd.dll Fnbcgn32.exe File created C:\Windows\SysWOW64\Iliinc32.exe Hpchib32.exe File created C:\Windows\SysWOW64\Dafmjm32.dll Ifomll32.exe File created C:\Windows\SysWOW64\Cohkokgj.exe Cfpffeaj.exe File created C:\Windows\SysWOW64\Ekellcop.dll Eqgmmk32.exe File created C:\Windows\SysWOW64\Chbfoaba.dll Gbbajjlp.exe File created C:\Windows\SysWOW64\Gengje32.dll Pkbjjbda.exe File created C:\Windows\SysWOW64\Bkfmmb32.dll Nhegig32.exe File created C:\Windows\SysWOW64\Fngcmcfe.exe Enpmld32.exe File opened for modification C:\Windows\SysWOW64\Mepfiq32.exe Lndagg32.exe File opened for modification C:\Windows\SysWOW64\Nflkbanj.exe Nnafno32.exe File created C:\Windows\SysWOW64\Dbfpagon.dll Afpjel32.exe File created C:\Windows\SysWOW64\Bfcklp32.dll Fqeioiam.exe File created C:\Windows\SysWOW64\Kcndbp32.exe Kjccdkki.exe File created C:\Windows\SysWOW64\Jdnoeb32.dll Aabkbono.exe File created C:\Windows\SysWOW64\Ncbigo32.dll Djgdkk32.exe File created C:\Windows\SysWOW64\Npdopj32.dll Iibccgep.exe File opened for modification C:\Windows\SysWOW64\Mgnlkfal.exe Mmhgmmbf.exe File created C:\Windows\SysWOW64\Leilnmkp.dll Mcgiefen.exe File created C:\Windows\SysWOW64\Mgnddp32.dll Cponen32.exe File opened for modification C:\Windows\SysWOW64\Eqgmmk32.exe Ehlhih32.exe File created C:\Windows\SysWOW64\Bfmpaf32.dll Oqmhqapg.exe File opened for modification C:\Windows\SysWOW64\Dflfac32.exe Dfiildio.exe File created C:\Windows\SysWOW64\Dkodcb32.dll Mgnlkfal.exe File created C:\Windows\SysWOW64\Ieoigp32.dll Adhdjpjf.exe File created C:\Windows\SysWOW64\Hecjke32.exe Gbbajjlp.exe File opened for modification C:\Windows\SysWOW64\Mablfnne.exe Mledmg32.exe File created C:\Windows\SysWOW64\Gpnfge32.exe Fnnjmbpm.exe File created C:\Windows\SysWOW64\Blcnqjjo.dll Pcegclgp.exe File opened for modification C:\Windows\SysWOW64\Ecgodpgb.exe Egpnooan.exe File created C:\Windows\SysWOW64\Fkkceedp.dll Eifhdd32.exe File created C:\Windows\SysWOW64\Ogacbllg.dll Peahgl32.exe File opened for modification C:\Windows\SysWOW64\Jmbhoeid.exe Joahqn32.exe File opened for modification C:\Windows\SysWOW64\Ebkbbmqj.exe Eqlfhjig.exe File created C:\Windows\SysWOW64\Pkbcikkp.dll Mapppn32.exe File created C:\Windows\SysWOW64\Agolng32.dll Ofgdcipq.exe File created C:\Windows\SysWOW64\Mgaokl32.exe Mepfiq32.exe File opened for modification C:\Windows\SysWOW64\Clchbqoo.exe Ckclhn32.exe File opened for modification C:\Windows\SysWOW64\Glfmgp32.exe Geldkfpi.exe File created C:\Windows\SysWOW64\Mcfbkpab.exe Mqhfoebo.exe File created C:\Windows\SysWOW64\Bigbmpco.exe Aalmimfd.exe File created C:\Windows\SysWOW64\Fggdpnkf.exe Enopghee.exe File created C:\Windows\SysWOW64\Nhahaiec.exe Neqopnhb.exe File created C:\Windows\SysWOW64\Kngekilj.dll Ihpcinld.exe File created C:\Windows\SysWOW64\Eonklp32.dll Jnlbojee.exe File created C:\Windows\SysWOW64\Olfghg32.exe Ojgjndno.exe File opened for modification C:\Windows\SysWOW64\Hbjoeojc.exe Hplbickp.exe File created C:\Windows\SysWOW64\Kajimagp.dll Aokkahlo.exe File created C:\Windows\SysWOW64\Iponmakp.dll Bfaigclq.exe File created C:\Windows\SysWOW64\Efjimhnh.exe Eifhdd32.exe File created C:\Windows\SysWOW64\Cfpffeaj.exe Cofnik32.exe File created C:\Windows\SysWOW64\Ghcfpl32.dll Nfgklkoc.exe File created C:\Windows\SysWOW64\Eifhdd32.exe Emphocjj.exe File created C:\Windows\SysWOW64\Ilmifh32.dll Enigke32.exe File opened for modification C:\Windows\SysWOW64\Pcbkml32.exe Pcpnhl32.exe File created C:\Windows\SysWOW64\Pjajmpkj.dll Idfaefkd.exe File opened for modification C:\Windows\SysWOW64\Kflide32.exe Koaagkcb.exe File created C:\Windows\SysWOW64\Mapppn32.exe Llqjbhdc.exe File opened for modification C:\Windows\SysWOW64\Dokgdkeh.exe Cohkokgj.exe File created C:\Windows\SysWOW64\Ocdnln32.exe Nmhijd32.exe File opened for modification C:\Windows\SysWOW64\Ccblbb32.exe Ckggnp32.exe File created C:\Windows\SysWOW64\Kcbfcigf.exe Kfnfjehl.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1800 536 WerFault.exe Gddgpqbe.exe -
Modifies registry class 64 IoCs
Processes:
Nnfpinmi.exeLcggio32.exeGifkpknp.exeKoaagkcb.exeDihlbf32.exeLndagg32.exeCkdkhq32.exeKdpmbc32.exeMfbaalbi.exeAkqfkp32.exeFbgihaji.exeLpepbgbd.exeObjkmkjj.exeEcgodpgb.exe21904453b86bacb5222badb97d687df0_NeikiAnalytics.exeFdglmkeg.exeNjedbjej.exeAalmimfd.exeCpacqg32.exeEhlhih32.exeKlpakj32.exeManmoq32.exeNlcalieg.exeMpeiie32.exePlbfdekd.exeFohfbpgi.exeMledmg32.exeBpjmph32.exeIibccgep.exeOcdnln32.exeDhikci32.exeMqjbddpl.exeFggdpnkf.exeOjgjndno.exeFmkqpkla.exeDokgdkeh.exeHefnkkkj.exeGnnccl32.exeDnqcfjae.exeEfjimhnh.exeAkccap32.exeQiiflaoo.exeNfgklkoc.exeNjgqhicg.exeCmpjoloh.exeGbalopbn.exeBdojjo32.exeDhbebj32.exeFpggamqc.exeMmpmnl32.exeOfgdcipq.exeBfkbfd32.exeIfomll32.exeIojkeh32.exeGpqjglii.exeBkphhgfc.exeAfappe32.exeLnldla32.exeHidgai32.exeEojiqb32.exeIhkjno32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnfpinmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcggio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbpcnkaj.dll" Gifkpknp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koaagkcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggamph32.dll" Dihlbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lndagg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckdkhq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdpmbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfbaalbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akqfkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aolece32.dll" Fbgihaji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpepbgbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Objkmkjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jodamh32.dll" Ecgodpgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anfjipgp.dll" 21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdglmkeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njedbjej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnhekleo.dll" Aalmimfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpacqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehlhih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klpakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Manmoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlcalieg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpeiie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgccelpk.dll" Mfbaalbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihbjebjh.dll" Plbfdekd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fohfbpgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mledmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adppeapp.dll" Bpjmph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iibccgep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocdnln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhikci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqjbddpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glkkmjeh.dll" Fggdpnkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojgjndno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kapceeje.dll" Fmkqpkla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icinkkcp.dll" Dokgdkeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hefnkkkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gnnccl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnqcfjae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efjimhnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akccap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qiiflaoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfgklkoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njgqhicg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmpjoloh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbalopbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdojjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llobhg32.dll" Dhbebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fohfbpgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcghka32.dll" Fpggamqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eleqaiga.dll" Mmpmnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agolng32.dll" Ofgdcipq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfkbfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifomll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iojkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpqjglii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkphhgfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afappe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oonnoglh.dll" Lnldla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hidgai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnggkf32.dll" Eojiqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpiaimfg.dll" Ihkjno32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
21904453b86bacb5222badb97d687df0_NeikiAnalytics.exeCimmggfl.exeCbgnemjj.exeDfefkkqp.exeDjcoai32.exeDihlbf32.exeDlieda32.exeEjlbhh32.exeEiaoid32.exeEmphocjj.exeEifhdd32.exeEfjimhnh.exeFmfnpa32.exeFpggamqc.exeFdepgkgj.exeFdglmkeg.exeGdjibj32.exeGpqjglii.exeGlgjlm32.exeGljgbllj.exeGdcliikj.exeIdfaefkd.exedescription pid process target process PID 484 wrote to memory of 1196 484 21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe Cimmggfl.exe PID 484 wrote to memory of 1196 484 21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe Cimmggfl.exe PID 484 wrote to memory of 1196 484 21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe Cimmggfl.exe PID 1196 wrote to memory of 2376 1196 Cimmggfl.exe Cbgnemjj.exe PID 1196 wrote to memory of 2376 1196 Cimmggfl.exe Cbgnemjj.exe PID 1196 wrote to memory of 2376 1196 Cimmggfl.exe Cbgnemjj.exe PID 2376 wrote to memory of 1200 2376 Cbgnemjj.exe Dfefkkqp.exe PID 2376 wrote to memory of 1200 2376 Cbgnemjj.exe Dfefkkqp.exe PID 2376 wrote to memory of 1200 2376 Cbgnemjj.exe Dfefkkqp.exe PID 1200 wrote to memory of 4072 1200 Dfefkkqp.exe Djcoai32.exe PID 1200 wrote to memory of 4072 1200 Dfefkkqp.exe Djcoai32.exe PID 1200 wrote to memory of 4072 1200 Dfefkkqp.exe Djcoai32.exe PID 4072 wrote to memory of 2124 4072 Djcoai32.exe Dihlbf32.exe PID 4072 wrote to memory of 2124 4072 Djcoai32.exe Dihlbf32.exe PID 4072 wrote to memory of 2124 4072 Djcoai32.exe Dihlbf32.exe PID 2124 wrote to memory of 3464 2124 Dihlbf32.exe Dlieda32.exe PID 2124 wrote to memory of 3464 2124 Dihlbf32.exe Dlieda32.exe PID 2124 wrote to memory of 3464 2124 Dihlbf32.exe Dlieda32.exe PID 3464 wrote to memory of 4176 3464 Dlieda32.exe Ejlbhh32.exe PID 3464 wrote to memory of 4176 3464 Dlieda32.exe Ejlbhh32.exe PID 3464 wrote to memory of 4176 3464 Dlieda32.exe Ejlbhh32.exe PID 4176 wrote to memory of 3572 4176 Ejlbhh32.exe Eiaoid32.exe PID 4176 wrote to memory of 3572 4176 Ejlbhh32.exe Eiaoid32.exe PID 4176 wrote to memory of 3572 4176 Ejlbhh32.exe Eiaoid32.exe PID 3572 wrote to memory of 3752 3572 Eiaoid32.exe Emphocjj.exe PID 3572 wrote to memory of 3752 3572 Eiaoid32.exe Emphocjj.exe PID 3572 wrote to memory of 3752 3572 Eiaoid32.exe Emphocjj.exe PID 3752 wrote to memory of 3620 3752 Emphocjj.exe Eifhdd32.exe PID 3752 wrote to memory of 3620 3752 Emphocjj.exe Eifhdd32.exe PID 3752 wrote to memory of 3620 3752 Emphocjj.exe Eifhdd32.exe PID 3620 wrote to memory of 5096 3620 Eifhdd32.exe Efjimhnh.exe PID 3620 wrote to memory of 5096 3620 Eifhdd32.exe Efjimhnh.exe PID 3620 wrote to memory of 5096 3620 Eifhdd32.exe Efjimhnh.exe PID 5096 wrote to memory of 3032 5096 Efjimhnh.exe Fmfnpa32.exe PID 5096 wrote to memory of 3032 5096 Efjimhnh.exe Fmfnpa32.exe PID 5096 wrote to memory of 3032 5096 Efjimhnh.exe Fmfnpa32.exe PID 3032 wrote to memory of 4792 3032 Fmfnpa32.exe Fpggamqc.exe PID 3032 wrote to memory of 4792 3032 Fmfnpa32.exe Fpggamqc.exe PID 3032 wrote to memory of 4792 3032 Fmfnpa32.exe Fpggamqc.exe PID 4792 wrote to memory of 2576 4792 Fpggamqc.exe Fdepgkgj.exe PID 4792 wrote to memory of 2576 4792 Fpggamqc.exe Fdepgkgj.exe PID 4792 wrote to memory of 2576 4792 Fpggamqc.exe Fdepgkgj.exe PID 2576 wrote to memory of 4684 2576 Fdepgkgj.exe Fdglmkeg.exe PID 2576 wrote to memory of 4684 2576 Fdepgkgj.exe Fdglmkeg.exe PID 2576 wrote to memory of 4684 2576 Fdepgkgj.exe Fdglmkeg.exe PID 4684 wrote to memory of 4508 4684 Fdglmkeg.exe Gdjibj32.exe PID 4684 wrote to memory of 4508 4684 Fdglmkeg.exe Gdjibj32.exe PID 4684 wrote to memory of 4508 4684 Fdglmkeg.exe Gdjibj32.exe PID 4508 wrote to memory of 2192 4508 Gdjibj32.exe Gpqjglii.exe PID 4508 wrote to memory of 2192 4508 Gdjibj32.exe Gpqjglii.exe PID 4508 wrote to memory of 2192 4508 Gdjibj32.exe Gpqjglii.exe PID 2192 wrote to memory of 4400 2192 Gpqjglii.exe Glgjlm32.exe PID 2192 wrote to memory of 4400 2192 Gpqjglii.exe Glgjlm32.exe PID 2192 wrote to memory of 4400 2192 Gpqjglii.exe Glgjlm32.exe PID 4400 wrote to memory of 560 4400 Glgjlm32.exe Gljgbllj.exe PID 4400 wrote to memory of 560 4400 Glgjlm32.exe Gljgbllj.exe PID 4400 wrote to memory of 560 4400 Glgjlm32.exe Gljgbllj.exe PID 560 wrote to memory of 4700 560 Gljgbllj.exe Gdcliikj.exe PID 560 wrote to memory of 4700 560 Gljgbllj.exe Gdcliikj.exe PID 560 wrote to memory of 4700 560 Gljgbllj.exe Gdcliikj.exe PID 4700 wrote to memory of 4240 4700 Gdcliikj.exe Idfaefkd.exe PID 4700 wrote to memory of 4240 4700 Gdcliikj.exe Idfaefkd.exe PID 4700 wrote to memory of 4240 4700 Gdcliikj.exe Idfaefkd.exe PID 4240 wrote to memory of 3260 4240 Idfaefkd.exe Inqbclob.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\21904453b86bacb5222badb97d687df0_NeikiAnalytics.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\Cimmggfl.exeC:\Windows\system32\Cimmggfl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Cbgnemjj.exeC:\Windows\system32\Cbgnemjj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Dfefkkqp.exeC:\Windows\system32\Dfefkkqp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Djcoai32.exeC:\Windows\system32\Djcoai32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\Dihlbf32.exeC:\Windows\system32\Dihlbf32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Dlieda32.exeC:\Windows\system32\Dlieda32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\Ejlbhh32.exeC:\Windows\system32\Ejlbhh32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\Eiaoid32.exeC:\Windows\system32\Eiaoid32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\Emphocjj.exeC:\Windows\system32\Emphocjj.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\Eifhdd32.exeC:\Windows\system32\Eifhdd32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\Efjimhnh.exeC:\Windows\system32\Efjimhnh.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\Fmfnpa32.exeC:\Windows\system32\Fmfnpa32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Fpggamqc.exeC:\Windows\system32\Fpggamqc.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\Fdepgkgj.exeC:\Windows\system32\Fdepgkgj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Fdglmkeg.exeC:\Windows\system32\Fdglmkeg.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Gdjibj32.exeC:\Windows\system32\Gdjibj32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\Gpqjglii.exeC:\Windows\system32\Gpqjglii.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Glgjlm32.exeC:\Windows\system32\Glgjlm32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\Gljgbllj.exeC:\Windows\system32\Gljgbllj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\Gdcliikj.exeC:\Windows\system32\Gdcliikj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\Idfaefkd.exeC:\Windows\system32\Idfaefkd.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\Inqbclob.exeC:\Windows\system32\Inqbclob.exe23⤵
- Executes dropped EXE
PID:3260 -
C:\Windows\SysWOW64\Jnjejjgh.exeC:\Windows\system32\Jnjejjgh.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\Jnlbojee.exeC:\Windows\system32\Jnlbojee.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\Kjccdkki.exeC:\Windows\system32\Kjccdkki.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\Kcndbp32.exeC:\Windows\system32\Kcndbp32.exe27⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Kdmqmc32.exeC:\Windows\system32\Kdmqmc32.exe28⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Kdpmbc32.exeC:\Windows\system32\Kdpmbc32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4896 -
C:\Windows\SysWOW64\Kcejco32.exeC:\Windows\system32\Kcejco32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3944 -
C:\Windows\SysWOW64\Lcggio32.exeC:\Windows\system32\Lcggio32.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\Lqkgbcff.exeC:\Windows\system32\Lqkgbcff.exe32⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\Ldipha32.exeC:\Windows\system32\Ldipha32.exe33⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\Lndagg32.exeC:\Windows\system32\Lndagg32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Mepfiq32.exeC:\Windows\system32\Mepfiq32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1004 -
C:\Windows\SysWOW64\Mgaokl32.exeC:\Windows\system32\Mgaokl32.exe36⤵
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\Mjahlgpf.exeC:\Windows\system32\Mjahlgpf.exe37⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\Manmoq32.exeC:\Windows\system32\Manmoq32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\Nlcalieg.exeC:\Windows\system32\Nlcalieg.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:4784 -
C:\Windows\SysWOW64\Neqopnhb.exeC:\Windows\system32\Neqopnhb.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4708 -
C:\Windows\SysWOW64\Nhahaiec.exeC:\Windows\system32\Nhahaiec.exe41⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\Njpdnedf.exeC:\Windows\system32\Njpdnedf.exe42⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\Oeheqm32.exeC:\Windows\system32\Oeheqm32.exe43⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\Ojgjndno.exeC:\Windows\system32\Ojgjndno.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:684 -
C:\Windows\SysWOW64\Olfghg32.exeC:\Windows\system32\Olfghg32.exe45⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Okkdic32.exeC:\Windows\system32\Okkdic32.exe46⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Peahgl32.exeC:\Windows\system32\Peahgl32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2964 -
C:\Windows\SysWOW64\Plmmif32.exeC:\Windows\system32\Plmmif32.exe48⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\Pkbjjbda.exeC:\Windows\system32\Pkbjjbda.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3868 -
C:\Windows\SysWOW64\Plbfdekd.exeC:\Windows\system32\Plbfdekd.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:3328 -
C:\Windows\SysWOW64\Pldcjeia.exeC:\Windows\system32\Pldcjeia.exe51⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\Qlgpod32.exeC:\Windows\system32\Qlgpod32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Qklmpalf.exeC:\Windows\system32\Qklmpalf.exe53⤵
- Executes dropped EXE
PID:4956 -
C:\Windows\SysWOW64\Aknifq32.exeC:\Windows\system32\Aknifq32.exe54⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\Akqfkp32.exeC:\Windows\system32\Akqfkp32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Windows\SysWOW64\Akccap32.exeC:\Windows\system32\Akccap32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:4256 -
C:\Windows\SysWOW64\Adkgje32.exeC:\Windows\system32\Adkgje32.exe57⤵
- Executes dropped EXE
PID:224 -
C:\Windows\SysWOW64\Aekddhcb.exeC:\Windows\system32\Aekddhcb.exe58⤵
- Executes dropped EXE
PID:3716 -
C:\Windows\SysWOW64\Bnfihkqm.exeC:\Windows\system32\Bnfihkqm.exe59⤵
- Executes dropped EXE
PID:4644 -
C:\Windows\SysWOW64\Boeebnhp.exeC:\Windows\system32\Boeebnhp.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Bohbhmfm.exeC:\Windows\system32\Bohbhmfm.exe61⤵
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\Bkobmnka.exeC:\Windows\system32\Bkobmnka.exe62⤵
- Executes dropped EXE
PID:3640 -
C:\Windows\SysWOW64\Blnoga32.exeC:\Windows\system32\Blnoga32.exe63⤵PID:772
-
C:\Windows\SysWOW64\Ckclhn32.exeC:\Windows\system32\Ckclhn32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3392 -
C:\Windows\SysWOW64\Clchbqoo.exeC:\Windows\system32\Clchbqoo.exe65⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\Cdnmfclj.exeC:\Windows\system32\Cdnmfclj.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3376 -
C:\Windows\SysWOW64\Cfnjpfcl.exeC:\Windows\system32\Cfnjpfcl.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1452 -
C:\Windows\SysWOW64\Cofnik32.exeC:\Windows\system32\Cofnik32.exe68⤵
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\Cfpffeaj.exeC:\Windows\system32\Cfpffeaj.exe69⤵
- Drops file in System32 directory
PID:1424 -
C:\Windows\SysWOW64\Cohkokgj.exeC:\Windows\system32\Cohkokgj.exe70⤵
- Drops file in System32 directory
PID:3128 -
C:\Windows\SysWOW64\Dokgdkeh.exeC:\Windows\system32\Dokgdkeh.exe71⤵
- Modifies registry class
PID:4052 -
C:\Windows\SysWOW64\Dkahilkl.exeC:\Windows\system32\Dkahilkl.exe72⤵PID:2252
-
C:\Windows\SysWOW64\Ddjmba32.exeC:\Windows\system32\Ddjmba32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1448 -
C:\Windows\SysWOW64\Dfiildio.exeC:\Windows\system32\Dfiildio.exe74⤵
- Drops file in System32 directory
PID:4140 -
C:\Windows\SysWOW64\Dflfac32.exeC:\Windows\system32\Dflfac32.exe75⤵PID:3264
-
C:\Windows\SysWOW64\Dmennnni.exeC:\Windows\system32\Dmennnni.exe76⤵PID:1700
-
C:\Windows\SysWOW64\Eiloco32.exeC:\Windows\system32\Eiloco32.exe77⤵PID:2372
-
C:\Windows\SysWOW64\Enigke32.exeC:\Windows\system32\Enigke32.exe78⤵
- Drops file in System32 directory
PID:5148 -
C:\Windows\SysWOW64\Emjgim32.exeC:\Windows\system32\Emjgim32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5192 -
C:\Windows\SysWOW64\Ebgpad32.exeC:\Windows\system32\Ebgpad32.exe80⤵PID:5240
-
C:\Windows\SysWOW64\Eokqkh32.exeC:\Windows\system32\Eokqkh32.exe81⤵PID:5284
-
C:\Windows\SysWOW64\Enpmld32.exeC:\Windows\system32\Enpmld32.exe82⤵
- Drops file in System32 directory
PID:5328 -
C:\Windows\SysWOW64\Fngcmcfe.exeC:\Windows\system32\Fngcmcfe.exe83⤵PID:5372
-
C:\Windows\SysWOW64\Fnipbc32.exeC:\Windows\system32\Fnipbc32.exe84⤵PID:5420
-
C:\Windows\SysWOW64\Fmkqpkla.exeC:\Windows\system32\Fmkqpkla.exe85⤵
- Modifies registry class
PID:5464 -
C:\Windows\SysWOW64\Fbgihaji.exeC:\Windows\system32\Fbgihaji.exe86⤵
- Modifies registry class
PID:5508 -
C:\Windows\SysWOW64\Fnnjmbpm.exeC:\Windows\system32\Fnnjmbpm.exe87⤵
- Drops file in System32 directory
PID:5552 -
C:\Windows\SysWOW64\Gpnfge32.exeC:\Windows\system32\Gpnfge32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5596 -
C:\Windows\SysWOW64\Gifkpknp.exeC:\Windows\system32\Gifkpknp.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5640 -
C:\Windows\SysWOW64\Gncchb32.exeC:\Windows\system32\Gncchb32.exe90⤵PID:5684
-
C:\Windows\SysWOW64\Glgcbf32.exeC:\Windows\system32\Glgcbf32.exe91⤵PID:5732
-
C:\Windows\SysWOW64\Gbalopbn.exeC:\Windows\system32\Gbalopbn.exe92⤵
- Modifies registry class
PID:5776 -
C:\Windows\SysWOW64\Gmfplibd.exeC:\Windows\system32\Gmfplibd.exe93⤵PID:5824
-
C:\Windows\SysWOW64\Goglcahb.exeC:\Windows\system32\Goglcahb.exe94⤵PID:5868
-
C:\Windows\SysWOW64\Glkmmefl.exeC:\Windows\system32\Glkmmefl.exe95⤵PID:5912
-
C:\Windows\SysWOW64\Gbeejp32.exeC:\Windows\system32\Gbeejp32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5956 -
C:\Windows\SysWOW64\Hpiecd32.exeC:\Windows\system32\Hpiecd32.exe97⤵PID:6004
-
C:\Windows\SysWOW64\Hefnkkkj.exeC:\Windows\system32\Hefnkkkj.exe98⤵
- Modifies registry class
PID:6048 -
C:\Windows\SysWOW64\Hplbickp.exeC:\Windows\system32\Hplbickp.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6092 -
C:\Windows\SysWOW64\Hbjoeojc.exeC:\Windows\system32\Hbjoeojc.exe100⤵PID:6132
-
C:\Windows\SysWOW64\Hidgai32.exeC:\Windows\system32\Hidgai32.exe101⤵
- Modifies registry class
PID:5176 -
C:\Windows\SysWOW64\Hekgfj32.exeC:\Windows\system32\Hekgfj32.exe102⤵PID:5248
-
C:\Windows\SysWOW64\Hbohpn32.exeC:\Windows\system32\Hbohpn32.exe103⤵PID:5316
-
C:\Windows\SysWOW64\Hpchib32.exeC:\Windows\system32\Hpchib32.exe104⤵
- Drops file in System32 directory
PID:5388 -
C:\Windows\SysWOW64\Iliinc32.exeC:\Windows\system32\Iliinc32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5452 -
C:\Windows\SysWOW64\Ifomll32.exeC:\Windows\system32\Ifomll32.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:5524 -
C:\Windows\SysWOW64\Ibfnqmpf.exeC:\Windows\system32\Ibfnqmpf.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5588 -
C:\Windows\SysWOW64\Ipjoja32.exeC:\Windows\system32\Ipjoja32.exe108⤵PID:5668
-
C:\Windows\SysWOW64\Iibccgep.exeC:\Windows\system32\Iibccgep.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5764 -
C:\Windows\SysWOW64\Ickglm32.exeC:\Windows\system32\Ickglm32.exe110⤵PID:5876
-
C:\Windows\SysWOW64\Joahqn32.exeC:\Windows\system32\Joahqn32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5948 -
C:\Windows\SysWOW64\Jmbhoeid.exeC:\Windows\system32\Jmbhoeid.exe112⤵PID:6020
-
C:\Windows\SysWOW64\Jmeede32.exeC:\Windows\system32\Jmeede32.exe113⤵PID:6080
-
C:\Windows\SysWOW64\Jlolpq32.exeC:\Windows\system32\Jlolpq32.exe114⤵PID:5136
-
C:\Windows\SysWOW64\Klahfp32.exeC:\Windows\system32\Klahfp32.exe115⤵PID:5232
-
C:\Windows\SysWOW64\Knqepc32.exeC:\Windows\system32\Knqepc32.exe116⤵PID:5360
-
C:\Windows\SysWOW64\Koaagkcb.exeC:\Windows\system32\Koaagkcb.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:5500 -
C:\Windows\SysWOW64\Kflide32.exeC:\Windows\system32\Kflide32.exe118⤵PID:5636
-
C:\Windows\SysWOW64\Kodnmkap.exeC:\Windows\system32\Kodnmkap.exe119⤵PID:5744
-
C:\Windows\SysWOW64\Kfnfjehl.exeC:\Windows\system32\Kfnfjehl.exe120⤵
- Drops file in System32 directory
PID:5952 -
C:\Windows\SysWOW64\Kcbfcigf.exeC:\Windows\system32\Kcbfcigf.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6064 -
C:\Windows\SysWOW64\Lljklo32.exeC:\Windows\system32\Lljklo32.exe122⤵PID:5604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-