Analysis
-
max time kernel
138s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 04:54
Behavioral task
behavioral1
Sample
2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe
-
Size
384KB
-
MD5
2f52e4a3c0de205e31f30f06b8e7f050
-
SHA1
a87cf46ade386e8367be28682316ce909ed9fa64
-
SHA256
a6a15a472cd5b373c2916884becd90d3a17ca9ec2210ece8e179665bdde7d79d
-
SHA512
294caf6990e0e8d9dbe117d13bdb126bfa2680424c1e864587ed3e938f6cabcec02fbdb43abc4dad7267b3767da8209ca4927a8bf78ebb2b5d4d922ed8f5c818
-
SSDEEP
6144:U9OAiuLWWXpui6yYPaIGckjh/xaSfBJKFbhD7sYQpui6yYPaIGck7/DiuoH3ygND:JiDpV6yYPMLnfBJKFbhDwBpV6yYP0riN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dhkjej32.exeHapaemll.exeHbhdmd32.exeJibeql32.exeLmqgnhmp.exePnfkma32.exeEocenh32.exeCjbpaf32.exeIcjmmg32.exeFkopnh32.exeIldkgc32.exeKepelfam.exeQbimoo32.exeClkndpag.exeFaihkbci.exeKmfmmcbo.exeMenjdbgj.exeOcpgod32.exeNjfmke32.exeKboljk32.exeLigqhc32.exePnakhkol.exePcncpbmd.exePfaigm32.exeCajlhqjp.exeIbjqcd32.exeHbnjmp32.exeIcnpmp32.exePncgmkmj.exeBaicac32.exeDoilmc32.exeMdkhapfj.exeGkkojgao.exeAgjhgngj.exeEchknh32.exeLmdina32.exePnfdcjkg.exeOnhhamgg.exeHabnjm32.exeLaefdf32.exeOdnnnnfe.exeBahmfj32.exeGhlcnk32.exeGkaejf32.exeJefbfgig.exeDmcibama.exeHoiafcic.exe2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exeJfaloa32.exeMpmokb32.exeOgcpjhoq.exePjdilcla.exeEemnjbaj.exeGmjlcj32.exeIblfnn32.exeLdoaklml.exeMlcifmbl.exeOfnckp32.exePqpgdfnp.exeHmmhjm32.exeKdffocib.exeLpocjdld.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hapaemll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbhdmd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jibeql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmqgnhmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnfkma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eocenh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cjbpaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icjmmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkopnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ildkgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kepelfam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qbimoo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clkndpag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faihkbci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kmfmmcbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Menjdbgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocpgod32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njfmke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kboljk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ligqhc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnakhkol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcncpbmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfaigm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cajlhqjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ibjqcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbnjmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icnpmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pncgmkmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Baicac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Doilmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mdkhapfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gkkojgao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agjhgngj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Echknh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkopnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmdina32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnfdcjkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onhhamgg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Habnjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Laefdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Odnnnnfe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bahmfj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghlcnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkaejf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jefbfgig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmcibama.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hoiafcic.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jfaloa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mpmokb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ogcpjhoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjdilcla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eemnjbaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmjlcj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iblfnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ldoaklml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlcifmbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mlcifmbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ofnckp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqpgdfnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hmmhjm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdffocib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lpocjdld.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Gfcgge32.exe family_berbew C:\Windows\SysWOW64\Gmmocpjk.exe family_berbew C:\Windows\SysWOW64\Gpklpkio.exe family_berbew C:\Windows\SysWOW64\Gfhqbe32.exe family_berbew C:\Windows\SysWOW64\Gmaioo32.exe family_berbew C:\Windows\SysWOW64\Gameonno.exe family_berbew C:\Windows\SysWOW64\Hapaemll.exe family_berbew C:\Windows\SysWOW64\Hapaemll.exe family_berbew C:\Windows\SysWOW64\Hbanme32.exe family_berbew C:\Windows\SysWOW64\Habnjm32.exe family_berbew C:\Windows\SysWOW64\Hbckbepg.exe family_berbew C:\Windows\SysWOW64\Hccglh32.exe family_berbew C:\Windows\SysWOW64\Hippdo32.exe family_berbew C:\Windows\SysWOW64\Hbhdmd32.exe family_berbew C:\Windows\SysWOW64\Hmmhjm32.exe family_berbew C:\Windows\SysWOW64\Ibjqcd32.exe family_berbew C:\Windows\SysWOW64\Icjmmg32.exe family_berbew C:\Windows\SysWOW64\Ifhiib32.exe family_berbew C:\Windows\SysWOW64\Imdnklfp.exe family_berbew C:\Windows\SysWOW64\Ipckgh32.exe family_berbew C:\Windows\SysWOW64\Ifmcdblq.exe family_berbew C:\Windows\SysWOW64\Idacmfkj.exe family_berbew C:\Windows\SysWOW64\Iinlemia.exe family_berbew C:\Windows\SysWOW64\Jaedgjjd.exe family_berbew C:\Windows\SysWOW64\Jdcpcf32.exe family_berbew C:\Windows\SysWOW64\Jfaloa32.exe family_berbew C:\Windows\SysWOW64\Jjmhppqd.exe family_berbew C:\Windows\SysWOW64\Jpjqhgol.exe family_berbew C:\Windows\SysWOW64\Jibeql32.exe family_berbew C:\Windows\SysWOW64\Ifopiajn.exe family_berbew C:\Windows\SysWOW64\Kgmlkp32.exe family_berbew C:\Windows\SysWOW64\Kilhgk32.exe family_berbew C:\Windows\SysWOW64\Kgphpo32.exe family_berbew C:\Windows\SysWOW64\Kknafn32.exe family_berbew C:\Windows\SysWOW64\Mpkbebbf.exe family_berbew C:\Windows\SysWOW64\Njljefql.exe family_berbew C:\Windows\SysWOW64\Njacpf32.exe family_berbew C:\Windows\SysWOW64\Ncldnkae.exe family_berbew C:\Windows\SysWOW64\Okeieh32.exe family_berbew C:\Windows\SysWOW64\Ogljjiei.exe family_berbew C:\Windows\SysWOW64\Obidhaog.exe family_berbew C:\Windows\SysWOW64\Pbkamqmd.exe family_berbew C:\Windows\SysWOW64\Pgopffec.exe family_berbew C:\Windows\SysWOW64\Aegikj32.exe family_berbew C:\Windows\SysWOW64\Aaqgek32.exe family_berbew C:\Windows\SysWOW64\Clkndpag.exe family_berbew C:\Windows\SysWOW64\Chdkoa32.exe family_berbew C:\Windows\SysWOW64\Dahode32.exe family_berbew C:\Windows\SysWOW64\Ednaqo32.exe family_berbew C:\Windows\SysWOW64\Eocenh32.exe family_berbew C:\Windows\SysWOW64\Ecandfpd.exe family_berbew C:\Windows\SysWOW64\Fhgjblfq.exe family_berbew C:\Windows\SysWOW64\Gkhbdg32.exe family_berbew C:\Windows\SysWOW64\Ghlcnk32.exe family_berbew C:\Windows\SysWOW64\Hfqlnm32.exe family_berbew C:\Windows\SysWOW64\Jlnnmb32.exe family_berbew C:\Windows\SysWOW64\Jidklf32.exe family_berbew C:\Windows\SysWOW64\Kmfmmcbo.exe family_berbew C:\Windows\SysWOW64\Kefkme32.exe family_berbew C:\Windows\SysWOW64\Ldanqkki.exe family_berbew C:\Windows\SysWOW64\Miemjaci.exe family_berbew C:\Windows\SysWOW64\Menjdbgj.exe family_berbew C:\Windows\SysWOW64\Nngokoej.exe family_berbew C:\Windows\SysWOW64\Odocigqg.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Gfcgge32.exeGmmocpjk.exeGpklpkio.exeGfhqbe32.exeGmaioo32.exeGameonno.exeHapaemll.exeHbanme32.exeHabnjm32.exeHbckbepg.exeHccglh32.exeHippdo32.exeHbhdmd32.exeHmmhjm32.exeIbjqcd32.exeIcjmmg32.exeIfhiib32.exeImdnklfp.exeIpckgh32.exeIfmcdblq.exeIdacmfkj.exeIfopiajn.exeIinlemia.exeJaedgjjd.exeJdcpcf32.exeJfaloa32.exeJjmhppqd.exeJpjqhgol.exeJibeql32.exeKgmlkp32.exeKilhgk32.exeKgphpo32.exeKknafn32.exeKagichjo.exeKdffocib.exeKgdbkohf.exeKmnjhioc.exeKdhbec32.exeKgfoan32.exeLmqgnhmp.exeLpocjdld.exeLkdggmlj.exeLaopdgcg.exeLcpllo32.exeLgkhlnbn.exeLijdhiaa.exeLdohebqh.exeLkiqbl32.exeLnhmng32.exeLgpagm32.exeLaefdf32.exeLgbnmm32.exeMjqjih32.exeMpkbebbf.exeMnocof32.exeMpmokb32.exeMgghhlhq.exeMnapdf32.exeMdkhapfj.exeMkepnjng.exeMdmegp32.exeMglack32.exeMnfipekh.exeMpdelajl.exepid process 3208 Gfcgge32.exe 740 Gmmocpjk.exe 4608 Gpklpkio.exe 4316 Gfhqbe32.exe 1484 Gmaioo32.exe 2592 Gameonno.exe 5004 Hapaemll.exe 5024 Hbanme32.exe 2184 Habnjm32.exe 5048 Hbckbepg.exe 4676 Hccglh32.exe 4968 Hippdo32.exe 3824 Hbhdmd32.exe 4788 Hmmhjm32.exe 4940 Ibjqcd32.exe 1520 Icjmmg32.exe 1924 Ifhiib32.exe 4680 Imdnklfp.exe 2976 Ipckgh32.exe 1796 Ifmcdblq.exe 5104 Idacmfkj.exe 1720 Ifopiajn.exe 2276 Iinlemia.exe 3300 Jaedgjjd.exe 1952 Jdcpcf32.exe 4628 Jfaloa32.exe 220 Jjmhppqd.exe 3488 Jpjqhgol.exe 2288 Jibeql32.exe 5080 Kgmlkp32.exe 3276 Kilhgk32.exe 2612 Kgphpo32.exe 4588 Kknafn32.exe 848 Kagichjo.exe 5084 Kdffocib.exe 948 Kgdbkohf.exe 868 Kmnjhioc.exe 1252 Kdhbec32.exe 3840 Kgfoan32.exe 3756 Lmqgnhmp.exe 4460 Lpocjdld.exe 2196 Lkdggmlj.exe 3628 Laopdgcg.exe 1772 Lcpllo32.exe 4192 Lgkhlnbn.exe 4476 Lijdhiaa.exe 2304 Ldohebqh.exe 1532 Lkiqbl32.exe 3836 Lnhmng32.exe 1460 Lgpagm32.exe 4840 Laefdf32.exe 4500 Lgbnmm32.exe 4328 Mjqjih32.exe 1064 Mpkbebbf.exe 4640 Mnocof32.exe 916 Mpmokb32.exe 4580 Mgghhlhq.exe 4908 Mnapdf32.exe 4584 Mdkhapfj.exe 2464 Mkepnjng.exe 1732 Mdmegp32.exe 2332 Mglack32.exe 2792 Mnfipekh.exe 4712 Mpdelajl.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fkciihgg.exeIifokh32.exeNcfdie32.exeHccglh32.exeNdhmhh32.exeBeeflhdh.exeDahode32.exeOcgmpccl.exeFkopnh32.exeIldkgc32.exeJlnnmb32.exeMnocof32.exeCliaoq32.exeHodgkc32.exeEcandfpd.exeHmhhehlb.exeNpjebj32.exeIbjqcd32.exeLkiqbl32.exeOdnnnnfe.exeIfmcdblq.exeLboeaifi.exeNjnpppkn.exeBmkjkd32.exeKemhff32.exeLenamdem.exeMiemjaci.exeMjqjih32.exeBalfaiil.exeBlbknaib.exeJfhlejnh.exeEchknh32.exeIcgjmapi.exeKdgljmcd.exeIdacmfkj.exeLdohebqh.exeAegikj32.exeLffhfh32.exeBelebq32.exeIinlemia.exeIfllil32.exeKfankifm.exeNeeqea32.exeJlkagbej.exeMcmabg32.exePcncpbmd.exeKdffocib.exeMkepnjng.exePjhbgb32.exeIbcmom32.exeOnfbfc32.exeJifhaenk.exePbddcoei.exeAdcmmeog.exeKmdqgd32.exeNlaegk32.exeEcmeig32.exeNjogjfoj.exedescription ioc process File created C:\Windows\SysWOW64\Icfpbq32.dll Fkciihgg.exe File opened for modification C:\Windows\SysWOW64\Ildkgc32.exe Iifokh32.exe File created C:\Windows\SysWOW64\Hlfofiig.dll Ncfdie32.exe File created C:\Windows\SysWOW64\Ifhmhq32.dll Hccglh32.exe File created C:\Windows\SysWOW64\Kmcjho32.dll Ndhmhh32.exe File created C:\Windows\SysWOW64\Bgdpie32.dll Beeflhdh.exe File opened for modification C:\Windows\SysWOW64\Dlncan32.exe Dahode32.exe File opened for modification C:\Windows\SysWOW64\Ogbipa32.exe Ocgmpccl.exe File created C:\Windows\SysWOW64\Faihkbci.exe Fkopnh32.exe File created C:\Windows\SysWOW64\Ickchq32.exe Ildkgc32.exe File created C:\Windows\SysWOW64\Jbhfjljd.exe Jlnnmb32.exe File opened for modification C:\Windows\SysWOW64\Mpmokb32.exe Mnocof32.exe File opened for modification C:\Windows\SysWOW64\Cogmkl32.exe Cliaoq32.exe File created C:\Windows\SysWOW64\Enoogcin.dll Hodgkc32.exe File created C:\Windows\SysWOW64\Ehnglm32.exe Ecandfpd.exe File created C:\Windows\SysWOW64\Hofdacke.exe Hmhhehlb.exe File created C:\Windows\SysWOW64\Hddeok32.dll Npjebj32.exe File opened for modification C:\Windows\SysWOW64\Icjmmg32.exe Ibjqcd32.exe File opened for modification C:\Windows\SysWOW64\Lnhmng32.exe Lkiqbl32.exe File created C:\Windows\SysWOW64\Ogljjiei.exe Odnnnnfe.exe File created C:\Windows\SysWOW64\Cogmkl32.exe Cliaoq32.exe File created C:\Windows\SysWOW64\Bpqnnk32.dll Ifmcdblq.exe File opened for modification C:\Windows\SysWOW64\Lenamdem.exe Lboeaifi.exe File created C:\Windows\SysWOW64\Cihmlb32.dll Njnpppkn.exe File created C:\Windows\SysWOW64\Bneljh32.dll Bmkjkd32.exe File created C:\Windows\SysWOW64\Kmdqgd32.exe Kemhff32.exe File opened for modification C:\Windows\SysWOW64\Lmdina32.exe Lenamdem.exe File opened for modification C:\Windows\SysWOW64\Mlcifmbl.exe Miemjaci.exe File created C:\Windows\SysWOW64\Kmdigkkd.dll Mjqjih32.exe File created C:\Windows\SysWOW64\Bdkcmdhp.exe Balfaiil.exe File opened for modification C:\Windows\SysWOW64\Bopgjmhe.exe Blbknaib.exe File created C:\Windows\SysWOW64\Ndqgbjkm.dll Jfhlejnh.exe File created C:\Windows\SysWOW64\Linjpeof.dll Echknh32.exe File created C:\Windows\SysWOW64\Hnmacdaj.dll Icgjmapi.exe File opened for modification C:\Windows\SysWOW64\Jbhfjljd.exe Jlnnmb32.exe File opened for modification C:\Windows\SysWOW64\Lffhfh32.exe Kdgljmcd.exe File opened for modification C:\Windows\SysWOW64\Idacmfkj.exe Ifmcdblq.exe File opened for modification C:\Windows\SysWOW64\Ifopiajn.exe Idacmfkj.exe File created C:\Windows\SysWOW64\Ekiidlll.dll Ldohebqh.exe File created C:\Windows\SysWOW64\Alabgd32.exe Aegikj32.exe File opened for modification C:\Windows\SysWOW64\Liddbc32.exe Lffhfh32.exe File created C:\Windows\SysWOW64\Cndikf32.exe Belebq32.exe File created C:\Windows\SysWOW64\Gbledndp.dll Iinlemia.exe File created C:\Windows\SysWOW64\Imfdff32.exe Ifllil32.exe File created C:\Windows\SysWOW64\Fhccdhqf.dll Kfankifm.exe File created C:\Windows\SysWOW64\Npjebj32.exe Neeqea32.exe File opened for modification C:\Windows\SysWOW64\Jcbihpel.exe Jlkagbej.exe File created C:\Windows\SysWOW64\Lplhdc32.dll Mcmabg32.exe File created C:\Windows\SysWOW64\Pncgmkmj.exe Pcncpbmd.exe File opened for modification C:\Windows\SysWOW64\Kgdbkohf.exe Kdffocib.exe File created C:\Windows\SysWOW64\Mdmegp32.exe Mkepnjng.exe File created C:\Windows\SysWOW64\Cpnfbohh.dll Pjhbgb32.exe File created C:\Windows\SysWOW64\Jimekgff.exe Ibcmom32.exe File opened for modification C:\Windows\SysWOW64\Occkojkm.exe Onfbfc32.exe File opened for modification C:\Windows\SysWOW64\Jlednamo.exe Jifhaenk.exe File created C:\Windows\SysWOW64\Qecppkdm.exe Pbddcoei.exe File opened for modification C:\Windows\SysWOW64\Alkdnboj.exe Adcmmeog.exe File created C:\Windows\SysWOW64\Qoecnk32.dll Kmdqgd32.exe File created C:\Windows\SysWOW64\Fjegoh32.dll Nlaegk32.exe File created C:\Windows\SysWOW64\Pengdk32.exe Pjhbgb32.exe File created C:\Windows\SysWOW64\Bopgjmhe.exe Blbknaib.exe File created C:\Windows\SysWOW64\Djhgpa32.dll Ecmeig32.exe File created C:\Windows\SysWOW64\Jlgbon32.dll Lffhfh32.exe File opened for modification C:\Windows\SysWOW64\Nafokcol.exe Njogjfoj.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4568 9308 WerFault.exe Dmllipeg.exe -
Modifies registry class 64 IoCs
Processes:
Jlnnmb32.exeBlbknaib.exeGbbkaako.exeGhlcnk32.exeGmjlcj32.exeJedeph32.exeCddecc32.exeColffknh.exeEdkdkplj.exeIpckgh32.exeNcldnkae.exeOdnnnnfe.exeOcckojkm.exeQloebdig.exeGfbploob.exeIcgjmapi.exeIfefimom.exeBdkcmdhp.exeEkemhj32.exeLiddbc32.exeGfcgge32.exeHccglh32.exeMnapdf32.exeOnfbfc32.exeBeeflhdh.exeNpjebj32.exePfjcgn32.exeAglemn32.exeJefbfgig.exePnakhkol.exeNafokcol.exeImfdff32.exeKpbmco32.exeCdfbibnb.exeBlpnib32.exeHfqlnm32.exeAnadoi32.exeEhnglm32.exeGkkojgao.exeKpgfooop.exeNggjdc32.exeOdocigqg.exePnonbk32.exeNgedij32.exeAejfpjne.exeDkljak32.exeHmjdjgjo.exeMmlpoqpg.exeLdohebqh.exeBnnjen32.exeEocenh32.exeIblfnn32.exeDhkjej32.exePqpgdfnp.exeMnocof32.exeFkopnh32.exeOnhhamgg.exeHmmhjm32.exeDkoggkjo.exeKebbafoj.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jlnnmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Blbknaib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdmann32.dll" Gbbkaako.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ghlcnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhondp32.dll" Gmjlcj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jedeph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgqddl32.dll" Cddecc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Colffknh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Edkdkplj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ipckgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Odnnnnfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Echmafdm.dll" Occkojkm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qloebdig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjhcgd32.dll" Gfbploob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Icgjmapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ifefimom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bdkcmdhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgmbieme.dll" Ekemhj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Liddbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gfcgge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hccglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mnapdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Onfbfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Beeflhdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hddeok32.dll" Npjebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjgfjhqm.dll" Pfjcgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aglemn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jefbfgig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pnakhkol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nafokcol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afomjffg.dll" Imfdff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpbmco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cdfbibnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Blpnib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hfqlnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Anadoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bqhimici.dll" Ehnglm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gkkojgao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpgfooop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nggjdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Odocigqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pnonbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anmnemcc.dll" Aejfpjne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dkljak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hmjdjgjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mmlpoqpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekiidlll.dll" Ldohebqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bnnjen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eocenh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iblfnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhkjej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oomibind.dll" Pqpgdfnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkankc32.dll" Mnocof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klohnjkj.dll" Qloebdig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkopnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naekcf32.dll" Onhhamgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jocbigff.dll" Pnakhkol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hmmhjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpmmhi32.dll" Dkoggkjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gfbploob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffhoqj32.dll" Kebbafoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gbbkaako.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exeGfcgge32.exeGmmocpjk.exeGpklpkio.exeGfhqbe32.exeGmaioo32.exeGameonno.exeHapaemll.exeHbanme32.exeHabnjm32.exeHbckbepg.exeHccglh32.exeHippdo32.exeHbhdmd32.exeHmmhjm32.exeIbjqcd32.exeIcjmmg32.exeIfhiib32.exeImdnklfp.exeIpckgh32.exeIfmcdblq.exeIdacmfkj.exedescription pid process target process PID 3108 wrote to memory of 3208 3108 2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe Gfcgge32.exe PID 3108 wrote to memory of 3208 3108 2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe Gfcgge32.exe PID 3108 wrote to memory of 3208 3108 2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe Gfcgge32.exe PID 3208 wrote to memory of 740 3208 Gfcgge32.exe Gmmocpjk.exe PID 3208 wrote to memory of 740 3208 Gfcgge32.exe Gmmocpjk.exe PID 3208 wrote to memory of 740 3208 Gfcgge32.exe Gmmocpjk.exe PID 740 wrote to memory of 4608 740 Gmmocpjk.exe Gpklpkio.exe PID 740 wrote to memory of 4608 740 Gmmocpjk.exe Gpklpkio.exe PID 740 wrote to memory of 4608 740 Gmmocpjk.exe Gpklpkio.exe PID 4608 wrote to memory of 4316 4608 Gpklpkio.exe Gfhqbe32.exe PID 4608 wrote to memory of 4316 4608 Gpklpkio.exe Gfhqbe32.exe PID 4608 wrote to memory of 4316 4608 Gpklpkio.exe Gfhqbe32.exe PID 4316 wrote to memory of 1484 4316 Gfhqbe32.exe Gmaioo32.exe PID 4316 wrote to memory of 1484 4316 Gfhqbe32.exe Gmaioo32.exe PID 4316 wrote to memory of 1484 4316 Gfhqbe32.exe Gmaioo32.exe PID 1484 wrote to memory of 2592 1484 Gmaioo32.exe Gameonno.exe PID 1484 wrote to memory of 2592 1484 Gmaioo32.exe Gameonno.exe PID 1484 wrote to memory of 2592 1484 Gmaioo32.exe Gameonno.exe PID 2592 wrote to memory of 5004 2592 Gameonno.exe Hapaemll.exe PID 2592 wrote to memory of 5004 2592 Gameonno.exe Hapaemll.exe PID 2592 wrote to memory of 5004 2592 Gameonno.exe Hapaemll.exe PID 5004 wrote to memory of 5024 5004 Hapaemll.exe Hbanme32.exe PID 5004 wrote to memory of 5024 5004 Hapaemll.exe Hbanme32.exe PID 5004 wrote to memory of 5024 5004 Hapaemll.exe Hbanme32.exe PID 5024 wrote to memory of 2184 5024 Hbanme32.exe Habnjm32.exe PID 5024 wrote to memory of 2184 5024 Hbanme32.exe Habnjm32.exe PID 5024 wrote to memory of 2184 5024 Hbanme32.exe Habnjm32.exe PID 2184 wrote to memory of 5048 2184 Habnjm32.exe Hbckbepg.exe PID 2184 wrote to memory of 5048 2184 Habnjm32.exe Hbckbepg.exe PID 2184 wrote to memory of 5048 2184 Habnjm32.exe Hbckbepg.exe PID 5048 wrote to memory of 4676 5048 Hbckbepg.exe Hccglh32.exe PID 5048 wrote to memory of 4676 5048 Hbckbepg.exe Hccglh32.exe PID 5048 wrote to memory of 4676 5048 Hbckbepg.exe Hccglh32.exe PID 4676 wrote to memory of 4968 4676 Hccglh32.exe Hippdo32.exe PID 4676 wrote to memory of 4968 4676 Hccglh32.exe Hippdo32.exe PID 4676 wrote to memory of 4968 4676 Hccglh32.exe Hippdo32.exe PID 4968 wrote to memory of 3824 4968 Hippdo32.exe Hbhdmd32.exe PID 4968 wrote to memory of 3824 4968 Hippdo32.exe Hbhdmd32.exe PID 4968 wrote to memory of 3824 4968 Hippdo32.exe Hbhdmd32.exe PID 3824 wrote to memory of 4788 3824 Hbhdmd32.exe Hmmhjm32.exe PID 3824 wrote to memory of 4788 3824 Hbhdmd32.exe Hmmhjm32.exe PID 3824 wrote to memory of 4788 3824 Hbhdmd32.exe Hmmhjm32.exe PID 4788 wrote to memory of 4940 4788 Hmmhjm32.exe Ibjqcd32.exe PID 4788 wrote to memory of 4940 4788 Hmmhjm32.exe Ibjqcd32.exe PID 4788 wrote to memory of 4940 4788 Hmmhjm32.exe Ibjqcd32.exe PID 4940 wrote to memory of 1520 4940 Ibjqcd32.exe Icjmmg32.exe PID 4940 wrote to memory of 1520 4940 Ibjqcd32.exe Icjmmg32.exe PID 4940 wrote to memory of 1520 4940 Ibjqcd32.exe Icjmmg32.exe PID 1520 wrote to memory of 1924 1520 Icjmmg32.exe Ifhiib32.exe PID 1520 wrote to memory of 1924 1520 Icjmmg32.exe Ifhiib32.exe PID 1520 wrote to memory of 1924 1520 Icjmmg32.exe Ifhiib32.exe PID 1924 wrote to memory of 4680 1924 Ifhiib32.exe Imdnklfp.exe PID 1924 wrote to memory of 4680 1924 Ifhiib32.exe Imdnklfp.exe PID 1924 wrote to memory of 4680 1924 Ifhiib32.exe Imdnklfp.exe PID 4680 wrote to memory of 2976 4680 Imdnklfp.exe Ipckgh32.exe PID 4680 wrote to memory of 2976 4680 Imdnklfp.exe Ipckgh32.exe PID 4680 wrote to memory of 2976 4680 Imdnklfp.exe Ipckgh32.exe PID 2976 wrote to memory of 1796 2976 Ipckgh32.exe Ifmcdblq.exe PID 2976 wrote to memory of 1796 2976 Ipckgh32.exe Ifmcdblq.exe PID 2976 wrote to memory of 1796 2976 Ipckgh32.exe Ifmcdblq.exe PID 1796 wrote to memory of 5104 1796 Ifmcdblq.exe Idacmfkj.exe PID 1796 wrote to memory of 5104 1796 Ifmcdblq.exe Idacmfkj.exe PID 1796 wrote to memory of 5104 1796 Ifmcdblq.exe Idacmfkj.exe PID 5104 wrote to memory of 1720 5104 Idacmfkj.exe Ifopiajn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2f52e4a3c0de205e31f30f06b8e7f050_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\Gfcgge32.exeC:\Windows\system32\Gfcgge32.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\Gmmocpjk.exeC:\Windows\system32\Gmmocpjk.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\Gpklpkio.exeC:\Windows\system32\Gpklpkio.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\Gfhqbe32.exeC:\Windows\system32\Gfhqbe32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\Gmaioo32.exeC:\Windows\system32\Gmaioo32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\Gameonno.exeC:\Windows\system32\Gameonno.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Hapaemll.exeC:\Windows\system32\Hapaemll.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\Hbanme32.exeC:\Windows\system32\Hbanme32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\Habnjm32.exeC:\Windows\system32\Habnjm32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Hbckbepg.exeC:\Windows\system32\Hbckbepg.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\Hccglh32.exeC:\Windows\system32\Hccglh32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\Hippdo32.exeC:\Windows\system32\Hippdo32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\Hbhdmd32.exeC:\Windows\system32\Hbhdmd32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\Hmmhjm32.exeC:\Windows\system32\Hmmhjm32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Ibjqcd32.exeC:\Windows\system32\Ibjqcd32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\Icjmmg32.exeC:\Windows\system32\Icjmmg32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\Ifhiib32.exeC:\Windows\system32\Ifhiib32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Idacmfkj.exeC:\Windows\system32\Idacmfkj.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\Ifopiajn.exeC:\Windows\system32\Ifopiajn.exe23⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\Iinlemia.exeC:\Windows\system32\Iinlemia.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe25⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe26⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Jfaloa32.exeC:\Windows\system32\Jfaloa32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\Jjmhppqd.exeC:\Windows\system32\Jjmhppqd.exe28⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe29⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\Jibeql32.exeC:\Windows\system32\Jibeql32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe31⤵PID:2404
-
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe32⤵
- Executes dropped EXE
PID:5080 -
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe33⤵
- Executes dropped EXE
PID:3276 -
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe34⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Kknafn32.exeC:\Windows\system32\Kknafn32.exe35⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe36⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5084 -
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe38⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe39⤵
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\Kdhbec32.exeC:\Windows\system32\Kdhbec32.exe40⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\Kgfoan32.exeC:\Windows\system32\Kgfoan32.exe41⤵
- Executes dropped EXE
PID:3840 -
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\Lkdggmlj.exeC:\Windows\system32\Lkdggmlj.exe44⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Laopdgcg.exeC:\Windows\system32\Laopdgcg.exe45⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe46⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe47⤵
- Executes dropped EXE
PID:4192 -
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe48⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe51⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe52⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\Lgbnmm32.exeC:\Windows\system32\Lgbnmm32.exe54⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\Mjqjih32.exeC:\Windows\system32\Mjqjih32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4328 -
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe56⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4640 -
C:\Windows\SysWOW64\Mpmokb32.exeC:\Windows\system32\Mpmokb32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe59⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe63⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe64⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Mnfipekh.exeC:\Windows\system32\Mnfipekh.exe65⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe66⤵
- Executes dropped EXE
PID:4712 -
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe67⤵PID:4408
-
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe68⤵PID:4260
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe69⤵PID:4368
-
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe70⤵
- Drops file in System32 directory
PID:3188 -
C:\Windows\SysWOW64\Nafokcol.exeC:\Windows\system32\Nafokcol.exe71⤵
- Modifies registry class
PID:1472 -
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe72⤵PID:8
-
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe73⤵PID:1188
-
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe74⤵
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe75⤵PID:3296
-
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe76⤵
- Modifies registry class
PID:1656 -
C:\Windows\SysWOW64\Njfmke32.exeC:\Windows\system32\Njfmke32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3128 -
C:\Windows\SysWOW64\Nbmelbid.exeC:\Windows\system32\Nbmelbid.exe78⤵PID:4504
-
C:\Windows\SysWOW64\Ndkahnhh.exeC:\Windows\system32\Ndkahnhh.exe79⤵PID:2068
-
C:\Windows\SysWOW64\Okeieh32.exeC:\Windows\system32\Okeieh32.exe80⤵PID:1968
-
C:\Windows\SysWOW64\Oboaabga.exeC:\Windows\system32\Oboaabga.exe81⤵PID:4648
-
C:\Windows\SysWOW64\Odnnnnfe.exeC:\Windows\system32\Odnnnnfe.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4508 -
C:\Windows\SysWOW64\Ogljjiei.exeC:\Windows\system32\Ogljjiei.exe83⤵PID:2576
-
C:\Windows\SysWOW64\Onfbfc32.exeC:\Windows\system32\Onfbfc32.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Occkojkm.exeC:\Windows\system32\Occkojkm.exe85⤵
- Modifies registry class
PID:60 -
C:\Windows\SysWOW64\Okjbpglo.exeC:\Windows\system32\Okjbpglo.exe86⤵PID:5136
-
C:\Windows\SysWOW64\Oqgkhnjf.exeC:\Windows\system32\Oqgkhnjf.exe87⤵PID:5176
-
C:\Windows\SysWOW64\Ocegdjij.exeC:\Windows\system32\Ocegdjij.exe88⤵PID:5232
-
C:\Windows\SysWOW64\Oqihnn32.exeC:\Windows\system32\Oqihnn32.exe89⤵PID:5280
-
C:\Windows\SysWOW64\Ogcpjhoq.exeC:\Windows\system32\Ogcpjhoq.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5324 -
C:\Windows\SysWOW64\Obidhaog.exeC:\Windows\system32\Obidhaog.exe91⤵PID:5368
-
C:\Windows\SysWOW64\Pjdilcla.exeC:\Windows\system32\Pjdilcla.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5416 -
C:\Windows\SysWOW64\Pbkamqmd.exeC:\Windows\system32\Pbkamqmd.exe93⤵PID:5460
-
C:\Windows\SysWOW64\Pkceffcd.exeC:\Windows\system32\Pkceffcd.exe94⤵PID:5500
-
C:\Windows\SysWOW64\Peljol32.exeC:\Windows\system32\Peljol32.exe95⤵PID:5560
-
C:\Windows\SysWOW64\Pgjfkg32.exeC:\Windows\system32\Pgjfkg32.exe96⤵PID:5632
-
C:\Windows\SysWOW64\Pjhbgb32.exeC:\Windows\system32\Pjhbgb32.exe97⤵
- Drops file in System32 directory
PID:5684 -
C:\Windows\SysWOW64\Pengdk32.exeC:\Windows\system32\Pengdk32.exe98⤵PID:5752
-
C:\Windows\SysWOW64\Pgmcqggf.exeC:\Windows\system32\Pgmcqggf.exe99⤵PID:5792
-
C:\Windows\SysWOW64\Pnfkma32.exeC:\Windows\system32\Pnfkma32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5844 -
C:\Windows\SysWOW64\Paegjl32.exeC:\Windows\system32\Paegjl32.exe101⤵PID:5920
-
C:\Windows\SysWOW64\Pgopffec.exeC:\Windows\system32\Pgopffec.exe102⤵PID:5996
-
C:\Windows\SysWOW64\Pjmlbbdg.exeC:\Windows\system32\Pjmlbbdg.exe103⤵PID:6052
-
C:\Windows\SysWOW64\Pbddcoei.exeC:\Windows\system32\Pbddcoei.exe104⤵
- Drops file in System32 directory
PID:6100 -
C:\Windows\SysWOW64\Qecppkdm.exeC:\Windows\system32\Qecppkdm.exe105⤵PID:2788
-
C:\Windows\SysWOW64\Qgallfcq.exeC:\Windows\system32\Qgallfcq.exe106⤵PID:5152
-
C:\Windows\SysWOW64\Qjpiha32.exeC:\Windows\system32\Qjpiha32.exe107⤵PID:3884
-
C:\Windows\SysWOW64\Qajadlja.exeC:\Windows\system32\Qajadlja.exe108⤵PID:5316
-
C:\Windows\SysWOW64\Qchmagie.exeC:\Windows\system32\Qchmagie.exe109⤵PID:5408
-
C:\Windows\SysWOW64\Qloebdig.exeC:\Windows\system32\Qloebdig.exe110⤵
- Modifies registry class
PID:5468 -
C:\Windows\SysWOW64\Qbimoo32.exeC:\Windows\system32\Qbimoo32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5556 -
C:\Windows\SysWOW64\Aegikj32.exeC:\Windows\system32\Aegikj32.exe112⤵
- Drops file in System32 directory
PID:5672 -
C:\Windows\SysWOW64\Alabgd32.exeC:\Windows\system32\Alabgd32.exe113⤵PID:5760
-
C:\Windows\SysWOW64\Abkjdnoa.exeC:\Windows\system32\Abkjdnoa.exe114⤵PID:5828
-
C:\Windows\SysWOW64\Aejfpjne.exeC:\Windows\system32\Aejfpjne.exe115⤵
- Modifies registry class
PID:5928 -
C:\Windows\SysWOW64\Ahhblemi.exeC:\Windows\system32\Ahhblemi.exe116⤵PID:6032
-
C:\Windows\SysWOW64\Aldomc32.exeC:\Windows\system32\Aldomc32.exe117⤵PID:6128
-
C:\Windows\SysWOW64\Aaqgek32.exeC:\Windows\system32\Aaqgek32.exe118⤵PID:5208
-
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe119⤵PID:5288
-
C:\Windows\SysWOW64\Andgoobc.exeC:\Windows\system32\Andgoobc.exe120⤵PID:5400
-
C:\Windows\SysWOW64\Aacckjaf.exeC:\Windows\system32\Aacckjaf.exe121⤵PID:5588
-
C:\Windows\SysWOW64\Alhhhcal.exeC:\Windows\system32\Alhhhcal.exe122⤵PID:5736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-