Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 05:15
Behavioral task
behavioral1
Sample
3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe
-
Size
199KB
-
MD5
3179ffe5d0b435e088a9d4b67f990fb0
-
SHA1
7aae7cea247e98c7cc04ef9446ca1790bc8f46a6
-
SHA256
4a0aa466acca510f5e5703c650c5c99e38b6d300e37a2cd8a9633334c6b258da
-
SHA512
1085f56da0534a4cbb9b4eb668ea69fcab5075715fb87e728ca2a2e151969cf6a45708d1c645bec41a029bc211eb31922a8606dfcd0ce221082f0fcadc8931ee
-
SSDEEP
6144:xfxXWK4h65SZSCZj81+jq4peBK034YOmFz1h:xfRWLvZSCG1+jheBbOmFxh
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Gcidfi32.exeHmioonpn.exeKaqcbi32.exeMjqjih32.exeMkpgck32.exeEoapbo32.exeElhmablc.exeHfofbd32.exeHaggelfd.exeKpepcedo.exeKgdbkohf.exeLaalifad.exeMcnhmm32.exeDoccaall.exeEhjdldfl.exeNqmhbpba.exeIabgaklg.exeKdopod32.exeKkihknfg.exeLaopdgcg.exeMnocof32.exeMgghhlhq.exeGmoliohh.exeGameonno.exeMdfofakp.exeEcbenm32.exeKagichjo.exeMciobn32.exeMdpalp32.exeGppekj32.exeKdcijcke.exeLmqgnhmp.exeLalcng32.exeHfachc32.exeJjpeepnb.exeIbagcc32.exeDhlhjf32.exeIjaida32.exeGoiojk32.exeHmdedo32.exeHfcpncdk.exeMaohkd32.exeFjhmgeao.exeFodeolof.exeElagacbk.exeFqohnp32.exeHcqjfh32.exeIbjqcd32.exeJaedgjjd.exeDcalgo32.exeDpjflb32.exeJangmibi.exeKbdmpqcb.exe3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exeFicgacna.exeHpgkkioa.exeLpappc32.exeCoagla32.exeFbgbpihg.exeHpihai32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcidfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmioonpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaqcbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjqjih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkpgck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eoapbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elhmablc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfofbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haggelfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpepcedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgdbkohf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laalifad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcnhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doccaall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehjdldfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iabgaklg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdopod32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkihknfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laopdgcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnocof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgghhlhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmoliohh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gameonno.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdfofakp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecbenm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kagichjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kagichjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mciobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdpalp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gppekj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdcijcke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmqgnhmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lalcng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfachc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjpeepnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibagcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhlhjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijaida32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goiojk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmdedo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfcpncdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnocof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Maohkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjhmgeao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fodeolof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elagacbk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqohnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqohnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcqjfh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibjqcd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaedgjjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcalgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpjflb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jangmibi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbdmpqcb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmoliohh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ficgacna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpgkkioa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpappc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coagla32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbgbpihg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpihai32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Cakjmm32.exe family_berbew C:\Windows\SysWOW64\Cpljkdig.exe family_berbew C:\Windows\SysWOW64\Ccjfgphj.exe family_berbew C:\Windows\SysWOW64\Cidncj32.exe family_berbew C:\Windows\SysWOW64\Clckpf32.exe family_berbew C:\Windows\SysWOW64\Coagla32.exe family_berbew C:\Windows\SysWOW64\Ccmclp32.exe family_berbew C:\Windows\SysWOW64\Digkijmd.exe family_berbew C:\Windows\SysWOW64\Dljqpd32.exe family_berbew C:\Windows\SysWOW64\Debeijoc.exe family_berbew C:\Windows\SysWOW64\Dokjbp32.exe family_berbew C:\Windows\SysWOW64\Djpnohej.exe family_berbew C:\Windows\SysWOW64\Dpjflb32.exe family_berbew C:\Windows\SysWOW64\Dchbhn32.exe family_berbew C:\Windows\SysWOW64\Ejbkehcg.exe family_berbew C:\Windows\SysWOW64\Ebnoikqb.exe family_berbew C:\Windows\SysWOW64\Ejegjh32.exe family_berbew C:\Windows\SysWOW64\Eoapbo32.exe family_berbew C:\Windows\SysWOW64\Ijaida32.exe family_berbew C:\Windows\SysWOW64\Ifjfnb32.exe family_berbew C:\Windows\SysWOW64\Jfaloa32.exe family_berbew C:\Windows\SysWOW64\Kgmlkp32.exe family_berbew C:\Windows\SysWOW64\Kipabjil.exe family_berbew C:\Windows\SysWOW64\Kdffocib.exe family_berbew C:\Windows\SysWOW64\Kmjqmi32.exe family_berbew C:\Windows\SysWOW64\Kgdbkohf.exe family_berbew C:\Windows\SysWOW64\Lmqgnhmp.exe family_berbew C:\Windows\SysWOW64\Kmgdgjek.exe family_berbew C:\Windows\SysWOW64\Kdopod32.exe family_berbew C:\Windows\SysWOW64\Liggbi32.exe family_berbew C:\Windows\SysWOW64\Kaqcbi32.exe family_berbew C:\Windows\SysWOW64\Jdmcidam.exe family_berbew C:\Windows\SysWOW64\Jbmfoa32.exe family_berbew C:\Windows\SysWOW64\Jbkjjblm.exe family_berbew C:\Windows\SysWOW64\Jibeql32.exe family_berbew C:\Windows\SysWOW64\Jfdida32.exe family_berbew C:\Windows\SysWOW64\Ijkljp32.exe family_berbew C:\Windows\SysWOW64\Ifhiib32.exe family_berbew C:\Windows\SysWOW64\Ipnalhii.exe family_berbew C:\Windows\SysWOW64\Haidklda.exe family_berbew C:\Windows\SysWOW64\Hjolnb32.exe family_berbew C:\Windows\SysWOW64\Himcoo32.exe family_berbew C:\Windows\SysWOW64\Habnjm32.exe family_berbew C:\Windows\SysWOW64\Hfljmdjc.exe family_berbew C:\Windows\SysWOW64\Hboagf32.exe family_berbew C:\Windows\SysWOW64\Gppekj32.exe family_berbew C:\Windows\SysWOW64\Gfedle32.exe family_berbew C:\Windows\SysWOW64\Lcbiao32.exe family_berbew C:\Windows\SysWOW64\Gbenqg32.exe family_berbew C:\Windows\SysWOW64\Gmhfhp32.exe family_berbew C:\Windows\SysWOW64\Gfnnlffc.exe family_berbew C:\Windows\SysWOW64\Fijmbb32.exe family_berbew C:\Windows\SysWOW64\Fjepaecb.exe family_berbew C:\Windows\SysWOW64\Eflhoigi.exe family_berbew C:\Windows\SysWOW64\Eoocmoao.exe family_berbew C:\Windows\SysWOW64\Eoocmoao.exe family_berbew C:\Windows\SysWOW64\Dhcnke32.exe family_berbew C:\Windows\SysWOW64\Dllmfd32.exe family_berbew C:\Windows\SysWOW64\Djnaji32.exe family_berbew C:\Windows\SysWOW64\Dcdimopp.exe family_berbew C:\Windows\SysWOW64\Dhnepfpj.exe family_berbew C:\Windows\SysWOW64\Dephckaf.exe family_berbew C:\Windows\SysWOW64\Dcalgo32.exe family_berbew C:\Windows\SysWOW64\Dpcpkc32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Cakjmm32.exeCpljkdig.exeCcjfgphj.exeCidncj32.exeClckpf32.exeCoagla32.exeCcmclp32.exeDigkijmd.exeDhjkdg32.exeDoccaall.exeDabpnlkp.exeDiihojkb.exeDhlhjf32.exeDpcpkc32.exeDcalgo32.exeDephckaf.exeDhnepfpj.exeDljqpd32.exeDcdimopp.exeDebeijoc.exeDjnaji32.exeDllmfd32.exeDokjbp32.exeDjpnohej.exeDhcnke32.exeDpjflb32.exeDchbhn32.exeEjbkehcg.exeElagacbk.exeEoocmoao.exeEbnoikqb.exeEjegjh32.exeEoapbo32.exeEbploj32.exeEflhoigi.exeEhjdldfl.exeEqalmafo.exeEodlho32.exeEbbidj32.exeEjjqeg32.exeElhmablc.exeEofinnkf.exeEcbenm32.exeEfpajh32.exeEmjjgbjp.exeEoifcnid.exeEcdbdl32.exeFbgbpihg.exeFjnjqfij.exeFhajlc32.exeFqhbmqqg.exeFcgoilpj.exeFbioei32.exeFjqgff32.exeFicgacna.exeFmocba32.exeFomonm32.exeFbllkh32.exeFfggkgmk.exeFifdgblo.exeFopldmcl.exeFckhdk32.exeFfjdqg32.exeFjepaecb.exepid process 2796 Cakjmm32.exe 2264 Cpljkdig.exe 4960 Ccjfgphj.exe 3384 Cidncj32.exe 3636 Clckpf32.exe 792 Coagla32.exe 1424 Ccmclp32.exe 3364 Digkijmd.exe 4204 Dhjkdg32.exe 1324 Doccaall.exe 4428 Dabpnlkp.exe 2140 Diihojkb.exe 2244 Dhlhjf32.exe 1104 Dpcpkc32.exe 4460 Dcalgo32.exe 4984 Dephckaf.exe 908 Dhnepfpj.exe 3112 Dljqpd32.exe 4396 Dcdimopp.exe 4788 Debeijoc.exe 5092 Djnaji32.exe 4220 Dllmfd32.exe 1808 Dokjbp32.exe 3236 Djpnohej.exe 4308 Dhcnke32.exe 928 Dpjflb32.exe 3444 Dchbhn32.exe 4568 Ejbkehcg.exe 3260 Elagacbk.exe 448 Eoocmoao.exe 1032 Ebnoikqb.exe 1344 Ejegjh32.exe 4908 Eoapbo32.exe 4368 Ebploj32.exe 1108 Eflhoigi.exe 864 Ehjdldfl.exe 4796 Eqalmafo.exe 2356 Eodlho32.exe 632 Ebbidj32.exe 4692 Ejjqeg32.exe 4868 Elhmablc.exe 1968 Eofinnkf.exe 4432 Ecbenm32.exe 4272 Efpajh32.exe 1556 Emjjgbjp.exe 1352 Eoifcnid.exe 624 Ecdbdl32.exe 3904 Fbgbpihg.exe 1412 Fjnjqfij.exe 3004 Fhajlc32.exe 3840 Fqhbmqqg.exe 4560 Fcgoilpj.exe 3064 Fbioei32.exe 460 Fjqgff32.exe 808 Ficgacna.exe 3912 Fmocba32.exe 4240 Fomonm32.exe 1784 Fbllkh32.exe 4836 Ffggkgmk.exe 4372 Fifdgblo.exe 3288 Fopldmcl.exe 4292 Fckhdk32.exe 4524 Ffjdqg32.exe 3508 Fjepaecb.exe -
Drops file in System32 directory 64 IoCs
Processes:
Clckpf32.exeJmpngk32.exeKmgdgjek.exeKaemnhla.exeMamleegg.exeMdmegp32.exeCidncj32.exeLaopdgcg.exeMkbchk32.exeHabnjm32.exeDhlhjf32.exeJbfpobpb.exeNnhfee32.exeCpljkdig.exeIannfk32.exeJfhbppbc.exeJiikak32.exeHfcpncdk.exeDebeijoc.exeEcbenm32.exeKaqcbi32.exeFobiilai.exeLdkojb32.exeEjbkehcg.exeJfaloa32.exeFomonm32.exeIbjqcd32.exeMpdelajl.exeEmjjgbjp.exeHfljmdjc.exeNnjbke32.exeGqkhjn32.exeKkbkamnl.exeLgikfn32.exeMgidml32.exeGimjhafg.exeFopldmcl.exeFodeolof.exeNgedij32.exeEbnoikqb.exeHclakimb.exeLalcng32.exeMahbje32.exeEhjdldfl.exeEcdbdl32.exeFicgacna.exeHpenfjad.exeNqmhbpba.exeJmkdlkph.exeKbdmpqcb.exeLdaeka32.exeMkgmcjld.exeMnfipekh.exeMdpalp32.exeIfjfnb32.exeGmkbnp32.exeJaimbj32.exeLijdhiaa.exeLdohebqh.exeLcdegnep.exeNkncdifl.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Coagla32.exe Clckpf32.exe File opened for modification C:\Windows\SysWOW64\Jaljgidl.exe Jmpngk32.exe File created C:\Windows\SysWOW64\Kacphh32.exe Kmgdgjek.exe File created C:\Windows\SysWOW64\Jcpkbc32.dll Kaemnhla.exe File created C:\Windows\SysWOW64\Odegmceb.dll Mamleegg.exe File created C:\Windows\SysWOW64\Hhapkbgi.dll Mdmegp32.exe File created C:\Windows\SysWOW64\Fdahphpi.dll Cidncj32.exe File created C:\Windows\SysWOW64\Lpappc32.exe Laopdgcg.exe File created C:\Windows\SysWOW64\Mnapdf32.exe Mkbchk32.exe File opened for modification C:\Windows\SysWOW64\Hpenfjad.exe Habnjm32.exe File created C:\Windows\SysWOW64\Clckpf32.exe Cidncj32.exe File opened for modification C:\Windows\SysWOW64\Dpcpkc32.exe Dhlhjf32.exe File opened for modification C:\Windows\SysWOW64\Jfaloa32.exe Jbfpobpb.exe File created C:\Windows\SysWOW64\Nacbfdao.exe Nnhfee32.exe File created C:\Windows\SysWOW64\Jingckla.dll Cpljkdig.exe File created C:\Windows\SysWOW64\Icljbg32.exe Iannfk32.exe File opened for modification C:\Windows\SysWOW64\Jkdnpo32.exe Jfhbppbc.exe File opened for modification C:\Windows\SysWOW64\Kaqcbi32.exe Jiikak32.exe File created C:\Windows\SysWOW64\Lkbhbe32.dll Hfcpncdk.exe File opened for modification C:\Windows\SysWOW64\Djnaji32.exe Debeijoc.exe File created C:\Windows\SysWOW64\Ohcepmcb.dll Ecbenm32.exe File opened for modification C:\Windows\SysWOW64\Kpccnefa.exe Kaqcbi32.exe File created C:\Windows\SysWOW64\Dpcpkc32.exe Dhlhjf32.exe File created C:\Windows\SysWOW64\Lghekack.dll Fobiilai.exe File opened for modification C:\Windows\SysWOW64\Lcmofolg.exe Ldkojb32.exe File opened for modification C:\Windows\SysWOW64\Elagacbk.exe Ejbkehcg.exe File created C:\Windows\SysWOW64\Jdkind32.dll Jfaloa32.exe File created C:\Windows\SysWOW64\Fbllkh32.exe Fomonm32.exe File opened for modification C:\Windows\SysWOW64\Iffmccbi.exe Ibjqcd32.exe File opened for modification C:\Windows\SysWOW64\Mdpalp32.exe Mpdelajl.exe File created C:\Windows\SysWOW64\Ppgjkamf.dll Emjjgbjp.exe File created C:\Windows\SysWOW64\Ibilnj32.dll Hfljmdjc.exe File created C:\Windows\SysWOW64\Nkncdifl.exe Nnjbke32.exe File created C:\Windows\SysWOW64\Adijolgl.dll Gqkhjn32.exe File created C:\Windows\SysWOW64\Imppcc32.dll Kkbkamnl.exe File created C:\Windows\SysWOW64\Gcgqhjop.dll Lgikfn32.exe File created C:\Windows\SysWOW64\Mjhqjg32.exe Mgidml32.exe File created C:\Windows\SysWOW64\Jpckhigh.dll Gimjhafg.exe File created C:\Windows\SysWOW64\Fckhdk32.exe Fopldmcl.exe File created C:\Windows\SysWOW64\Gbcakg32.exe Fodeolof.exe File created C:\Windows\SysWOW64\Nqmhbpba.exe Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Ejegjh32.exe Ebnoikqb.exe File created C:\Windows\SysWOW64\Eagncfoj.dll Hclakimb.exe File created C:\Windows\SysWOW64\Lpocjdld.exe Lalcng32.exe File created C:\Windows\SysWOW64\Flfmin32.dll Mahbje32.exe File opened for modification C:\Windows\SysWOW64\Eqalmafo.exe Ehjdldfl.exe File created C:\Windows\SysWOW64\Bppheeep.dll Ecdbdl32.exe File created C:\Windows\SysWOW64\Ckfliccm.dll Ficgacna.exe File created C:\Windows\SysWOW64\Hcqjfh32.exe Hpenfjad.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Nqmhbpba.exe File opened for modification C:\Windows\SysWOW64\Ccjfgphj.exe Cpljkdig.exe File created C:\Windows\SysWOW64\Ggcjqj32.dll Jmkdlkph.exe File created C:\Windows\SysWOW64\Nqjfoc32.dll Kbdmpqcb.exe File created C:\Windows\SysWOW64\Eeandl32.dll Ldaeka32.exe File opened for modification C:\Windows\SysWOW64\Mjjmog32.exe Mkgmcjld.exe File opened for modification C:\Windows\SysWOW64\Mpdelajl.exe Mnfipekh.exe File opened for modification C:\Windows\SysWOW64\Mgnnhk32.exe Mdpalp32.exe File opened for modification C:\Windows\SysWOW64\Ijfboafl.exe Ifjfnb32.exe File created C:\Windows\SysWOW64\Goiojk32.exe Gmkbnp32.exe File opened for modification C:\Windows\SysWOW64\Jplmmfmi.exe Jaimbj32.exe File created C:\Windows\SysWOW64\Nngcpm32.dll Lijdhiaa.exe File opened for modification C:\Windows\SysWOW64\Lcbiao32.exe Ldohebqh.exe File created C:\Windows\SysWOW64\Lklnhlfb.exe Lcdegnep.exe File created C:\Windows\SysWOW64\Nqklmpdd.exe Nkncdifl.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8408 8320 WerFault.exe Nkcmohbg.exe -
Modifies registry class 64 IoCs
Processes:
Lgkhlnbn.exeMaohkd32.exeJbmfoa32.exeKgbefoji.exeIiffen32.exeLmqgnhmp.exeLdohebqh.exeLklnhlfb.exeImdnklfp.exeJmpngk32.exeMdfofakp.exeMpolqa32.exeIjaida32.exeFicgacna.exeDabpnlkp.exeKbdmpqcb.exeLaopdgcg.exeLaefdf32.exeJpojcf32.exeJaimbj32.exeJplmmfmi.exeLgikfn32.exeDljqpd32.exeIpnalhii.exeLpocjdld.exeKagichjo.exeIjkljp32.exeNdbnboqb.exeHccglh32.exeIfjfnb32.exeLkiqbl32.exeHimcoo32.exeIfhiib32.exeIdacmfkj.exeLnepih32.exeGjapmdid.exeHmioonpn.exeClckpf32.exeImbaemhc.exeKaqcbi32.exeDephckaf.exeGiacca32.exeLgbnmm32.exeFjqgff32.exeHjfihc32.exeHbanme32.exeJkfkfohj.exeLcbiao32.exeDiihojkb.exeIapjlk32.exeGjclbc32.exeFjnjqfij.exeFfggkgmk.exeJjpeepnb.exeJbkjjblm.exeJkdnpo32.exeLiekmj32.exeEcbenm32.exeJdcpcf32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgkhlnbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbcjkf32.dll" Jbmfoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgbefoji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iiffen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efhikhod.dll" Lmqgnhmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldohebqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lklnhlfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imdnklfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmpngk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdfofakp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpolqa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijaida32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ficgacna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbmfoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dabpnlkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbdmpqcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Laopdgcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpgeph32.dll" Laefdf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpojcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jaimbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jaimbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jplmmfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgikfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dljqpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pglanoaq.dll" Ipnalhii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jifkeoll.dll" Lpocjdld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmpfpdoi.dll" Ijaida32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqjfoc32.dll" Kbdmpqcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kagichjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijkljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndbnboqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hccglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifjfnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkiqbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpolqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Himcoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qngfmkdl.dll" Ifhiib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idacmfkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnepih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjapmdid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmioonpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iindogea.dll" Clckpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imbaemhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ichhhi32.dll" Kaqcbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dephckaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocdehlgh.dll" Giacca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjqgff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjfihc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbanme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkfkfohj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcbiao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Diihojkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eddbig32.dll" Iapjlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjclbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bofjdo32.dll" Fjnjqfij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcplce32.dll" Ffggkgmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjpeepnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbkjjblm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkdnpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liekmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecbenm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdcpcf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exeCakjmm32.exeCpljkdig.exeCcjfgphj.exeCidncj32.exeClckpf32.exeCoagla32.exeCcmclp32.exeDigkijmd.exeDhjkdg32.exeDoccaall.exeDabpnlkp.exeDiihojkb.exeDhlhjf32.exeDpcpkc32.exeDcalgo32.exeDephckaf.exeDhnepfpj.exeDljqpd32.exeDcdimopp.exeDebeijoc.exeDjnaji32.exedescription pid process target process PID 4424 wrote to memory of 2796 4424 3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe Cakjmm32.exe PID 4424 wrote to memory of 2796 4424 3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe Cakjmm32.exe PID 4424 wrote to memory of 2796 4424 3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe Cakjmm32.exe PID 2796 wrote to memory of 2264 2796 Cakjmm32.exe Cpljkdig.exe PID 2796 wrote to memory of 2264 2796 Cakjmm32.exe Cpljkdig.exe PID 2796 wrote to memory of 2264 2796 Cakjmm32.exe Cpljkdig.exe PID 2264 wrote to memory of 4960 2264 Cpljkdig.exe Ccjfgphj.exe PID 2264 wrote to memory of 4960 2264 Cpljkdig.exe Ccjfgphj.exe PID 2264 wrote to memory of 4960 2264 Cpljkdig.exe Ccjfgphj.exe PID 4960 wrote to memory of 3384 4960 Ccjfgphj.exe Cidncj32.exe PID 4960 wrote to memory of 3384 4960 Ccjfgphj.exe Cidncj32.exe PID 4960 wrote to memory of 3384 4960 Ccjfgphj.exe Cidncj32.exe PID 3384 wrote to memory of 3636 3384 Cidncj32.exe Clckpf32.exe PID 3384 wrote to memory of 3636 3384 Cidncj32.exe Clckpf32.exe PID 3384 wrote to memory of 3636 3384 Cidncj32.exe Clckpf32.exe PID 3636 wrote to memory of 792 3636 Clckpf32.exe Coagla32.exe PID 3636 wrote to memory of 792 3636 Clckpf32.exe Coagla32.exe PID 3636 wrote to memory of 792 3636 Clckpf32.exe Coagla32.exe PID 792 wrote to memory of 1424 792 Coagla32.exe Ccmclp32.exe PID 792 wrote to memory of 1424 792 Coagla32.exe Ccmclp32.exe PID 792 wrote to memory of 1424 792 Coagla32.exe Ccmclp32.exe PID 1424 wrote to memory of 3364 1424 Ccmclp32.exe Digkijmd.exe PID 1424 wrote to memory of 3364 1424 Ccmclp32.exe Digkijmd.exe PID 1424 wrote to memory of 3364 1424 Ccmclp32.exe Digkijmd.exe PID 3364 wrote to memory of 4204 3364 Digkijmd.exe Dhjkdg32.exe PID 3364 wrote to memory of 4204 3364 Digkijmd.exe Dhjkdg32.exe PID 3364 wrote to memory of 4204 3364 Digkijmd.exe Dhjkdg32.exe PID 4204 wrote to memory of 1324 4204 Dhjkdg32.exe Doccaall.exe PID 4204 wrote to memory of 1324 4204 Dhjkdg32.exe Doccaall.exe PID 4204 wrote to memory of 1324 4204 Dhjkdg32.exe Doccaall.exe PID 1324 wrote to memory of 4428 1324 Doccaall.exe Dabpnlkp.exe PID 1324 wrote to memory of 4428 1324 Doccaall.exe Dabpnlkp.exe PID 1324 wrote to memory of 4428 1324 Doccaall.exe Dabpnlkp.exe PID 4428 wrote to memory of 2140 4428 Dabpnlkp.exe Diihojkb.exe PID 4428 wrote to memory of 2140 4428 Dabpnlkp.exe Diihojkb.exe PID 4428 wrote to memory of 2140 4428 Dabpnlkp.exe Diihojkb.exe PID 2140 wrote to memory of 2244 2140 Diihojkb.exe Dhlhjf32.exe PID 2140 wrote to memory of 2244 2140 Diihojkb.exe Dhlhjf32.exe PID 2140 wrote to memory of 2244 2140 Diihojkb.exe Dhlhjf32.exe PID 2244 wrote to memory of 1104 2244 Dhlhjf32.exe Dpcpkc32.exe PID 2244 wrote to memory of 1104 2244 Dhlhjf32.exe Dpcpkc32.exe PID 2244 wrote to memory of 1104 2244 Dhlhjf32.exe Dpcpkc32.exe PID 1104 wrote to memory of 4460 1104 Dpcpkc32.exe Dcalgo32.exe PID 1104 wrote to memory of 4460 1104 Dpcpkc32.exe Dcalgo32.exe PID 1104 wrote to memory of 4460 1104 Dpcpkc32.exe Dcalgo32.exe PID 4460 wrote to memory of 4984 4460 Dcalgo32.exe Dephckaf.exe PID 4460 wrote to memory of 4984 4460 Dcalgo32.exe Dephckaf.exe PID 4460 wrote to memory of 4984 4460 Dcalgo32.exe Dephckaf.exe PID 4984 wrote to memory of 908 4984 Dephckaf.exe Dhnepfpj.exe PID 4984 wrote to memory of 908 4984 Dephckaf.exe Dhnepfpj.exe PID 4984 wrote to memory of 908 4984 Dephckaf.exe Dhnepfpj.exe PID 908 wrote to memory of 3112 908 Dhnepfpj.exe Dljqpd32.exe PID 908 wrote to memory of 3112 908 Dhnepfpj.exe Dljqpd32.exe PID 908 wrote to memory of 3112 908 Dhnepfpj.exe Dljqpd32.exe PID 3112 wrote to memory of 4396 3112 Dljqpd32.exe Dcdimopp.exe PID 3112 wrote to memory of 4396 3112 Dljqpd32.exe Dcdimopp.exe PID 3112 wrote to memory of 4396 3112 Dljqpd32.exe Dcdimopp.exe PID 4396 wrote to memory of 4788 4396 Dcdimopp.exe Debeijoc.exe PID 4396 wrote to memory of 4788 4396 Dcdimopp.exe Debeijoc.exe PID 4396 wrote to memory of 4788 4396 Dcdimopp.exe Debeijoc.exe PID 4788 wrote to memory of 5092 4788 Debeijoc.exe Djnaji32.exe PID 4788 wrote to memory of 5092 4788 Debeijoc.exe Djnaji32.exe PID 4788 wrote to memory of 5092 4788 Debeijoc.exe Djnaji32.exe PID 5092 wrote to memory of 4220 5092 Djnaji32.exe Dllmfd32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3179ffe5d0b435e088a9d4b67f990fb0_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\Cakjmm32.exeC:\Windows\system32\Cakjmm32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Cpljkdig.exeC:\Windows\system32\Cpljkdig.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Ccjfgphj.exeC:\Windows\system32\Ccjfgphj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Cidncj32.exeC:\Windows\system32\Cidncj32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\Clckpf32.exeC:\Windows\system32\Clckpf32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\Coagla32.exeC:\Windows\system32\Coagla32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\Ccmclp32.exeC:\Windows\system32\Ccmclp32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\Digkijmd.exeC:\Windows\system32\Digkijmd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\Dhjkdg32.exeC:\Windows\system32\Dhjkdg32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\Doccaall.exeC:\Windows\system32\Doccaall.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\Dabpnlkp.exeC:\Windows\system32\Dabpnlkp.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Diihojkb.exeC:\Windows\system32\Diihojkb.exe13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Dhlhjf32.exeC:\Windows\system32\Dhlhjf32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Dpcpkc32.exeC:\Windows\system32\Dpcpkc32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\Dcalgo32.exeC:\Windows\system32\Dcalgo32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\Dephckaf.exeC:\Windows\system32\Dephckaf.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\Dhnepfpj.exeC:\Windows\system32\Dhnepfpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\Dljqpd32.exeC:\Windows\system32\Dljqpd32.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\Dcdimopp.exeC:\Windows\system32\Dcdimopp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\Debeijoc.exeC:\Windows\system32\Debeijoc.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Djnaji32.exeC:\Windows\system32\Djnaji32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Dllmfd32.exeC:\Windows\system32\Dllmfd32.exe23⤵
- Executes dropped EXE
PID:4220 -
C:\Windows\SysWOW64\Dokjbp32.exeC:\Windows\system32\Dokjbp32.exe24⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\Djpnohej.exeC:\Windows\system32\Djpnohej.exe25⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\Dhcnke32.exeC:\Windows\system32\Dhcnke32.exe26⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\Dpjflb32.exeC:\Windows\system32\Dpjflb32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\Dchbhn32.exeC:\Windows\system32\Dchbhn32.exe28⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\Ejbkehcg.exeC:\Windows\system32\Ejbkehcg.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4568 -
C:\Windows\SysWOW64\Elagacbk.exeC:\Windows\system32\Elagacbk.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3260 -
C:\Windows\SysWOW64\Eoocmoao.exeC:\Windows\system32\Eoocmoao.exe31⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\Ebnoikqb.exeC:\Windows\system32\Ebnoikqb.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1032 -
C:\Windows\SysWOW64\Ejegjh32.exeC:\Windows\system32\Ejegjh32.exe33⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Eoapbo32.exeC:\Windows\system32\Eoapbo32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\Ebploj32.exeC:\Windows\system32\Ebploj32.exe35⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\Eflhoigi.exeC:\Windows\system32\Eflhoigi.exe36⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\Ehjdldfl.exeC:\Windows\system32\Ehjdldfl.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\Eqalmafo.exeC:\Windows\system32\Eqalmafo.exe38⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\Eodlho32.exeC:\Windows\system32\Eodlho32.exe39⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Ebbidj32.exeC:\Windows\system32\Ebbidj32.exe40⤵
- Executes dropped EXE
PID:632 -
C:\Windows\SysWOW64\Ejjqeg32.exeC:\Windows\system32\Ejjqeg32.exe41⤵
- Executes dropped EXE
PID:4692 -
C:\Windows\SysWOW64\Elhmablc.exeC:\Windows\system32\Elhmablc.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\Eofinnkf.exeC:\Windows\system32\Eofinnkf.exe43⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Ecbenm32.exeC:\Windows\system32\Ecbenm32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4432 -
C:\Windows\SysWOW64\Efpajh32.exeC:\Windows\system32\Efpajh32.exe45⤵
- Executes dropped EXE
PID:4272 -
C:\Windows\SysWOW64\Emjjgbjp.exeC:\Windows\system32\Emjjgbjp.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\Eoifcnid.exeC:\Windows\system32\Eoifcnid.exe47⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\SysWOW64\Ecdbdl32.exeC:\Windows\system32\Ecdbdl32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:624 -
C:\Windows\SysWOW64\Fbgbpihg.exeC:\Windows\system32\Fbgbpihg.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\Fjnjqfij.exeC:\Windows\system32\Fjnjqfij.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:1412 -
C:\Windows\SysWOW64\Fhajlc32.exeC:\Windows\system32\Fhajlc32.exe51⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Fqhbmqqg.exeC:\Windows\system32\Fqhbmqqg.exe52⤵
- Executes dropped EXE
PID:3840 -
C:\Windows\SysWOW64\Fcgoilpj.exeC:\Windows\system32\Fcgoilpj.exe53⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\Fbioei32.exeC:\Windows\system32\Fbioei32.exe54⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Fjqgff32.exeC:\Windows\system32\Fjqgff32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:460 -
C:\Windows\SysWOW64\Ficgacna.exeC:\Windows\system32\Ficgacna.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:808 -
C:\Windows\SysWOW64\Fmocba32.exeC:\Windows\system32\Fmocba32.exe57⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\Fomonm32.exeC:\Windows\system32\Fomonm32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4240 -
C:\Windows\SysWOW64\Fbllkh32.exeC:\Windows\system32\Fbllkh32.exe59⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\Ffggkgmk.exeC:\Windows\system32\Ffggkgmk.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:4836 -
C:\Windows\SysWOW64\Fifdgblo.exeC:\Windows\system32\Fifdgblo.exe61⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\Fopldmcl.exeC:\Windows\system32\Fopldmcl.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3288 -
C:\Windows\SysWOW64\Fckhdk32.exeC:\Windows\system32\Fckhdk32.exe63⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\Ffjdqg32.exeC:\Windows\system32\Ffjdqg32.exe64⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\Fjepaecb.exeC:\Windows\system32\Fjepaecb.exe65⤵
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\Fihqmb32.exeC:\Windows\system32\Fihqmb32.exe66⤵PID:1892
-
C:\Windows\SysWOW64\Fqohnp32.exeC:\Windows\system32\Fqohnp32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4888 -
C:\Windows\SysWOW64\Fobiilai.exeC:\Windows\system32\Fobiilai.exe68⤵
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\Fbqefhpm.exeC:\Windows\system32\Fbqefhpm.exe69⤵PID:1732
-
C:\Windows\SysWOW64\Fjhmgeao.exeC:\Windows\system32\Fjhmgeao.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1200 -
C:\Windows\SysWOW64\Fijmbb32.exeC:\Windows\system32\Fijmbb32.exe71⤵PID:2732
-
C:\Windows\SysWOW64\Fqaeco32.exeC:\Windows\system32\Fqaeco32.exe72⤵PID:3104
-
C:\Windows\SysWOW64\Fodeolof.exeC:\Windows\system32\Fodeolof.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:444 -
C:\Windows\SysWOW64\Gbcakg32.exeC:\Windows\system32\Gbcakg32.exe74⤵PID:5036
-
C:\Windows\SysWOW64\Gfnnlffc.exeC:\Windows\system32\Gfnnlffc.exe75⤵PID:3176
-
C:\Windows\SysWOW64\Gimjhafg.exeC:\Windows\system32\Gimjhafg.exe76⤵
- Drops file in System32 directory
PID:552 -
C:\Windows\SysWOW64\Gmhfhp32.exeC:\Windows\system32\Gmhfhp32.exe77⤵PID:4580
-
C:\Windows\SysWOW64\Gqdbiofi.exeC:\Windows\system32\Gqdbiofi.exe78⤵PID:4544
-
C:\Windows\SysWOW64\Gcbnejem.exeC:\Windows\system32\Gcbnejem.exe79⤵PID:1316
-
C:\Windows\SysWOW64\Gbenqg32.exeC:\Windows\system32\Gbenqg32.exe80⤵PID:2172
-
C:\Windows\SysWOW64\Gjlfbd32.exeC:\Windows\system32\Gjlfbd32.exe81⤵PID:3588
-
C:\Windows\SysWOW64\Giofnacd.exeC:\Windows\system32\Giofnacd.exe82⤵PID:1248
-
C:\Windows\SysWOW64\Gmkbnp32.exeC:\Windows\system32\Gmkbnp32.exe83⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Goiojk32.exeC:\Windows\system32\Goiojk32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4932 -
C:\Windows\SysWOW64\Gbgkfg32.exeC:\Windows\system32\Gbgkfg32.exe85⤵PID:2296
-
C:\Windows\SysWOW64\Gjocgdkg.exeC:\Windows\system32\Gjocgdkg.exe86⤵PID:4316
-
C:\Windows\SysWOW64\Giacca32.exeC:\Windows\system32\Giacca32.exe87⤵
- Modifies registry class
PID:1268 -
C:\Windows\SysWOW64\Gpklpkio.exeC:\Windows\system32\Gpklpkio.exe88⤵PID:212
-
C:\Windows\SysWOW64\Gcggpj32.exeC:\Windows\system32\Gcggpj32.exe89⤵PID:4488
-
C:\Windows\SysWOW64\Gfedle32.exeC:\Windows\system32\Gfedle32.exe90⤵PID:1680
-
C:\Windows\SysWOW64\Gjapmdid.exeC:\Windows\system32\Gjapmdid.exe91⤵
- Modifies registry class
PID:2996 -
C:\Windows\SysWOW64\Gmoliohh.exeC:\Windows\system32\Gmoliohh.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3948 -
C:\Windows\SysWOW64\Gqkhjn32.exeC:\Windows\system32\Gqkhjn32.exe93⤵
- Drops file in System32 directory
PID:3680 -
C:\Windows\SysWOW64\Gcidfi32.exeC:\Windows\system32\Gcidfi32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:976 -
C:\Windows\SysWOW64\Gbldaffp.exeC:\Windows\system32\Gbldaffp.exe95⤵PID:2728
-
C:\Windows\SysWOW64\Gjclbc32.exeC:\Windows\system32\Gjclbc32.exe96⤵
- Modifies registry class
PID:3120 -
C:\Windows\SysWOW64\Gifmnpnl.exeC:\Windows\system32\Gifmnpnl.exe97⤵PID:796
-
C:\Windows\SysWOW64\Gameonno.exeC:\Windows\system32\Gameonno.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4608 -
C:\Windows\SysWOW64\Gppekj32.exeC:\Windows\system32\Gppekj32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4668 -
C:\Windows\SysWOW64\Hclakimb.exeC:\Windows\system32\Hclakimb.exe100⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Hboagf32.exeC:\Windows\system32\Hboagf32.exe101⤵PID:1672
-
C:\Windows\SysWOW64\Hfjmgdlf.exeC:\Windows\system32\Hfjmgdlf.exe102⤵PID:3324
-
C:\Windows\SysWOW64\Hjfihc32.exeC:\Windows\system32\Hjfihc32.exe103⤵
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Hmdedo32.exeC:\Windows\system32\Hmdedo32.exe104⤵PID:5152
-
C:\Windows\SysWOW64\Hmdedo32.exeC:\Windows\system32\Hmdedo32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5176 -
C:\Windows\SysWOW64\Hapaemll.exeC:\Windows\system32\Hapaemll.exe106⤵PID:5224
-
C:\Windows\SysWOW64\Hpbaqj32.exeC:\Windows\system32\Hpbaqj32.exe107⤵PID:5264
-
C:\Windows\SysWOW64\Hbanme32.exeC:\Windows\system32\Hbanme32.exe108⤵
- Modifies registry class
PID:5308 -
C:\Windows\SysWOW64\Hfljmdjc.exeC:\Windows\system32\Hfljmdjc.exe109⤵
- Drops file in System32 directory
PID:5360 -
C:\Windows\SysWOW64\Hjhfnccl.exeC:\Windows\system32\Hjhfnccl.exe110⤵PID:5404
-
C:\Windows\SysWOW64\Hikfip32.exeC:\Windows\system32\Hikfip32.exe111⤵PID:5444
-
C:\Windows\SysWOW64\Habnjm32.exeC:\Windows\system32\Habnjm32.exe112⤵
- Drops file in System32 directory
PID:5492 -
C:\Windows\SysWOW64\Hpenfjad.exeC:\Windows\system32\Hpenfjad.exe113⤵
- Drops file in System32 directory
PID:5536 -
C:\Windows\SysWOW64\Hcqjfh32.exeC:\Windows\system32\Hcqjfh32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5576 -
C:\Windows\SysWOW64\Hfofbd32.exeC:\Windows\system32\Hfofbd32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5624 -
C:\Windows\SysWOW64\Hjjbcbqj.exeC:\Windows\system32\Hjjbcbqj.exe116⤵PID:5668
-
C:\Windows\SysWOW64\Himcoo32.exeC:\Windows\system32\Himcoo32.exe117⤵
- Modifies registry class
PID:5712 -
C:\Windows\SysWOW64\Hmioonpn.exeC:\Windows\system32\Hmioonpn.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5748 -
C:\Windows\SysWOW64\Hpgkkioa.exeC:\Windows\system32\Hpgkkioa.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5800 -
C:\Windows\SysWOW64\Hccglh32.exeC:\Windows\system32\Hccglh32.exe120⤵
- Modifies registry class
PID:5844 -
C:\Windows\SysWOW64\Hfachc32.exeC:\Windows\system32\Hfachc32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5884 -
C:\Windows\SysWOW64\Hjmoibog.exeC:\Windows\system32\Hjmoibog.exe122⤵PID:5928
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-