Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 08:11
Behavioral task
behavioral1
Sample
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe
-
Size
125KB
-
MD5
4287f1f26f5e36e33e73b7fb32d78c00
-
SHA1
7769c720726c9ad9a31d0b6bd0aabb77d179b57c
-
SHA256
d9e3aa37acc7a438582010127eeafe01c9d035e9236992404de336fbe34165c4
-
SHA512
5e740a70c460baa0672e7859d5cdc1b2695b5cdae69355ed580766efdd7783f906bac1a71851d803058f2a36f3a6fb9a72208d777df47fe154c954b5fe1bb689
-
SSDEEP
3072:Uo8FuBFiGU98DMjEXc5nQcd1WdTCn93OGey/ZhJakrPF:18FuboaDMjEMQceTCndOGeKTaG
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jmbdbd32.exeKfoafi32.exeKfckahdj.exePfaigm32.exeCndikf32.exeDfknkg32.exeIicbehnq.exeLgokmgjm.exeOjjolnaq.exeCffdpghg.exeDocmgjhp.exeDadeieea.exeElbmlmml.exeHodgkc32.exeDlijfneg.exeLbdolh32.exeColffknh.exeDaaicfgd.exeEhljfnpn.exeOlkhmi32.exeDfpgffpm.exeBdolhc32.exeDlncan32.exeFakdpb32.exeLigqhc32.exeBehbag32.exeEocenh32.exeJifhaenk.exeCjbpaf32.exeClbceo32.exeDeagdn32.exeLdjhpl32.exeBcjlcn32.exeEcjhcg32.exeHmfkoh32.exeKepelfam.exeOpdghh32.exeCegdnopg.exeJpppnp32.exeMchhggno.exePqknig32.exeQjoankoi.exeMgagbf32.exeBnbmefbg.exeEolpmi32.exeHcbpab32.exeKedoge32.exeFkffog32.exeHkkhqd32.exePnakhkol.exeJcgbco32.exeQmkadgpo.exeCknnpm32.exeCdfbibnb.exeGlhonj32.exeLbmhlihl.exeFojlngce.exeKmfmmcbo.exeNpfkgjdn.exeAclpap32.exeNgbpidjh.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmbdbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfoafi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfckahdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pfaigm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cndikf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfknkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iicbehnq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgokmgjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojjolnaq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffdpghg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Docmgjhp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dadeieea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elbmlmml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hodgkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dlijfneg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbdolh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Colffknh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Daaicfgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ehljfnpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olkhmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfpgffpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdolhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dlncan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fakdpb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ligqhc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Behbag32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eocenh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jifhaenk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Clbceo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Deagdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldjhpl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcjlcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ecjhcg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfkoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kepelfam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opdghh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jpppnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mchhggno.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqknig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjoankoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgagbf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnbmefbg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eolpmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcbpab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kedoge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlncan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fkffog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkkhqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnakhkol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eolpmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jcgbco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qmkadgpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cknnpm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdfbibnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glhonj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbmhlihl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fojlngce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmfmmcbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Npfkgjdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aclpap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngbpidjh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aclpap32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral2/memory/1792-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bhaebcen.exe family_berbew behavioral2/memory/2916-12-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bjpaooda.exe family_berbew behavioral2/memory/4308-16-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bbgipldd.exe family_berbew C:\Windows\SysWOW64\Bbgipldd.exe family_berbew behavioral2/memory/4624-24-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bjbndobo.exe family_berbew behavioral2/memory/2636-32-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bbifelba.exe family_berbew behavioral2/memory/4212-39-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Behbag32.exe family_berbew behavioral2/memory/2484-48-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Blbknaib.exe family_berbew behavioral2/memory/60-55-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Baocghgi.exe family_berbew behavioral2/memory/5104-63-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bdmpcdfm.exe family_berbew C:\Windows\SysWOW64\Bldgdago.exe family_berbew behavioral2/memory/888-79-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/1348-72-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bbnpqk32.exe family_berbew C:\Windows\SysWOW64\Bdolhc32.exe family_berbew behavioral2/memory/4992-95-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Bkidenlg.exe family_berbew behavioral2/memory/2108-104-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Cdainc32.exe family_berbew behavioral2/memory/4676-119-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Cacmah32.exe family_berbew C:\Windows\SysWOW64\Cogmkl32.exe family_berbew C:\Windows\SysWOW64\Cafigg32.exe family_berbew behavioral2/memory/5032-140-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Chpada32.exe family_berbew C:\Windows\SysWOW64\Cbefaj32.exe family_berbew behavioral2/memory/3716-184-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Cefoce32.exe family_berbew behavioral2/memory/4944-207-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Clpgpp32.exe family_berbew C:\Windows\SysWOW64\Camphf32.exe family_berbew behavioral2/memory/4304-231-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Clbceo32.exe family_berbew behavioral2/memory/3952-244-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2012-248-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/4488-260-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/4140-266-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/372-274-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/4400-272-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2544-284-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/1668-302-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/3920-309-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/4940-322-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/4384-328-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/4720-342-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/3500-352-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Dlncan32.exe family_berbew behavioral2/memory/1404-358-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/3924-380-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/844-392-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/3536-398-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/316-435-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2284-447-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2872-449-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Fcckif32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Bhaebcen.exeBjpaooda.exeBbgipldd.exeBjbndobo.exeBbifelba.exeBehbag32.exeBlbknaib.exeBaocghgi.exeBdmpcdfm.exeBldgdago.exeBbnpqk32.exeBdolhc32.exeBkidenlg.exeCacmah32.exeCdainc32.exeCogmkl32.exeCafigg32.exeCeaehfjj.exeChpada32.exeCknnpm32.exeCbefaj32.exeCdfbibnb.exeClnjjpod.exeColffknh.exeCajcbgml.exeCefoce32.exeClpgpp32.exeConclk32.exeCamphf32.exeClbceo32.exeDbllbibl.exeDhidjpqc.exeDocmgjhp.exeDaaicfgd.exeDdpeoafg.exeDlgmpogj.exeDkjmlk32.exeDadeieea.exeDdbbeade.exeDlijfneg.exeDohfbj32.exeDafbne32.exeDddojq32.exeDllfkn32.exeDojcgi32.exeDceohhja.exeDedkdcie.exeDhbgqohi.exeDlncan32.exeEolpmi32.exeEefhjc32.exeEdihepnm.exeElppfmoo.exeEcjhcg32.exeEamhodmf.exeEdkdkplj.exeElbmlmml.exeEkemhj32.exeEapedd32.exeEdnaqo32.exeEkhjmiad.exeEemnjbaj.exeEhljfnpn.exeEkjfcipa.exepid process 2916 Bhaebcen.exe 4308 Bjpaooda.exe 4624 Bbgipldd.exe 2636 Bjbndobo.exe 4212 Bbifelba.exe 2484 Behbag32.exe 60 Blbknaib.exe 5104 Baocghgi.exe 1348 Bdmpcdfm.exe 888 Bldgdago.exe 4876 Bbnpqk32.exe 4992 Bdolhc32.exe 2108 Bkidenlg.exe 3684 Cacmah32.exe 4676 Cdainc32.exe 2680 Cogmkl32.exe 5032 Cafigg32.exe 4508 Ceaehfjj.exe 1528 Chpada32.exe 740 Cknnpm32.exe 4120 Cbefaj32.exe 3296 Cdfbibnb.exe 3716 Clnjjpod.exe 228 Colffknh.exe 3904 Cajcbgml.exe 4944 Cefoce32.exe 3644 Clpgpp32.exe 3228 Conclk32.exe 4304 Camphf32.exe 3952 Clbceo32.exe 2012 Dbllbibl.exe 4488 Dhidjpqc.exe 4140 Docmgjhp.exe 4400 Daaicfgd.exe 372 Ddpeoafg.exe 2544 Dlgmpogj.exe 1992 Dkjmlk32.exe 2500 Dadeieea.exe 1668 Ddbbeade.exe 3920 Dlijfneg.exe 4848 Dohfbj32.exe 2992 Dafbne32.exe 4940 Dddojq32.exe 4384 Dllfkn32.exe 3132 Dojcgi32.exe 4720 Dceohhja.exe 2772 Dedkdcie.exe 3500 Dhbgqohi.exe 1404 Dlncan32.exe 1392 Eolpmi32.exe 4456 Eefhjc32.exe 3924 Edihepnm.exe 4300 Elppfmoo.exe 844 Ecjhcg32.exe 3536 Eamhodmf.exe 3648 Edkdkplj.exe 4588 Elbmlmml.exe 3668 Ekemhj32.exe 3156 Eapedd32.exe 3876 Ednaqo32.exe 3900 Ekhjmiad.exe 1420 Eemnjbaj.exe 2284 Ehljfnpn.exe 2872 Ekjfcipa.exe -
Drops file in System32 directory 64 IoCs
Processes:
Deagdn32.exeFcmnpe32.exeJfeopj32.exePfolbmje.exeAjfhnjhq.exeAglemn32.exeEemnjbaj.exeKfankifm.exeNfjjppmm.exeOdocigqg.exeCmlcbbcj.exeGkaejf32.exeJlpkba32.exeKlngdpdd.exeMlcifmbl.exeDfnjafap.exeBeeoaapl.exeBbgipldd.exeDlgmpogj.exeGokdeeec.exeJimekgff.exeOpakbi32.exeOjaelm32.exeDedkdcie.exeHobkfd32.exeHbpgbo32.exeKlljnp32.exeNpmagine.exeLpebpm32.exeMeiaib32.exeQmmnjfnl.exeCdainc32.exeDkjmlk32.exeDadeieea.exeGhaliknf.exeImakkfdg.exeAdgbpc32.exeAmbgef32.exeAabmqd32.exeEamhodmf.exeFcckif32.exeKbhoqj32.exeEdkdkplj.exeHmfkoh32.exeKemhff32.exePdmpje32.exeAgeolo32.exeOcnjidkf.exeCfmajipb.exeDanecp32.exeEcjhcg32.exeHioiji32.exeIfllil32.exeJcgbco32.exeFhgjblfq.exeNepgjaeg.exeOgnpebpj.exeBhaebcen.exeJcioiood.exeLmgfda32.exedescription ioc process File created C:\Windows\SysWOW64\Dgbdlf32.exe Deagdn32.exe File created C:\Windows\SysWOW64\Apignbdf.dll Fcmnpe32.exe File created C:\Windows\SysWOW64\Jehokgge.exe Jfeopj32.exe File created C:\Windows\SysWOW64\Odaoecld.dll Pfolbmje.exe File opened for modification C:\Windows\SysWOW64\Anadoi32.exe Ajfhnjhq.exe File created C:\Windows\SysWOW64\Oahicipe.dll Aglemn32.exe File created C:\Windows\SysWOW64\Lfjehk32.dll Eemnjbaj.exe File created C:\Windows\SysWOW64\Kedoge32.exe Kfankifm.exe File created C:\Windows\SysWOW64\Njefqo32.exe Nfjjppmm.exe File opened for modification C:\Windows\SysWOW64\Ocbddc32.exe Odocigqg.exe File created C:\Windows\SysWOW64\Ceckcp32.exe Cmlcbbcj.exe File created C:\Windows\SysWOW64\Gomakdcp.exe Gkaejf32.exe File opened for modification C:\Windows\SysWOW64\Jplfcpin.exe Jlpkba32.exe File opened for modification C:\Windows\SysWOW64\Kdeoemeg.exe Klngdpdd.exe File created C:\Windows\SysWOW64\Mdjagjco.exe Mlcifmbl.exe File opened for modification C:\Windows\SysWOW64\Dkifae32.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Fpnnia32.dll Beeoaapl.exe File created C:\Windows\SysWOW64\Pllfhkno.dll Bbgipldd.exe File opened for modification C:\Windows\SysWOW64\Dkjmlk32.exe Dlgmpogj.exe File created C:\Windows\SysWOW64\Gcfqfc32.exe Gokdeeec.exe File opened for modification C:\Windows\SysWOW64\Jcbihpel.exe Jimekgff.exe File opened for modification C:\Windows\SysWOW64\Odmgcgbi.exe Opakbi32.exe File opened for modification C:\Windows\SysWOW64\Pnlaml32.exe Ojaelm32.exe File created C:\Windows\SysWOW64\Gfnphnen.dll Ajfhnjhq.exe File created C:\Windows\SysWOW64\Dhbgqohi.exe Dedkdcie.exe File opened for modification C:\Windows\SysWOW64\Hbpgbo32.exe Hobkfd32.exe File created C:\Windows\SysWOW64\Heocnk32.exe Hbpgbo32.exe File created C:\Windows\SysWOW64\Ojhnmh32.dll Klljnp32.exe File created C:\Windows\SysWOW64\Fjegoh32.dll Npmagine.exe File opened for modification C:\Windows\SysWOW64\Lbdolh32.exe Lpebpm32.exe File created C:\Windows\SysWOW64\Gaiann32.dll Meiaib32.exe File opened for modification C:\Windows\SysWOW64\Ajanck32.exe Qmmnjfnl.exe File created C:\Windows\SysWOW64\Aecqac32.dll Cdainc32.exe File opened for modification C:\Windows\SysWOW64\Dadeieea.exe Dkjmlk32.exe File created C:\Windows\SysWOW64\Ddbbeade.exe Dadeieea.exe File created C:\Windows\SysWOW64\Gokdeeec.exe Ghaliknf.exe File opened for modification C:\Windows\SysWOW64\Ippggbck.exe Imakkfdg.exe File opened for modification C:\Windows\SysWOW64\Ageolo32.exe Adgbpc32.exe File created C:\Windows\SysWOW64\Aqncedbp.exe Ambgef32.exe File created C:\Windows\SysWOW64\Hjlena32.dll Aabmqd32.exe File created C:\Windows\SysWOW64\Hbcbgk32.dll Eamhodmf.exe File created C:\Windows\SysWOW64\Fdegandp.exe Fcckif32.exe File created C:\Windows\SysWOW64\Edgbbfnk.dll Kbhoqj32.exe File created C:\Windows\SysWOW64\Odmgcgbi.exe Opakbi32.exe File created C:\Windows\SysWOW64\Eelcja32.dll Edkdkplj.exe File created C:\Windows\SysWOW64\Dammlf32.dll Hmfkoh32.exe File opened for modification C:\Windows\SysWOW64\Kmdqgd32.exe Kemhff32.exe File created C:\Windows\SysWOW64\Pcppfaka.exe Pdmpje32.exe File opened for modification C:\Windows\SysWOW64\Afhohlbj.exe Ageolo32.exe File created C:\Windows\SysWOW64\Ogifjcdp.exe Ocnjidkf.exe File created C:\Windows\SysWOW64\Fqjamcpe.dll Cfmajipb.exe File created C:\Windows\SysWOW64\Ddmaok32.exe Danecp32.exe File created C:\Windows\SysWOW64\Ocalcppo.dll Ecjhcg32.exe File opened for modification C:\Windows\SysWOW64\Hmjdjgjo.exe Hioiji32.exe File created C:\Windows\SysWOW64\Bkblkg32.dll Ifllil32.exe File created C:\Windows\SysWOW64\Jbjcolha.exe Jcgbco32.exe File opened for modification C:\Windows\SysWOW64\Jbjcolha.exe Jcgbco32.exe File opened for modification C:\Windows\SysWOW64\Ddbbeade.exe Dadeieea.exe File created C:\Windows\SysWOW64\Fkffog32.exe Fhgjblfq.exe File created C:\Windows\SysWOW64\Nilcjp32.exe Nepgjaeg.exe File opened for modification C:\Windows\SysWOW64\Ojllan32.exe Ognpebpj.exe File opened for modification C:\Windows\SysWOW64\Bjpaooda.exe Bhaebcen.exe File created C:\Windows\SysWOW64\Jblpek32.exe Jcioiood.exe File opened for modification C:\Windows\SysWOW64\Lpebpm32.exe Lmgfda32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 11572 11492 WerFault.exe Dmllipeg.exe -
Modifies registry class 64 IoCs
Processes:
Bbgipldd.exeEcjhcg32.exeEkjfcipa.exeIehfdi32.exeKfankifm.exeCenahpha.exeJedeph32.exeMlcifmbl.exePjcbbmif.exePmannhhj.exePdpmpdbd.exeAmpkof32.exeAnadoi32.exeBeeoaapl.exeBfhhoi32.exeClnjjpod.exeImakkfdg.exeLboeaifi.exeOgbipa32.exeDaaicfgd.exeHoiafcic.exeIihkpg32.exeCeaehfjj.exeGdcdbl32.exeJcioiood.exeLmgfda32.exeMgfqmfde.exePncgmkmj.exeQmmnjfnl.exeCefoce32.exeIcnpmp32.exeDopigd32.exeEapedd32.exeHmfkoh32.exeLekehdgp.exeMmlpoqpg.exePflplnlg.exeAnogiicl.exeBfdodjhm.exeBclhhnca.exeGhopckpi.exeJcbihpel.exeKbaipkbi.exeKbceejpf.exeOfcmfodb.exePfhfan32.exeJbhfjljd.exeJehokgge.exeCaebma32.exeDjgjlelk.exeDodbbdbb.exeEkemhj32.exeJcllonma.exeLbdolh32.exeMeiaib32.exeMmpijp32.exeOfeilobp.exeCegdnopg.exeDadeieea.exeDohfbj32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbgipldd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocalcppo.dll" Ecjhcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekjfcipa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcinbcgc.dll" Iehfdi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kfankifm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhicommo.dll" Cenahpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cefofm32.dll" Jedeph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kiljkifg.dll" Mlcifmbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjcbbmif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oncmnnje.dll" Pmannhhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pdpmpdbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ampkof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Anadoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpnnia32.dll" Beeoaapl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bfhhoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Clnjjpod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imakkfdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lboeaifi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ogbipa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eocqqdjh.dll" Daaicfgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hoiafcic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihoofe32.dll" Iihkpg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ceaehfjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcneih32.dll" Gdcdbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jcioiood.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lmgfda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mgfqmfde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pncgmkmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qmmnjfnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cefoce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icnpmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dopigd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eapedd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dammlf32.dll" Hmfkoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lekehdgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijfjal32.dll" Mmlpoqpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pflplnlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Anogiicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmgmnjcj.dll" Bfdodjhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnjaqjfh.dll" Bclhhnca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ghopckpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eeanii32.dll" Jcbihpel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kbaipkbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qamhhedg.dll" Kbceejpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aomaga32.dll" Lmgfda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hppdbdbc.dll" Ofcmfodb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pfhfan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jbhfjljd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jehokgge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Caebma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gidbim32.dll" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekemhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jcbihpel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jcllonma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lbdolh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Meiaib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnkhmbin.dll" Mmpijp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofcmfodb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofeilobp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Daaicfgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dadeieea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jffldcca.dll" Dohfbj32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exeBhaebcen.exeBjpaooda.exeBbgipldd.exeBjbndobo.exeBbifelba.exeBehbag32.exeBlbknaib.exeBaocghgi.exeBdmpcdfm.exeBldgdago.exeBbnpqk32.exeBdolhc32.exeBkidenlg.exeCacmah32.exeCdainc32.exeCogmkl32.exeCafigg32.exeCeaehfjj.exeChpada32.exeCknnpm32.exeCbefaj32.exedescription pid process target process PID 1792 wrote to memory of 2916 1792 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Bhaebcen.exe PID 1792 wrote to memory of 2916 1792 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Bhaebcen.exe PID 1792 wrote to memory of 2916 1792 4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe Bhaebcen.exe PID 2916 wrote to memory of 4308 2916 Bhaebcen.exe Bjpaooda.exe PID 2916 wrote to memory of 4308 2916 Bhaebcen.exe Bjpaooda.exe PID 2916 wrote to memory of 4308 2916 Bhaebcen.exe Bjpaooda.exe PID 4308 wrote to memory of 4624 4308 Bjpaooda.exe Bbgipldd.exe PID 4308 wrote to memory of 4624 4308 Bjpaooda.exe Bbgipldd.exe PID 4308 wrote to memory of 4624 4308 Bjpaooda.exe Bbgipldd.exe PID 4624 wrote to memory of 2636 4624 Bbgipldd.exe Bjbndobo.exe PID 4624 wrote to memory of 2636 4624 Bbgipldd.exe Bjbndobo.exe PID 4624 wrote to memory of 2636 4624 Bbgipldd.exe Bjbndobo.exe PID 2636 wrote to memory of 4212 2636 Bjbndobo.exe Bbifelba.exe PID 2636 wrote to memory of 4212 2636 Bjbndobo.exe Bbifelba.exe PID 2636 wrote to memory of 4212 2636 Bjbndobo.exe Bbifelba.exe PID 4212 wrote to memory of 2484 4212 Bbifelba.exe Behbag32.exe PID 4212 wrote to memory of 2484 4212 Bbifelba.exe Behbag32.exe PID 4212 wrote to memory of 2484 4212 Bbifelba.exe Behbag32.exe PID 2484 wrote to memory of 60 2484 Behbag32.exe Blbknaib.exe PID 2484 wrote to memory of 60 2484 Behbag32.exe Blbknaib.exe PID 2484 wrote to memory of 60 2484 Behbag32.exe Blbknaib.exe PID 60 wrote to memory of 5104 60 Blbknaib.exe Baocghgi.exe PID 60 wrote to memory of 5104 60 Blbknaib.exe Baocghgi.exe PID 60 wrote to memory of 5104 60 Blbknaib.exe Baocghgi.exe PID 5104 wrote to memory of 1348 5104 Baocghgi.exe Bdmpcdfm.exe PID 5104 wrote to memory of 1348 5104 Baocghgi.exe Bdmpcdfm.exe PID 5104 wrote to memory of 1348 5104 Baocghgi.exe Bdmpcdfm.exe PID 1348 wrote to memory of 888 1348 Bdmpcdfm.exe Bldgdago.exe PID 1348 wrote to memory of 888 1348 Bdmpcdfm.exe Bldgdago.exe PID 1348 wrote to memory of 888 1348 Bdmpcdfm.exe Bldgdago.exe PID 888 wrote to memory of 4876 888 Bldgdago.exe Bbnpqk32.exe PID 888 wrote to memory of 4876 888 Bldgdago.exe Bbnpqk32.exe PID 888 wrote to memory of 4876 888 Bldgdago.exe Bbnpqk32.exe PID 4876 wrote to memory of 4992 4876 Bbnpqk32.exe Bdolhc32.exe PID 4876 wrote to memory of 4992 4876 Bbnpqk32.exe Bdolhc32.exe PID 4876 wrote to memory of 4992 4876 Bbnpqk32.exe Bdolhc32.exe PID 4992 wrote to memory of 2108 4992 Bdolhc32.exe Bkidenlg.exe PID 4992 wrote to memory of 2108 4992 Bdolhc32.exe Bkidenlg.exe PID 4992 wrote to memory of 2108 4992 Bdolhc32.exe Bkidenlg.exe PID 2108 wrote to memory of 3684 2108 Bkidenlg.exe Cacmah32.exe PID 2108 wrote to memory of 3684 2108 Bkidenlg.exe Cacmah32.exe PID 2108 wrote to memory of 3684 2108 Bkidenlg.exe Cacmah32.exe PID 3684 wrote to memory of 4676 3684 Cacmah32.exe Cdainc32.exe PID 3684 wrote to memory of 4676 3684 Cacmah32.exe Cdainc32.exe PID 3684 wrote to memory of 4676 3684 Cacmah32.exe Cdainc32.exe PID 4676 wrote to memory of 2680 4676 Cdainc32.exe Cogmkl32.exe PID 4676 wrote to memory of 2680 4676 Cdainc32.exe Cogmkl32.exe PID 4676 wrote to memory of 2680 4676 Cdainc32.exe Cogmkl32.exe PID 2680 wrote to memory of 5032 2680 Cogmkl32.exe Cafigg32.exe PID 2680 wrote to memory of 5032 2680 Cogmkl32.exe Cafigg32.exe PID 2680 wrote to memory of 5032 2680 Cogmkl32.exe Cafigg32.exe PID 5032 wrote to memory of 4508 5032 Cafigg32.exe Ceaehfjj.exe PID 5032 wrote to memory of 4508 5032 Cafigg32.exe Ceaehfjj.exe PID 5032 wrote to memory of 4508 5032 Cafigg32.exe Ceaehfjj.exe PID 4508 wrote to memory of 1528 4508 Ceaehfjj.exe Chpada32.exe PID 4508 wrote to memory of 1528 4508 Ceaehfjj.exe Chpada32.exe PID 4508 wrote to memory of 1528 4508 Ceaehfjj.exe Chpada32.exe PID 1528 wrote to memory of 740 1528 Chpada32.exe Cknnpm32.exe PID 1528 wrote to memory of 740 1528 Chpada32.exe Cknnpm32.exe PID 1528 wrote to memory of 740 1528 Chpada32.exe Cknnpm32.exe PID 740 wrote to memory of 4120 740 Cknnpm32.exe Cbefaj32.exe PID 740 wrote to memory of 4120 740 Cknnpm32.exe Cbefaj32.exe PID 740 wrote to memory of 4120 740 Cknnpm32.exe Cbefaj32.exe PID 4120 wrote to memory of 3296 4120 Cbefaj32.exe Cdfbibnb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4287f1f26f5e36e33e73b7fb32d78c00_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Bhaebcen.exeC:\Windows\system32\Bhaebcen.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Bjpaooda.exeC:\Windows\system32\Bjpaooda.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\Bbgipldd.exeC:\Windows\system32\Bbgipldd.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\Bjbndobo.exeC:\Windows\system32\Bjbndobo.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Bbifelba.exeC:\Windows\system32\Bbifelba.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\Behbag32.exeC:\Windows\system32\Behbag32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Blbknaib.exeC:\Windows\system32\Blbknaib.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\Baocghgi.exeC:\Windows\system32\Baocghgi.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\Bdmpcdfm.exeC:\Windows\system32\Bdmpcdfm.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\Bldgdago.exeC:\Windows\system32\Bldgdago.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\Bbnpqk32.exeC:\Windows\system32\Bbnpqk32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\Bdolhc32.exeC:\Windows\system32\Bdolhc32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\Bkidenlg.exeC:\Windows\system32\Bkidenlg.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\Cacmah32.exeC:\Windows\system32\Cacmah32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\Cdainc32.exeC:\Windows\system32\Cdainc32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\Cogmkl32.exeC:\Windows\system32\Cogmkl32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Cafigg32.exeC:\Windows\system32\Cafigg32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\Ceaehfjj.exeC:\Windows\system32\Ceaehfjj.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\Chpada32.exeC:\Windows\system32\Chpada32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\Cknnpm32.exeC:\Windows\system32\Cknnpm32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\Cbefaj32.exeC:\Windows\system32\Cbefaj32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\Clnjjpod.exeC:\Windows\system32\Clnjjpod.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:3716 -
C:\Windows\SysWOW64\Colffknh.exeC:\Windows\system32\Colffknh.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\Cajcbgml.exeC:\Windows\system32\Cajcbgml.exe26⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\Clpgpp32.exeC:\Windows\system32\Clpgpp32.exe28⤵
- Executes dropped EXE
PID:3644 -
C:\Windows\SysWOW64\Conclk32.exeC:\Windows\system32\Conclk32.exe29⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe30⤵
- Executes dropped EXE
PID:4304 -
C:\Windows\SysWOW64\Clbceo32.exeC:\Windows\system32\Clbceo32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3952 -
C:\Windows\SysWOW64\Dbllbibl.exeC:\Windows\system32\Dbllbibl.exe32⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\Dhidjpqc.exeC:\Windows\system32\Dhidjpqc.exe33⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\Docmgjhp.exeC:\Windows\system32\Docmgjhp.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4140 -
C:\Windows\SysWOW64\Daaicfgd.exeC:\Windows\system32\Daaicfgd.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4400 -
C:\Windows\SysWOW64\Ddpeoafg.exeC:\Windows\system32\Ddpeoafg.exe36⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\Dlgmpogj.exeC:\Windows\system32\Dlgmpogj.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\Dkjmlk32.exeC:\Windows\system32\Dkjmlk32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Dadeieea.exeC:\Windows\system32\Dadeieea.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2500 -
C:\Windows\SysWOW64\Ddbbeade.exeC:\Windows\system32\Ddbbeade.exe40⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\Dlijfneg.exeC:\Windows\system32\Dlijfneg.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3920 -
C:\Windows\SysWOW64\Dohfbj32.exeC:\Windows\system32\Dohfbj32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:4848 -
C:\Windows\SysWOW64\Dafbne32.exeC:\Windows\system32\Dafbne32.exe43⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Dddojq32.exeC:\Windows\system32\Dddojq32.exe44⤵
- Executes dropped EXE
PID:4940 -
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe45⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Dojcgi32.exeC:\Windows\system32\Dojcgi32.exe46⤵
- Executes dropped EXE
PID:3132 -
C:\Windows\SysWOW64\Dceohhja.exeC:\Windows\system32\Dceohhja.exe47⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\Dedkdcie.exeC:\Windows\system32\Dedkdcie.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\Dhbgqohi.exeC:\Windows\system32\Dhbgqohi.exe49⤵
- Executes dropped EXE
PID:3500 -
C:\Windows\SysWOW64\Dlncan32.exeC:\Windows\system32\Dlncan32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe52⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\Edihepnm.exeC:\Windows\system32\Edihepnm.exe53⤵
- Executes dropped EXE
PID:3924 -
C:\Windows\SysWOW64\Elppfmoo.exeC:\Windows\system32\Elppfmoo.exe54⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:844 -
C:\Windows\SysWOW64\Eamhodmf.exeC:\Windows\system32\Eamhodmf.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3536 -
C:\Windows\SysWOW64\Edkdkplj.exeC:\Windows\system32\Edkdkplj.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3648 -
C:\Windows\SysWOW64\Elbmlmml.exeC:\Windows\system32\Elbmlmml.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\Ekemhj32.exeC:\Windows\system32\Ekemhj32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:3668 -
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:3156 -
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe61⤵
- Executes dropped EXE
PID:3876 -
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe62⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\Eocenh32.exeC:\Windows\system32\Eocenh32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:316 -
C:\Windows\SysWOW64\Eemnjbaj.exeC:\Windows\system32\Eemnjbaj.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\Ehljfnpn.exeC:\Windows\system32\Ehljfnpn.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe66⤵
- Executes dropped EXE
- Modifies registry class
PID:2872 -
C:\Windows\SysWOW64\Edbklofb.exeC:\Windows\system32\Edbklofb.exe67⤵PID:468
-
C:\Windows\SysWOW64\Fkmchi32.exeC:\Windows\system32\Fkmchi32.exe68⤵PID:4916
-
C:\Windows\SysWOW64\Fcckif32.exeC:\Windows\system32\Fcckif32.exe69⤵
- Drops file in System32 directory
PID:3268 -
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe70⤵PID:652
-
C:\Windows\SysWOW64\Fllpbldb.exeC:\Windows\system32\Fllpbldb.exe71⤵PID:2996
-
C:\Windows\SysWOW64\Fojlngce.exeC:\Windows\system32\Fojlngce.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3896 -
C:\Windows\SysWOW64\Faihkbci.exeC:\Windows\system32\Faihkbci.exe73⤵PID:1788
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe74⤵PID:5004
-
C:\Windows\SysWOW64\Flnlhk32.exeC:\Windows\system32\Flnlhk32.exe75⤵PID:852
-
C:\Windows\SysWOW64\Fomhdg32.exeC:\Windows\system32\Fomhdg32.exe76⤵PID:5100
-
C:\Windows\SysWOW64\Fakdpb32.exeC:\Windows\system32\Fakdpb32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2788 -
C:\Windows\SysWOW64\Fdialn32.exeC:\Windows\system32\Fdialn32.exe78⤵PID:1812
-
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe79⤵PID:4864
-
C:\Windows\SysWOW64\Fckajehi.exeC:\Windows\system32\Fckajehi.exe80⤵PID:2608
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe81⤵PID:3940
-
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe82⤵
- Drops file in System32 directory
PID:4648 -
C:\Windows\SysWOW64\Fkffog32.exeC:\Windows\system32\Fkffog32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:464 -
C:\Windows\SysWOW64\Fcmnpe32.exeC:\Windows\system32\Fcmnpe32.exe84⤵
- Drops file in System32 directory
PID:4776 -
C:\Windows\SysWOW64\Fhjfhl32.exeC:\Windows\system32\Fhjfhl32.exe85⤵PID:3664
-
C:\Windows\SysWOW64\Gkhbdg32.exeC:\Windows\system32\Gkhbdg32.exe86⤵PID:1384
-
C:\Windows\SysWOW64\Gbbkaako.exeC:\Windows\system32\Gbbkaako.exe87⤵PID:4760
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe88⤵PID:4380
-
C:\Windows\SysWOW64\Glhonj32.exeC:\Windows\system32\Glhonj32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:224 -
C:\Windows\SysWOW64\Gcagkdba.exeC:\Windows\system32\Gcagkdba.exe90⤵PID:3576
-
C:\Windows\SysWOW64\Gdcdbl32.exeC:\Windows\system32\Gdcdbl32.exe91⤵
- Modifies registry class
PID:4952 -
C:\Windows\SysWOW64\Ghopckpi.exeC:\Windows\system32\Ghopckpi.exe92⤵
- Modifies registry class
PID:1220 -
C:\Windows\SysWOW64\Gkmlofol.exeC:\Windows\system32\Gkmlofol.exe93⤵PID:2748
-
C:\Windows\SysWOW64\Gohhpe32.exeC:\Windows\system32\Gohhpe32.exe94⤵PID:4468
-
C:\Windows\SysWOW64\Gfbploob.exeC:\Windows\system32\Gfbploob.exe95⤵PID:392
-
C:\Windows\SysWOW64\Ghaliknf.exeC:\Windows\system32\Ghaliknf.exe96⤵
- Drops file in System32 directory
PID:2016 -
C:\Windows\SysWOW64\Gokdeeec.exeC:\Windows\system32\Gokdeeec.exe97⤵
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\Gcfqfc32.exeC:\Windows\system32\Gcfqfc32.exe98⤵PID:5136
-
C:\Windows\SysWOW64\Gfembo32.exeC:\Windows\system32\Gfembo32.exe99⤵PID:5176
-
C:\Windows\SysWOW64\Gicinj32.exeC:\Windows\system32\Gicinj32.exe100⤵PID:5212
-
C:\Windows\SysWOW64\Gkaejf32.exeC:\Windows\system32\Gkaejf32.exe101⤵
- Drops file in System32 directory
PID:5260 -
C:\Windows\SysWOW64\Gomakdcp.exeC:\Windows\system32\Gomakdcp.exe102⤵PID:5300
-
C:\Windows\SysWOW64\Gblngpbd.exeC:\Windows\system32\Gblngpbd.exe103⤵PID:5348
-
C:\Windows\SysWOW64\Gdjjckag.exeC:\Windows\system32\Gdjjckag.exe104⤵PID:5388
-
C:\Windows\SysWOW64\Hiefcj32.exeC:\Windows\system32\Hiefcj32.exe105⤵PID:5436
-
C:\Windows\SysWOW64\Hihbijhn.exeC:\Windows\system32\Hihbijhn.exe106⤵PID:5480
-
C:\Windows\SysWOW64\Hobkfd32.exeC:\Windows\system32\Hobkfd32.exe107⤵
- Drops file in System32 directory
PID:5520 -
C:\Windows\SysWOW64\Hbpgbo32.exeC:\Windows\system32\Hbpgbo32.exe108⤵
- Drops file in System32 directory
PID:5564 -
C:\Windows\SysWOW64\Heocnk32.exeC:\Windows\system32\Heocnk32.exe109⤵PID:5608
-
C:\Windows\SysWOW64\Hmfkoh32.exeC:\Windows\system32\Hmfkoh32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5652 -
C:\Windows\SysWOW64\Hkikkeeo.exeC:\Windows\system32\Hkikkeeo.exe111⤵PID:5696
-
C:\Windows\SysWOW64\Hodgkc32.exeC:\Windows\system32\Hodgkc32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5732 -
C:\Windows\SysWOW64\Hcpclbfa.exeC:\Windows\system32\Hcpclbfa.exe113⤵PID:5780
-
C:\Windows\SysWOW64\Hbbdholl.exeC:\Windows\system32\Hbbdholl.exe114⤵PID:5824
-
C:\Windows\SysWOW64\Heapdjlp.exeC:\Windows\system32\Heapdjlp.exe115⤵PID:5868
-
C:\Windows\SysWOW64\Hmhhehlb.exeC:\Windows\system32\Hmhhehlb.exe116⤵PID:5904
-
C:\Windows\SysWOW64\Hkkhqd32.exeC:\Windows\system32\Hkkhqd32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5952 -
C:\Windows\SysWOW64\Hofdacke.exeC:\Windows\system32\Hofdacke.exe118⤵PID:5988
-
C:\Windows\SysWOW64\Hcbpab32.exeC:\Windows\system32\Hcbpab32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6036 -
C:\Windows\SysWOW64\Hbeqmoji.exeC:\Windows\system32\Hbeqmoji.exe120⤵PID:6072
-
C:\Windows\SysWOW64\Hecmijim.exeC:\Windows\system32\Hecmijim.exe121⤵PID:6112
-
C:\Windows\SysWOW64\Hioiji32.exeC:\Windows\system32\Hioiji32.exe122⤵
- Drops file in System32 directory
PID:624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-