Analysis
-
max time kernel
134s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 21:57
Behavioral task
behavioral1
Sample
25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe
-
Size
108KB
-
MD5
25ec72ace4fce21307e276c2237157e0
-
SHA1
bb25648ae9c8a7755956e6f95095a04c1103386b
-
SHA256
5949c59a0cfe06e86cb28576c60587d6f408f732d74b724890d346d08898a381
-
SHA512
0fc0bb0bff66ea4479418a9cde251309089500004201a272894e11570109b1defb09be0903d7ac341b32849dd01986200b0bc35b49c56a35eb2260c398791232
-
SSDEEP
1536:LQ8w6PMteciSyVixMwB+rjm8NiIqhn3HQ8BawTj2wQ3K:M8voe0pUjmOiBn3w8BdTj2h3K
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Becifhfj.exeDkkcge32.exeBoipmj32.exeNobdbkhf.exeGpcmga32.exeEfhlhh32.exeJlhljhbg.exePcagphom.exeJbgoof32.exeEhailbaa.exeEfffmo32.exeKqbdldnq.exeKmegbjgn.exeDhmgki32.exeIklgah32.exePcepkfld.exeOdnnnnfe.exeNnlhfn32.exeDmglcj32.exeJjmcnbdm.exeCdhhdlid.exeDcjnoece.exeLknjmkdo.exeMahbje32.exeEeidoc32.exeLpcfkm32.exeLmgfda32.exeAcqimo32.exeNjiegl32.exeMnpabe32.exeBdmpcdfm.exeCjinkg32.exeNlnkmnah.exeBjbfklei.exeAjkaii32.exeAjpqnneo.exeIkkpgafg.exeOjjolnaq.exeKdaldd32.exeNqmhbpba.exeEdpnfo32.exeOjllan32.exeEkgbccni.exeFgbfhmll.exeAniajnnn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Becifhfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boipmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nobdbkhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpcmga32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efhlhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlhljhbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcagphom.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbgoof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehailbaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efffmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efffmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqbdldnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmegbjgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iklgah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcepkfld.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odnnnnfe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnlhfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmglcj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjmcnbdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdhhdlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcjnoece.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lknjmkdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mahbje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eeidoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpcfkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmgfda32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acqimo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njiegl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnpabe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdmpcdfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjinkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlnkmnah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjbfklei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajkaii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajpqnneo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikkpgafg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojjolnaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdaldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edpnfo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojllan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekgbccni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgbfhmll.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aniajnnn.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral2/memory/2920-0-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Ifjfnb32.exe family_berbew behavioral2/memory/2444-8-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Imdnklfp.exe family_berbew behavioral2/memory/764-19-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Iapjlk32.exe family_berbew behavioral2/memory/2300-24-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/552-32-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Ifmcdblq.exe family_berbew C:\Windows\SysWOW64\Imgkql32.exe family_berbew behavioral2/memory/4356-44-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Iabgaklg.exe family_berbew behavioral2/memory/4260-52-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Idacmfkj.exe family_berbew behavioral2/memory/1984-56-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Iinlemia.exe family_berbew behavioral2/memory/4016-68-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jaedgjjd.exe family_berbew behavioral2/memory/1748-72-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jfaloa32.exe family_berbew behavioral2/memory/4100-80-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jiphkm32.exe family_berbew behavioral2/memory/1732-87-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jpjqhgol.exe family_berbew behavioral2/memory/1728-96-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jbhmdbnp.exe family_berbew behavioral2/memory/1440-103-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jibeql32.exe family_berbew behavioral2/memory/4544-112-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jplmmfmi.exe family_berbew behavioral2/memory/4332-119-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jfffjqdf.exe family_berbew behavioral2/memory/4728-127-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/3288-136-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jmpngk32.exe family_berbew behavioral2/memory/2552-149-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Jmbklj32.exe family_berbew C:\Windows\SysWOW64\Jpaghf32.exe family_berbew C:\Windows\SysWOW64\Jdmcidam.exe family_berbew C:\Windows\SysWOW64\Jbocea32.exe family_berbew C:\Windows\SysWOW64\Jiikak32.exe family_berbew C:\Windows\SysWOW64\Kmegbjgn.exe family_berbew behavioral2/memory/2348-199-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Kaqcbi32.exe family_berbew behavioral2/memory/2568-212-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Kdopod32.exe family_berbew behavioral2/memory/2380-216-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew C:\Windows\SysWOW64\Kgmlkp32.exe family_berbew C:\Windows\SysWOW64\Kilhgk32.exe family_berbew C:\Windows\SysWOW64\Kacphh32.exe family_berbew C:\Windows\SysWOW64\Kdaldd32.exe family_berbew behavioral2/memory/2748-297-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/1896-296-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/1988-302-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/2044-344-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/3372-343-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/1224-339-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/2160-346-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/4156-337-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/1624-336-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/756-335-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/4932-334-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/2972-295-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew behavioral2/memory/3996-294-0x0000000000400000-0x000000000043F000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Ifjfnb32.exeImdnklfp.exeIapjlk32.exeIfmcdblq.exeImgkql32.exeIabgaklg.exeIdacmfkj.exeIinlemia.exeJaedgjjd.exeJfaloa32.exeJiphkm32.exeJpjqhgol.exeJbhmdbnp.exeJibeql32.exeJplmmfmi.exeJfffjqdf.exeJmpngk32.exeJdjfcecp.exeJmbklj32.exeJpaghf32.exeJdmcidam.exeJbocea32.exeJfkoeppq.exeJiikak32.exeKmegbjgn.exeKaqcbi32.exeKdopod32.exeKgmlkp32.exeKilhgk32.exeKmgdgjek.exeKacphh32.exeKdaldd32.exeKbdmpqcb.exeKkkdan32.exeKinemkko.exeKmjqmi32.exeKaemnhla.exeKphmie32.exeKdcijcke.exeKknafn32.exeKpjjod32.exeKdffocib.exeKgdbkohf.exeKkpnlm32.exeKibnhjgj.exeKmnjhioc.exeKpmfddnf.exeLdkojb32.exeLgikfn32.exeLkdggmlj.exeLaopdgcg.exeLcpllo32.exeLkgdml32.exeLaalifad.exeLdohebqh.exeLkiqbl32.exeLaciofpa.exeLdaeka32.exeLklnhlfb.exeLjnnch32.exeLphfpbdi.exeLknjmkdo.exeMahbje32.exeMpkbebbf.exepid process 2444 Ifjfnb32.exe 764 Imdnklfp.exe 2300 Iapjlk32.exe 552 Ifmcdblq.exe 4356 Imgkql32.exe 4260 Iabgaklg.exe 1984 Idacmfkj.exe 4016 Iinlemia.exe 1748 Jaedgjjd.exe 4100 Jfaloa32.exe 1732 Jiphkm32.exe 1728 Jpjqhgol.exe 1440 Jbhmdbnp.exe 4544 Jibeql32.exe 4332 Jplmmfmi.exe 4728 Jfffjqdf.exe 3288 Jmpngk32.exe 2552 Jdjfcecp.exe 4556 Jmbklj32.exe 2348 Jpaghf32.exe 4440 Jdmcidam.exe 660 Jbocea32.exe 3104 Jfkoeppq.exe 2168 Jiikak32.exe 2868 Kmegbjgn.exe 2568 Kaqcbi32.exe 2380 Kdopod32.exe 2040 Kgmlkp32.exe 4264 Kilhgk32.exe 3116 Kmgdgjek.exe 956 Kacphh32.exe 2744 Kdaldd32.exe 3272 Kbdmpqcb.exe 1376 Kkkdan32.exe 3996 Kinemkko.exe 2972 Kmjqmi32.exe 1896 Kaemnhla.exe 2748 Kphmie32.exe 1988 Kdcijcke.exe 4932 Kknafn32.exe 756 Kpjjod32.exe 1624 Kdffocib.exe 4156 Kgdbkohf.exe 1224 Kkpnlm32.exe 3372 Kibnhjgj.exe 2044 Kmnjhioc.exe 2160 Kpmfddnf.exe 1184 Ldkojb32.exe 3960 Lgikfn32.exe 1852 Lkdggmlj.exe 1016 Laopdgcg.exe 1228 Lcpllo32.exe 2800 Lkgdml32.exe 2496 Laalifad.exe 1936 Ldohebqh.exe 4884 Lkiqbl32.exe 4388 Laciofpa.exe 3396 Ldaeka32.exe 1212 Lklnhlfb.exe 5040 Ljnnch32.exe 376 Lphfpbdi.exe 2432 Lknjmkdo.exe 1644 Mahbje32.exe 1400 Mpkbebbf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ilidbbgl.exeKlqcioba.exeAeiofcji.exeBnpppgdj.exeFielph32.exeCjecpkcg.exeJmpngk32.exeKdffocib.exeNlnkmnah.exeBlbknaib.exeDdpeoafg.exeAjdbcano.exeMkpgck32.exeOjllan32.exeIbqpimpl.exeHfpecg32.exeEhjlaaig.exePkbjjbda.exeCioilg32.exeGdmmbq32.exeLbpdblmo.exeKndojobi.exeLmmolepp.exeCklaknjd.exeDmglcj32.exeJpppnp32.exePpopjp32.exeDkljak32.exeKefdbo32.exeHkpqkcpd.exeOlmeci32.exeCmqmma32.exeDmjocp32.exeKkfcndce.exeMjeddggd.exeAcmflf32.exePeqcjkfp.exeJpdhkf32.exeQaflgago.exedescription ioc process File created C:\Windows\SysWOW64\Icplcpgo.exe Ilidbbgl.exe File opened for modification C:\Windows\SysWOW64\Lbjlfi32.exe Klqcioba.exe File created C:\Windows\SysWOW64\Agglboim.exe Aeiofcji.exe File created C:\Windows\SysWOW64\Bclhhnca.exe Bnpppgdj.exe File created C:\Windows\SysWOW64\Fdkpma32.exe Fielph32.exe File created C:\Windows\SysWOW64\Opngmi32.dll Cjecpkcg.exe File opened for modification C:\Windows\SysWOW64\Jdjfcecp.exe Jmpngk32.exe File created C:\Windows\SysWOW64\Fogjfmfe.dll Kdffocib.exe File created C:\Windows\SysWOW64\Gghocf32.dll Nlnkmnah.exe File opened for modification C:\Windows\SysWOW64\Ondljl32.exe File opened for modification C:\Windows\SysWOW64\Cpfcfmlp.exe File created C:\Windows\SysWOW64\Bblckl32.exe Blbknaib.exe File created C:\Windows\SysWOW64\Doeiljfn.exe Ddpeoafg.exe File created C:\Windows\SysWOW64\Debheb32.dll Ajdbcano.exe File created C:\Windows\SysWOW64\Fhphpicg.dll File created C:\Windows\SysWOW64\Mdiklqhm.exe Mkpgck32.exe File created C:\Windows\SysWOW64\Olkhmi32.exe Ojllan32.exe File created C:\Windows\SysWOW64\Cammjakm.exe File created C:\Windows\SysWOW64\Mpaqbf32.dll File opened for modification C:\Windows\SysWOW64\Ofjqihnn.exe File opened for modification C:\Windows\SysWOW64\Iikhfg32.exe Ibqpimpl.exe File created C:\Windows\SysWOW64\Inkjhi32.exe Hfpecg32.exe File created C:\Windows\SysWOW64\Hifpcjin.dll Ehjlaaig.exe File opened for modification C:\Windows\SysWOW64\Pmaffnce.exe Pkbjjbda.exe File opened for modification C:\Windows\SysWOW64\Coiaiakf.exe Cioilg32.exe File opened for modification C:\Windows\SysWOW64\Onkidm32.exe File created C:\Windows\SysWOW64\Jafdcbge.exe File opened for modification C:\Windows\SysWOW64\Gpcmga32.exe Gdmmbq32.exe File created C:\Windows\SysWOW64\Fgibng32.dll Lbpdblmo.exe File created C:\Windows\SysWOW64\Iinjhh32.exe File created C:\Windows\SysWOW64\Adkqoohc.exe File created C:\Windows\SysWOW64\Gaebef32.exe File opened for modification C:\Windows\SysWOW64\Kijchhbo.exe Kndojobi.exe File opened for modification C:\Windows\SysWOW64\Lgccinoe.exe Lmmolepp.exe File created C:\Windows\SysWOW64\Oingap32.dll File created C:\Windows\SysWOW64\Cnfkdb32.exe File created C:\Windows\SysWOW64\Hpkdfd32.dll File created C:\Windows\SysWOW64\Ceaehfjj.exe Cklaknjd.exe File created C:\Windows\SysWOW64\Hekgfj32.exe File opened for modification C:\Windows\SysWOW64\Djklmo32.exe Dmglcj32.exe File opened for modification C:\Windows\SysWOW64\Kfjhkjle.exe Jpppnp32.exe File opened for modification C:\Windows\SysWOW64\Pgihfj32.exe Ppopjp32.exe File created C:\Windows\SysWOW64\Gikdkj32.exe File opened for modification C:\Windows\SysWOW64\Koodbl32.exe File created C:\Windows\SysWOW64\Bphgeo32.exe File opened for modification C:\Windows\SysWOW64\Noppeaed.exe File created C:\Windows\SysWOW64\Dccbbhld.exe Dkljak32.exe File opened for modification C:\Windows\SysWOW64\Lhdqnj32.exe Kefdbo32.exe File created C:\Windows\SysWOW64\Opkpck32.dll Hkpqkcpd.exe File created C:\Windows\SysWOW64\Ehpadhll.exe File created C:\Windows\SysWOW64\Fbplml32.exe File created C:\Windows\SysWOW64\Oddmdf32.exe Olmeci32.exe File created C:\Windows\SysWOW64\Mgcail32.dll Cmqmma32.exe File created C:\Windows\SysWOW64\Deagdn32.exe Dmjocp32.exe File opened for modification C:\Windows\SysWOW64\Kndojobi.exe Kkfcndce.exe File created C:\Windows\SysWOW64\Ekamnhne.dll File created C:\Windows\SysWOW64\Jlllhigk.dll File created C:\Windows\SysWOW64\Bcoaln32.dll File created C:\Windows\SysWOW64\Gndick32.exe File created C:\Windows\SysWOW64\Jgengpmj.dll Mjeddggd.exe File opened for modification C:\Windows\SysWOW64\Aldomc32.exe Acmflf32.exe File created C:\Windows\SysWOW64\Klqmnp32.dll Peqcjkfp.exe File created C:\Windows\SysWOW64\Olhldm32.dll Jpdhkf32.exe File opened for modification C:\Windows\SysWOW64\Ajndioga.exe Qaflgago.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 1200 14540 -
Modifies registry class 64 IoCs
Processes:
Anbkio32.exeQgnbaj32.exeIdacmfkj.exeKfjhkjle.exeLnmkfh32.exeNjefqo32.exeOjmcld32.exeAjkhdp32.exeJjgchm32.exeGmoeoidl.exeIkbnacmd.exeJblpek32.exeMdehlk32.exeDojcgi32.exeJmpgldhg.exeEolhbc32.exeMedgncoe.exePgihfj32.exeIklgah32.exeAodogdmn.exeLphoelqn.exeFdkggg32.exePabblb32.exeAfgacokc.exeLaciofpa.exeNnolfdcn.exeBbdhiojo.exeFedmqk32.exeEhedfo32.exeMplhql32.exePmaffnce.exePjeoglgc.exeMbbagk32.exeEachem32.exeHiiggoaf.exePkbjjbda.exeNcianepl.exeEmhldnkj.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aobmce32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anbkio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qgnbaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idacmfkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfjhkjle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Famcfn32.dll" Lnmkfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njefqo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojmcld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlgcki32.dll" Ajkhdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abjfai32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjgchm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lobpkihi.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmoeoidl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnknop32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjqkei32.dll" Ikbnacmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnbnoffm.dll" Jblpek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdehlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekhobd32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Higchddh.dll" Dojcgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmpgldhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eolhbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Medgncoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iicfkknk.dll" Pgihfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iklgah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aodogdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lphoelqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdlndj32.dll" Fdkggg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pabblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afgacokc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckegia32.dll" Laciofpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbdhiojo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fedmqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cggkemhh.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbjnhape.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehedfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flfelggh.dll" Mplhql32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmaffnce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Holpib32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfilim32.dll" Pjeoglgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbbagk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeheme32.dll" Pabblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jclnjo32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkcmfmhk.dll" Eachem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hiiggoaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkbjjbda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncianepl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emhldnkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exeIfjfnb32.exeImdnklfp.exeIapjlk32.exeIfmcdblq.exeImgkql32.exeIabgaklg.exeIdacmfkj.exeIinlemia.exeJaedgjjd.exeJfaloa32.exeJiphkm32.exeJpjqhgol.exeJbhmdbnp.exeJibeql32.exeJplmmfmi.exeJfffjqdf.exeJmpngk32.exeJdjfcecp.exeJmbklj32.exeJpaghf32.exeJdmcidam.exedescription pid process target process PID 2920 wrote to memory of 2444 2920 25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe Ifjfnb32.exe PID 2920 wrote to memory of 2444 2920 25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe Ifjfnb32.exe PID 2920 wrote to memory of 2444 2920 25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe Ifjfnb32.exe PID 2444 wrote to memory of 764 2444 Ifjfnb32.exe Imdnklfp.exe PID 2444 wrote to memory of 764 2444 Ifjfnb32.exe Imdnklfp.exe PID 2444 wrote to memory of 764 2444 Ifjfnb32.exe Imdnklfp.exe PID 764 wrote to memory of 2300 764 Imdnklfp.exe Iapjlk32.exe PID 764 wrote to memory of 2300 764 Imdnklfp.exe Iapjlk32.exe PID 764 wrote to memory of 2300 764 Imdnklfp.exe Iapjlk32.exe PID 2300 wrote to memory of 552 2300 Iapjlk32.exe Ifmcdblq.exe PID 2300 wrote to memory of 552 2300 Iapjlk32.exe Ifmcdblq.exe PID 2300 wrote to memory of 552 2300 Iapjlk32.exe Ifmcdblq.exe PID 552 wrote to memory of 4356 552 Ifmcdblq.exe Imgkql32.exe PID 552 wrote to memory of 4356 552 Ifmcdblq.exe Imgkql32.exe PID 552 wrote to memory of 4356 552 Ifmcdblq.exe Imgkql32.exe PID 4356 wrote to memory of 4260 4356 Imgkql32.exe Iabgaklg.exe PID 4356 wrote to memory of 4260 4356 Imgkql32.exe Iabgaklg.exe PID 4356 wrote to memory of 4260 4356 Imgkql32.exe Iabgaklg.exe PID 4260 wrote to memory of 1984 4260 Iabgaklg.exe Idacmfkj.exe PID 4260 wrote to memory of 1984 4260 Iabgaklg.exe Idacmfkj.exe PID 4260 wrote to memory of 1984 4260 Iabgaklg.exe Idacmfkj.exe PID 1984 wrote to memory of 4016 1984 Idacmfkj.exe Iinlemia.exe PID 1984 wrote to memory of 4016 1984 Idacmfkj.exe Iinlemia.exe PID 1984 wrote to memory of 4016 1984 Idacmfkj.exe Iinlemia.exe PID 4016 wrote to memory of 1748 4016 Iinlemia.exe Jaedgjjd.exe PID 4016 wrote to memory of 1748 4016 Iinlemia.exe Jaedgjjd.exe PID 4016 wrote to memory of 1748 4016 Iinlemia.exe Jaedgjjd.exe PID 1748 wrote to memory of 4100 1748 Jaedgjjd.exe Jfaloa32.exe PID 1748 wrote to memory of 4100 1748 Jaedgjjd.exe Jfaloa32.exe PID 1748 wrote to memory of 4100 1748 Jaedgjjd.exe Jfaloa32.exe PID 4100 wrote to memory of 1732 4100 Jfaloa32.exe Jiphkm32.exe PID 4100 wrote to memory of 1732 4100 Jfaloa32.exe Jiphkm32.exe PID 4100 wrote to memory of 1732 4100 Jfaloa32.exe Jiphkm32.exe PID 1732 wrote to memory of 1728 1732 Jiphkm32.exe Jpjqhgol.exe PID 1732 wrote to memory of 1728 1732 Jiphkm32.exe Jpjqhgol.exe PID 1732 wrote to memory of 1728 1732 Jiphkm32.exe Jpjqhgol.exe PID 1728 wrote to memory of 1440 1728 Jpjqhgol.exe Jbhmdbnp.exe PID 1728 wrote to memory of 1440 1728 Jpjqhgol.exe Jbhmdbnp.exe PID 1728 wrote to memory of 1440 1728 Jpjqhgol.exe Jbhmdbnp.exe PID 1440 wrote to memory of 4544 1440 Jbhmdbnp.exe Jibeql32.exe PID 1440 wrote to memory of 4544 1440 Jbhmdbnp.exe Jibeql32.exe PID 1440 wrote to memory of 4544 1440 Jbhmdbnp.exe Jibeql32.exe PID 4544 wrote to memory of 4332 4544 Jibeql32.exe Jplmmfmi.exe PID 4544 wrote to memory of 4332 4544 Jibeql32.exe Jplmmfmi.exe PID 4544 wrote to memory of 4332 4544 Jibeql32.exe Jplmmfmi.exe PID 4332 wrote to memory of 4728 4332 Jplmmfmi.exe Jfffjqdf.exe PID 4332 wrote to memory of 4728 4332 Jplmmfmi.exe Jfffjqdf.exe PID 4332 wrote to memory of 4728 4332 Jplmmfmi.exe Jfffjqdf.exe PID 4728 wrote to memory of 3288 4728 Jfffjqdf.exe Jmpngk32.exe PID 4728 wrote to memory of 3288 4728 Jfffjqdf.exe Jmpngk32.exe PID 4728 wrote to memory of 3288 4728 Jfffjqdf.exe Jmpngk32.exe PID 3288 wrote to memory of 2552 3288 Jmpngk32.exe Jdjfcecp.exe PID 3288 wrote to memory of 2552 3288 Jmpngk32.exe Jdjfcecp.exe PID 3288 wrote to memory of 2552 3288 Jmpngk32.exe Jdjfcecp.exe PID 2552 wrote to memory of 4556 2552 Jdjfcecp.exe Jmbklj32.exe PID 2552 wrote to memory of 4556 2552 Jdjfcecp.exe Jmbklj32.exe PID 2552 wrote to memory of 4556 2552 Jdjfcecp.exe Jmbklj32.exe PID 4556 wrote to memory of 2348 4556 Jmbklj32.exe Jpaghf32.exe PID 4556 wrote to memory of 2348 4556 Jmbklj32.exe Jpaghf32.exe PID 4556 wrote to memory of 2348 4556 Jmbklj32.exe Jpaghf32.exe PID 2348 wrote to memory of 4440 2348 Jpaghf32.exe Jdmcidam.exe PID 2348 wrote to memory of 4440 2348 Jpaghf32.exe Jdmcidam.exe PID 2348 wrote to memory of 4440 2348 Jpaghf32.exe Jdmcidam.exe PID 4440 wrote to memory of 660 4440 Jdmcidam.exe Jbocea32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\25ec72ace4fce21307e276c2237157e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\Iapjlk32.exeC:\Windows\system32\Iapjlk32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\Imgkql32.exeC:\Windows\system32\Imgkql32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\Iabgaklg.exeC:\Windows\system32\Iabgaklg.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\Idacmfkj.exeC:\Windows\system32\Idacmfkj.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Iinlemia.exeC:\Windows\system32\Iinlemia.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\Jaedgjjd.exeC:\Windows\system32\Jaedgjjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Jfaloa32.exeC:\Windows\system32\Jfaloa32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\Jiphkm32.exeC:\Windows\system32\Jiphkm32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\Jbhmdbnp.exeC:\Windows\system32\Jbhmdbnp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\Jibeql32.exeC:\Windows\system32\Jibeql32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\Jfffjqdf.exeC:\Windows\system32\Jfffjqdf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Jmpngk32.exeC:\Windows\system32\Jmpngk32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\Jdjfcecp.exeC:\Windows\system32\Jdjfcecp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Jmbklj32.exeC:\Windows\system32\Jmbklj32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Jdmcidam.exeC:\Windows\system32\Jdmcidam.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe23⤵
- Executes dropped EXE
PID:660 -
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe24⤵
- Executes dropped EXE
PID:3104 -
C:\Windows\SysWOW64\Jiikak32.exeC:\Windows\system32\Jiikak32.exe25⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Kmegbjgn.exeC:\Windows\system32\Kmegbjgn.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe27⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Kdopod32.exeC:\Windows\system32\Kdopod32.exe28⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe29⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe30⤵
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\Kmgdgjek.exeC:\Windows\system32\Kmgdgjek.exe31⤵
- Executes dropped EXE
PID:3116 -
C:\Windows\SysWOW64\Kacphh32.exeC:\Windows\system32\Kacphh32.exe32⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\Kbdmpqcb.exeC:\Windows\system32\Kbdmpqcb.exe34⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\Kkkdan32.exeC:\Windows\system32\Kkkdan32.exe35⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\Kinemkko.exeC:\Windows\system32\Kinemkko.exe36⤵
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\Kmjqmi32.exeC:\Windows\system32\Kmjqmi32.exe37⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Kaemnhla.exeC:\Windows\system32\Kaemnhla.exe38⤵
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe39⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe40⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Kknafn32.exeC:\Windows\system32\Kknafn32.exe41⤵
- Executes dropped EXE
PID:4932 -
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe42⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe44⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe45⤵
- Executes dropped EXE
PID:1224 -
C:\Windows\SysWOW64\Kibnhjgj.exeC:\Windows\system32\Kibnhjgj.exe46⤵
- Executes dropped EXE
PID:3372 -
C:\Windows\SysWOW64\Kmnjhioc.exeC:\Windows\system32\Kmnjhioc.exe47⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe48⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\Ldkojb32.exeC:\Windows\system32\Ldkojb32.exe49⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe50⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\Lkdggmlj.exeC:\Windows\system32\Lkdggmlj.exe51⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\Laopdgcg.exeC:\Windows\system32\Laopdgcg.exe52⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe53⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\Lkgdml32.exeC:\Windows\system32\Lkgdml32.exe54⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Laalifad.exeC:\Windows\system32\Laalifad.exe55⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe56⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe57⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\Laciofpa.exeC:\Windows\system32\Laciofpa.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Windows\SysWOW64\Ldaeka32.exeC:\Windows\system32\Ldaeka32.exe59⤵
- Executes dropped EXE
PID:3396 -
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe60⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe61⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe62⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe65⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe66⤵
- Drops file in System32 directory
PID:4984 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe67⤵PID:4760
-
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe68⤵PID:880
-
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe69⤵
- Drops file in System32 directory
PID:3864 -
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe70⤵PID:1900
-
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe71⤵PID:3452
-
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe72⤵PID:5084
-
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe73⤵PID:4076
-
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe74⤵PID:4400
-
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe75⤵PID:3168
-
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe76⤵PID:3648
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe77⤵PID:2460
-
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe78⤵PID:4128
-
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe79⤵PID:3880
-
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe80⤵PID:1196
-
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe81⤵PID:3268
-
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe82⤵PID:4428
-
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe83⤵PID:844
-
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe84⤵PID:2864
-
C:\Windows\SysWOW64\Ngcgcjnc.exeC:\Windows\system32\Ngcgcjnc.exe85⤵PID:4280
-
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe86⤵PID:3616
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe87⤵PID:4088
-
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe88⤵PID:1004
-
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe89⤵PID:1540
-
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe90⤵
- Modifies registry class
PID:3260 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5132 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe92⤵PID:5176
-
C:\Windows\SysWOW64\Nnaikd32.exeC:\Windows\system32\Nnaikd32.exe93⤵PID:5216
-
C:\Windows\SysWOW64\Ndkahnhh.exeC:\Windows\system32\Ndkahnhh.exe94⤵PID:5256
-
C:\Windows\SysWOW64\Ncnadk32.exeC:\Windows\system32\Ncnadk32.exe95⤵PID:5296
-
C:\Windows\SysWOW64\Ojhiqefo.exeC:\Windows\system32\Ojhiqefo.exe96⤵PID:5340
-
C:\Windows\SysWOW64\Oboaabga.exeC:\Windows\system32\Oboaabga.exe97⤵PID:5376
-
C:\Windows\SysWOW64\Odnnnnfe.exeC:\Windows\system32\Odnnnnfe.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5416 -
C:\Windows\SysWOW64\Ogljjiei.exeC:\Windows\system32\Ogljjiei.exe99⤵PID:5468
-
C:\Windows\SysWOW64\Okhfjh32.exeC:\Windows\system32\Okhfjh32.exe100⤵PID:5508
-
C:\Windows\SysWOW64\Onfbfc32.exeC:\Windows\system32\Onfbfc32.exe101⤵PID:5552
-
C:\Windows\SysWOW64\Obangb32.exeC:\Windows\system32\Obangb32.exe102⤵PID:5592
-
C:\Windows\SysWOW64\Oqdoboli.exeC:\Windows\system32\Oqdoboli.exe103⤵PID:5656
-
C:\Windows\SysWOW64\Occkojkm.exeC:\Windows\system32\Occkojkm.exe104⤵PID:5712
-
C:\Windows\SysWOW64\Okjbpglo.exeC:\Windows\system32\Okjbpglo.exe105⤵PID:5772
-
C:\Windows\SysWOW64\Ojmcld32.exeC:\Windows\system32\Ojmcld32.exe106⤵
- Modifies registry class
PID:5824 -
C:\Windows\SysWOW64\Obdkma32.exeC:\Windows\system32\Obdkma32.exe107⤵PID:5872
-
C:\Windows\SysWOW64\Odbgim32.exeC:\Windows\system32\Odbgim32.exe108⤵PID:5904
-
C:\Windows\SysWOW64\Ogaceh32.exeC:\Windows\system32\Ogaceh32.exe109⤵PID:5980
-
C:\Windows\SysWOW64\Obfhba32.exeC:\Windows\system32\Obfhba32.exe110⤵PID:6032
-
C:\Windows\SysWOW64\Ogcpjhoq.exeC:\Windows\system32\Ogcpjhoq.exe111⤵PID:6108
-
C:\Windows\SysWOW64\Okolkg32.exeC:\Windows\system32\Okolkg32.exe112⤵PID:3296
-
C:\Windows\SysWOW64\Onmhgb32.exeC:\Windows\system32\Onmhgb32.exe113⤵PID:5200
-
C:\Windows\SysWOW64\Oqkdcn32.exeC:\Windows\system32\Oqkdcn32.exe114⤵PID:5280
-
C:\Windows\SysWOW64\Pcjapi32.exeC:\Windows\system32\Pcjapi32.exe115⤵PID:5364
-
C:\Windows\SysWOW64\Pkaiqf32.exeC:\Windows\system32\Pkaiqf32.exe116⤵PID:5440
-
C:\Windows\SysWOW64\Pnpemb32.exeC:\Windows\system32\Pnpemb32.exe117⤵PID:5504
-
C:\Windows\SysWOW64\Pbkamqmd.exeC:\Windows\system32\Pbkamqmd.exe118⤵PID:5616
-
C:\Windows\SysWOW64\Peimil32.exeC:\Windows\system32\Peimil32.exe119⤵PID:5720
-
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe120⤵PID:5804
-
C:\Windows\SysWOW64\Pjffbc32.exeC:\Windows\system32\Pjffbc32.exe121⤵PID:5900
-
C:\Windows\SysWOW64\Pqpnombl.exeC:\Windows\system32\Pqpnombl.exe122⤵PID:6004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-