Analysis
-
max time kernel
142s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 21:49
Behavioral task
behavioral1
Sample
0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe
-
Size
320KB
-
MD5
0536f84eb45a078214bd2b95808fb830
-
SHA1
dfe49691421f594f1a6d356c0b9bac44b455a24f
-
SHA256
8c9c2d6e542debfc53db9ea0883e30a60bc4c8c4fa13d6ca82dae8e903d7977d
-
SHA512
05a4bef52a4b602526da6b33e164bcc77318c7ae87bb96d6e71e8ca2c1dd22a7b0edeced1bb97047ee3887a0f1ad257769f83e0e8643043ec11c5194b6fc2c9d
-
SSDEEP
6144:Cf3W8TcjgsPJGwWuZLcLTCndOGeKTame6UK+42GTQMJSZO5f7M0rx7/hP66qve69:Cf3W8TGJeuZOedOGeKTaPkY660fIaDZ4
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kgopidgf.exeQkmdkgob.exeNgdmod32.exeCnicfe32.exeGlcaambb.exeGpqjglii.exeKjgeedch.exeOponmilc.exeFaenpf32.exeNhdlao32.exeMjmoag32.exeBojomm32.exeEkodjiol.exeQkmhlekj.exeOnmhgb32.exeCfdhkhjj.exeDcpmen32.exeLggldm32.exeFflohaij.exeGmfplibd.exeIinjhh32.exeKgdpni32.exePnihcq32.exeMplhql32.exeNaaqofgj.exeLlgjjnlj.exeGdppbfff.exeCmdfgm32.exeJibeql32.exeAjckij32.exeOifeab32.exeNggqoj32.exeFhcpgmjf.exeJpppnp32.exeAmbgef32.exeFnaokmco.exeAaqgek32.exeKdeoemeg.exeHlpfhe32.exeJmknaell.exeBfchidda.exeDfmcfp32.exeMkmkkjko.exeDdnfmqng.exeDceohhja.exeFfimfqgm.exeJnjejjgh.exeJlobkg32.exeOhhnbhok.exeCknnpm32.exeCabfga32.exeAaiimadl.exeJklinohd.exeOmgcpokp.exeOdalmibl.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgopidgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qkmdkgob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngdmod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cnicfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glcaambb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpqjglii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjgeedch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oponmilc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faenpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhdlao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mjmoag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bojomm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekodjiol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkmhlekj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Onmhgb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfdhkhjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dcpmen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lggldm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fflohaij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmfplibd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iinjhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgdpni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnihcq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mplhql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naaqofgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llgjjnlj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdppbfff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmdfgm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jibeql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajckij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oifeab32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nggqoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fhcpgmjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpppnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ambgef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnaokmco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aaqgek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kdeoemeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hlpfhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmknaell.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfchidda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfmcfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkmkkjko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddnfmqng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dceohhja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffimfqgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jnjejjgh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlobkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohhnbhok.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cknnpm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cabfga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aaiimadl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jklinohd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omgcpokp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odalmibl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral2/memory/1988-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Jibeql32.exe family_berbew behavioral2/memory/4896-7-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Jplmmfmi.exe family_berbew behavioral2/memory/1928-15-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Jidbflcj.exe family_berbew behavioral2/memory/4044-24-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/1624-36-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Jdjfcecp.exe family_berbew behavioral2/memory/4788-40-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Jaljgidl.exe family_berbew behavioral2/memory/3728-47-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Jkfkfohj.exe family_berbew C:\Windows\SysWOW64\Kaqcbi32.exe family_berbew behavioral2/memory/3040-55-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Kgmlkp32.exe family_berbew behavioral2/memory/2520-64-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Kbdmpqcb.exe family_berbew behavioral2/memory/2816-71-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Kaemnhla.exe family_berbew behavioral2/memory/4584-80-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Kbfiep32.exe family_berbew behavioral2/memory/2440-87-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Kpjjod32.exe family_berbew C:\Windows\SysWOW64\Kpjjod32.exe family_berbew behavioral2/memory/2928-96-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/2592-104-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Kkpnlm32.exe family_berbew behavioral2/memory/3424-111-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Kajfig32.exe family_berbew C:\Windows\SysWOW64\Kckbqpnj.exe family_berbew C:\Windows\SysWOW64\Liekmj32.exe family_berbew behavioral2/memory/540-120-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/memory/1556-127-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Lmccchkn.exe family_berbew behavioral2/memory/440-136-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Lgkhlnbn.exe family_berbew behavioral2/memory/4904-144-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Lpcmec32.exe family_berbew behavioral2/memory/2728-152-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Lnhmng32.exe family_berbew behavioral2/memory/1400-165-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Lpfijcfl.exe family_berbew behavioral2/memory/1228-167-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Laefdf32.exe family_berbew behavioral2/memory/2708-176-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Lgbnmm32.exe family_berbew C:\Windows\SysWOW64\Lgbnmm32.exe family_berbew behavioral2/memory/3208-184-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mjcgohig.exe family_berbew behavioral2/memory/1772-192-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mdiklqhm.exe family_berbew behavioral2/memory/4908-200-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mnapdf32.exe family_berbew behavioral2/memory/2140-207-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mjhqjg32.exe family_berbew behavioral2/memory/2420-215-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mcpebmkb.exe family_berbew behavioral2/memory/4052-224-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mkgmcjld.exe family_berbew behavioral2/memory/3756-236-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mdpalp32.exe family_berbew behavioral2/memory/912-240-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew C:\Windows\SysWOW64\Mgnnhk32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Jibeql32.exeJplmmfmi.exeJidbflcj.exeJaljgidl.exeJdjfcecp.exeJkfkfohj.exeKaqcbi32.exeKgmlkp32.exeKbdmpqcb.exeKaemnhla.exeKbfiep32.exeKpjjod32.exeKkpnlm32.exeKajfig32.exeKckbqpnj.exeLiekmj32.exeLmccchkn.exeLgkhlnbn.exeLpcmec32.exeLnhmng32.exeLpfijcfl.exeLaefdf32.exeLgbnmm32.exeMjcgohig.exeMdiklqhm.exeMnapdf32.exeMjhqjg32.exeMcpebmkb.exeMkgmcjld.exeMdpalp32.exeMgnnhk32.exeNdbnboqb.exeNgpjnkpf.exeNjogjfoj.exeNnjbke32.exeNnmopdep.exeNcihikcg.exeNjcpee32.exeNdidbn32.exeNggqoj32.exeNnaikd32.exeNcnadk32.exeOboaabga.exeOcqnij32.exeOjjffddl.exeObangb32.exeOkjbpglo.exeObdkma32.exeOcegdjij.exeOnklabip.exeOdednmpm.exeOjalgcnd.exeOnmhgb32.exePcjapi32.exePjdilcla.exePeimil32.exePkceffcd.exePnbbbabh.exePcojkhap.exePkfblfab.exePbpjhp32.exePgmcqggf.exePjkombfj.exePaegjl32.exepid process 4896 Jibeql32.exe 1928 Jplmmfmi.exe 4044 Jidbflcj.exe 1624 Jaljgidl.exe 4788 Jdjfcecp.exe 3728 Jkfkfohj.exe 3040 Kaqcbi32.exe 2520 Kgmlkp32.exe 2816 Kbdmpqcb.exe 4584 Kaemnhla.exe 2440 Kbfiep32.exe 2928 Kpjjod32.exe 2592 Kkpnlm32.exe 3424 Kajfig32.exe 540 Kckbqpnj.exe 1556 Liekmj32.exe 440 Lmccchkn.exe 4904 Lgkhlnbn.exe 2728 Lpcmec32.exe 1400 Lnhmng32.exe 1228 Lpfijcfl.exe 2708 Laefdf32.exe 3208 Lgbnmm32.exe 1772 Mjcgohig.exe 4908 Mdiklqhm.exe 2140 Mnapdf32.exe 2420 Mjhqjg32.exe 4052 Mcpebmkb.exe 3756 Mkgmcjld.exe 912 Mdpalp32.exe 884 Mgnnhk32.exe 4420 Ndbnboqb.exe 2204 Ngpjnkpf.exe 2356 Njogjfoj.exe 1788 Nnjbke32.exe 4060 Nnmopdep.exe 3420 Ncihikcg.exe 4620 Njcpee32.exe 4212 Ndidbn32.exe 2496 Nggqoj32.exe 4524 Nnaikd32.exe 1616 Ncnadk32.exe 5012 Oboaabga.exe 3780 Ocqnij32.exe 2588 Ojjffddl.exe 3376 Obangb32.exe 4688 Okjbpglo.exe 4336 Obdkma32.exe 4756 Ocegdjij.exe 1728 Onklabip.exe 1968 Odednmpm.exe 2804 Ojalgcnd.exe 1656 Onmhgb32.exe 760 Pcjapi32.exe 464 Pjdilcla.exe 1836 Peimil32.exe 2260 Pkceffcd.exe 4308 Pnbbbabh.exe 1212 Pcojkhap.exe 4332 Pkfblfab.exe 3876 Pbpjhp32.exe 1924 Pgmcqggf.exe 2468 Pjkombfj.exe 4176 Paegjl32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Glldgljg.exeHmbfbn32.exeIidphgcn.exeKnenkbio.exeKlgqcqkl.exeHbdjchgn.exeAhgjejhd.exeBblnindg.exeOcmconhk.exePhodcg32.exeGfodeohd.exeHidgai32.exeAqkgpedc.exeImoneg32.exeKfckahdj.exePfjcgn32.exeIliinc32.exeBfchidda.exeOemefcap.exeEamhodmf.exeLggldm32.exeKkeldnpi.exeEadopc32.exeGododflk.exeHkdbpe32.exeImmapg32.exeDflmlj32.exeObangb32.exeFdegandp.exeLbjlfi32.exeAjkaii32.exeAaiimadl.exeHfifmnij.exeJmbdbd32.exeGgkiol32.exeIqpfjnba.exeLiimncmf.exeQffbbldm.exeGfmojenc.exeCbpajgmf.exeLfkaag32.exeHkpqkcpd.exeKqdaadln.exeAfnnnd32.exePknqoc32.exeDhpjkojk.exeQdbiedpa.exeQjoankoi.exeGhipne32.exeQklmpalf.exedescription ioc process File created C:\Windows\SysWOW64\Jihdpleo.dll Glldgljg.exe File created C:\Windows\SysWOW64\Mknjbg32.dll Hmbfbn32.exe File created C:\Windows\SysWOW64\Ipoheakj.exe Iidphgcn.exe File created C:\Windows\SysWOW64\Kpcjgnhb.exe Knenkbio.exe File created C:\Windows\SysWOW64\Kbaipkbi.exe Klgqcqkl.exe File opened for modification C:\Windows\SysWOW64\Hhnbpb32.exe Hbdjchgn.exe File created C:\Windows\SysWOW64\Acmobchj.exe Ahgjejhd.exe File created C:\Windows\SysWOW64\Kgpbnj32.dll Bblnindg.exe File opened for modification C:\Windows\SysWOW64\Mcaipa32.exe File created C:\Windows\SysWOW64\Oiagde32.exe File created C:\Windows\SysWOW64\Fbcolk32.dll File created C:\Windows\SysWOW64\Ohjlgefb.exe Ocmconhk.exe File created C:\Windows\SysWOW64\Pknqoc32.exe Phodcg32.exe File created C:\Windows\SysWOW64\Aoioli32.exe File opened for modification C:\Windows\SysWOW64\Gmimai32.exe Gfodeohd.exe File created C:\Windows\SysWOW64\Cpabibmg.dll Hidgai32.exe File opened for modification C:\Windows\SysWOW64\Jhkbdmbg.exe File created C:\Windows\SysWOW64\Hmcjlfqa.dll Aqkgpedc.exe File created C:\Windows\SysWOW64\Phcgcqab.exe File created C:\Windows\SysWOW64\Eeeaodnk.dll File created C:\Windows\SysWOW64\Nmjfodne.exe File created C:\Windows\SysWOW64\Icifbang.exe Imoneg32.exe File opened for modification C:\Windows\SysWOW64\Kmncnb32.exe Kfckahdj.exe File created C:\Windows\SysWOW64\Pnakhkol.exe Pfjcgn32.exe File created C:\Windows\SysWOW64\Ibcaknbi.exe Iliinc32.exe File opened for modification C:\Windows\SysWOW64\Boklbi32.exe Bfchidda.exe File opened for modification C:\Windows\SysWOW64\Okjnnj32.exe Oemefcap.exe File created C:\Windows\SysWOW64\Edkdkplj.exe Eamhodmf.exe File created C:\Windows\SysWOW64\Pnpkdp32.dll File opened for modification C:\Windows\SysWOW64\Ljfhqh32.exe Lggldm32.exe File opened for modification C:\Windows\SysWOW64\Fcneeo32.exe File created C:\Windows\SysWOW64\Kmfhkf32.exe Kkeldnpi.exe File opened for modification C:\Windows\SysWOW64\Mhldbh32.exe File created C:\Windows\SysWOW64\Inlekh32.dll Eadopc32.exe File opened for modification C:\Windows\SysWOW64\Gfngap32.exe Gododflk.exe File opened for modification C:\Windows\SysWOW64\Hfifmnij.exe Hkdbpe32.exe File created C:\Windows\SysWOW64\Ceacpg32.dll Immapg32.exe File created C:\Windows\SysWOW64\Dikihe32.exe Dflmlj32.exe File created C:\Windows\SysWOW64\Echmafdm.dll Obangb32.exe File opened for modification C:\Windows\SysWOW64\Fhqcam32.exe Fdegandp.exe File created C:\Windows\SysWOW64\Ncmlocln.dll Lbjlfi32.exe File created C:\Windows\SysWOW64\Bfddbh32.dll Ajkaii32.exe File created C:\Windows\SysWOW64\Ppejnh32.dll Aaiimadl.exe File created C:\Windows\SysWOW64\Jahqiaeb.exe File created C:\Windows\SysWOW64\Hihbijhn.exe Hfifmnij.exe File created C:\Windows\SysWOW64\Jpppnp32.exe Jmbdbd32.exe File opened for modification C:\Windows\SysWOW64\Gmeakf32.exe Ggkiol32.exe File created C:\Windows\SysWOW64\Ikejgf32.exe Iqpfjnba.exe File opened for modification C:\Windows\SysWOW64\Gqnejaff.exe File created C:\Windows\SysWOW64\Llgjjnlj.exe Liimncmf.exe File created C:\Windows\SysWOW64\Pkmlea32.dll Qffbbldm.exe File created C:\Windows\SysWOW64\Gikkfqmf.exe Gfmojenc.exe File opened for modification C:\Windows\SysWOW64\Ckhecmcf.exe Cbpajgmf.exe File created C:\Windows\SysWOW64\Liimncmf.exe Lfkaag32.exe File created C:\Windows\SysWOW64\Hllbndih.dll Hkpqkcpd.exe File created C:\Windows\SysWOW64\Ohpfbb32.dll Kqdaadln.exe File created C:\Windows\SysWOW64\Pkbcikkp.dll File opened for modification C:\Windows\SysWOW64\Bcbohigp.exe Afnnnd32.exe File created C:\Windows\SysWOW64\Aqhblk32.dll Pknqoc32.exe File created C:\Windows\SysWOW64\Dkoggkjo.exe Dhpjkojk.exe File created C:\Windows\SysWOW64\Qgqeappe.exe Qdbiedpa.exe File created C:\Windows\SysWOW64\Kgngca32.dll Qjoankoi.exe File created C:\Windows\SysWOW64\Gdppbfff.exe Ghipne32.exe File opened for modification C:\Windows\SysWOW64\Amjillkj.exe Qklmpalf.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 3212 4368 -
Modifies registry class 64 IoCs
Processes:
Opdghh32.exeHdpiid32.exePomgjn32.exeOdapnf32.exeEonehbjg.exeJbeidl32.exeGadqlkep.exeIpflihfq.exeLiqihglg.exeBnkbcj32.exeJlolpq32.exeKlngdpdd.exeNcfdie32.exePqpgdfnp.exeGnkaalkd.exeCgjjdf32.exeJejefqaf.exePgopffec.exeMhafeb32.exeBbdhiojo.exeLiekmj32.exePcojkhap.exeCdfbibnb.exeOlfobjbg.exeAabmqd32.exeKkfcndce.exeLcjcnoej.exePmlmkn32.exeDjcoai32.exeAhdged32.exeDbjkkl32.exeHpqldc32.exeIefgbh32.exeJleijb32.exeKplpjn32.exeLpqiemge.exeLbabgh32.exeIbfnqmpf.exeDccbbhld.exeQmkadgpo.exeJfpojead.exeAjeadd32.exeBhikcb32.exeGnhnaf32.exeHhbkinel.exeGeohklaa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llmglb32.dll" Opdghh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hdpiid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pomgjn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gejimf32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Odapnf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eonehbjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbddol32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jiopcppf.dll" Jbeidl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahamlm32.dll" Gadqlkep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipflihfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Liqihglg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Neiqnh32.dll" Bnkbcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jlolpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klngdpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlfofiig.dll" Ncfdie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehaaclak.dll" Pqpgdfnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gnkaalkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cgjjdf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebdpoomj.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jejefqaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgopffec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mhafeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbekag32.dll" Bbdhiojo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Liekmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pcojkhap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cdfbibnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Olfobjbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aabmqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkfcndce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaghgm32.dll" Lcjcnoej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmlmkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enfhldel.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djcoai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eobkhf32.dll" Ahdged32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Likage32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efehkimj.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dbjkkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqlhmf32.dll" Hpqldc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iefgbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdimkqnb.dll" Jleijb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdkfmkdc.dll" Kplpjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaeokj32.dll" Lpqiemge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lbabgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ibfnqmpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnambi32.dll" Dccbbhld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qmkadgpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akejpg32.dll" Jfpojead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiobodkp.dll" Ajeadd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcdihk32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bhikcb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gnhnaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hhbkinel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adfokn32.dll" Geohklaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aldclhie.dll" -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exeJibeql32.exeJplmmfmi.exeJidbflcj.exeJaljgidl.exeJdjfcecp.exeJkfkfohj.exeKaqcbi32.exeKgmlkp32.exeKbdmpqcb.exeKaemnhla.exeKbfiep32.exeKpjjod32.exeKkpnlm32.exeKajfig32.exeKckbqpnj.exeLiekmj32.exeLmccchkn.exeLgkhlnbn.exeLpcmec32.exeLnhmng32.exeLpfijcfl.exedescription pid process target process PID 1988 wrote to memory of 4896 1988 0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe Jibeql32.exe PID 1988 wrote to memory of 4896 1988 0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe Jibeql32.exe PID 1988 wrote to memory of 4896 1988 0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe Jibeql32.exe PID 4896 wrote to memory of 1928 4896 Jibeql32.exe Jplmmfmi.exe PID 4896 wrote to memory of 1928 4896 Jibeql32.exe Jplmmfmi.exe PID 4896 wrote to memory of 1928 4896 Jibeql32.exe Jplmmfmi.exe PID 1928 wrote to memory of 4044 1928 Jplmmfmi.exe Jidbflcj.exe PID 1928 wrote to memory of 4044 1928 Jplmmfmi.exe Jidbflcj.exe PID 1928 wrote to memory of 4044 1928 Jplmmfmi.exe Jidbflcj.exe PID 4044 wrote to memory of 1624 4044 Jidbflcj.exe Jaljgidl.exe PID 4044 wrote to memory of 1624 4044 Jidbflcj.exe Jaljgidl.exe PID 4044 wrote to memory of 1624 4044 Jidbflcj.exe Jaljgidl.exe PID 1624 wrote to memory of 4788 1624 Jaljgidl.exe Jdjfcecp.exe PID 1624 wrote to memory of 4788 1624 Jaljgidl.exe Jdjfcecp.exe PID 1624 wrote to memory of 4788 1624 Jaljgidl.exe Jdjfcecp.exe PID 4788 wrote to memory of 3728 4788 Jdjfcecp.exe Jkfkfohj.exe PID 4788 wrote to memory of 3728 4788 Jdjfcecp.exe Jkfkfohj.exe PID 4788 wrote to memory of 3728 4788 Jdjfcecp.exe Jkfkfohj.exe PID 3728 wrote to memory of 3040 3728 Jkfkfohj.exe Kaqcbi32.exe PID 3728 wrote to memory of 3040 3728 Jkfkfohj.exe Kaqcbi32.exe PID 3728 wrote to memory of 3040 3728 Jkfkfohj.exe Kaqcbi32.exe PID 3040 wrote to memory of 2520 3040 Kaqcbi32.exe Kgmlkp32.exe PID 3040 wrote to memory of 2520 3040 Kaqcbi32.exe Kgmlkp32.exe PID 3040 wrote to memory of 2520 3040 Kaqcbi32.exe Kgmlkp32.exe PID 2520 wrote to memory of 2816 2520 Kgmlkp32.exe Kbdmpqcb.exe PID 2520 wrote to memory of 2816 2520 Kgmlkp32.exe Kbdmpqcb.exe PID 2520 wrote to memory of 2816 2520 Kgmlkp32.exe Kbdmpqcb.exe PID 2816 wrote to memory of 4584 2816 Kbdmpqcb.exe Kaemnhla.exe PID 2816 wrote to memory of 4584 2816 Kbdmpqcb.exe Kaemnhla.exe PID 2816 wrote to memory of 4584 2816 Kbdmpqcb.exe Kaemnhla.exe PID 4584 wrote to memory of 2440 4584 Kaemnhla.exe Kbfiep32.exe PID 4584 wrote to memory of 2440 4584 Kaemnhla.exe Kbfiep32.exe PID 4584 wrote to memory of 2440 4584 Kaemnhla.exe Kbfiep32.exe PID 2440 wrote to memory of 2928 2440 Kbfiep32.exe Kpjjod32.exe PID 2440 wrote to memory of 2928 2440 Kbfiep32.exe Kpjjod32.exe PID 2440 wrote to memory of 2928 2440 Kbfiep32.exe Kpjjod32.exe PID 2928 wrote to memory of 2592 2928 Kpjjod32.exe Kkpnlm32.exe PID 2928 wrote to memory of 2592 2928 Kpjjod32.exe Kkpnlm32.exe PID 2928 wrote to memory of 2592 2928 Kpjjod32.exe Kkpnlm32.exe PID 2592 wrote to memory of 3424 2592 Kkpnlm32.exe Kajfig32.exe PID 2592 wrote to memory of 3424 2592 Kkpnlm32.exe Kajfig32.exe PID 2592 wrote to memory of 3424 2592 Kkpnlm32.exe Kajfig32.exe PID 3424 wrote to memory of 540 3424 Kajfig32.exe Kckbqpnj.exe PID 3424 wrote to memory of 540 3424 Kajfig32.exe Kckbqpnj.exe PID 3424 wrote to memory of 540 3424 Kajfig32.exe Kckbqpnj.exe PID 540 wrote to memory of 1556 540 Kckbqpnj.exe Liekmj32.exe PID 540 wrote to memory of 1556 540 Kckbqpnj.exe Liekmj32.exe PID 540 wrote to memory of 1556 540 Kckbqpnj.exe Liekmj32.exe PID 1556 wrote to memory of 440 1556 Liekmj32.exe Lmccchkn.exe PID 1556 wrote to memory of 440 1556 Liekmj32.exe Lmccchkn.exe PID 1556 wrote to memory of 440 1556 Liekmj32.exe Lmccchkn.exe PID 440 wrote to memory of 4904 440 Lmccchkn.exe Lgkhlnbn.exe PID 440 wrote to memory of 4904 440 Lmccchkn.exe Lgkhlnbn.exe PID 440 wrote to memory of 4904 440 Lmccchkn.exe Lgkhlnbn.exe PID 4904 wrote to memory of 2728 4904 Lgkhlnbn.exe Lpcmec32.exe PID 4904 wrote to memory of 2728 4904 Lgkhlnbn.exe Lpcmec32.exe PID 4904 wrote to memory of 2728 4904 Lgkhlnbn.exe Lpcmec32.exe PID 2728 wrote to memory of 1400 2728 Lpcmec32.exe Lnhmng32.exe PID 2728 wrote to memory of 1400 2728 Lpcmec32.exe Lnhmng32.exe PID 2728 wrote to memory of 1400 2728 Lpcmec32.exe Lnhmng32.exe PID 1400 wrote to memory of 1228 1400 Lnhmng32.exe Lpfijcfl.exe PID 1400 wrote to memory of 1228 1400 Lnhmng32.exe Lpfijcfl.exe PID 1400 wrote to memory of 1228 1400 Lnhmng32.exe Lpfijcfl.exe PID 1228 wrote to memory of 2708 1228 Lpfijcfl.exe Laefdf32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0536f84eb45a078214bd2b95808fb830_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\Jibeql32.exeC:\Windows\system32\Jibeql32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\Jaljgidl.exeC:\Windows\system32\Jaljgidl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\Jdjfcecp.exeC:\Windows\system32\Jdjfcecp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Jkfkfohj.exeC:\Windows\system32\Jkfkfohj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\Kgmlkp32.exeC:\Windows\system32\Kgmlkp32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Kbdmpqcb.exeC:\Windows\system32\Kbdmpqcb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Kaemnhla.exeC:\Windows\system32\Kaemnhla.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Kbfiep32.exeC:\Windows\system32\Kbfiep32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Kajfig32.exeC:\Windows\system32\Kajfig32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\Lmccchkn.exeC:\Windows\system32\Lmccchkn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe23⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\Lgbnmm32.exeC:\Windows\system32\Lgbnmm32.exe24⤵
- Executes dropped EXE
PID:3208 -
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe25⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe26⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe27⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe28⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Mcpebmkb.exeC:\Windows\system32\Mcpebmkb.exe29⤵
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe30⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe31⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe32⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe33⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe34⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe35⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe36⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe37⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe38⤵
- Executes dropped EXE
PID:3420 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe39⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe40⤵
- Executes dropped EXE
PID:4212 -
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\Nnaikd32.exeC:\Windows\system32\Nnaikd32.exe42⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\Ncnadk32.exeC:\Windows\system32\Ncnadk32.exe43⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Oboaabga.exeC:\Windows\system32\Oboaabga.exe44⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\Ocqnij32.exeC:\Windows\system32\Ocqnij32.exe45⤵
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\Ojjffddl.exeC:\Windows\system32\Ojjffddl.exe46⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Obangb32.exeC:\Windows\system32\Obangb32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3376 -
C:\Windows\SysWOW64\Okjbpglo.exeC:\Windows\system32\Okjbpglo.exe48⤵
- Executes dropped EXE
PID:4688 -
C:\Windows\SysWOW64\Obdkma32.exeC:\Windows\system32\Obdkma32.exe49⤵
- Executes dropped EXE
PID:4336 -
C:\Windows\SysWOW64\Ocegdjij.exeC:\Windows\system32\Ocegdjij.exe50⤵
- Executes dropped EXE
PID:4756 -
C:\Windows\SysWOW64\Onklabip.exeC:\Windows\system32\Onklabip.exe51⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\Odednmpm.exeC:\Windows\system32\Odednmpm.exe52⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Ojalgcnd.exeC:\Windows\system32\Ojalgcnd.exe53⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\Onmhgb32.exeC:\Windows\system32\Onmhgb32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Pcjapi32.exeC:\Windows\system32\Pcjapi32.exe55⤵
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\Pjdilcla.exeC:\Windows\system32\Pjdilcla.exe56⤵
- Executes dropped EXE
PID:464 -
C:\Windows\SysWOW64\Peimil32.exeC:\Windows\system32\Peimil32.exe57⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Pkceffcd.exeC:\Windows\system32\Pkceffcd.exe58⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Pnbbbabh.exeC:\Windows\system32\Pnbbbabh.exe59⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\Pcojkhap.exeC:\Windows\system32\Pcojkhap.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:1212 -
C:\Windows\SysWOW64\Pkfblfab.exeC:\Windows\system32\Pkfblfab.exe61⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Pbpjhp32.exeC:\Windows\system32\Pbpjhp32.exe62⤵
- Executes dropped EXE
PID:3876 -
C:\Windows\SysWOW64\Pgmcqggf.exeC:\Windows\system32\Pgmcqggf.exe63⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\Pjkombfj.exeC:\Windows\system32\Pjkombfj.exe64⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\Paegjl32.exeC:\Windows\system32\Paegjl32.exe65⤵
- Executes dropped EXE
PID:4176 -
C:\Windows\SysWOW64\Pgopffec.exeC:\Windows\system32\Pgopffec.exe66⤵
- Modifies registry class
PID:932 -
C:\Windows\SysWOW64\Pnihcq32.exeC:\Windows\system32\Pnihcq32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3628 -
C:\Windows\SysWOW64\Pagdol32.exeC:\Windows\system32\Pagdol32.exe68⤵PID:1052
-
C:\Windows\SysWOW64\Qkmhlekj.exeC:\Windows\system32\Qkmhlekj.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2044 -
C:\Windows\SysWOW64\Qnkdhpjn.exeC:\Windows\system32\Qnkdhpjn.exe70⤵PID:2068
-
C:\Windows\SysWOW64\Qeemej32.exeC:\Windows\system32\Qeemej32.exe71⤵PID:2676
-
C:\Windows\SysWOW64\Qloebdig.exeC:\Windows\system32\Qloebdig.exe72⤵PID:5020
-
C:\Windows\SysWOW64\Qbimoo32.exeC:\Windows\system32\Qbimoo32.exe73⤵PID:3232
-
C:\Windows\SysWOW64\Acjjfggb.exeC:\Windows\system32\Acjjfggb.exe74⤵PID:228
-
C:\Windows\SysWOW64\Ajdbcano.exeC:\Windows\system32\Ajdbcano.exe75⤵PID:4984
-
C:\Windows\SysWOW64\Abkjdnoa.exeC:\Windows\system32\Abkjdnoa.exe76⤵PID:2132
-
C:\Windows\SysWOW64\Acmflf32.exeC:\Windows\system32\Acmflf32.exe77⤵PID:3996
-
C:\Windows\SysWOW64\Anbkio32.exeC:\Windows\system32\Anbkio32.exe78⤵PID:1960
-
C:\Windows\SysWOW64\Aaqgek32.exeC:\Windows\system32\Aaqgek32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1008 -
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe80⤵PID:468
-
C:\Windows\SysWOW64\Andgoobc.exeC:\Windows\system32\Andgoobc.exe81⤵PID:1472
-
C:\Windows\SysWOW64\Adapgfqj.exeC:\Windows\system32\Adapgfqj.exe82⤵PID:5132
-
C:\Windows\SysWOW64\Alhhhcal.exeC:\Windows\system32\Alhhhcal.exe83⤵PID:5176
-
C:\Windows\SysWOW64\Aaepqjpd.exeC:\Windows\system32\Aaepqjpd.exe84⤵PID:5216
-
C:\Windows\SysWOW64\Ajneip32.exeC:\Windows\system32\Ajneip32.exe85⤵PID:5272
-
C:\Windows\SysWOW64\Becifhfj.exeC:\Windows\system32\Becifhfj.exe86⤵PID:5316
-
C:\Windows\SysWOW64\Bhaebcen.exeC:\Windows\system32\Bhaebcen.exe87⤵PID:5356
-
C:\Windows\SysWOW64\Bnlnon32.exeC:\Windows\system32\Bnlnon32.exe88⤵PID:5396
-
C:\Windows\SysWOW64\Bajjli32.exeC:\Windows\system32\Bajjli32.exe89⤵PID:5444
-
C:\Windows\SysWOW64\Bjbndobo.exeC:\Windows\system32\Bjbndobo.exe90⤵PID:5492
-
C:\Windows\SysWOW64\Behbag32.exeC:\Windows\system32\Behbag32.exe91⤵PID:5536
-
C:\Windows\SysWOW64\Blbknaib.exeC:\Windows\system32\Blbknaib.exe92⤵PID:5580
-
C:\Windows\SysWOW64\Bopgjmhe.exeC:\Windows\system32\Bopgjmhe.exe93⤵PID:5628
-
C:\Windows\SysWOW64\Bejogg32.exeC:\Windows\system32\Bejogg32.exe94⤵PID:5672
-
C:\Windows\SysWOW64\Bhikcb32.exeC:\Windows\system32\Bhikcb32.exe95⤵
- Modifies registry class
PID:5712 -
C:\Windows\SysWOW64\Bjghpn32.exeC:\Windows\system32\Bjghpn32.exe96⤵PID:5760
-
C:\Windows\SysWOW64\Baaplhef.exeC:\Windows\system32\Baaplhef.exe97⤵PID:5804
-
C:\Windows\SysWOW64\Bhkhibmc.exeC:\Windows\system32\Bhkhibmc.exe98⤵PID:5848
-
C:\Windows\SysWOW64\Cacmah32.exeC:\Windows\system32\Cacmah32.exe99⤵PID:5892
-
C:\Windows\SysWOW64\Cliaoq32.exeC:\Windows\system32\Cliaoq32.exe100⤵PID:5936
-
C:\Windows\SysWOW64\Cknnpm32.exeC:\Windows\system32\Cknnpm32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5984 -
C:\Windows\SysWOW64\Cahfmgoo.exeC:\Windows\system32\Cahfmgoo.exe102⤵PID:6036
-
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe103⤵
- Modifies registry class
PID:6076 -
C:\Windows\SysWOW64\Colffknh.exeC:\Windows\system32\Colffknh.exe104⤵PID:6120
-
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe105⤵PID:1700
-
C:\Windows\SysWOW64\Chdkoa32.exeC:\Windows\system32\Chdkoa32.exe106⤵PID:5212
-
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe107⤵PID:5256
-
C:\Windows\SysWOW64\Clbceo32.exeC:\Windows\system32\Clbceo32.exe108⤵PID:5348
-
C:\Windows\SysWOW64\Dbllbibl.exeC:\Windows\system32\Dbllbibl.exe109⤵PID:5408
-
C:\Windows\SysWOW64\Daolnf32.exeC:\Windows\system32\Daolnf32.exe110⤵PID:5500
-
C:\Windows\SysWOW64\Dhidjpqc.exeC:\Windows\system32\Dhidjpqc.exe111⤵PID:5572
-
C:\Windows\SysWOW64\Dldpkoil.exeC:\Windows\system32\Dldpkoil.exe112⤵PID:5664
-
C:\Windows\SysWOW64\Docmgjhp.exeC:\Windows\system32\Docmgjhp.exe113⤵PID:5708
-
C:\Windows\SysWOW64\Daaicfgd.exeC:\Windows\system32\Daaicfgd.exe114⤵PID:5780
-
C:\Windows\SysWOW64\Ddpeoafg.exeC:\Windows\system32\Ddpeoafg.exe115⤵PID:5840
-
C:\Windows\SysWOW64\Dlgmpogj.exeC:\Windows\system32\Dlgmpogj.exe116⤵PID:5920
-
C:\Windows\SysWOW64\Doeiljfn.exeC:\Windows\system32\Doeiljfn.exe117⤵PID:6008
-
C:\Windows\SysWOW64\Deoaid32.exeC:\Windows\system32\Deoaid32.exe118⤵PID:6068
-
C:\Windows\SysWOW64\Dlijfneg.exeC:\Windows\system32\Dlijfneg.exe119⤵PID:6128
-
C:\Windows\SysWOW64\Dccbbhld.exeC:\Windows\system32\Dccbbhld.exe120⤵
- Modifies registry class
PID:5200 -
C:\Windows\SysWOW64\Deanodkh.exeC:\Windows\system32\Deanodkh.exe121⤵PID:5300
-
C:\Windows\SysWOW64\Dhpjkojk.exeC:\Windows\system32\Dhpjkojk.exe122⤵
- Drops file in System32 directory
PID:5436 -
C:\Windows\SysWOW64\Dkoggkjo.exeC:\Windows\system32\Dkoggkjo.exe123⤵PID:5576
-
C:\Windows\SysWOW64\Dceohhja.exeC:\Windows\system32\Dceohhja.exe124⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5640 -
C:\Windows\SysWOW64\Dedkdcie.exeC:\Windows\system32\Dedkdcie.exe125⤵PID:5736
-
C:\Windows\SysWOW64\Dhbgqohi.exeC:\Windows\system32\Dhbgqohi.exe126⤵PID:5884
-
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe127⤵PID:5980
-
C:\Windows\SysWOW64\Eaklidoi.exeC:\Windows\system32\Eaklidoi.exe128⤵PID:6112
-
C:\Windows\SysWOW64\Edihepnm.exeC:\Windows\system32\Edihepnm.exe129⤵PID:5208
-
C:\Windows\SysWOW64\Elppfmoo.exeC:\Windows\system32\Elppfmoo.exe130⤵PID:5364
-
C:\Windows\SysWOW64\Eoolbinc.exeC:\Windows\system32\Eoolbinc.exe131⤵PID:5616
-
C:\Windows\SysWOW64\Eamhodmf.exeC:\Windows\system32\Eamhodmf.exe132⤵
- Drops file in System32 directory
PID:5740 -
C:\Windows\SysWOW64\Edkdkplj.exeC:\Windows\system32\Edkdkplj.exe133⤵PID:5972
-
C:\Windows\SysWOW64\Elbmlmml.exeC:\Windows\system32\Elbmlmml.exe134⤵PID:1868
-
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe135⤵PID:5280
-
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe136⤵PID:5724
-
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe137⤵PID:6084
-
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe138⤵PID:5772
-
C:\Windows\SysWOW64\Ecoangbg.exeC:\Windows\system32\Ecoangbg.exe139⤵PID:5456
-
C:\Windows\SysWOW64\Eemnjbaj.exeC:\Windows\system32\Eemnjbaj.exe140⤵PID:5428
-
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe141⤵PID:6148
-
C:\Windows\SysWOW64\Eadopc32.exeC:\Windows\system32\Eadopc32.exe142⤵
- Drops file in System32 directory
PID:6192 -
C:\Windows\SysWOW64\Edbklofb.exeC:\Windows\system32\Edbklofb.exe143⤵PID:6232
-
C:\Windows\SysWOW64\Fljcmlfd.exeC:\Windows\system32\Fljcmlfd.exe144⤵PID:6280
-
C:\Windows\SysWOW64\Fafkecel.exeC:\Windows\system32\Fafkecel.exe145⤵PID:6332
-
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe146⤵
- Drops file in System32 directory
PID:6368 -
C:\Windows\SysWOW64\Fhqcam32.exeC:\Windows\system32\Fhqcam32.exe147⤵PID:6408
-
C:\Windows\SysWOW64\Fojlngce.exeC:\Windows\system32\Fojlngce.exe148⤵PID:6456
-
C:\Windows\SysWOW64\Ffddka32.exeC:\Windows\system32\Ffddka32.exe149⤵PID:6500
-
C:\Windows\SysWOW64\Fhcpgmjf.exeC:\Windows\system32\Fhcpgmjf.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6544 -
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe151⤵PID:6588
-
C:\Windows\SysWOW64\Fakdpb32.exeC:\Windows\system32\Fakdpb32.exe152⤵PID:6632
-
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe153⤵PID:6676
-
C:\Windows\SysWOW64\Fckajehi.exeC:\Windows\system32\Fckajehi.exe154⤵PID:6720
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe155⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6764 -
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe156⤵PID:6808
-
C:\Windows\SysWOW64\Foabofnn.exeC:\Windows\system32\Foabofnn.exe157⤵PID:6848
-
C:\Windows\SysWOW64\Fbpnkama.exeC:\Windows\system32\Fbpnkama.exe158⤵PID:6892
-
C:\Windows\SysWOW64\Ffkjlp32.exeC:\Windows\system32\Ffkjlp32.exe159⤵PID:6932
-
C:\Windows\SysWOW64\Fhjfhl32.exeC:\Windows\system32\Fhjfhl32.exe160⤵PID:6976
-
C:\Windows\SysWOW64\Gkhbdg32.exeC:\Windows\system32\Gkhbdg32.exe161⤵PID:7016
-
C:\Windows\SysWOW64\Gododflk.exeC:\Windows\system32\Gododflk.exe162⤵
- Drops file in System32 directory
PID:7068 -
C:\Windows\SysWOW64\Gfngap32.exeC:\Windows\system32\Gfngap32.exe163⤵PID:7100
-
C:\Windows\SysWOW64\Ghlcnk32.exeC:\Windows\system32\Ghlcnk32.exe164⤵PID:7152
-
C:\Windows\SysWOW64\Gkkojgao.exeC:\Windows\system32\Gkkojgao.exe165⤵PID:6176
-
C:\Windows\SysWOW64\Gcagkdba.exeC:\Windows\system32\Gcagkdba.exe166⤵PID:6268
-
C:\Windows\SysWOW64\Gfpcgpae.exeC:\Windows\system32\Gfpcgpae.exe167⤵PID:6320
-
C:\Windows\SysWOW64\Ghopckpi.exeC:\Windows\system32\Ghopckpi.exe168⤵PID:6392
-
C:\Windows\SysWOW64\Gohhpe32.exeC:\Windows\system32\Gohhpe32.exe169⤵PID:6452
-
C:\Windows\SysWOW64\Gbgdlq32.exeC:\Windows\system32\Gbgdlq32.exe170⤵PID:6532
-
C:\Windows\SysWOW64\Gkoiefmj.exeC:\Windows\system32\Gkoiefmj.exe171⤵PID:6608
-
C:\Windows\SysWOW64\Gbiaapdf.exeC:\Windows\system32\Gbiaapdf.exe172⤵PID:6660
-
C:\Windows\SysWOW64\Gicinj32.exeC:\Windows\system32\Gicinj32.exe173⤵PID:6744
-
C:\Windows\SysWOW64\Gkaejf32.exeC:\Windows\system32\Gkaejf32.exe174⤵PID:6836
-
C:\Windows\SysWOW64\Gblngpbd.exeC:\Windows\system32\Gblngpbd.exe175⤵PID:6920
-
C:\Windows\SysWOW64\Gfgjgo32.exeC:\Windows\system32\Gfgjgo32.exe176⤵PID:6968
-
C:\Windows\SysWOW64\Hiefcj32.exeC:\Windows\system32\Hiefcj32.exe177⤵PID:7040
-
C:\Windows\SysWOW64\Hkdbpe32.exeC:\Windows\system32\Hkdbpe32.exe178⤵
- Drops file in System32 directory
PID:7108 -
C:\Windows\SysWOW64\Hfifmnij.exeC:\Windows\system32\Hfifmnij.exe179⤵
- Drops file in System32 directory
PID:6184 -
C:\Windows\SysWOW64\Hihbijhn.exeC:\Windows\system32\Hihbijhn.exe180⤵PID:6256
-
C:\Windows\SysWOW64\Hobkfd32.exeC:\Windows\system32\Hobkfd32.exe181⤵PID:6396
-
C:\Windows\SysWOW64\Hbpgbo32.exeC:\Windows\system32\Hbpgbo32.exe182⤵PID:6512
-
C:\Windows\SysWOW64\Heocnk32.exeC:\Windows\system32\Heocnk32.exe183⤵PID:6620
-
C:\Windows\SysWOW64\Hmfkoh32.exeC:\Windows\system32\Hmfkoh32.exe184⤵PID:6728
-
C:\Windows\SysWOW64\Hodgkc32.exeC:\Windows\system32\Hodgkc32.exe185⤵PID:6868
-
C:\Windows\SysWOW64\Hkkhqd32.exeC:\Windows\system32\Hkkhqd32.exe186⤵PID:6984
-
C:\Windows\SysWOW64\Hbeqmoji.exeC:\Windows\system32\Hbeqmoji.exe187⤵PID:7088
-
C:\Windows\SysWOW64\Hecmijim.exeC:\Windows\system32\Hecmijim.exe188⤵PID:6156
-
C:\Windows\SysWOW64\Hmjdjgjo.exeC:\Windows\system32\Hmjdjgjo.exe189⤵PID:6364
-
C:\Windows\SysWOW64\Hcdmga32.exeC:\Windows\system32\Hcdmga32.exe190⤵PID:6540
-
C:\Windows\SysWOW64\Iefioj32.exeC:\Windows\system32\Iefioj32.exe191⤵PID:6708
-
C:\Windows\SysWOW64\Immapg32.exeC:\Windows\system32\Immapg32.exe192⤵
- Drops file in System32 directory
PID:6988 -
C:\Windows\SysWOW64\Icgjmapi.exeC:\Windows\system32\Icgjmapi.exe193⤵PID:7140
-
C:\Windows\SysWOW64\Ifefimom.exeC:\Windows\system32\Ifefimom.exe194⤵PID:6240
-
C:\Windows\SysWOW64\Imoneg32.exeC:\Windows\system32\Imoneg32.exe195⤵
- Drops file in System32 directory
PID:6844 -
C:\Windows\SysWOW64\Icifbang.exeC:\Windows\system32\Icifbang.exe196⤵PID:4852
-
C:\Windows\SysWOW64\Ifgbnlmj.exeC:\Windows\system32\Ifgbnlmj.exe197⤵PID:6712
-
C:\Windows\SysWOW64\Iejcji32.exeC:\Windows\system32\Iejcji32.exe198⤵PID:6696
-
C:\Windows\SysWOW64\Imakkfdg.exeC:\Windows\system32\Imakkfdg.exe199⤵PID:6596
-
C:\Windows\SysWOW64\Ippggbck.exeC:\Windows\system32\Ippggbck.exe200⤵PID:7208
-
C:\Windows\SysWOW64\Ibnccmbo.exeC:\Windows\system32\Ibnccmbo.exe201⤵PID:7248
-
C:\Windows\SysWOW64\Ifjodl32.exeC:\Windows\system32\Ifjodl32.exe202⤵PID:7292
-
C:\Windows\SysWOW64\Iihkpg32.exeC:\Windows\system32\Iihkpg32.exe203⤵PID:7328
-
C:\Windows\SysWOW64\Ilghlc32.exeC:\Windows\system32\Ilghlc32.exe204⤵PID:7376
-
C:\Windows\SysWOW64\Icnpmp32.exeC:\Windows\system32\Icnpmp32.exe205⤵PID:7412
-
C:\Windows\SysWOW64\Ifllil32.exeC:\Windows\system32\Ifllil32.exe206⤵PID:7456
-
C:\Windows\SysWOW64\Ieolehop.exeC:\Windows\system32\Ieolehop.exe207⤵PID:7500
-
C:\Windows\SysWOW64\Imfdff32.exeC:\Windows\system32\Imfdff32.exe208⤵PID:7540
-
C:\Windows\SysWOW64\Ipdqba32.exeC:\Windows\system32\Ipdqba32.exe209⤵PID:7580
-
C:\Windows\SysWOW64\Ibcmom32.exeC:\Windows\system32\Ibcmom32.exe210⤵PID:7624
-
C:\Windows\SysWOW64\Jeaikh32.exeC:\Windows\system32\Jeaikh32.exe211⤵PID:7668
-
C:\Windows\SysWOW64\Jmhale32.exeC:\Windows\system32\Jmhale32.exe212⤵PID:7704
-
C:\Windows\SysWOW64\Jpgmha32.exeC:\Windows\system32\Jpgmha32.exe213⤵PID:7748
-
C:\Windows\SysWOW64\Jbeidl32.exeC:\Windows\system32\Jbeidl32.exe214⤵
- Modifies registry class
PID:7800 -
C:\Windows\SysWOW64\Jedeph32.exeC:\Windows\system32\Jedeph32.exe215⤵PID:7852
-
C:\Windows\SysWOW64\Jmknaell.exeC:\Windows\system32\Jmknaell.exe216⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7912 -
C:\Windows\SysWOW64\Jbhfjljd.exeC:\Windows\system32\Jbhfjljd.exe217⤵PID:7968
-
C:\Windows\SysWOW64\Jmmjgejj.exeC:\Windows\system32\Jmmjgejj.exe218⤵PID:8028
-
C:\Windows\SysWOW64\Jcgbco32.exeC:\Windows\system32\Jcgbco32.exe219⤵PID:8092
-
C:\Windows\SysWOW64\Jehokgge.exeC:\Windows\system32\Jehokgge.exe220⤵PID:8148
-
C:\Windows\SysWOW64\Jmpgldhg.exeC:\Windows\system32\Jmpgldhg.exe221⤵PID:6288
-
C:\Windows\SysWOW64\Jcioiood.exeC:\Windows\system32\Jcioiood.exe222⤵PID:7300
-
C:\Windows\SysWOW64\Jblpek32.exeC:\Windows\system32\Jblpek32.exe223⤵PID:7364
-
C:\Windows\SysWOW64\Jeklag32.exeC:\Windows\system32\Jeklag32.exe224⤵PID:7452
-
C:\Windows\SysWOW64\Jmbdbd32.exeC:\Windows\system32\Jmbdbd32.exe225⤵
- Drops file in System32 directory
PID:7524 -
C:\Windows\SysWOW64\Jpppnp32.exeC:\Windows\system32\Jpppnp32.exe226⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7568 -
C:\Windows\SysWOW64\Kboljk32.exeC:\Windows\system32\Kboljk32.exe227⤵PID:7644
-
C:\Windows\SysWOW64\Kiidgeki.exeC:\Windows\system32\Kiidgeki.exe228⤵PID:6488
-
C:\Windows\SysWOW64\Klgqcqkl.exeC:\Windows\system32\Klgqcqkl.exe229⤵
- Drops file in System32 directory
PID:7772 -
C:\Windows\SysWOW64\Kbaipkbi.exeC:\Windows\system32\Kbaipkbi.exe230⤵PID:7844
-
C:\Windows\SysWOW64\Kikame32.exeC:\Windows\system32\Kikame32.exe231⤵PID:7952
-
C:\Windows\SysWOW64\Klimip32.exeC:\Windows\system32\Klimip32.exe232⤵PID:8072
-
C:\Windows\SysWOW64\Kdqejn32.exeC:\Windows\system32\Kdqejn32.exe233⤵PID:8176
-
C:\Windows\SysWOW64\Kebbafoj.exeC:\Windows\system32\Kebbafoj.exe234⤵PID:7240
-
C:\Windows\SysWOW64\Kmijbcpl.exeC:\Windows\system32\Kmijbcpl.exe235⤵PID:7396
-
C:\Windows\SysWOW64\Kpgfooop.exeC:\Windows\system32\Kpgfooop.exe236⤵PID:7532
-
C:\Windows\SysWOW64\Kfankifm.exeC:\Windows\system32\Kfankifm.exe237⤵PID:7652
-
C:\Windows\SysWOW64\Kipkhdeq.exeC:\Windows\system32\Kipkhdeq.exe238⤵PID:7764
-
C:\Windows\SysWOW64\Klngdpdd.exeC:\Windows\system32\Klngdpdd.exe239⤵
- Modifies registry class
PID:7808 -
C:\Windows\SysWOW64\Kdeoemeg.exeC:\Windows\system32\Kdeoemeg.exe240⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7940 -
C:\Windows\SysWOW64\Kfckahdj.exeC:\Windows\system32\Kfckahdj.exe241⤵
- Drops file in System32 directory
PID:8024 -