Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 04:19
Behavioral task
behavioral1
Sample
2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe
-
Size
669KB
-
MD5
2c7a52992f7b4c97c040749d92bb00e0
-
SHA1
0c7cb61f7cbc9c964b8d9a3d4d4560a05504d21a
-
SHA256
f53a2551a81b51e0bea007e9bcb6051c34b28650175eafd320cf7671318d4781
-
SHA512
37c599d80b3b69183b161e2720720c7a28f57640715703b808d4cba28f5f737c7c3eac0cc2b8d4f15a0d626db5c1411cf4dd5f3f85576a91afacb96abb52dddb
-
SSDEEP
12288:zhjIeVKhMpQnqr+cI3a72LXrY6x46UbR/qYglMi:zhjzchMpQnqrdX72LbY6x46uR/qYglMi
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Efpomccg.exeNpedmdab.exeAgbkmijg.exeAjpqnneo.exeFideeaco.exePmcclm32.exeAekddhcb.exeKkkdan32.exeGkiaej32.exeLqbncb32.exeAbbpem32.exeHifcgion.exeHpqldc32.exeHhiajmod.exeQeodhjmo.exeDnmhpg32.exePqbdjfln.exeEbimgcfi.exePaeelgnj.exeJkmgblok.exePahpfc32.exePecellgl.exeMfqlfb32.exeGeaepk32.exeDcogje32.exeLejgch32.exeAnogiicl.exeLmmolepp.exeHemdlj32.exeMnlfigcc.exeNjogjfoj.exeOdmbaj32.exePclneicb.exeGcagkdba.exeFoghnabl.exeQikgco32.exeAleckinj.exePhodcg32.exeCikglnkj.exeNlnkmnah.exeJgkmgk32.exeLjqhkckn.exeGdaociml.exeNcihikcg.exeGgilil32.exeJglklggl.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efpomccg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Npedmdab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Agbkmijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajpqnneo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fideeaco.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmcclm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aekddhcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkkdan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gkiaej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqbncb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abbpem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hifcgion.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhiajmod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qeodhjmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnmhpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pqbdjfln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebimgcfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Paeelgnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkmgblok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pahpfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pecellgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfqlfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Geaepk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcogje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lejgch32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anogiicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmmolepp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hemdlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mnlfigcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njogjfoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odmbaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pclneicb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gcagkdba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Foghnabl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qikgco32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aleckinj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phodcg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cikglnkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nlnkmnah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgkmgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ljqhkckn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gdaociml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ggilil32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jglklggl.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Ifmcdblq.exe family_berbew C:\Windows\SysWOW64\Iabgaklg.exe family_berbew C:\Windows\SysWOW64\Jiphkm32.exe family_berbew C:\Windows\SysWOW64\Jmnaakne.exe family_berbew C:\Windows\SysWOW64\Jdhine32.exe family_berbew C:\Windows\SysWOW64\Jpojcf32.exe family_berbew C:\Windows\SysWOW64\Jbocea32.exe family_berbew C:\Windows\SysWOW64\Kpccnefa.exe family_berbew C:\Windows\SysWOW64\Kmgdgjek.exe family_berbew C:\Windows\SysWOW64\Kkkdan32.exe family_berbew C:\Windows\SysWOW64\Kdcijcke.exe family_berbew C:\Windows\SysWOW64\Kpjjod32.exe family_berbew C:\Windows\SysWOW64\Kcifkp32.exe family_berbew C:\Windows\SysWOW64\Kgfoan32.exe family_berbew C:\Windows\SysWOW64\Lalcng32.exe family_berbew C:\Windows\SysWOW64\Lgikfn32.exe family_berbew C:\Windows\SysWOW64\Lpcmec32.exe family_berbew C:\Windows\SysWOW64\Lijdhiaa.exe family_berbew C:\Windows\SysWOW64\Lkiqbl32.exe family_berbew C:\Windows\SysWOW64\Laciofpa.exe family_berbew C:\Windows\SysWOW64\Lcdegnep.exe family_berbew C:\Windows\SysWOW64\Lklnhlfb.exe family_berbew C:\Windows\SysWOW64\Mkpgck32.exe family_berbew C:\Windows\SysWOW64\Majopeii.exe family_berbew C:\Windows\SysWOW64\Ocegdjij.exe family_berbew C:\Windows\SysWOW64\Odednmpm.exe family_berbew C:\Windows\SysWOW64\Onmhgb32.exe family_berbew C:\Windows\SysWOW64\Mgghhlhq.exe family_berbew C:\Windows\SysWOW64\Mdiklqhm.exe family_berbew C:\Windows\SysWOW64\Mnocof32.exe family_berbew C:\Windows\SysWOW64\Mciobn32.exe family_berbew C:\Windows\SysWOW64\Mpkbebbf.exe family_berbew C:\Windows\SysWOW64\Mnlfigcc.exe family_berbew C:\Windows\SysWOW64\Lknjmkdo.exe family_berbew C:\Windows\SysWOW64\Lcgblncm.exe family_berbew C:\Windows\SysWOW64\Pcagphom.exe family_berbew C:\Windows\SysWOW64\Ahoimd32.exe family_berbew C:\Windows\SysWOW64\Bjpaooda.exe family_berbew C:\Windows\SysWOW64\Blfdia32.exe family_berbew C:\Windows\SysWOW64\Cliaoq32.exe family_berbew C:\Windows\SysWOW64\Clnjjpod.exe family_berbew C:\Windows\SysWOW64\Chdkoa32.exe family_berbew C:\Windows\SysWOW64\Chghdqbf.exe family_berbew C:\Windows\SysWOW64\Dhkapp32.exe family_berbew C:\Windows\SysWOW64\Dllfkn32.exe family_berbew C:\Windows\SysWOW64\Ekjfcipa.exe family_berbew C:\Windows\SysWOW64\Fllpbldb.exe family_berbew C:\Windows\SysWOW64\Fkalchij.exe family_berbew C:\Windows\SysWOW64\Glebhjlg.exe family_berbew C:\Windows\SysWOW64\Ghaliknf.exe family_berbew C:\Windows\SysWOW64\Hopnqdan.exe family_berbew C:\Windows\SysWOW64\Hmfkoh32.exe family_berbew C:\Windows\SysWOW64\Icifbang.exe family_berbew C:\Windows\SysWOW64\Ilghlc32.exe family_berbew C:\Windows\SysWOW64\Jedeph32.exe family_berbew C:\Windows\SysWOW64\Jifhaenk.exe family_berbew C:\Windows\SysWOW64\Lffhfh32.exe family_berbew C:\Windows\SysWOW64\Lboeaifi.exe family_berbew C:\Windows\SysWOW64\Lpcfkm32.exe family_berbew C:\Windows\SysWOW64\Mdehlk32.exe family_berbew C:\Windows\SysWOW64\Ngpccdlj.exe family_berbew C:\Windows\SysWOW64\Ngbpidjh.exe family_berbew C:\Windows\SysWOW64\Nckndeni.exe family_berbew C:\Windows\SysWOW64\Oponmilc.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Ifmcdblq.exeIabgaklg.exeJiphkm32.exeJmnaakne.exeJdhine32.exeJpojcf32.exeJbocea32.exeKpccnefa.exeKmgdgjek.exeKkkdan32.exeKdcijcke.exeKpjjod32.exeKcifkp32.exeKgfoan32.exeLalcng32.exeLgikfn32.exeLijdhiaa.exeLpcmec32.exeLkiqbl32.exeLaciofpa.exeLcdegnep.exeLklnhlfb.exeLcgblncm.exeLknjmkdo.exeMnlfigcc.exeMpkbebbf.exeMciobn32.exeMkpgck32.exeMnocof32.exeMajopeii.exeMdiklqhm.exeMgghhlhq.exeMnapdf32.exeMamleegg.exeMdkhapfj.exeMgidml32.exeMkepnjng.exeMaohkd32.exeMpaifalo.exeMcpebmkb.exeMkgmcjld.exeMnfipekh.exeMpdelajl.exeMcbahlip.exeNkjjij32.exeNnhfee32.exeNqfbaq32.exeNceonl32.exeNjogjfoj.exeNqiogp32.exeNcgkcl32.exeNkncdifl.exeNnmopdep.exeNqklmpdd.exeNcihikcg.exeNkqpjidj.exeNbkhfc32.exeNdidbn32.exeNnaikd32.exeOndeac32.exeOnholckc.exeOqgkhnjf.exeOcegdjij.exeOjopad32.exepid process 1204 Ifmcdblq.exe 3684 Iabgaklg.exe 4568 Jiphkm32.exe 3452 Jmnaakne.exe 5024 Jdhine32.exe 3704 Jpojcf32.exe 540 Jbocea32.exe 2796 Kpccnefa.exe 1496 Kmgdgjek.exe 2032 Kkkdan32.exe 4828 Kdcijcke.exe 2980 Kpjjod32.exe 4612 Kcifkp32.exe 3932 Kgfoan32.exe 4316 Lalcng32.exe 408 Lgikfn32.exe 964 Lijdhiaa.exe 4408 Lpcmec32.exe 1272 Lkiqbl32.exe 3692 Laciofpa.exe 4560 Lcdegnep.exe 4204 Lklnhlfb.exe 3552 Lcgblncm.exe 1796 Lknjmkdo.exe 688 Mnlfigcc.exe 2768 Mpkbebbf.exe 4724 Mciobn32.exe 884 Mkpgck32.exe 1404 Mnocof32.exe 2880 Majopeii.exe 3220 Mdiklqhm.exe 3056 Mgghhlhq.exe 1344 Mnapdf32.exe 1576 Mamleegg.exe 4288 Mdkhapfj.exe 3788 Mgidml32.exe 1580 Mkepnjng.exe 536 Maohkd32.exe 3288 Mpaifalo.exe 624 Mcpebmkb.exe 2200 Mkgmcjld.exe 3948 Mnfipekh.exe 2208 Mpdelajl.exe 2040 Mcbahlip.exe 4032 Nkjjij32.exe 864 Nnhfee32.exe 4652 Nqfbaq32.exe 2076 Nceonl32.exe 2284 Njogjfoj.exe 3224 Nqiogp32.exe 2852 Ncgkcl32.exe 2276 Nkncdifl.exe 2396 Nnmopdep.exe 1712 Nqklmpdd.exe 5068 Ncihikcg.exe 2908 Nkqpjidj.exe 452 Nbkhfc32.exe 4472 Ndidbn32.exe 3696 Nnaikd32.exe 4200 Ondeac32.exe 5096 Onholckc.exe 4064 Oqgkhnjf.exe 1428 Ocegdjij.exe 1152 Ojopad32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Jpgmha32.exeLigqhc32.exeGkhkjd32.exeQmepam32.exeQlgpod32.exeMekgdl32.exeMgkjhe32.exeBlfdia32.exeLboeaifi.exeOgmijllo.exeBkkple32.exeQmhlgmmm.exeKpjjod32.exeCefoce32.exeDekhneap.exeHgmgqc32.exeHbjoeojc.exeIbcaknbi.exeNdidbn32.exeAdgbpc32.exeIckglm32.exeMbighjdd.exeOdmbaj32.exeIlnbicff.exeNcianepl.exeMjjkaabc.exeEolpmi32.exeIkfabm32.exeAmjillkj.exeChdkoa32.exeHbpgbo32.exeBagflcje.exeOmcjep32.exeFikbocki.exeDooaoj32.exeAjbmdn32.exeAobilkcl.exeJghpbk32.exeCgjjdf32.exeCpeohh32.exeQlggjk32.exeCoknoaic.exeFfobhg32.exeEfjbcakl.exeJgadgf32.exeKghjhemo.exeDjqblj32.exeHpofii32.exeClnjjpod.exeLfhdlh32.exeQddfkd32.exeBmofagfp.exePqbdjfln.exeBfbaonae.exedescription ioc process File created C:\Windows\SysWOW64\Jiopcppf.dll Jpgmha32.exe File created C:\Windows\SysWOW64\Oaeokj32.dll Ligqhc32.exe File created C:\Windows\SysWOW64\Adnipccc.dll Gkhkjd32.exe File opened for modification C:\Windows\SysWOW64\Qemhbj32.exe Qmepam32.exe File created C:\Windows\SysWOW64\Mjknojbk.dll Qlgpod32.exe File created C:\Windows\SysWOW64\Fkaokcqj.dll File opened for modification C:\Windows\SysWOW64\Mpqkad32.exe Mekgdl32.exe File created C:\Windows\SysWOW64\Lemphdgj.dll Mgkjhe32.exe File created C:\Windows\SysWOW64\Ibcjqgnm.exe File opened for modification C:\Windows\SysWOW64\Ceoibflm.exe Blfdia32.exe File opened for modification C:\Windows\SysWOW64\Lpcfkm32.exe Lboeaifi.exe File created C:\Windows\SysWOW64\Oileggkb.exe Ogmijllo.exe File opened for modification C:\Windows\SysWOW64\Bbdhiojo.exe Bkkple32.exe File opened for modification C:\Windows\SysWOW64\Qeodhjmo.exe Qmhlgmmm.exe File opened for modification C:\Windows\SysWOW64\Kcifkp32.exe Kpjjod32.exe File created C:\Windows\SysWOW64\Chdkoa32.exe Cefoce32.exe File created C:\Windows\SysWOW64\Dldpkoil.exe Dekhneap.exe File opened for modification C:\Windows\SysWOW64\Hildmn32.exe Hgmgqc32.exe File created C:\Windows\SysWOW64\Hehkajig.exe Hbjoeojc.exe File created C:\Windows\SysWOW64\Iebngial.exe Ibcaknbi.exe File created C:\Windows\SysWOW64\Aaiapmca.dll Ndidbn32.exe File created C:\Windows\SysWOW64\Ghekgcil.dll Adgbpc32.exe File created C:\Windows\SysWOW64\Nokpod32.dll Ickglm32.exe File created C:\Windows\SysWOW64\Pfagighf.exe File created C:\Windows\SysWOW64\Mehcdfch.exe Mbighjdd.exe File created C:\Windows\SysWOW64\Keldkigj.dll Odmbaj32.exe File created C:\Windows\SysWOW64\Cfidbo32.dll Ilnbicff.exe File created C:\Windows\SysWOW64\Njciko32.exe Ncianepl.exe File opened for modification C:\Windows\SysWOW64\Mogcihaj.exe Mjjkaabc.exe File opened for modification C:\Windows\SysWOW64\Nqcejcha.exe File opened for modification C:\Windows\SysWOW64\Edihepnm.exe Eolpmi32.exe File created C:\Windows\SysWOW64\Kkqdpn32.dll Ikfabm32.exe File opened for modification C:\Windows\SysWOW64\Addaif32.exe Amjillkj.exe File opened for modification C:\Windows\SysWOW64\Baegibae.exe File opened for modification C:\Windows\SysWOW64\Mfbaalbi.exe File created C:\Windows\SysWOW64\Oapgek32.dll Chdkoa32.exe File created C:\Windows\SysWOW64\Nekfmb32.dll Hbpgbo32.exe File created C:\Windows\SysWOW64\Glbandkm.dll Bagflcje.exe File created C:\Windows\SysWOW64\Odmbaj32.exe Omcjep32.exe File opened for modification C:\Windows\SysWOW64\Hajkqfoe.exe File created C:\Windows\SysWOW64\Kolkod32.dll Fikbocki.exe File opened for modification C:\Windows\SysWOW64\Dfiildio.exe Dooaoj32.exe File opened for modification C:\Windows\SysWOW64\Aanbhp32.exe Ajbmdn32.exe File opened for modification C:\Windows\SysWOW64\Aijnep32.exe Aobilkcl.exe File created C:\Windows\SysWOW64\Lpefcn32.dll Jghpbk32.exe File created C:\Windows\SysWOW64\Gngeik32.exe File created C:\Windows\SysWOW64\Cikglnkj.exe Cgjjdf32.exe File created C:\Windows\SysWOW64\Cimcan32.exe Cpeohh32.exe File opened for modification C:\Windows\SysWOW64\Qofcff32.exe Qlggjk32.exe File created C:\Windows\SysWOW64\Djqblj32.exe Coknoaic.exe File created C:\Windows\SysWOW64\Dlqjei32.dll Ffobhg32.exe File opened for modification C:\Windows\SysWOW64\Fihnomjp.exe Efjbcakl.exe File opened for modification C:\Windows\SysWOW64\Haodle32.exe File created C:\Windows\SysWOW64\Iejpiq32.dll Aobilkcl.exe File created C:\Windows\SysWOW64\Ndlapjeg.dll Jgadgf32.exe File created C:\Windows\SysWOW64\Ophpeg32.dll Kghjhemo.exe File created C:\Windows\SysWOW64\Khacqh32.dll Djqblj32.exe File opened for modification C:\Windows\SysWOW64\Hdjbiheb.exe Hpofii32.exe File opened for modification C:\Windows\SysWOW64\Cefoce32.exe Clnjjpod.exe File opened for modification C:\Windows\SysWOW64\Ligqhc32.exe Lfhdlh32.exe File created C:\Windows\SysWOW64\Ajanck32.exe Qddfkd32.exe File opened for modification C:\Windows\SysWOW64\Bblnindg.exe Bmofagfp.exe File created C:\Windows\SysWOW64\Pgllfp32.exe Pqbdjfln.exe File created C:\Windows\SysWOW64\Bmlilh32.exe Bfbaonae.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 12600 13232 -
Modifies registry class 64 IoCs
Processes:
Mnocof32.exeMdehlk32.exeEifhdd32.exePhonha32.exeBfdodjhm.exeIfbbig32.exeIfleoe32.exeGempgj32.exeFknbil32.exeJgnqgqan.exeDfiildio.exeFfnknafg.exePkjlge32.exeJcioiood.exeKdeoemeg.exeNcbknfed.exeFikbocki.exeOdednmpm.exeCjbpaf32.exeKlkcdj32.exePemomqcn.exeEcbjkngo.exeJllokajf.exeKdmqmc32.exeDpdaepai.exeEofgpikj.exeNnhfee32.exeLpnlpnih.exePgkelj32.exeIfefimom.exeLllcen32.exeIijaka32.exeDjdflp32.exeEiobceef.exeAmjillkj.exeHmfkoh32.exeOfeilobp.exeEpmmqheb.exePjeoglgc.exeNpgabc32.exeOhghgodi.exeIckglm32.exeOaplqh32.exeAhkobekf.exeBhikcb32.exeInbqhhfj.exeMpdelajl.exeGhniielm.exeGhaliknf.exeAomifecf.exeAlelqb32.exeGmfplibd.exePqmjog32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mnocof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mdehlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eifhdd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Phonha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpnnia32.dll" Bfdodjhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkioig32.dll" Ifbbig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjhked32.dll" Ifleoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gempgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fknbil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jgnqgqan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfiildio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baaelkfn.dll" Ffnknafg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pkjlge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jcioiood.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhgaocmg.dll" Kdeoemeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ncbknfed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fikbocki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeeobqbq.dll" Dfiildio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odednmpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cjbpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Klkcdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pemomqcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ecbjkngo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibcbfe32.dll" Jllokajf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlhbih32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbnimm32.dll" Kdmqmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpdaepai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fqehjpfj.dll" Eofgpikj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnhfee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpnlpnih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abgiapmj.dll" Pgkelj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipdejo32.dll" Ifefimom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikkokgea.dll" Lllcen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iijaka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dikhjofo.dll" Djdflp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eiobceef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Amjillkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npckna32.dll" Nnhfee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hmfkoh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofeilobp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Epmmqheb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oomibind.dll" Pjeoglgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Npgabc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebkibb32.dll" Ohghgodi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ickglm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkfoeejd.dll" Oaplqh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eegdfm32.dll" Ahkobekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhikcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eignmpke.dll" Inbqhhfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lelgbkio.dll" Mpdelajl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ghniielm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ghaliknf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aomifecf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Alelqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gmfplibd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pqmjog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkfefigf.dll" -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exeIfmcdblq.exeIabgaklg.exeJiphkm32.exeJmnaakne.exeJdhine32.exeJpojcf32.exeJbocea32.exeKpccnefa.exeKmgdgjek.exeKkkdan32.exeKdcijcke.exeKpjjod32.exeKcifkp32.exeKgfoan32.exeLalcng32.exeLgikfn32.exeLijdhiaa.exeLpcmec32.exeLkiqbl32.exeLaciofpa.exeLcdegnep.exedescription pid process target process PID 1888 wrote to memory of 1204 1888 2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe Ifmcdblq.exe PID 1888 wrote to memory of 1204 1888 2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe Ifmcdblq.exe PID 1888 wrote to memory of 1204 1888 2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe Ifmcdblq.exe PID 1204 wrote to memory of 3684 1204 Ifmcdblq.exe Iabgaklg.exe PID 1204 wrote to memory of 3684 1204 Ifmcdblq.exe Iabgaklg.exe PID 1204 wrote to memory of 3684 1204 Ifmcdblq.exe Iabgaklg.exe PID 3684 wrote to memory of 4568 3684 Iabgaklg.exe Jiphkm32.exe PID 3684 wrote to memory of 4568 3684 Iabgaklg.exe Jiphkm32.exe PID 3684 wrote to memory of 4568 3684 Iabgaklg.exe Jiphkm32.exe PID 4568 wrote to memory of 3452 4568 Jiphkm32.exe Jmnaakne.exe PID 4568 wrote to memory of 3452 4568 Jiphkm32.exe Jmnaakne.exe PID 4568 wrote to memory of 3452 4568 Jiphkm32.exe Jmnaakne.exe PID 3452 wrote to memory of 5024 3452 Jmnaakne.exe Jdhine32.exe PID 3452 wrote to memory of 5024 3452 Jmnaakne.exe Jdhine32.exe PID 3452 wrote to memory of 5024 3452 Jmnaakne.exe Jdhine32.exe PID 5024 wrote to memory of 3704 5024 Jdhine32.exe Jpojcf32.exe PID 5024 wrote to memory of 3704 5024 Jdhine32.exe Jpojcf32.exe PID 5024 wrote to memory of 3704 5024 Jdhine32.exe Jpojcf32.exe PID 3704 wrote to memory of 540 3704 Jpojcf32.exe Jbocea32.exe PID 3704 wrote to memory of 540 3704 Jpojcf32.exe Jbocea32.exe PID 3704 wrote to memory of 540 3704 Jpojcf32.exe Jbocea32.exe PID 540 wrote to memory of 2796 540 Jbocea32.exe Kpccnefa.exe PID 540 wrote to memory of 2796 540 Jbocea32.exe Kpccnefa.exe PID 540 wrote to memory of 2796 540 Jbocea32.exe Kpccnefa.exe PID 2796 wrote to memory of 1496 2796 Kpccnefa.exe Kmgdgjek.exe PID 2796 wrote to memory of 1496 2796 Kpccnefa.exe Kmgdgjek.exe PID 2796 wrote to memory of 1496 2796 Kpccnefa.exe Kmgdgjek.exe PID 1496 wrote to memory of 2032 1496 Kmgdgjek.exe Kkkdan32.exe PID 1496 wrote to memory of 2032 1496 Kmgdgjek.exe Kkkdan32.exe PID 1496 wrote to memory of 2032 1496 Kmgdgjek.exe Kkkdan32.exe PID 2032 wrote to memory of 4828 2032 Kkkdan32.exe Kdcijcke.exe PID 2032 wrote to memory of 4828 2032 Kkkdan32.exe Kdcijcke.exe PID 2032 wrote to memory of 4828 2032 Kkkdan32.exe Kdcijcke.exe PID 4828 wrote to memory of 2980 4828 Kdcijcke.exe Kpjjod32.exe PID 4828 wrote to memory of 2980 4828 Kdcijcke.exe Kpjjod32.exe PID 4828 wrote to memory of 2980 4828 Kdcijcke.exe Kpjjod32.exe PID 2980 wrote to memory of 4612 2980 Kpjjod32.exe Kcifkp32.exe PID 2980 wrote to memory of 4612 2980 Kpjjod32.exe Kcifkp32.exe PID 2980 wrote to memory of 4612 2980 Kpjjod32.exe Kcifkp32.exe PID 4612 wrote to memory of 3932 4612 Kcifkp32.exe Kgfoan32.exe PID 4612 wrote to memory of 3932 4612 Kcifkp32.exe Kgfoan32.exe PID 4612 wrote to memory of 3932 4612 Kcifkp32.exe Kgfoan32.exe PID 3932 wrote to memory of 4316 3932 Kgfoan32.exe Lalcng32.exe PID 3932 wrote to memory of 4316 3932 Kgfoan32.exe Lalcng32.exe PID 3932 wrote to memory of 4316 3932 Kgfoan32.exe Lalcng32.exe PID 4316 wrote to memory of 408 4316 Lalcng32.exe Lgikfn32.exe PID 4316 wrote to memory of 408 4316 Lalcng32.exe Lgikfn32.exe PID 4316 wrote to memory of 408 4316 Lalcng32.exe Lgikfn32.exe PID 408 wrote to memory of 964 408 Lgikfn32.exe Lijdhiaa.exe PID 408 wrote to memory of 964 408 Lgikfn32.exe Lijdhiaa.exe PID 408 wrote to memory of 964 408 Lgikfn32.exe Lijdhiaa.exe PID 964 wrote to memory of 4408 964 Lijdhiaa.exe Lpcmec32.exe PID 964 wrote to memory of 4408 964 Lijdhiaa.exe Lpcmec32.exe PID 964 wrote to memory of 4408 964 Lijdhiaa.exe Lpcmec32.exe PID 4408 wrote to memory of 1272 4408 Lpcmec32.exe Lkiqbl32.exe PID 4408 wrote to memory of 1272 4408 Lpcmec32.exe Lkiqbl32.exe PID 4408 wrote to memory of 1272 4408 Lpcmec32.exe Lkiqbl32.exe PID 1272 wrote to memory of 3692 1272 Lkiqbl32.exe Laciofpa.exe PID 1272 wrote to memory of 3692 1272 Lkiqbl32.exe Laciofpa.exe PID 1272 wrote to memory of 3692 1272 Lkiqbl32.exe Laciofpa.exe PID 3692 wrote to memory of 4560 3692 Laciofpa.exe Lcdegnep.exe PID 3692 wrote to memory of 4560 3692 Laciofpa.exe Lcdegnep.exe PID 3692 wrote to memory of 4560 3692 Laciofpa.exe Lcdegnep.exe PID 4560 wrote to memory of 4204 4560 Lcdegnep.exe Lklnhlfb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2c7a52992f7b4c97c040749d92bb00e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\Iabgaklg.exeC:\Windows\system32\Iabgaklg.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\Jiphkm32.exeC:\Windows\system32\Jiphkm32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\Jmnaakne.exeC:\Windows\system32\Jmnaakne.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\Jdhine32.exeC:\Windows\system32\Jdhine32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\Jpojcf32.exeC:\Windows\system32\Jpojcf32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\Kpccnefa.exeC:\Windows\system32\Kpccnefa.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Kmgdgjek.exeC:\Windows\system32\Kmgdgjek.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\Kkkdan32.exeC:\Windows\system32\Kkkdan32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Kcifkp32.exeC:\Windows\system32\Kcifkp32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\Kgfoan32.exeC:\Windows\system32\Kgfoan32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\Lalcng32.exeC:\Windows\system32\Lalcng32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Laciofpa.exeC:\Windows\system32\Laciofpa.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe23⤵
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe24⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe25⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:688 -
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe27⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe28⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe29⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:1404 -
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe31⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe32⤵
- Executes dropped EXE
PID:3220 -
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe33⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe34⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe35⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe36⤵
- Executes dropped EXE
PID:4288 -
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe37⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe38⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe39⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe40⤵
- Executes dropped EXE
PID:3288 -
C:\Windows\SysWOW64\Mcpebmkb.exeC:\Windows\system32\Mcpebmkb.exe41⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe42⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\Mnfipekh.exeC:\Windows\system32\Mnfipekh.exe43⤵
- Executes dropped EXE
PID:3948 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe45⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe46⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:864 -
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe48⤵
- Executes dropped EXE
PID:4652 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe49⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe51⤵
- Executes dropped EXE
PID:3224 -
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe52⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe53⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe54⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe55⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe57⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe58⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4472 -
C:\Windows\SysWOW64\Nnaikd32.exeC:\Windows\system32\Nnaikd32.exe60⤵
- Executes dropped EXE
PID:3696 -
C:\Windows\SysWOW64\Ondeac32.exeC:\Windows\system32\Ondeac32.exe61⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\Onholckc.exeC:\Windows\system32\Onholckc.exe62⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\Oqgkhnjf.exeC:\Windows\system32\Oqgkhnjf.exe63⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\Ocegdjij.exeC:\Windows\system32\Ocegdjij.exe64⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Ojopad32.exeC:\Windows\system32\Ojopad32.exe65⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Odednmpm.exeC:\Windows\system32\Odednmpm.exe66⤵
- Modifies registry class
PID:3416 -
C:\Windows\SysWOW64\Onmhgb32.exeC:\Windows\system32\Onmhgb32.exe67⤵PID:4344
-
C:\Windows\SysWOW64\Pjdilcla.exeC:\Windows\system32\Pjdilcla.exe68⤵PID:3260
-
C:\Windows\SysWOW64\Pclneicb.exeC:\Windows\system32\Pclneicb.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3228 -
C:\Windows\SysWOW64\Pjffbc32.exeC:\Windows\system32\Pjffbc32.exe70⤵PID:3768
-
C:\Windows\SysWOW64\Peljol32.exeC:\Windows\system32\Peljol32.exe71⤵PID:3864
-
C:\Windows\SysWOW64\Pkfblfab.exeC:\Windows\system32\Pkfblfab.exe72⤵PID:996
-
C:\Windows\SysWOW64\Pabkdmpi.exeC:\Windows\system32\Pabkdmpi.exe73⤵PID:2080
-
C:\Windows\SysWOW64\Pcagphom.exeC:\Windows\system32\Pcagphom.exe74⤵PID:3136
-
C:\Windows\SysWOW64\Pjkombfj.exeC:\Windows\system32\Pjkombfj.exe75⤵PID:640
-
C:\Windows\SysWOW64\Pcccfh32.exeC:\Windows\system32\Pcccfh32.exe76⤵PID:1916
-
C:\Windows\SysWOW64\Pkjlge32.exeC:\Windows\system32\Pkjlge32.exe77⤵
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\Pbddcoei.exeC:\Windows\system32\Pbddcoei.exe78⤵PID:2420
-
C:\Windows\SysWOW64\Qecppkdm.exeC:\Windows\system32\Qecppkdm.exe79⤵PID:1016
-
C:\Windows\SysWOW64\Qjpiha32.exeC:\Windows\system32\Qjpiha32.exe80⤵PID:3256
-
C:\Windows\SysWOW64\Qeemej32.exeC:\Windows\system32\Qeemej32.exe81⤵PID:4608
-
C:\Windows\SysWOW64\Qloebdig.exeC:\Windows\system32\Qloebdig.exe82⤵PID:2296
-
C:\Windows\SysWOW64\Qnnanphk.exeC:\Windows\system32\Qnnanphk.exe83⤵PID:4460
-
C:\Windows\SysWOW64\Qalnjkgo.exeC:\Windows\system32\Qalnjkgo.exe84⤵PID:4988
-
C:\Windows\SysWOW64\Agffge32.exeC:\Windows\system32\Agffge32.exe85⤵PID:1072
-
C:\Windows\SysWOW64\Anpncp32.exeC:\Windows\system32\Anpncp32.exe86⤵PID:2328
-
C:\Windows\SysWOW64\Acmflf32.exeC:\Windows\system32\Acmflf32.exe87⤵PID:1484
-
C:\Windows\SysWOW64\Aldomc32.exeC:\Windows\system32\Aldomc32.exe88⤵PID:4136
-
C:\Windows\SysWOW64\Aaqgek32.exeC:\Windows\system32\Aaqgek32.exe89⤵PID:3440
-
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe90⤵
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Ajiknpjj.exeC:\Windows\system32\Ajiknpjj.exe91⤵PID:4996
-
C:\Windows\SysWOW64\Aacckjaf.exeC:\Windows\system32\Aacckjaf.exe92⤵PID:5128
-
C:\Windows\SysWOW64\Adapgfqj.exeC:\Windows\system32\Adapgfqj.exe93⤵PID:5184
-
C:\Windows\SysWOW64\Ajkhdp32.exeC:\Windows\system32\Ajkhdp32.exe94⤵PID:5248
-
C:\Windows\SysWOW64\Abbpem32.exeC:\Windows\system32\Abbpem32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5292 -
C:\Windows\SysWOW64\Aealah32.exeC:\Windows\system32\Aealah32.exe96⤵PID:5332
-
C:\Windows\SysWOW64\Ahoimd32.exeC:\Windows\system32\Ahoimd32.exe97⤵PID:5372
-
C:\Windows\SysWOW64\Bahmfj32.exeC:\Windows\system32\Bahmfj32.exe98⤵PID:5420
-
C:\Windows\SysWOW64\Bdfibe32.exeC:\Windows\system32\Bdfibe32.exe99⤵PID:5460
-
C:\Windows\SysWOW64\Bjpaooda.exeC:\Windows\system32\Bjpaooda.exe100⤵PID:5512
-
C:\Windows\SysWOW64\Bdhfhe32.exeC:\Windows\system32\Bdhfhe32.exe101⤵PID:5556
-
C:\Windows\SysWOW64\Bnnjen32.exeC:\Windows\system32\Bnnjen32.exe102⤵PID:5596
-
C:\Windows\SysWOW64\Bdkcmdhp.exeC:\Windows\system32\Bdkcmdhp.exe103⤵PID:5636
-
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe104⤵PID:5676
-
C:\Windows\SysWOW64\Bhikcb32.exeC:\Windows\system32\Bhikcb32.exe105⤵
- Modifies registry class
PID:5716 -
C:\Windows\SysWOW64\Bobcpmfc.exeC:\Windows\system32\Bobcpmfc.exe106⤵PID:5756
-
C:\Windows\SysWOW64\Bemlmgnp.exeC:\Windows\system32\Bemlmgnp.exe107⤵PID:5796
-
C:\Windows\SysWOW64\Blfdia32.exeC:\Windows\system32\Blfdia32.exe108⤵
- Drops file in System32 directory
PID:5844 -
C:\Windows\SysWOW64\Ceoibflm.exeC:\Windows\system32\Ceoibflm.exe109⤵PID:5884
-
C:\Windows\SysWOW64\Cliaoq32.exeC:\Windows\system32\Cliaoq32.exe110⤵PID:5924
-
C:\Windows\SysWOW64\Cafigg32.exeC:\Windows\system32\Cafigg32.exe111⤵PID:5960
-
C:\Windows\SysWOW64\Cddecc32.exeC:\Windows\system32\Cddecc32.exe112⤵PID:6004
-
C:\Windows\SysWOW64\Cojjqlpk.exeC:\Windows\system32\Cojjqlpk.exe113⤵PID:6048
-
C:\Windows\SysWOW64\Cahfmgoo.exeC:\Windows\system32\Cahfmgoo.exe114⤵PID:6088
-
C:\Windows\SysWOW64\Clnjjpod.exeC:\Windows\system32\Clnjjpod.exe115⤵
- Drops file in System32 directory
PID:6128 -
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe116⤵
- Drops file in System32 directory
PID:5164 -
C:\Windows\SysWOW64\Chdkoa32.exeC:\Windows\system32\Chdkoa32.exe117⤵
- Drops file in System32 directory
PID:5240 -
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe118⤵PID:5328
-
C:\Windows\SysWOW64\Chghdqbf.exeC:\Windows\system32\Chghdqbf.exe119⤵PID:5400
-
C:\Windows\SysWOW64\Dekhneap.exeC:\Windows\system32\Dekhneap.exe120⤵
- Drops file in System32 directory
PID:5484 -
C:\Windows\SysWOW64\Dldpkoil.exeC:\Windows\system32\Dldpkoil.exe121⤵PID:5564
-
C:\Windows\SysWOW64\Docmgjhp.exeC:\Windows\system32\Docmgjhp.exe122⤵PID:5624
-
C:\Windows\SysWOW64\Demecd32.exeC:\Windows\system32\Demecd32.exe123⤵PID:5704
-
C:\Windows\SysWOW64\Dhkapp32.exeC:\Windows\system32\Dhkapp32.exe124⤵PID:5772
-
C:\Windows\SysWOW64\Dadeieea.exeC:\Windows\system32\Dadeieea.exe125⤵PID:5864
-
C:\Windows\SysWOW64\Deoaid32.exeC:\Windows\system32\Deoaid32.exe126⤵PID:5920
-
C:\Windows\SysWOW64\Dhnnep32.exeC:\Windows\system32\Dhnnep32.exe127⤵PID:6000
-
C:\Windows\SysWOW64\Dccbbhld.exeC:\Windows\system32\Dccbbhld.exe128⤵PID:6076
-
C:\Windows\SysWOW64\Deanodkh.exeC:\Windows\system32\Deanodkh.exe129⤵PID:3760
-
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe130⤵PID:5276
-
C:\Windows\SysWOW64\Dahode32.exeC:\Windows\system32\Dahode32.exe131⤵PID:5356
-
C:\Windows\SysWOW64\Ddgkpp32.exeC:\Windows\system32\Ddgkpp32.exe132⤵PID:5548
-
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe133⤵
- Drops file in System32 directory
PID:5652 -
C:\Windows\SysWOW64\Edihepnm.exeC:\Windows\system32\Edihepnm.exe134⤵PID:5764
-
C:\Windows\SysWOW64\Eoolbinc.exeC:\Windows\system32\Eoolbinc.exe135⤵PID:5876
-
C:\Windows\SysWOW64\Eamhodmf.exeC:\Windows\system32\Eamhodmf.exe136⤵PID:5988
-
C:\Windows\SysWOW64\Ehgqln32.exeC:\Windows\system32\Ehgqln32.exe137⤵PID:3804
-
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe138⤵PID:5312
-
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe139⤵PID:5572
-
C:\Windows\SysWOW64\Eleiam32.exeC:\Windows\system32\Eleiam32.exe140⤵PID:5672
-
C:\Windows\SysWOW64\Ecoangbg.exeC:\Windows\system32\Ecoangbg.exe141⤵PID:5852
-
C:\Windows\SysWOW64\Eemnjbaj.exeC:\Windows\system32\Eemnjbaj.exe142⤵PID:6120
-
C:\Windows\SysWOW64\Ehljfnpn.exeC:\Windows\system32\Ehljfnpn.exe143⤵PID:6012
-
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe144⤵PID:5632
-
C:\Windows\SysWOW64\Eepjpb32.exeC:\Windows\system32\Eepjpb32.exe145⤵PID:5912
-
C:\Windows\SysWOW64\Fafkecel.exeC:\Windows\system32\Fafkecel.exe146⤵PID:5444
-
C:\Windows\SysWOW64\Fllpbldb.exeC:\Windows\system32\Fllpbldb.exe147⤵PID:5840
-
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe148⤵PID:5260
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe149⤵PID:6160
-
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe150⤵PID:6208
-
C:\Windows\SysWOW64\Fdialn32.exeC:\Windows\system32\Fdialn32.exe151⤵PID:6252
-
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe152⤵PID:6296
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe153⤵PID:6340
-
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe154⤵PID:6384
-
C:\Windows\SysWOW64\Fkffog32.exeC:\Windows\system32\Fkffog32.exe155⤵PID:6428
-
C:\Windows\SysWOW64\Fcmnpe32.exeC:\Windows\system32\Fcmnpe32.exe156⤵PID:6472
-
C:\Windows\SysWOW64\Fdnjgmle.exeC:\Windows\system32\Fdnjgmle.exe157⤵PID:6512
-
C:\Windows\SysWOW64\Glebhjlg.exeC:\Windows\system32\Glebhjlg.exe158⤵PID:6556
-
C:\Windows\SysWOW64\Gbbkaako.exeC:\Windows\system32\Gbbkaako.exe159⤵PID:6600
-
C:\Windows\SysWOW64\Glhonj32.exeC:\Windows\system32\Glhonj32.exe160⤵PID:6640
-
C:\Windows\SysWOW64\Gcagkdba.exeC:\Windows\system32\Gcagkdba.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6688 -
C:\Windows\SysWOW64\Gmjlcj32.exeC:\Windows\system32\Gmjlcj32.exe162⤵PID:6736
-
C:\Windows\SysWOW64\Gcddpdpo.exeC:\Windows\system32\Gcddpdpo.exe163⤵PID:6776
-
C:\Windows\SysWOW64\Gdeqhl32.exeC:\Windows\system32\Gdeqhl32.exe164⤵PID:6816
-
C:\Windows\SysWOW64\Ghaliknf.exeC:\Windows\system32\Ghaliknf.exe165⤵
- Modifies registry class
PID:6860 -
C:\Windows\SysWOW64\Gdhmnlcj.exeC:\Windows\system32\Gdhmnlcj.exe166⤵PID:6904
-
C:\Windows\SysWOW64\Gkaejf32.exeC:\Windows\system32\Gkaejf32.exe167⤵PID:6948
-
C:\Windows\SysWOW64\Gblngpbd.exeC:\Windows\system32\Gblngpbd.exe168⤵PID:6992
-
C:\Windows\SysWOW64\Hiefcj32.exeC:\Windows\system32\Hiefcj32.exe169⤵PID:7036
-
C:\Windows\SysWOW64\Hopnqdan.exeC:\Windows\system32\Hopnqdan.exe170⤵PID:7076
-
C:\Windows\SysWOW64\Helfik32.exeC:\Windows\system32\Helfik32.exe171⤵PID:7120
-
C:\Windows\SysWOW64\Hbpgbo32.exeC:\Windows\system32\Hbpgbo32.exe172⤵
- Drops file in System32 directory
PID:7164 -
C:\Windows\SysWOW64\Hmfkoh32.exeC:\Windows\system32\Hmfkoh32.exe173⤵
- Modifies registry class
PID:6204 -
C:\Windows\SysWOW64\Heapdjlp.exeC:\Windows\system32\Heapdjlp.exe174⤵PID:6276
-
C:\Windows\SysWOW64\Hkkhqd32.exeC:\Windows\system32\Hkkhqd32.exe175⤵PID:6332
-
C:\Windows\SysWOW64\Hcbpab32.exeC:\Windows\system32\Hcbpab32.exe176⤵PID:6412
-
C:\Windows\SysWOW64\Hkmefd32.exeC:\Windows\system32\Hkmefd32.exe177⤵PID:6460
-
C:\Windows\SysWOW64\Iiaephpc.exeC:\Windows\system32\Iiaephpc.exe178⤵PID:6552
-
C:\Windows\SysWOW64\Ifefimom.exeC:\Windows\system32\Ifefimom.exe179⤵
- Modifies registry class
PID:6608 -
C:\Windows\SysWOW64\Icifbang.exeC:\Windows\system32\Icifbang.exe180⤵PID:6680
-
C:\Windows\SysWOW64\Iemppiab.exeC:\Windows\system32\Iemppiab.exe181⤵PID:6764
-
C:\Windows\SysWOW64\Ilghlc32.exeC:\Windows\system32\Ilghlc32.exe182⤵PID:6840
-
C:\Windows\SysWOW64\Ibcmom32.exeC:\Windows\system32\Ibcmom32.exe183⤵PID:6924
-
C:\Windows\SysWOW64\Jmhale32.exeC:\Windows\system32\Jmhale32.exe184⤵PID:6988
-
C:\Windows\SysWOW64\Jpgmha32.exeC:\Windows\system32\Jpgmha32.exe185⤵
- Drops file in System32 directory
PID:4380 -
C:\Windows\SysWOW64\Jedeph32.exeC:\Windows\system32\Jedeph32.exe186⤵PID:7096
-
C:\Windows\SysWOW64\Jfcbjk32.exeC:\Windows\system32\Jfcbjk32.exe187⤵PID:228
-
C:\Windows\SysWOW64\Jfeopj32.exeC:\Windows\system32\Jfeopj32.exe188⤵PID:6196
-
C:\Windows\SysWOW64\Jcioiood.exeC:\Windows\system32\Jcioiood.exe189⤵
- Modifies registry class
PID:6308 -
C:\Windows\SysWOW64\Jifhaenk.exeC:\Windows\system32\Jifhaenk.exe190⤵PID:6456
-
C:\Windows\SysWOW64\Kfjhkjle.exeC:\Windows\system32\Kfjhkjle.exe191⤵PID:6504
-
C:\Windows\SysWOW64\Kmdqgd32.exeC:\Windows\system32\Kmdqgd32.exe192⤵PID:6668
-
C:\Windows\SysWOW64\Kpbmco32.exeC:\Windows\system32\Kpbmco32.exe193⤵PID:6784
-
C:\Windows\SysWOW64\Kfmepi32.exeC:\Windows\system32\Kfmepi32.exe194⤵PID:6912
-
C:\Windows\SysWOW64\Kikame32.exeC:\Windows\system32\Kikame32.exe195⤵PID:7044
-
C:\Windows\SysWOW64\Kpeiioac.exeC:\Windows\system32\Kpeiioac.exe196⤵PID:7152
-
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe197⤵PID:6304
-
C:\Windows\SysWOW64\Kebbafoj.exeC:\Windows\system32\Kebbafoj.exe198⤵PID:6480
-
C:\Windows\SysWOW64\Kmijbcpl.exeC:\Windows\system32\Kmijbcpl.exe199⤵PID:6808
-
C:\Windows\SysWOW64\Kpgfooop.exeC:\Windows\system32\Kpgfooop.exe200⤵PID:7132
-
C:\Windows\SysWOW64\Kfankifm.exeC:\Windows\system32\Kfankifm.exe201⤵PID:6324
-
C:\Windows\SysWOW64\Kmkfhc32.exeC:\Windows\system32\Kmkfhc32.exe202⤵PID:6584
-
C:\Windows\SysWOW64\Kdeoemeg.exeC:\Windows\system32\Kdeoemeg.exe203⤵
- Modifies registry class
PID:7156 -
C:\Windows\SysWOW64\Kibgmdcn.exeC:\Windows\system32\Kibgmdcn.exe204⤵PID:6760
-
C:\Windows\SysWOW64\Lffhfh32.exeC:\Windows\system32\Lffhfh32.exe205⤵PID:6240
-
C:\Windows\SysWOW64\Lpnlpnih.exeC:\Windows\system32\Lpnlpnih.exe206⤵
- Modifies registry class
PID:7016 -
C:\Windows\SysWOW64\Lfhdlh32.exeC:\Windows\system32\Lfhdlh32.exe207⤵
- Drops file in System32 directory
PID:7180 -
C:\Windows\SysWOW64\Ligqhc32.exeC:\Windows\system32\Ligqhc32.exe208⤵
- Drops file in System32 directory
PID:7220 -
C:\Windows\SysWOW64\Lboeaifi.exeC:\Windows\system32\Lboeaifi.exe209⤵
- Drops file in System32 directory
PID:7272 -
C:\Windows\SysWOW64\Lpcfkm32.exeC:\Windows\system32\Lpcfkm32.exe210⤵PID:7324
-
C:\Windows\SysWOW64\Lepncd32.exeC:\Windows\system32\Lepncd32.exe211⤵PID:7376
-
C:\Windows\SysWOW64\Lpebpm32.exeC:\Windows\system32\Lpebpm32.exe212⤵PID:7428
-
C:\Windows\SysWOW64\Lingibiq.exeC:\Windows\system32\Lingibiq.exe213⤵PID:7472
-
C:\Windows\SysWOW64\Lllcen32.exeC:\Windows\system32\Lllcen32.exe214⤵
- Modifies registry class
PID:7520 -
C:\Windows\SysWOW64\Mdckfk32.exeC:\Windows\system32\Mdckfk32.exe215⤵PID:7568
-
C:\Windows\SysWOW64\Mgagbf32.exeC:\Windows\system32\Mgagbf32.exe216⤵PID:7608
-
C:\Windows\SysWOW64\Mipcob32.exeC:\Windows\system32\Mipcob32.exe217⤵PID:7664
-
C:\Windows\SysWOW64\Mdehlk32.exeC:\Windows\system32\Mdehlk32.exe218⤵
- Modifies registry class
PID:7716 -
C:\Windows\SysWOW64\Mlampmdo.exeC:\Windows\system32\Mlampmdo.exe219⤵PID:7772
-
C:\Windows\SysWOW64\Mckemg32.exeC:\Windows\system32\Mckemg32.exe220⤵PID:7820
-
C:\Windows\SysWOW64\Mlcifmbl.exeC:\Windows\system32\Mlcifmbl.exe221⤵PID:7860
-
C:\Windows\SysWOW64\Mcmabg32.exeC:\Windows\system32\Mcmabg32.exe222⤵PID:7912
-
C:\Windows\SysWOW64\Migjoaaf.exeC:\Windows\system32\Migjoaaf.exe223⤵PID:7956
-
C:\Windows\SysWOW64\Mpablkhc.exeC:\Windows\system32\Mpablkhc.exe224⤵PID:8000
-
C:\Windows\SysWOW64\Mgkjhe32.exeC:\Windows\system32\Mgkjhe32.exe225⤵
- Drops file in System32 directory
PID:8044 -
C:\Windows\SysWOW64\Mnebeogl.exeC:\Windows\system32\Mnebeogl.exe226⤵PID:8092
-
C:\Windows\SysWOW64\Npcoakfp.exeC:\Windows\system32\Npcoakfp.exe227⤵PID:8128
-
C:\Windows\SysWOW64\Ncbknfed.exeC:\Windows\system32\Ncbknfed.exe228⤵
- Modifies registry class
PID:8172 -
C:\Windows\SysWOW64\Nilcjp32.exeC:\Windows\system32\Nilcjp32.exe229⤵PID:7200
-
C:\Windows\SysWOW64\Nljofl32.exeC:\Windows\system32\Nljofl32.exe230⤵PID:7268
-
C:\Windows\SysWOW64\Ndaggimg.exeC:\Windows\system32\Ndaggimg.exe231⤵PID:7336
-
C:\Windows\SysWOW64\Ngpccdlj.exeC:\Windows\system32\Ngpccdlj.exe232⤵PID:7396
-
C:\Windows\SysWOW64\Nlmllkja.exeC:\Windows\system32\Nlmllkja.exe233⤵PID:7460
-
C:\Windows\SysWOW64\Ndcdmikd.exeC:\Windows\system32\Ndcdmikd.exe234⤵PID:7504
-
C:\Windows\SysWOW64\Ngbpidjh.exeC:\Windows\system32\Ngbpidjh.exe235⤵PID:7592
-
C:\Windows\SysWOW64\Ndfqbhia.exeC:\Windows\system32\Ndfqbhia.exe236⤵PID:7656
-
C:\Windows\SysWOW64\Ncianepl.exeC:\Windows\system32\Ncianepl.exe237⤵
- Drops file in System32 directory
PID:7732 -
C:\Windows\SysWOW64\Njciko32.exeC:\Windows\system32\Njciko32.exe238⤵PID:7800
-
C:\Windows\SysWOW64\Nlaegk32.exeC:\Windows\system32\Nlaegk32.exe239⤵PID:7884
-
C:\Windows\SysWOW64\Nckndeni.exeC:\Windows\system32\Nckndeni.exe240⤵PID:7940
-
C:\Windows\SysWOW64\Oponmilc.exeC:\Windows\system32\Oponmilc.exe241⤵PID:8020
-