Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 23:41
Behavioral task
behavioral1
Sample
5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe
-
Size
89KB
-
MD5
5796fbbfa914ec4578ba4fb5fc8bca20
-
SHA1
100ada18ee9d517e71e737f783a4f06da7feefc3
-
SHA256
5a4300c69960a81874dc0f3da6b1ad749e4cde3eb121e0e022f9bb280ab449a5
-
SHA512
ab96fddb9b20cdbb241447b358873386a7314ffdcc4dfa3c15168c5a7f5fc33ccd57ed2cb649c4db5bf4b765e3deeb5be70d0f535c129dd236cb2939ca087810
-
SSDEEP
1536:QvYt7xvSLyvKMdUE0xm60pEWSd5RU7kRsz8STLRQ+D68a+VMKKTRVGFtUhQfR1Wy:QvYLKLyvKYU5m65T5RU7xe3r4MKy3G7r
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lljpjchg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kfopdk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jacfidem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kofaicon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iafnjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hinqgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gcmamj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lahmbo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eicpcm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nflfad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ceeieced.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfcopl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aknlofim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jeaahk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lidilk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jblnaq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmimcbja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nokqidll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkejcq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaajei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amhcad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgildi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cfeepelg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qlfdac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qndigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efjlgmlf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imcfjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ecoihm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgkgeah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dajgfboj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nemhhpmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Coafko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lklgbadb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckeqga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iebldo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dbadagln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x000c0000000132c6-5.dat family_berbew behavioral1/files/0x000a0000000139d6-22.dat family_berbew behavioral1/files/0x0008000000013a4d-31.dat family_berbew behavioral1/files/0x000800000001450f-46.dat family_berbew behavioral1/files/0x0006000000015c7c-59.dat family_berbew behavioral1/files/0x0006000000015cb9-73.dat family_berbew behavioral1/files/0x0006000000015db4-88.dat family_berbew behavioral1/files/0x0013000000013721-103.dat family_berbew behavioral1/files/0x0006000000015e5b-118.dat family_berbew behavioral1/files/0x0006000000015e7c-133.dat family_berbew behavioral1/files/0x0006000000015ec0-153.dat family_berbew behavioral1/files/0x000600000001604b-161.dat family_berbew behavioral1/memory/2832-167-0x00000000002D0000-0x0000000000312000-memory.dmp family_berbew behavioral1/files/0x0006000000016332-176.dat family_berbew behavioral1/files/0x00060000000165ae-190.dat family_berbew behavioral1/files/0x00060000000167db-205.dat family_berbew behavioral1/files/0x0006000000016b96-221.dat family_berbew behavioral1/files/0x0006000000016c1a-236.dat family_berbew behavioral1/files/0x0006000000016c90-245.dat family_berbew behavioral1/files/0x0006000000016ccf-256.dat family_berbew behavioral1/files/0x0006000000016cf0-269.dat family_berbew behavioral1/files/0x0006000000016d36-284.dat family_berbew behavioral1/files/0x0006000000016d11-280.dat family_berbew behavioral1/files/0x0006000000016d4a-300.dat family_berbew behavioral1/files/0x0006000000016d55-311.dat family_berbew behavioral1/files/0x0006000000016d89-322.dat family_berbew behavioral1/files/0x000600000001704f-331.dat family_berbew behavioral1/files/0x000500000001868c-341.dat family_berbew behavioral1/files/0x00050000000186a0-350.dat family_berbew behavioral1/files/0x0006000000018ae8-362.dat family_berbew behavioral1/files/0x0006000000018b33-371.dat family_berbew behavioral1/files/0x0006000000018b42-382.dat family_berbew behavioral1/files/0x0006000000018b6a-394.dat family_berbew behavioral1/files/0x0006000000018b96-403.dat family_berbew behavioral1/files/0x0006000000018d06-417.dat family_berbew behavioral1/files/0x00050000000192f4-425.dat family_berbew behavioral1/files/0x0005000000019333-439.dat family_berbew behavioral1/files/0x0005000000019377-449.dat family_berbew behavioral1/files/0x00050000000193b0-462.dat family_berbew behavioral1/files/0x000500000001946b-471.dat family_berbew behavioral1/files/0x0005000000019473-484.dat family_berbew behavioral1/files/0x00050000000194a4-495.dat family_berbew behavioral1/files/0x00040000000194d8-505.dat family_berbew behavioral1/files/0x00050000000194e8-519.dat family_berbew behavioral1/files/0x00050000000194ee-529.dat family_berbew behavioral1/files/0x00050000000194f2-540.dat family_berbew behavioral1/files/0x000500000001950c-553.dat family_berbew behavioral1/files/0x0005000000019547-563.dat family_berbew behavioral1/files/0x000500000001959c-575.dat family_berbew behavioral1/files/0x00050000000195a2-586.dat family_berbew behavioral1/files/0x00050000000195a6-599.dat family_berbew behavioral1/files/0x00050000000195a8-608.dat family_berbew behavioral1/files/0x00050000000195aa-621.dat family_berbew behavioral1/files/0x00050000000195ff-629.dat family_berbew behavioral1/files/0x0005000000019bd6-643.dat family_berbew behavioral1/files/0x0005000000019bd8-656.dat family_berbew behavioral1/files/0x0005000000019cba-666.dat family_berbew behavioral1/files/0x0005000000019d4d-675.dat family_berbew behavioral1/files/0x0005000000019f42-686.dat family_berbew behavioral1/files/0x000500000001a00c-696.dat family_berbew behavioral1/files/0x000500000001a04c-707.dat family_berbew behavioral1/files/0x000500000001a31e-717.dat family_berbew behavioral1/files/0x000500000001a3c5-729.dat family_berbew behavioral1/files/0x000500000001a3cd-739.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 2696 Cbgjqo32.exe 2556 Cgdcgm32.exe 2540 Candgk32.exe 2844 Ddomif32.exe 2404 Dkkbkp32.exe 2832 Dgbcpq32.exe 524 Dciceaoe.exe 1020 Efjlgmlf.exe 2856 Eodnebpd.exe 2076 Enlglnci.exe 2252 Edfpih32.exe 2004 Fblmglgm.exe 2668 Fjgalndh.exe 1088 Fjlkgn32.exe 932 Gcglec32.exe 1720 Gppipc32.exe 1016 Gihniioc.exe 640 Gdboig32.exe 1916 Hafock32.exe 392 Hmmphlpp.exe 1964 Hpmiig32.exe 1224 Hjcmgp32.exe 3068 Hppfog32.exe 2088 Ilicig32.exe 2896 Ihpdoh32.exe 808 Imoilo32.exe 2600 Ikbifcpb.exe 2148 Iaonhm32.exe 2604 Jglgpdcc.exe 2640 Jnhlbn32.exe 2688 Jblnaq32.exe 2520 Kdpcikdi.exe 2836 Knhhaaki.exe 2880 Kgbipf32.exe 676 Kgefefnd.exe 2712 Lbackc32.exe 2872 Lpedeg32.exe 1660 Lahmbo32.exe 1376 Mcifdj32.exe 1952 Mmakmp32.exe 836 Mfjoeeeh.exe 2348 Mhilph32.exe 1688 Mikhgqbi.exe 2920 Mlkail32.exe 2764 Nmkncofl.exe 400 Nianhplq.exe 1160 Noogpfjh.exe 2716 Nkegeg32.exe 856 Neklbppb.exe 2504 Nkhdkgnj.exe 2704 Nemhhpmp.exe 1648 Nhlddkmc.exe 2908 Nadimacd.exe 3064 Omkjbb32.exe 2612 Ommfga32.exe 1260 Ocjophem.exe 2440 Olbchn32.exe 2400 Oghhfg32.exe 1204 Oldpnn32.exe 240 Oaaifdhb.exe 556 Poeipifl.exe 1452 Pdbahpec.exe 1960 Pnjfae32.exe 1796 Pkofjijm.exe -
Loads dropped DLL 64 IoCs
pid Process 2068 5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe 2068 5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe 2696 Cbgjqo32.exe 2696 Cbgjqo32.exe 2556 Cgdcgm32.exe 2556 Cgdcgm32.exe 2540 Candgk32.exe 2540 Candgk32.exe 2844 Ddomif32.exe 2844 Ddomif32.exe 2404 Dkkbkp32.exe 2404 Dkkbkp32.exe 2832 Dgbcpq32.exe 2832 Dgbcpq32.exe 524 Dciceaoe.exe 524 Dciceaoe.exe 1020 Efjlgmlf.exe 1020 Efjlgmlf.exe 2856 Eodnebpd.exe 2856 Eodnebpd.exe 2076 Enlglnci.exe 2076 Enlglnci.exe 2252 Edfpih32.exe 2252 Edfpih32.exe 2004 Fblmglgm.exe 2004 Fblmglgm.exe 2668 Fjgalndh.exe 2668 Fjgalndh.exe 1088 Fjlkgn32.exe 1088 Fjlkgn32.exe 932 Gcglec32.exe 932 Gcglec32.exe 1720 Gppipc32.exe 1720 Gppipc32.exe 1016 Gihniioc.exe 1016 Gihniioc.exe 640 Gdboig32.exe 640 Gdboig32.exe 1916 Hafock32.exe 1916 Hafock32.exe 392 Hmmphlpp.exe 392 Hmmphlpp.exe 1964 Hpmiig32.exe 1964 Hpmiig32.exe 1224 Hjcmgp32.exe 1224 Hjcmgp32.exe 3068 Hppfog32.exe 3068 Hppfog32.exe 2088 Ilicig32.exe 2088 Ilicig32.exe 2896 Ihpdoh32.exe 2896 Ihpdoh32.exe 808 Imoilo32.exe 808 Imoilo32.exe 2600 Ikbifcpb.exe 2600 Ikbifcpb.exe 2148 Iaonhm32.exe 2148 Iaonhm32.exe 2604 Jglgpdcc.exe 2604 Jglgpdcc.exe 2640 Jnhlbn32.exe 2640 Jnhlbn32.exe 2688 Jblnaq32.exe 2688 Jblnaq32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Fchkbg32.exe Flocfmnl.exe File opened for modification C:\Windows\SysWOW64\Iadbqlmh.exe Ihlnhffh.exe File created C:\Windows\SysWOW64\Gqknjlfp.exe Process not Found File created C:\Windows\SysWOW64\Odjoikgb.dll Akqpom32.exe File created C:\Windows\SysWOW64\Nfidjbdg.exe Niedqnen.exe File opened for modification C:\Windows\SysWOW64\Jhdlad32.exe Jbhcim32.exe File created C:\Windows\SysWOW64\Ejgicl32.dll Cdchneko.exe File created C:\Windows\SysWOW64\Nfjeqa32.dll Process not Found File created C:\Windows\SysWOW64\Ieqbbl32.exe Process not Found File created C:\Windows\SysWOW64\Mdigakic.exe Process not Found File created C:\Windows\SysWOW64\Oiobjk32.dll Lgoboc32.exe File created C:\Windows\SysWOW64\Bdinnqon.exe Bnofaf32.exe File opened for modification C:\Windows\SysWOW64\Cenmfbml.exe Codeih32.exe File created C:\Windows\SysWOW64\Ddpidhgj.dll Kckjmpko.exe File opened for modification C:\Windows\SysWOW64\Lgbibb32.exe Kfaljjdj.exe File opened for modification C:\Windows\SysWOW64\Lbpolb32.exe Process not Found File created C:\Windows\SysWOW64\Ifkmqd32.dll Jnmiag32.exe File created C:\Windows\SysWOW64\Gohnpcmd.exe Process not Found File opened for modification C:\Windows\SysWOW64\Qckcdj32.exe Process not Found File created C:\Windows\SysWOW64\Dbkgliff.dll Process not Found File created C:\Windows\SysWOW64\Gdlbll32.dll Process not Found File created C:\Windows\SysWOW64\Kndoim32.dll Jhdlad32.exe File created C:\Windows\SysWOW64\Hiqoeplo.exe Hfbcidmk.exe File created C:\Windows\SysWOW64\Hfebmdnh.dll Gpafgp32.exe File created C:\Windows\SysWOW64\Qhmcmk32.exe Qkibcg32.exe File created C:\Windows\SysWOW64\Qlfdac32.exe Qemldifo.exe File created C:\Windows\SysWOW64\Bjngbihn.exe Bpebidam.exe File created C:\Windows\SysWOW64\Bhbodpkg.dll Process not Found File created C:\Windows\SysWOW64\Johlpoij.exe Process not Found File created C:\Windows\SysWOW64\Ggkqmoma.exe Gbohehoj.exe File opened for modification C:\Windows\SysWOW64\Aiknnf32.exe Qbafalph.exe File created C:\Windows\SysWOW64\Bpebidam.exe Bkhjamcf.exe File created C:\Windows\SysWOW64\Imbige32.dll Epnkip32.exe File created C:\Windows\SysWOW64\Igkjcm32.exe Imcfjg32.exe File opened for modification C:\Windows\SysWOW64\Lnqkjl32.exe Lggbmbfc.exe File opened for modification C:\Windows\SysWOW64\Papank32.exe Process not Found File opened for modification C:\Windows\SysWOW64\Bcmjpd32.exe Process not Found File created C:\Windows\SysWOW64\Omakjj32.dll Cnkjnb32.exe File opened for modification C:\Windows\SysWOW64\Infjfblm.exe Process not Found File created C:\Windows\SysWOW64\Ecbhdi32.exe Ehmdgp32.exe File created C:\Windows\SysWOW64\Hcdnhoac.exe Hkiicmdh.exe File created C:\Windows\SysWOW64\Eomgdlji.dll Eejjnhgc.exe File created C:\Windows\SysWOW64\Bcpaqn32.dll Klfmijae.exe File created C:\Windows\SysWOW64\Aknlofim.exe Qhmcmk32.exe File opened for modification C:\Windows\SysWOW64\Kablnadm.exe Kdnkdmec.exe File opened for modification C:\Windows\SysWOW64\Flhhed32.exe Facdgl32.exe File opened for modification C:\Windows\SysWOW64\Bhpclica.exe Process not Found File created C:\Windows\SysWOW64\Nmhlnngi.exe Process not Found File opened for modification C:\Windows\SysWOW64\Qicoleno.exe Process not Found File created C:\Windows\SysWOW64\Khadpa32.exe Koipglep.exe File created C:\Windows\SysWOW64\Dbkffc32.exe Process not Found File opened for modification C:\Windows\SysWOW64\Mqlbnnej.exe Process not Found File created C:\Windows\SysWOW64\Opkekoll.dll Imoilo32.exe File created C:\Windows\SysWOW64\Jhibakgh.dll Cnflae32.exe File created C:\Windows\SysWOW64\Lflonn32.exe Lnqkjl32.exe File created C:\Windows\SysWOW64\Ggpmkgab.exe Process not Found File opened for modification C:\Windows\SysWOW64\Fimclh32.exe Process not Found File created C:\Windows\SysWOW64\Kkgahoel.exe Kaompi32.exe File created C:\Windows\SysWOW64\Kongke32.dll Nfdddm32.exe File created C:\Windows\SysWOW64\Bipalg32.dll Mciabmlo.exe File opened for modification C:\Windows\SysWOW64\Aknngo32.exe Aklabp32.exe File created C:\Windows\SysWOW64\Ghibjjnk.exe Gncnmane.exe File created C:\Windows\SysWOW64\Kmnnepij.dll Process not Found File opened for modification C:\Windows\SysWOW64\Fdcncg32.exe Process not Found -
Program crash 1 IoCs
pid pid_target Process procid_target 6024 3664 Process not Found 1733 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcebdq32.dll" Dpqnhadq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpbodi32.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bfncpcoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aeiecfga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmedeaio.dll" Dgkiih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kddifg32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldbjfdld.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjjdgm32.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kgbipf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaddfb32.dll" Coacbfii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jhahanie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiabmg32.dll" Emdhhdqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dekmid32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ojpomh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fpmpnmck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ioohokoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jflgph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejikmqhk.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eabepp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kikokf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odhgec32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dflhfeng.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gamnhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkokcp32.dll" Jkioho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hnmeen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Peedka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bdobdc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gpjfcali.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phemcq32.dll" Oaaifdhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jniefm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jbnjhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcaopfhd.dll" Igpdnlgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mldgbcoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qkgbae32.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Objjnkie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bfcodkcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cfnkmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehebki32.dll" Ohnaik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iebldo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hadfah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oenpon32.dll" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbknkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eimllb32.dll" Dfpaic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dgiaefgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ecoihm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlmfob32.dll" Lefikg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jipaip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlcbff32.dll" Nklaipbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijppackl.dll" Cfpldf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aljcpg32.dll" Gdegfn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2696 2068 5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe 28 PID 2068 wrote to memory of 2696 2068 5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe 28 PID 2068 wrote to memory of 2696 2068 5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe 28 PID 2068 wrote to memory of 2696 2068 5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe 28 PID 2696 wrote to memory of 2556 2696 Cbgjqo32.exe 29 PID 2696 wrote to memory of 2556 2696 Cbgjqo32.exe 29 PID 2696 wrote to memory of 2556 2696 Cbgjqo32.exe 29 PID 2696 wrote to memory of 2556 2696 Cbgjqo32.exe 29 PID 2556 wrote to memory of 2540 2556 Cgdcgm32.exe 30 PID 2556 wrote to memory of 2540 2556 Cgdcgm32.exe 30 PID 2556 wrote to memory of 2540 2556 Cgdcgm32.exe 30 PID 2556 wrote to memory of 2540 2556 Cgdcgm32.exe 30 PID 2540 wrote to memory of 2844 2540 Candgk32.exe 31 PID 2540 wrote to memory of 2844 2540 Candgk32.exe 31 PID 2540 wrote to memory of 2844 2540 Candgk32.exe 31 PID 2540 wrote to memory of 2844 2540 Candgk32.exe 31 PID 2844 wrote to memory of 2404 2844 Ddomif32.exe 32 PID 2844 wrote to memory of 2404 2844 Ddomif32.exe 32 PID 2844 wrote to memory of 2404 2844 Ddomif32.exe 32 PID 2844 wrote to memory of 2404 2844 Ddomif32.exe 32 PID 2404 wrote to memory of 2832 2404 Dkkbkp32.exe 33 PID 2404 wrote to memory of 2832 2404 Dkkbkp32.exe 33 PID 2404 wrote to memory of 2832 2404 Dkkbkp32.exe 33 PID 2404 wrote to memory of 2832 2404 Dkkbkp32.exe 33 PID 2832 wrote to memory of 524 2832 Dgbcpq32.exe 34 PID 2832 wrote to memory of 524 2832 Dgbcpq32.exe 34 PID 2832 wrote to memory of 524 2832 Dgbcpq32.exe 34 PID 2832 wrote to memory of 524 2832 Dgbcpq32.exe 34 PID 524 wrote to memory of 1020 524 Dciceaoe.exe 35 PID 524 wrote to memory of 1020 524 Dciceaoe.exe 35 PID 524 wrote to memory of 1020 524 Dciceaoe.exe 35 PID 524 wrote to memory of 1020 524 Dciceaoe.exe 35 PID 1020 wrote to memory of 2856 1020 Efjlgmlf.exe 36 PID 1020 wrote to memory of 2856 1020 Efjlgmlf.exe 36 PID 1020 wrote to memory of 2856 1020 Efjlgmlf.exe 36 PID 1020 wrote to memory of 2856 1020 Efjlgmlf.exe 36 PID 2856 wrote to memory of 2076 2856 Eodnebpd.exe 37 PID 2856 wrote to memory of 2076 2856 Eodnebpd.exe 37 PID 2856 wrote to memory of 2076 2856 Eodnebpd.exe 37 PID 2856 wrote to memory of 2076 2856 Eodnebpd.exe 37 PID 2076 wrote to memory of 2252 2076 Enlglnci.exe 38 PID 2076 wrote to memory of 2252 2076 Enlglnci.exe 38 PID 2076 wrote to memory of 2252 2076 Enlglnci.exe 38 PID 2076 wrote to memory of 2252 2076 Enlglnci.exe 38 PID 2252 wrote to memory of 2004 2252 Edfpih32.exe 39 PID 2252 wrote to memory of 2004 2252 Edfpih32.exe 39 PID 2252 wrote to memory of 2004 2252 Edfpih32.exe 39 PID 2252 wrote to memory of 2004 2252 Edfpih32.exe 39 PID 2004 wrote to memory of 2668 2004 Fblmglgm.exe 40 PID 2004 wrote to memory of 2668 2004 Fblmglgm.exe 40 PID 2004 wrote to memory of 2668 2004 Fblmglgm.exe 40 PID 2004 wrote to memory of 2668 2004 Fblmglgm.exe 40 PID 2668 wrote to memory of 1088 2668 Fjgalndh.exe 41 PID 2668 wrote to memory of 1088 2668 Fjgalndh.exe 41 PID 2668 wrote to memory of 1088 2668 Fjgalndh.exe 41 PID 2668 wrote to memory of 1088 2668 Fjgalndh.exe 41 PID 1088 wrote to memory of 932 1088 Fjlkgn32.exe 42 PID 1088 wrote to memory of 932 1088 Fjlkgn32.exe 42 PID 1088 wrote to memory of 932 1088 Fjlkgn32.exe 42 PID 1088 wrote to memory of 932 1088 Fjlkgn32.exe 42 PID 932 wrote to memory of 1720 932 Gcglec32.exe 43 PID 932 wrote to memory of 1720 932 Gcglec32.exe 43 PID 932 wrote to memory of 1720 932 Gcglec32.exe 43 PID 932 wrote to memory of 1720 932 Gcglec32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5796fbbfa914ec4578ba4fb5fc8bca20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Cbgjqo32.exeC:\Windows\system32\Cbgjqo32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Cgdcgm32.exeC:\Windows\system32\Cgdcgm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\Candgk32.exeC:\Windows\system32\Candgk32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Ddomif32.exeC:\Windows\system32\Ddomif32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Dkkbkp32.exeC:\Windows\system32\Dkkbkp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Dgbcpq32.exeC:\Windows\system32\Dgbcpq32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\Dciceaoe.exeC:\Windows\system32\Dciceaoe.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\Efjlgmlf.exeC:\Windows\system32\Efjlgmlf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\Eodnebpd.exeC:\Windows\system32\Eodnebpd.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\Enlglnci.exeC:\Windows\system32\Enlglnci.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Edfpih32.exeC:\Windows\system32\Edfpih32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Fblmglgm.exeC:\Windows\system32\Fblmglgm.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Fjgalndh.exeC:\Windows\system32\Fjgalndh.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Fjlkgn32.exeC:\Windows\system32\Fjlkgn32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\Gcglec32.exeC:\Windows\system32\Gcglec32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\Gppipc32.exeC:\Windows\system32\Gppipc32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720 -
C:\Windows\SysWOW64\Gihniioc.exeC:\Windows\system32\Gihniioc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Windows\SysWOW64\Gdboig32.exeC:\Windows\system32\Gdboig32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:640 -
C:\Windows\SysWOW64\Hafock32.exeC:\Windows\system32\Hafock32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\Windows\SysWOW64\Hmmphlpp.exeC:\Windows\system32\Hmmphlpp.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:392 -
C:\Windows\SysWOW64\Hpmiig32.exeC:\Windows\system32\Hpmiig32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Windows\SysWOW64\Hjcmgp32.exeC:\Windows\system32\Hjcmgp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1224 -
C:\Windows\SysWOW64\Hppfog32.exeC:\Windows\system32\Hppfog32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068 -
C:\Windows\SysWOW64\Ilicig32.exeC:\Windows\system32\Ilicig32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Windows\SysWOW64\Ihpdoh32.exeC:\Windows\system32\Ihpdoh32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896 -
C:\Windows\SysWOW64\Imoilo32.exeC:\Windows\system32\Imoilo32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\Ikbifcpb.exeC:\Windows\system32\Ikbifcpb.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Windows\SysWOW64\Iaonhm32.exeC:\Windows\system32\Iaonhm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Windows\SysWOW64\Jglgpdcc.exeC:\Windows\system32\Jglgpdcc.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Windows\SysWOW64\Jnhlbn32.exeC:\Windows\system32\Jnhlbn32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640 -
C:\Windows\SysWOW64\Jblnaq32.exeC:\Windows\system32\Jblnaq32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Windows\SysWOW64\Kdpcikdi.exeC:\Windows\system32\Kdpcikdi.exe33⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\Knhhaaki.exeC:\Windows\system32\Knhhaaki.exe34⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Kgbipf32.exeC:\Windows\system32\Kgbipf32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Kgefefnd.exeC:\Windows\system32\Kgefefnd.exe36⤵
- Executes dropped EXE
PID:676 -
C:\Windows\SysWOW64\Lbackc32.exeC:\Windows\system32\Lbackc32.exe37⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\Lpedeg32.exeC:\Windows\system32\Lpedeg32.exe38⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\Lahmbo32.exeC:\Windows\system32\Lahmbo32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\Mcifdj32.exeC:\Windows\system32\Mcifdj32.exe40⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\Mmakmp32.exeC:\Windows\system32\Mmakmp32.exe41⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Mfjoeeeh.exeC:\Windows\system32\Mfjoeeeh.exe42⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\Mhilph32.exeC:\Windows\system32\Mhilph32.exe43⤵
- Executes dropped EXE
PID:2348 -
C:\Windows\SysWOW64\Mikhgqbi.exeC:\Windows\system32\Mikhgqbi.exe44⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Mlkail32.exeC:\Windows\system32\Mlkail32.exe45⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Nmkncofl.exeC:\Windows\system32\Nmkncofl.exe46⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\Nianhplq.exeC:\Windows\system32\Nianhplq.exe47⤵
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\Noogpfjh.exeC:\Windows\system32\Noogpfjh.exe48⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Nkegeg32.exeC:\Windows\system32\Nkegeg32.exe49⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Neklbppb.exeC:\Windows\system32\Neklbppb.exe50⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\Nkhdkgnj.exeC:\Windows\system32\Nkhdkgnj.exe51⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Nemhhpmp.exeC:\Windows\system32\Nemhhpmp.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\Nhlddkmc.exeC:\Windows\system32\Nhlddkmc.exe53⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Nadimacd.exeC:\Windows\system32\Nadimacd.exe54⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Ohnaik32.exeC:\Windows\system32\Ohnaik32.exe55⤵
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Omkjbb32.exeC:\Windows\system32\Omkjbb32.exe56⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Ommfga32.exeC:\Windows\system32\Ommfga32.exe57⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Ocjophem.exeC:\Windows\system32\Ocjophem.exe58⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\Olbchn32.exeC:\Windows\system32\Olbchn32.exe59⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\Oghhfg32.exeC:\Windows\system32\Oghhfg32.exe60⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Oldpnn32.exeC:\Windows\system32\Oldpnn32.exe61⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\SysWOW64\Oaaifdhb.exeC:\Windows\system32\Oaaifdhb.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:240 -
C:\Windows\SysWOW64\Poeipifl.exeC:\Windows\system32\Poeipifl.exe63⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\Pdbahpec.exeC:\Windows\system32\Pdbahpec.exe64⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\SysWOW64\Pnjfae32.exeC:\Windows\system32\Pnjfae32.exe65⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Pkofjijm.exeC:\Windows\system32\Pkofjijm.exe66⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Phbgcnig.exeC:\Windows\system32\Phbgcnig.exe67⤵PID:2676
-
C:\Windows\SysWOW64\Pjcckf32.exeC:\Windows\system32\Pjcckf32.exe68⤵PID:656
-
C:\Windows\SysWOW64\Pdihiook.exeC:\Windows\system32\Pdihiook.exe69⤵PID:1760
-
C:\Windows\SysWOW64\Pjfpafmb.exeC:\Windows\system32\Pjfpafmb.exe70⤵PID:2936
-
C:\Windows\SysWOW64\Pcnejk32.exeC:\Windows\system32\Pcnejk32.exe71⤵PID:2772
-
C:\Windows\SysWOW64\Qndigd32.exeC:\Windows\system32\Qndigd32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2272 -
C:\Windows\SysWOW64\Qglmpi32.exeC:\Windows\system32\Qglmpi32.exe73⤵PID:696
-
C:\Windows\SysWOW64\Qqdbiopj.exeC:\Windows\system32\Qqdbiopj.exe74⤵PID:300
-
C:\Windows\SysWOW64\Accnekon.exeC:\Windows\system32\Accnekon.exe75⤵PID:2808
-
C:\Windows\SysWOW64\Amkbnp32.exeC:\Windows\system32\Amkbnp32.exe76⤵PID:1264
-
C:\Windows\SysWOW64\Afdgfelo.exeC:\Windows\system32\Afdgfelo.exe77⤵PID:896
-
C:\Windows\SysWOW64\Akqpom32.exeC:\Windows\system32\Akqpom32.exe78⤵
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\Aggpdnpj.exeC:\Windows\system32\Aggpdnpj.exe79⤵PID:2940
-
C:\Windows\SysWOW64\Aekqmbod.exeC:\Windows\system32\Aekqmbod.exe80⤵PID:2620
-
C:\Windows\SysWOW64\Ancefgfd.exeC:\Windows\system32\Ancefgfd.exe81⤵PID:2576
-
C:\Windows\SysWOW64\Acqnnndl.exeC:\Windows\system32\Acqnnndl.exe82⤵PID:2416
-
C:\Windows\SysWOW64\Bepjha32.exeC:\Windows\system32\Bepjha32.exe83⤵PID:2384
-
C:\Windows\SysWOW64\Bfagpiam.exeC:\Windows\system32\Bfagpiam.exe84⤵PID:592
-
C:\Windows\SysWOW64\Bgqcjlhp.exeC:\Windows\system32\Bgqcjlhp.exe85⤵PID:2812
-
C:\Windows\SysWOW64\Bjoofhgc.exeC:\Windows\system32\Bjoofhgc.exe86⤵PID:944
-
C:\Windows\SysWOW64\Bplhnoej.exeC:\Windows\system32\Bplhnoej.exe87⤵PID:1820
-
C:\Windows\SysWOW64\Bjallg32.exeC:\Windows\system32\Bjallg32.exe88⤵PID:1776
-
C:\Windows\SysWOW64\Bfhmqhkd.exeC:\Windows\system32\Bfhmqhkd.exe89⤵PID:2276
-
C:\Windows\SysWOW64\Cohkpj32.exeC:\Windows\system32\Cohkpj32.exe90⤵PID:1728
-
C:\Windows\SysWOW64\Cojhejbh.exeC:\Windows\system32\Cojhejbh.exe91⤵PID:1072
-
C:\Windows\SysWOW64\Cmpdgf32.exeC:\Windows\system32\Cmpdgf32.exe92⤵PID:1836
-
C:\Windows\SysWOW64\Cheido32.exeC:\Windows\system32\Cheido32.exe93⤵PID:616
-
C:\Windows\SysWOW64\Dpqnhadq.exeC:\Windows\system32\Dpqnhadq.exe94⤵
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\Dgjfek32.exeC:\Windows\system32\Dgjfek32.exe95⤵PID:2080
-
C:\Windows\SysWOW64\Dlgnmb32.exeC:\Windows\system32\Dlgnmb32.exe96⤵PID:772
-
C:\Windows\SysWOW64\Dgmbkk32.exeC:\Windows\system32\Dgmbkk32.exe97⤵PID:3012
-
C:\Windows\SysWOW64\Dmgkgeah.exeC:\Windows\system32\Dmgkgeah.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2752 -
C:\Windows\SysWOW64\Dcccpl32.exeC:\Windows\system32\Dcccpl32.exe99⤵PID:2820
-
C:\Windows\SysWOW64\Dpgcip32.exeC:\Windows\system32\Dpgcip32.exe100⤵PID:2432
-
C:\Windows\SysWOW64\Dhbhmb32.exeC:\Windows\system32\Dhbhmb32.exe101⤵PID:2056
-
C:\Windows\SysWOW64\Dakmfh32.exeC:\Windows\system32\Dakmfh32.exe102⤵PID:1128
-
C:\Windows\SysWOW64\Eoompl32.exeC:\Windows\system32\Eoompl32.exe103⤵PID:2508
-
C:\Windows\SysWOW64\Edlfhc32.exeC:\Windows\system32\Edlfhc32.exe104⤵PID:2264
-
C:\Windows\SysWOW64\Ednbncmb.exeC:\Windows\system32\Ednbncmb.exe105⤵PID:1876
-
C:\Windows\SysWOW64\Ejkkfjkj.exeC:\Windows\system32\Ejkkfjkj.exe106⤵PID:1104
-
C:\Windows\SysWOW64\Epecbd32.exeC:\Windows\system32\Epecbd32.exe107⤵PID:2316
-
C:\Windows\SysWOW64\Ekjgpm32.exeC:\Windows\system32\Ekjgpm32.exe108⤵PID:1812
-
C:\Windows\SysWOW64\Edclib32.exeC:\Windows\system32\Edclib32.exe109⤵PID:2044
-
C:\Windows\SysWOW64\Enkpahon.exeC:\Windows\system32\Enkpahon.exe110⤵PID:1680
-
C:\Windows\SysWOW64\Fchijone.exeC:\Windows\system32\Fchijone.exe111⤵PID:588
-
C:\Windows\SysWOW64\Fheabelm.exeC:\Windows\system32\Fheabelm.exe112⤵PID:2788
-
C:\Windows\SysWOW64\Fjdnlhco.exeC:\Windows\system32\Fjdnlhco.exe113⤵PID:2332
-
C:\Windows\SysWOW64\Fkejcq32.exeC:\Windows\system32\Fkejcq32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2608 -
C:\Windows\SysWOW64\Fcmben32.exeC:\Windows\system32\Fcmben32.exe115⤵PID:2768
-
C:\Windows\SysWOW64\Fhikme32.exeC:\Windows\system32\Fhikme32.exe116⤵PID:2436
-
C:\Windows\SysWOW64\Foccjood.exeC:\Windows\system32\Foccjood.exe117⤵PID:2388
-
C:\Windows\SysWOW64\Fgohna32.exeC:\Windows\system32\Fgohna32.exe118⤵PID:1568
-
C:\Windows\SysWOW64\Fqglggcp.exeC:\Windows\system32\Fqglggcp.exe119⤵PID:2008
-
C:\Windows\SysWOW64\Fkmqdpce.exeC:\Windows\system32\Fkmqdpce.exe120⤵PID:1972
-
C:\Windows\SysWOW64\Gcheib32.exeC:\Windows\system32\Gcheib32.exe121⤵PID:1980
-
C:\Windows\SysWOW64\Gnmifk32.exeC:\Windows\system32\Gnmifk32.exe122⤵PID:936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-