Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 00:55
Behavioral task
behavioral1
Sample
19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe
-
Size
125KB
-
MD5
19decd64e2569e9a47e1b33818f52750
-
SHA1
6359d3e36417f69e10e49b8b04b470b93306a49d
-
SHA256
c541db0e1ebae0e9c05f1c8eb0c3bd1d78759f88f3a9dcccd3c6ef4c0c48f5cc
-
SHA512
8807930502a06ba7665e417f3fc2a085f410c60a6fc76d118f6dfd8a565d65abd05619d635e722d6ccb3328c49700865b6b0dd40bba66b1eee97bb4996d4d6ca
-
SSDEEP
3072:Kj9VJt/bGAsKywP5R6lv8cO1WdTCn93OGey/ZhJakrPF:8VY4R/clTCndOGeKTaG
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fpmeimpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkigbfja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eelifc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gplbcgbg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kifjip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agnkck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmojd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpgbgpbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kcphpdil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bipnihgi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqagkjne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpofd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmblhh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkqepi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Halhfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncmaai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aiabhj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epeohn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohnljine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jbbmmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pfkpiled.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iodjcnca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jalakeme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaonbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lacijjgi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peaahmcd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikdlmmbh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efopjbjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nkkggl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkaclqkk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdmjdkda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfhlpnfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndmgnkja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpelqj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijigfaol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghohdk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnimia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqcejcha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cplckbmc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqgjmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gcmpgpkp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agikne32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jekpljgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bojohp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdopjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kqdodo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncecioib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dncpkjoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifjoop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meljappg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mmghklif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apggckbf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnhdjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cbnbhfde.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccigpbga.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjojkpdp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkalbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dfemdcba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Canocm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnlfqngm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbgfhnhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Acgfec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Clgmkbna.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igqbiacj.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/4076-0-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000b00000002324f-6.dat family_berbew behavioral2/memory/1436-7-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0008000000023278-14.dat family_berbew behavioral2/memory/1960-15-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002327a-22.dat family_berbew behavioral2/memory/2872-24-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002327c-30.dat family_berbew behavioral2/memory/4028-31-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002327e-37.dat family_berbew behavioral2/memory/1028-39-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023280-41.dat family_berbew behavioral2/memory/3040-47-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023282-54.dat family_berbew behavioral2/memory/3700-55-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023284-57.dat family_berbew behavioral2/memory/800-64-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023286-70.dat family_berbew behavioral2/memory/3560-71-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023288-78.dat family_berbew behavioral2/memory/1164-79-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002328a-86.dat family_berbew behavioral2/memory/2304-87-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002328c-94.dat family_berbew behavioral2/memory/1416-95-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002328f-102.dat family_berbew behavioral2/memory/4616-103-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023291-110.dat family_berbew behavioral2/memory/436-112-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023293-113.dat family_berbew behavioral2/files/0x0007000000023293-118.dat family_berbew behavioral2/memory/4584-120-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023295-126.dat family_berbew behavioral2/memory/812-127-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023297-134.dat family_berbew behavioral2/memory/1844-135-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x0007000000023299-142.dat family_berbew behavioral2/memory/4716-143-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002329b-150.dat family_berbew behavioral2/memory/3872-151-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002329d-158.dat family_berbew behavioral2/memory/404-159-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x000700000002329f-166.dat family_berbew behavioral2/memory/4712-167-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232a1-174.dat family_berbew behavioral2/memory/2604-175-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232a3-182.dat family_berbew behavioral2/memory/1236-183-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232a6-190.dat family_berbew behavioral2/memory/936-192-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232a8-198.dat family_berbew behavioral2/memory/4396-200-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232aa-206.dat family_berbew behavioral2/memory/2316-207-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232ac-214.dat family_berbew behavioral2/memory/3252-220-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232ae-222.dat family_berbew behavioral2/memory/4592-224-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232b0-230.dat family_berbew behavioral2/memory/1404-232-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232b2-238.dat family_berbew behavioral2/memory/2496-240-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew behavioral2/files/0x00070000000232b4-246.dat family_berbew behavioral2/memory/3912-247-0x0000000000400000-0x0000000000447000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
pid Process 1436 Pmlfqh32.exe 1960 Pmpolgoi.exe 2872 Qfkqjmdg.exe 4028 Qacameaj.exe 1028 Ddgibkpc.exe 3040 Doagjc32.exe 3700 Dkhgod32.exe 800 Eqgmmk32.exe 3560 Edeeci32.exe 1164 Ekajec32.exe 2304 Fqppci32.exe 1416 Fdnhih32.exe 4616 Feqeog32.exe 436 Fganqbgg.exe 4584 Fkofga32.exe 812 Gkaclqkk.exe 1844 Giecfejd.exe 4716 Ggkqgaol.exe 3872 Hnlodjpa.exe 404 Halhfe32.exe 4712 Hnbeeiji.exe 2604 Inebjihf.exe 1236 Iojkeh32.exe 936 Ibjqaf32.exe 4396 Jaonbc32.exe 2316 Jikoopij.exe 3252 Kiphjo32.exe 4592 Kibeoo32.exe 1404 Kcoccc32.exe 2496 Lhqefjpo.exe 3912 Legben32.exe 1136 Lhgkgijg.exe 4532 Mjidgkog.exe 4564 Mpeiie32.exe 2516 Nciopppp.exe 1740 Nqmojd32.exe 1116 Nijqcf32.exe 452 Nqcejcha.exe 4792 Ojnfihmo.exe 3940 Oonlfo32.exe 4776 Oophlo32.exe 368 Oikjkc32.exe 3780 Pfojdh32.exe 3152 Ppgomnai.exe 3612 Piapkbeg.exe 4408 Pfepdg32.exe 4764 Pfhmjf32.exe 5012 Qiiflaoo.exe 4424 Qfmfefni.exe 2592 Afockelf.exe 232 Apggckbf.exe 4296 Aiplmq32.exe 3628 Aaiqcnhg.exe 1748 Bigbmpco.exe 4556 Bpcgpihi.exe 2984 Biklho32.exe 2588 Bfolacnc.exe 4940 Bipecnkd.exe 4152 Bbhildae.exe 2988 Cmpjoloh.exe 4944 Cpacqg32.exe 1368 Cildom32.exe 4896 Dgpeha32.exe 4324 Dickplko.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bejceb32.dll Fcpakn32.exe File created C:\Windows\SysWOW64\Lfmojjnk.dll Gkbnkfei.exe File created C:\Windows\SysWOW64\Cgdlfk32.exe Cpjdiadb.exe File created C:\Windows\SysWOW64\Cnkilbni.exe Cqghcn32.exe File opened for modification C:\Windows\SysWOW64\Ononmo32.exe Odgjdibf.exe File created C:\Windows\SysWOW64\Akmjdpac.exe Abdfkj32.exe File created C:\Windows\SysWOW64\Qpboqfjk.dll Blabakle.exe File created C:\Windows\SysWOW64\Gmlplbib.exe Ghohdk32.exe File opened for modification C:\Windows\SysWOW64\Mbnjcg32.exe Mbkmngfn.exe File opened for modification C:\Windows\SysWOW64\Pfhmjf32.exe Pfepdg32.exe File created C:\Windows\SysWOW64\Bcqbmqdi.dll Pohnnqgo.exe File opened for modification C:\Windows\SysWOW64\Gkbnkfei.exe Gokmfe32.exe File created C:\Windows\SysWOW64\Nicjaino.exe Nkojheoe.exe File created C:\Windows\SysWOW64\Pkjdhm32.dll Aimhmkgn.exe File created C:\Windows\SysWOW64\Jlilhlel.dll Llpofd32.exe File opened for modification C:\Windows\SysWOW64\Mdcmnfop.exe Mmiealgc.exe File opened for modification C:\Windows\SysWOW64\Ahinbo32.exe Ancjef32.exe File opened for modification C:\Windows\SysWOW64\Iameid32.exe Iibaeb32.exe File created C:\Windows\SysWOW64\Gokmfe32.exe Gmlplbib.exe File opened for modification C:\Windows\SysWOW64\Lbgcch32.exe Lmjkka32.exe File created C:\Windows\SysWOW64\Ichelm32.dll Kibeoo32.exe File created C:\Windows\SysWOW64\Cmpjoloh.exe Bbhildae.exe File created C:\Windows\SysWOW64\Kelpjn32.dll Gckjlf32.exe File created C:\Windows\SysWOW64\Paomog32.exe Oajccgmd.exe File opened for modification C:\Windows\SysWOW64\Gknkkmmj.exe Gaffbg32.exe File created C:\Windows\SysWOW64\Bcinkldn.dll Hnhdjn32.exe File opened for modification C:\Windows\SysWOW64\Ndpcdjho.exe Ndmgnkja.exe File opened for modification C:\Windows\SysWOW64\Dcnqkb32.exe Cjflblll.exe File created C:\Windows\SysWOW64\Aehojk32.dll Egbken32.exe File opened for modification C:\Windows\SysWOW64\Bnppkj32.exe Aeglbeea.exe File created C:\Windows\SysWOW64\Abdfkj32.exe Akjnnpcf.exe File opened for modification C:\Windows\SysWOW64\Nocphd32.exe Mndcnafd.exe File opened for modification C:\Windows\SysWOW64\Okfpid32.exe Nbkojo32.exe File created C:\Windows\SysWOW64\Aaqcco32.dll Jdopjh32.exe File opened for modification C:\Windows\SysWOW64\Dmplkd32.exe Dmnpfd32.exe File created C:\Windows\SysWOW64\Cbhkmfgo.dll Elhfbp32.exe File created C:\Windows\SysWOW64\Fdmjdkda.exe Fdjnolfd.exe File created C:\Windows\SysWOW64\Gfemmb32.exe Gnjhhpgl.exe File opened for modification C:\Windows\SysWOW64\Nlefjnno.exe Ncmaai32.exe File created C:\Windows\SysWOW64\Gbhgpg32.dll Hlfcqh32.exe File opened for modification C:\Windows\SysWOW64\Knkokl32.exe Kfpjgi32.exe File opened for modification C:\Windows\SysWOW64\Gjagapbn.exe Gplbcgbg.exe File created C:\Windows\SysWOW64\Kbpkkeen.dll Biklho32.exe File created C:\Windows\SysWOW64\Opfqgkgc.dll Hhobjf32.exe File opened for modification C:\Windows\SysWOW64\Kfjjbd32.exe Kifjip32.exe File created C:\Windows\SysWOW64\Anqfepaj.exe Qdhalj32.exe File created C:\Windows\SysWOW64\Jhpjbgne.exe Idbalhho.exe File opened for modification C:\Windows\SysWOW64\Imdgljil.exe Ifjoop32.exe File created C:\Windows\SysWOW64\Ieknpb32.exe Iameid32.exe File opened for modification C:\Windows\SysWOW64\Elolco32.exe Ecfhji32.exe File created C:\Windows\SysWOW64\Jgqfbo32.dll Mhefhf32.exe File opened for modification C:\Windows\SysWOW64\Epgpajdp.exe Ejjgic32.exe File created C:\Windows\SysWOW64\Imeeohoi.exe Idmafc32.exe File created C:\Windows\SysWOW64\Bigbmpco.exe Aaiqcnhg.exe File created C:\Windows\SysWOW64\Eacdhhjj.dll Edfknb32.exe File created C:\Windows\SysWOW64\Klgqabib.exe Kkgdhp32.exe File created C:\Windows\SysWOW64\Jbjabqbh.dll Mklfjm32.exe File created C:\Windows\SysWOW64\Fpbibenl.dll Eleimp32.exe File created C:\Windows\SysWOW64\Mmpbkm32.exe Lcealh32.exe File opened for modification C:\Windows\SysWOW64\Hopfadlp.exe Galfhpmf.exe File created C:\Windows\SysWOW64\Gkfllami.dll Kfmmajed.exe File created C:\Windows\SysWOW64\Lddble32.exe Logicn32.exe File created C:\Windows\SysWOW64\Oknplpbh.dll Ffpcbchm.exe File opened for modification C:\Windows\SysWOW64\Kfanflne.exe Jepbodhg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8424 1844 WerFault.exe 743 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paoinm32.dll" Fdnhih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pfhmjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfemdcba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Micdgi32.dll" Dkgeao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dgpeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clmbea32.dll" Jchaoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppbkjhqi.dll" Bnbeggmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ggkqgaol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pmhkflnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enehjd32.dll" Mmpbkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cjflblll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ikdlmmbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llgdkbfj.dll" Nqmojd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipdkapdh.dll" Mkepineo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oiijig32.dll" Jhpjbgne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpejnp32.dll" Jhmhpfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmplkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jfehpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oiphhg32.dll" Lkiiee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iepihf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kiphjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qolmplcl.dll" Okpkgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qfkqjmdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jjgkab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dpgbgpbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Epeohn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lagqnoge.dll" Kcgekjgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cddjofbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fdnhih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lmheph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdebfago.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ahinbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iodaikfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agccao32.dll" Bmddihfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enonclfe.dll" Kobnji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kinhljen.dll" Clffalkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hcabhido.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kfdcbiol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nlefjnno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmeoqlpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Meljappg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ioppho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mhefhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Glngep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naompiea.dll" Koekpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohegbggk.dll" Mqpcdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjqkpgdc.dll" Eepkkefp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nehjmnei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lfnfhg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pblolb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ffjkdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehepld32.dll" Bbcignbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eqkmpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kcoccc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gipbck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgekcecd.dll" Bkepeaaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Flodilma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jognokdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Paomog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ancjef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hcabhido.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hkggfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Foajai32.dll" Ffeaichg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mhpeelnd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4076 wrote to memory of 1436 4076 19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe 91 PID 4076 wrote to memory of 1436 4076 19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe 91 PID 4076 wrote to memory of 1436 4076 19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe 91 PID 1436 wrote to memory of 1960 1436 Pmlfqh32.exe 92 PID 1436 wrote to memory of 1960 1436 Pmlfqh32.exe 92 PID 1436 wrote to memory of 1960 1436 Pmlfqh32.exe 92 PID 1960 wrote to memory of 2872 1960 Pmpolgoi.exe 93 PID 1960 wrote to memory of 2872 1960 Pmpolgoi.exe 93 PID 1960 wrote to memory of 2872 1960 Pmpolgoi.exe 93 PID 2872 wrote to memory of 4028 2872 Qfkqjmdg.exe 94 PID 2872 wrote to memory of 4028 2872 Qfkqjmdg.exe 94 PID 2872 wrote to memory of 4028 2872 Qfkqjmdg.exe 94 PID 4028 wrote to memory of 1028 4028 Qacameaj.exe 95 PID 4028 wrote to memory of 1028 4028 Qacameaj.exe 95 PID 4028 wrote to memory of 1028 4028 Qacameaj.exe 95 PID 1028 wrote to memory of 3040 1028 Ddgibkpc.exe 96 PID 1028 wrote to memory of 3040 1028 Ddgibkpc.exe 96 PID 1028 wrote to memory of 3040 1028 Ddgibkpc.exe 96 PID 3040 wrote to memory of 3700 3040 Doagjc32.exe 97 PID 3040 wrote to memory of 3700 3040 Doagjc32.exe 97 PID 3040 wrote to memory of 3700 3040 Doagjc32.exe 97 PID 3700 wrote to memory of 800 3700 Dkhgod32.exe 98 PID 3700 wrote to memory of 800 3700 Dkhgod32.exe 98 PID 3700 wrote to memory of 800 3700 Dkhgod32.exe 98 PID 800 wrote to memory of 3560 800 Eqgmmk32.exe 99 PID 800 wrote to memory of 3560 800 Eqgmmk32.exe 99 PID 800 wrote to memory of 3560 800 Eqgmmk32.exe 99 PID 3560 wrote to memory of 1164 3560 Edeeci32.exe 100 PID 3560 wrote to memory of 1164 3560 Edeeci32.exe 100 PID 3560 wrote to memory of 1164 3560 Edeeci32.exe 100 PID 1164 wrote to memory of 2304 1164 Ekajec32.exe 101 PID 1164 wrote to memory of 2304 1164 Ekajec32.exe 101 PID 1164 wrote to memory of 2304 1164 Ekajec32.exe 101 PID 2304 wrote to memory of 1416 2304 Fqppci32.exe 102 PID 2304 wrote to memory of 1416 2304 Fqppci32.exe 102 PID 2304 wrote to memory of 1416 2304 Fqppci32.exe 102 PID 1416 wrote to memory of 4616 1416 Fdnhih32.exe 103 PID 1416 wrote to memory of 4616 1416 Fdnhih32.exe 103 PID 1416 wrote to memory of 4616 1416 Fdnhih32.exe 103 PID 4616 wrote to memory of 436 4616 Feqeog32.exe 104 PID 4616 wrote to memory of 436 4616 Feqeog32.exe 104 PID 4616 wrote to memory of 436 4616 Feqeog32.exe 104 PID 436 wrote to memory of 4584 436 Fganqbgg.exe 105 PID 436 wrote to memory of 4584 436 Fganqbgg.exe 105 PID 436 wrote to memory of 4584 436 Fganqbgg.exe 105 PID 4584 wrote to memory of 812 4584 Fkofga32.exe 106 PID 4584 wrote to memory of 812 4584 Fkofga32.exe 106 PID 4584 wrote to memory of 812 4584 Fkofga32.exe 106 PID 812 wrote to memory of 1844 812 Gkaclqkk.exe 107 PID 812 wrote to memory of 1844 812 Gkaclqkk.exe 107 PID 812 wrote to memory of 1844 812 Gkaclqkk.exe 107 PID 1844 wrote to memory of 4716 1844 Giecfejd.exe 108 PID 1844 wrote to memory of 4716 1844 Giecfejd.exe 108 PID 1844 wrote to memory of 4716 1844 Giecfejd.exe 108 PID 4716 wrote to memory of 3872 4716 Ggkqgaol.exe 109 PID 4716 wrote to memory of 3872 4716 Ggkqgaol.exe 109 PID 4716 wrote to memory of 3872 4716 Ggkqgaol.exe 109 PID 3872 wrote to memory of 404 3872 Hnlodjpa.exe 110 PID 3872 wrote to memory of 404 3872 Hnlodjpa.exe 110 PID 3872 wrote to memory of 404 3872 Hnlodjpa.exe 110 PID 404 wrote to memory of 4712 404 Halhfe32.exe 111 PID 404 wrote to memory of 4712 404 Halhfe32.exe 111 PID 404 wrote to memory of 4712 404 Halhfe32.exe 111 PID 4712 wrote to memory of 2604 4712 Hnbeeiji.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\19decd64e2569e9a47e1b33818f52750_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\Pmlfqh32.exeC:\Windows\system32\Pmlfqh32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Pmpolgoi.exeC:\Windows\system32\Pmpolgoi.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\Qfkqjmdg.exeC:\Windows\system32\Qfkqjmdg.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\Qacameaj.exeC:\Windows\system32\Qacameaj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\Ddgibkpc.exeC:\Windows\system32\Ddgibkpc.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\Doagjc32.exeC:\Windows\system32\Doagjc32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\Dkhgod32.exeC:\Windows\system32\Dkhgod32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\Eqgmmk32.exeC:\Windows\system32\Eqgmmk32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\Edeeci32.exeC:\Windows\system32\Edeeci32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\Ekajec32.exeC:\Windows\system32\Ekajec32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\Fqppci32.exeC:\Windows\system32\Fqppci32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Fdnhih32.exeC:\Windows\system32\Fdnhih32.exe13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\Feqeog32.exeC:\Windows\system32\Feqeog32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\Fganqbgg.exeC:\Windows\system32\Fganqbgg.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\Fkofga32.exeC:\Windows\system32\Fkofga32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Gkaclqkk.exeC:\Windows\system32\Gkaclqkk.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\Giecfejd.exeC:\Windows\system32\Giecfejd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\Ggkqgaol.exeC:\Windows\system32\Ggkqgaol.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\Hnlodjpa.exeC:\Windows\system32\Hnlodjpa.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\Halhfe32.exeC:\Windows\system32\Halhfe32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\Hnbeeiji.exeC:\Windows\system32\Hnbeeiji.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\Inebjihf.exeC:\Windows\system32\Inebjihf.exe23⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Iojkeh32.exeC:\Windows\system32\Iojkeh32.exe24⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\SysWOW64\Ibjqaf32.exeC:\Windows\system32\Ibjqaf32.exe25⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\Jaonbc32.exeC:\Windows\system32\Jaonbc32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\Jikoopij.exeC:\Windows\system32\Jikoopij.exe27⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Kiphjo32.exeC:\Windows\system32\Kiphjo32.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\Kibeoo32.exeC:\Windows\system32\Kibeoo32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4592 -
C:\Windows\SysWOW64\Kcoccc32.exeC:\Windows\system32\Kcoccc32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:1404 -
C:\Windows\SysWOW64\Lhqefjpo.exeC:\Windows\system32\Lhqefjpo.exe31⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\Legben32.exeC:\Windows\system32\Legben32.exe32⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\Lhgkgijg.exeC:\Windows\system32\Lhgkgijg.exe33⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\Mjidgkog.exeC:\Windows\system32\Mjidgkog.exe34⤵
- Executes dropped EXE
PID:4532 -
C:\Windows\SysWOW64\Mpeiie32.exeC:\Windows\system32\Mpeiie32.exe35⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\SysWOW64\Nciopppp.exeC:\Windows\system32\Nciopppp.exe36⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Nqmojd32.exeC:\Windows\system32\Nqmojd32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\Nijqcf32.exeC:\Windows\system32\Nijqcf32.exe38⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\Nqcejcha.exeC:\Windows\system32\Nqcejcha.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\Ojnfihmo.exeC:\Windows\system32\Ojnfihmo.exe40⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\Oonlfo32.exeC:\Windows\system32\Oonlfo32.exe41⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\Oophlo32.exeC:\Windows\system32\Oophlo32.exe42⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\Oikjkc32.exeC:\Windows\system32\Oikjkc32.exe43⤵
- Executes dropped EXE
PID:368 -
C:\Windows\SysWOW64\Pfojdh32.exeC:\Windows\system32\Pfojdh32.exe44⤵
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\Ppgomnai.exeC:\Windows\system32\Ppgomnai.exe45⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\Piapkbeg.exeC:\Windows\system32\Piapkbeg.exe46⤵
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\Pfepdg32.exeC:\Windows\system32\Pfepdg32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4408 -
C:\Windows\SysWOW64\Pfhmjf32.exeC:\Windows\system32\Pfhmjf32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:4764 -
C:\Windows\SysWOW64\Qiiflaoo.exeC:\Windows\system32\Qiiflaoo.exe49⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\Qfmfefni.exeC:\Windows\system32\Qfmfefni.exe50⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\Afockelf.exeC:\Windows\system32\Afockelf.exe51⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\Apggckbf.exeC:\Windows\system32\Apggckbf.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\Aiplmq32.exeC:\Windows\system32\Aiplmq32.exe53⤵
- Executes dropped EXE
PID:4296 -
C:\Windows\SysWOW64\Aaiqcnhg.exeC:\Windows\system32\Aaiqcnhg.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3628 -
C:\Windows\SysWOW64\Bigbmpco.exeC:\Windows\system32\Bigbmpco.exe55⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\Bpcgpihi.exeC:\Windows\system32\Bpcgpihi.exe56⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\Biklho32.exeC:\Windows\system32\Biklho32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\Bfolacnc.exeC:\Windows\system32\Bfolacnc.exe58⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Bipecnkd.exeC:\Windows\system32\Bipecnkd.exe59⤵
- Executes dropped EXE
PID:4940 -
C:\Windows\SysWOW64\Bbhildae.exeC:\Windows\system32\Bbhildae.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4152 -
C:\Windows\SysWOW64\Cmpjoloh.exeC:\Windows\system32\Cmpjoloh.exe61⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\Cpacqg32.exeC:\Windows\system32\Cpacqg32.exe62⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\Cildom32.exeC:\Windows\system32\Cildom32.exe63⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Dgpeha32.exeC:\Windows\system32\Dgpeha32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:4896 -
C:\Windows\SysWOW64\Dickplko.exeC:\Windows\system32\Dickplko.exe65⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\SysWOW64\Dckoia32.exeC:\Windows\system32\Dckoia32.exe66⤵PID:3792
-
C:\Windows\SysWOW64\Dncpkjoc.exeC:\Windows\system32\Dncpkjoc.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2400 -
C:\Windows\SysWOW64\Dcphdqmj.exeC:\Windows\system32\Dcphdqmj.exe68⤵PID:3556
-
C:\Windows\SysWOW64\Ekimjn32.exeC:\Windows\system32\Ekimjn32.exe69⤵PID:2976
-
C:\Windows\SysWOW64\Eafbmgad.exeC:\Windows\system32\Eafbmgad.exe70⤵PID:3848
-
C:\Windows\SysWOW64\Egbken32.exeC:\Windows\system32\Egbken32.exe71⤵
- Drops file in System32 directory
PID:640 -
C:\Windows\SysWOW64\Edfknb32.exeC:\Windows\system32\Edfknb32.exe72⤵
- Drops file in System32 directory
PID:3828 -
C:\Windows\SysWOW64\Fjeplijj.exeC:\Windows\system32\Fjeplijj.exe73⤵PID:4612
-
C:\Windows\SysWOW64\Fcpakn32.exeC:\Windows\system32\Fcpakn32.exe74⤵
- Drops file in System32 directory
PID:736 -
C:\Windows\SysWOW64\Fdpnda32.exeC:\Windows\system32\Fdpnda32.exe75⤵PID:4924
-
C:\Windows\SysWOW64\Fcekfnkb.exeC:\Windows\system32\Fcekfnkb.exe76⤵PID:1444
-
C:\Windows\SysWOW64\Gkoplk32.exeC:\Windows\system32\Gkoplk32.exe77⤵PID:3732
-
C:\Windows\SysWOW64\Gkalbj32.exeC:\Windows\system32\Gkalbj32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1900 -
C:\Windows\SysWOW64\Gkcigjel.exeC:\Windows\system32\Gkcigjel.exe79⤵PID:4760
-
C:\Windows\SysWOW64\Gkefmjcj.exeC:\Windows\system32\Gkefmjcj.exe80⤵PID:5152
-
C:\Windows\SysWOW64\Gglfbkin.exeC:\Windows\system32\Gglfbkin.exe81⤵PID:5204
-
C:\Windows\SysWOW64\Hepgkohh.exeC:\Windows\system32\Hepgkohh.exe82⤵PID:5264
-
C:\Windows\SysWOW64\Hcedmkmp.exeC:\Windows\system32\Hcedmkmp.exe83⤵PID:5308
-
C:\Windows\SysWOW64\Hchqbkkm.exeC:\Windows\system32\Hchqbkkm.exe84⤵PID:5352
-
C:\Windows\SysWOW64\Hejjanpm.exeC:\Windows\system32\Hejjanpm.exe85⤵PID:5404
-
C:\Windows\SysWOW64\Hnbnjc32.exeC:\Windows\system32\Hnbnjc32.exe86⤵PID:5464
-
C:\Windows\SysWOW64\Ilfodgeg.exeC:\Windows\system32\Ilfodgeg.exe87⤵PID:5520
-
C:\Windows\SysWOW64\Infhebbh.exeC:\Windows\system32\Infhebbh.exe88⤵PID:5572
-
C:\Windows\SysWOW64\Ilkhog32.exeC:\Windows\system32\Ilkhog32.exe89⤵PID:5620
-
C:\Windows\SysWOW64\Icfmci32.exeC:\Windows\system32\Icfmci32.exe90⤵PID:5688
-
C:\Windows\SysWOW64\Ieeimlep.exeC:\Windows\system32\Ieeimlep.exe91⤵PID:5752
-
C:\Windows\SysWOW64\Iloajfml.exeC:\Windows\system32\Iloajfml.exe92⤵PID:5812
-
C:\Windows\SysWOW64\Jhfbog32.exeC:\Windows\system32\Jhfbog32.exe93⤵PID:5880
-
C:\Windows\SysWOW64\Jnpjlajn.exeC:\Windows\system32\Jnpjlajn.exe94⤵PID:5928
-
C:\Windows\SysWOW64\Jjgkab32.exeC:\Windows\system32\Jjgkab32.exe95⤵
- Modifies registry class
PID:5968 -
C:\Windows\SysWOW64\Jdopjh32.exeC:\Windows\system32\Jdopjh32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6020 -
C:\Windows\SysWOW64\Jjihfbno.exeC:\Windows\system32\Jjihfbno.exe97⤵PID:6064
-
C:\Windows\SysWOW64\Jhmhpfmi.exeC:\Windows\system32\Jhmhpfmi.exe98⤵
- Modifies registry class
PID:6112 -
C:\Windows\SysWOW64\Jbbmmo32.exeC:\Windows\system32\Jbbmmo32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1376 -
C:\Windows\SysWOW64\Jhoeef32.exeC:\Windows\system32\Jhoeef32.exe100⤵PID:5212
-
C:\Windows\SysWOW64\Kdffjgpj.exeC:\Windows\system32\Kdffjgpj.exe101⤵PID:5316
-
C:\Windows\SysWOW64\Kbgfhnhi.exeC:\Windows\system32\Kbgfhnhi.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5368 -
C:\Windows\SysWOW64\Kkbkmqed.exeC:\Windows\system32\Kkbkmqed.exe103⤵PID:5428
-
C:\Windows\SysWOW64\Khfkfedn.exeC:\Windows\system32\Khfkfedn.exe104⤵PID:5536
-
C:\Windows\SysWOW64\Kblpcndd.exeC:\Windows\system32\Kblpcndd.exe105⤵PID:5652
-
C:\Windows\SysWOW64\Kkgdhp32.exeC:\Windows\system32\Kkgdhp32.exe106⤵
- Drops file in System32 directory
PID:5728 -
C:\Windows\SysWOW64\Klgqabib.exeC:\Windows\system32\Klgqabib.exe107⤵PID:5836
-
C:\Windows\SysWOW64\Lacijjgi.exeC:\Windows\system32\Lacijjgi.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5900 -
C:\Windows\SysWOW64\Logicn32.exeC:\Windows\system32\Logicn32.exe109⤵
- Drops file in System32 directory
PID:5980 -
C:\Windows\SysWOW64\Lddble32.exeC:\Windows\system32\Lddble32.exe110⤵PID:6052
-
C:\Windows\SysWOW64\Lahbei32.exeC:\Windows\system32\Lahbei32.exe111⤵PID:6128
-
C:\Windows\SysWOW64\Lolcnman.exeC:\Windows\system32\Lolcnman.exe112⤵PID:5148
-
C:\Windows\SysWOW64\Lefkkg32.exeC:\Windows\system32\Lefkkg32.exe113⤵PID:5320
-
C:\Windows\SysWOW64\Mkepineo.exeC:\Windows\system32\Mkepineo.exe114⤵
- Modifies registry class
PID:5472 -
C:\Windows\SysWOW64\Mlemcq32.exeC:\Windows\system32\Mlemcq32.exe115⤵PID:5616
-
C:\Windows\SysWOW64\Mdpagc32.exeC:\Windows\system32\Mdpagc32.exe116⤵PID:5696
-
C:\Windows\SysWOW64\Mklfjm32.exeC:\Windows\system32\Mklfjm32.exe117⤵
- Drops file in System32 directory
PID:5888 -
C:\Windows\SysWOW64\Mhpgca32.exeC:\Windows\system32\Mhpgca32.exe118⤵PID:2964
-
C:\Windows\SysWOW64\Mojopk32.exeC:\Windows\system32\Mojopk32.exe119⤵PID:6120
-
C:\Windows\SysWOW64\Nlnpio32.exeC:\Windows\system32\Nlnpio32.exe120⤵PID:5300
-
C:\Windows\SysWOW64\Nakhaf32.exeC:\Windows\system32\Nakhaf32.exe121⤵PID:5556
-
C:\Windows\SysWOW64\Nkcmjlio.exeC:\Windows\system32\Nkcmjlio.exe122⤵PID:5856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-