Analysis
-
max time kernel
21s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 16:24
Behavioral task
behavioral1
Sample
f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe
-
Size
381KB
-
MD5
f1885cb2016cd8ba7abbb68967dd1ad0
-
SHA1
ce6d86cdb442c318b22fb4ca4d2df681b63e95b6
-
SHA256
5736438a3bef53bde9a5bd6d7a7891164c2f89e5e516f979cacfb8c296bc9ea2
-
SHA512
b8c2e3fb824ee045c873221053fe0999349543c23a91211538e2911968bbecc2d1c415cdc7ab4ed663a8e030772ed516055a644b04adfa9665172ad9f5101cdb
-
SSDEEP
6144:kcm4FmowdHoSphraHcpOaKHpSwp9OD0IbswYT/:y4wFHoS3eFaKHpNKbbswe/
Malware Config
Signatures
-
Detect Blackmoon payload 62 IoCs
Processes:
resource yara_rule behavioral2/memory/1388-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1624-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1440-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2804-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3336-117-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4424-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2496-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2708-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3872-237-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3080-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1248-256-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2040-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2552-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3988-387-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2056-460-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1152-487-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4116-548-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3900-649-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4732-886-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/668-618-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3312-596-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3588-582-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/964-575-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/548-467-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3520-452-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2588-429-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/844-380-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3516-369-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2416-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1928-326-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4632-306-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1676-299-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2652-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4336-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2480-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3036-236-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5004-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3760-215-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/532-210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/112-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2428-183-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3168-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3316-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/712-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4552-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/64-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2648-115-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2424-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/856-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4480-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3344-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3720-66-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/668-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1032-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4748-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2944-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/532-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4752-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5044-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tnhbhh.exepjdjv.exedjvvj.exelfxlxrf.exenntntt.exevppjv.exe9lfxrlf.exelrrrrlr.exe3pdvp.exepjjjd.exedvjdv.exebnthnb.exe5jdvp.exerrlrllf.exetththb.exevdppd.exehbhbbh.exe7djdv.exe7rlxxlr.exetnbnhb.exepjdpj.exe9ttnnn.exe1jjvp.exexlrrlll.exettnhnn.exe7ddvj.exe9bhhnn.exepdjjv.exefxfrlfx.exentnnhh.exeppvjd.exejvdpj.exe5lfxfrf.exebhnnth.exedjjdv.exefflxxff.exehttnhh.exethnhtn.exedpdpj.exerllrrxl.exenbnthb.exedvjdp.exelfxrlff.exellflrfr.exetbtnnh.exejvpjd.exe9llfxrx.exerrxxlxx.exebbthbn.exejpdpj.exedjpdv.exefrfffxr.exentthtn.exentbtnh.exedvpdv.exexflfrll.exetntntt.exebbhbbh.exe3vjvd.exelffxrlf.exenbnhbt.exevvjjd.exejvvvj.exefxrlllf.exepid process 4752 tnhbhh.exe 532 pjdjv.exe 1388 djvvj.exe 2944 lfxlxrf.exe 1624 nntntt.exe 4748 vppjv.exe 1032 9lfxrlf.exe 668 lrrrrlr.exe 1440 3pdvp.exe 3720 pjjjd.exe 3344 dvjdv.exe 2804 bnthnb.exe 4480 5jdvp.exe 856 rrlrllf.exe 2700 tththb.exe 2424 vdppd.exe 4208 hbhbbh.exe 2648 7djdv.exe 3336 7rlxxlr.exe 4712 tnbnhb.exe 4744 pjdpj.exe 64 9ttnnn.exe 4552 1jjvp.exe 712 xlrrlll.exe 964 ttnhnn.exe 3492 7ddvj.exe 3360 9bhhnn.exe 4736 pdjjv.exe 3316 fxfrlfx.exe 2428 ntnnhh.exe 3168 ppvjd.exe 1444 jvdpj.exe 112 5lfxfrf.exe 4424 bhnnth.exe 5076 djjdv.exe 4440 fflxxff.exe 532 httnhh.exe 3760 thnhtn.exe 2496 dpdpj.exe 4600 rllrrxl.exe 5004 nbnthb.exe 2244 dvjdp.exe 2708 lfxrlff.exe 3036 llflrfr.exe 3872 tbtnnh.exe 2480 jvpjd.exe 4336 9llfxrx.exe 3080 rrxxlxx.exe 1248 bbthbn.exe 3044 jpdpj.exe 4628 djpdv.exe 2040 frfffxr.exe 5100 ntthtn.exe 2652 ntbtnh.exe 3916 dvpdv.exe 3964 xflfrll.exe 1976 tntntt.exe 1228 bbhbbh.exe 4912 3vjvd.exe 1692 lffxrlf.exe 908 nbnhbt.exe 1676 vvjjd.exe 4188 jvvvj.exe 1716 fxrlllf.exe -
Processes:
resource yara_rule behavioral2/memory/5044-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1388-20-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1388-26-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1624-33-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lrrrrlr.exe upx C:\3pdvp.exe upx \??\c:\pjjjd.exe upx behavioral2/memory/1440-61-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3344-68-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bnthnb.exe upx behavioral2/memory/2804-80-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rrlrllf.exe upx \??\c:\tththb.exe upx \??\c:\vdppd.exe upx \??\c:\hbhbbh.exe upx behavioral2/memory/3336-117-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pjdpj.exe upx \??\c:\xlrrlll.exe upx \??\c:\ttnhnn.exe upx \??\c:\7ddvj.exe upx \??\c:\9bhhnn.exe upx C:\pdjjv.exe upx \??\c:\fxfrlfx.exe upx C:\jvdpj.exe upx behavioral2/memory/4424-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3760-211-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2496-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2708-233-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3872-237-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3080-249-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1248-256-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2040-266-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2552-313-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4408-348-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/844-376-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3988-387-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/856-403-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2056-460-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1152-487-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4116-548-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/964-571-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3900-649-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4264-656-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2248-771-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2352-807-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3352-826-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/368-872-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1728-905-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2112-909-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4732-886-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2244-876-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2428-844-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/392-840-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4428-836-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2648-797-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5008-784-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4816-764-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2620-688-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4876-666-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/668-618-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3312-596-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2388-583-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3588-582-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/964-575-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exetnhbhh.exepjdjv.exedjvvj.exelfxlxrf.exenntntt.exevppjv.exe9lfxrlf.exelrrrrlr.exe3pdvp.exepjjjd.exedvjdv.exebnthnb.exe5jdvp.exerrlrllf.exetththb.exevdppd.exehbhbbh.exe7djdv.exe7rlxxlr.exetnbnhb.exepjdpj.exedescription pid process target process PID 5044 wrote to memory of 4752 5044 f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe tnhbhh.exe PID 5044 wrote to memory of 4752 5044 f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe tnhbhh.exe PID 5044 wrote to memory of 4752 5044 f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe tnhbhh.exe PID 4752 wrote to memory of 532 4752 tnhbhh.exe fllfxxl.exe PID 4752 wrote to memory of 532 4752 tnhbhh.exe fllfxxl.exe PID 4752 wrote to memory of 532 4752 tnhbhh.exe fllfxxl.exe PID 532 wrote to memory of 1388 532 pjdjv.exe djvvj.exe PID 532 wrote to memory of 1388 532 pjdjv.exe djvvj.exe PID 532 wrote to memory of 1388 532 pjdjv.exe djvvj.exe PID 1388 wrote to memory of 2944 1388 djvvj.exe lfxlxrf.exe PID 1388 wrote to memory of 2944 1388 djvvj.exe lfxlxrf.exe PID 1388 wrote to memory of 2944 1388 djvvj.exe lfxlxrf.exe PID 2944 wrote to memory of 1624 2944 lfxlxrf.exe nntntt.exe PID 2944 wrote to memory of 1624 2944 lfxlxrf.exe nntntt.exe PID 2944 wrote to memory of 1624 2944 lfxlxrf.exe nntntt.exe PID 1624 wrote to memory of 4748 1624 nntntt.exe vppjv.exe PID 1624 wrote to memory of 4748 1624 nntntt.exe vppjv.exe PID 1624 wrote to memory of 4748 1624 nntntt.exe vppjv.exe PID 4748 wrote to memory of 1032 4748 vppjv.exe 9lfxrlf.exe PID 4748 wrote to memory of 1032 4748 vppjv.exe 9lfxrlf.exe PID 4748 wrote to memory of 1032 4748 vppjv.exe 9lfxrlf.exe PID 1032 wrote to memory of 668 1032 9lfxrlf.exe lrrrrlr.exe PID 1032 wrote to memory of 668 1032 9lfxrlf.exe lrrrrlr.exe PID 1032 wrote to memory of 668 1032 9lfxrlf.exe lrrrrlr.exe PID 668 wrote to memory of 1440 668 lrrrrlr.exe 3pdvp.exe PID 668 wrote to memory of 1440 668 lrrrrlr.exe 3pdvp.exe PID 668 wrote to memory of 1440 668 lrrrrlr.exe 3pdvp.exe PID 1440 wrote to memory of 3720 1440 3pdvp.exe pjjjd.exe PID 1440 wrote to memory of 3720 1440 3pdvp.exe pjjjd.exe PID 1440 wrote to memory of 3720 1440 3pdvp.exe pjjjd.exe PID 3720 wrote to memory of 3344 3720 pjjjd.exe dvjdv.exe PID 3720 wrote to memory of 3344 3720 pjjjd.exe dvjdv.exe PID 3720 wrote to memory of 3344 3720 pjjjd.exe dvjdv.exe PID 3344 wrote to memory of 2804 3344 dvjdv.exe bnthnb.exe PID 3344 wrote to memory of 2804 3344 dvjdv.exe bnthnb.exe PID 3344 wrote to memory of 2804 3344 dvjdv.exe bnthnb.exe PID 2804 wrote to memory of 4480 2804 bnthnb.exe 5jdvp.exe PID 2804 wrote to memory of 4480 2804 bnthnb.exe 5jdvp.exe PID 2804 wrote to memory of 4480 2804 bnthnb.exe 5jdvp.exe PID 4480 wrote to memory of 856 4480 5jdvp.exe rrlrllf.exe PID 4480 wrote to memory of 856 4480 5jdvp.exe rrlrllf.exe PID 4480 wrote to memory of 856 4480 5jdvp.exe rrlrllf.exe PID 856 wrote to memory of 2700 856 rrlrllf.exe tththb.exe PID 856 wrote to memory of 2700 856 rrlrllf.exe tththb.exe PID 856 wrote to memory of 2700 856 rrlrllf.exe tththb.exe PID 2700 wrote to memory of 2424 2700 tththb.exe vdppd.exe PID 2700 wrote to memory of 2424 2700 tththb.exe vdppd.exe PID 2700 wrote to memory of 2424 2700 tththb.exe vdppd.exe PID 2424 wrote to memory of 4208 2424 vdppd.exe pddpd.exe PID 2424 wrote to memory of 4208 2424 vdppd.exe pddpd.exe PID 2424 wrote to memory of 4208 2424 vdppd.exe pddpd.exe PID 4208 wrote to memory of 2648 4208 hbhbbh.exe 7djdv.exe PID 4208 wrote to memory of 2648 4208 hbhbbh.exe 7djdv.exe PID 4208 wrote to memory of 2648 4208 hbhbbh.exe 7djdv.exe PID 2648 wrote to memory of 3336 2648 7djdv.exe bbbttt.exe PID 2648 wrote to memory of 3336 2648 7djdv.exe bbbttt.exe PID 2648 wrote to memory of 3336 2648 7djdv.exe bbbttt.exe PID 3336 wrote to memory of 4712 3336 7rlxxlr.exe tnbnhb.exe PID 3336 wrote to memory of 4712 3336 7rlxxlr.exe tnbnhb.exe PID 3336 wrote to memory of 4712 3336 7rlxxlr.exe tnbnhb.exe PID 4712 wrote to memory of 4744 4712 tnbnhb.exe dvvpv.exe PID 4712 wrote to memory of 4744 4712 tnbnhb.exe dvvpv.exe PID 4712 wrote to memory of 4744 4712 tnbnhb.exe dvvpv.exe PID 4744 wrote to memory of 64 4744 pjdpj.exe 9ttnnn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f1885cb2016cd8ba7abbb68967dd1ad0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\tnhbhh.exec:\tnhbhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\pjdjv.exec:\pjdjv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\djvvj.exec:\djvvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\lfxlxrf.exec:\lfxlxrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\nntntt.exec:\nntntt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\vppjv.exec:\vppjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
\??\c:\9lfxrlf.exec:\9lfxrlf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\lrrrrlr.exec:\lrrrrlr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\3pdvp.exec:\3pdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\pjjjd.exec:\pjjjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\dvjdv.exec:\dvjdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\bnthnb.exec:\bnthnb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\5jdvp.exec:\5jdvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
\??\c:\rrlrllf.exec:\rrlrllf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\tththb.exec:\tththb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\vdppd.exec:\vdppd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\hbhbbh.exec:\hbhbbh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
\??\c:\7djdv.exec:\7djdv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\7rlxxlr.exec:\7rlxxlr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
\??\c:\tnbnhb.exec:\tnbnhb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
\??\c:\pjdpj.exec:\pjdpj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\9ttnnn.exec:\9ttnnn.exe23⤵
- Executes dropped EXE
PID:64 -
\??\c:\1jjvp.exec:\1jjvp.exe24⤵
- Executes dropped EXE
PID:4552 -
\??\c:\xlrrlll.exec:\xlrrlll.exe25⤵
- Executes dropped EXE
PID:712 -
\??\c:\ttnhnn.exec:\ttnhnn.exe26⤵
- Executes dropped EXE
PID:964 -
\??\c:\7ddvj.exec:\7ddvj.exe27⤵
- Executes dropped EXE
PID:3492 -
\??\c:\9bhhnn.exec:\9bhhnn.exe28⤵
- Executes dropped EXE
PID:3360 -
\??\c:\pdjjv.exec:\pdjjv.exe29⤵
- Executes dropped EXE
PID:4736 -
\??\c:\fxfrlfx.exec:\fxfrlfx.exe30⤵
- Executes dropped EXE
PID:3316 -
\??\c:\ntnnhh.exec:\ntnnhh.exe31⤵
- Executes dropped EXE
PID:2428 -
\??\c:\ppvjd.exec:\ppvjd.exe32⤵
- Executes dropped EXE
PID:3168 -
\??\c:\jvdpj.exec:\jvdpj.exe33⤵
- Executes dropped EXE
PID:1444 -
\??\c:\5lfxfrf.exec:\5lfxfrf.exe34⤵
- Executes dropped EXE
PID:112 -
\??\c:\bhnnth.exec:\bhnnth.exe35⤵
- Executes dropped EXE
PID:4424 -
\??\c:\djjdv.exec:\djjdv.exe36⤵
- Executes dropped EXE
PID:5076 -
\??\c:\fflxxff.exec:\fflxxff.exe37⤵
- Executes dropped EXE
PID:4440 -
\??\c:\httnhh.exec:\httnhh.exe38⤵
- Executes dropped EXE
PID:532 -
\??\c:\thnhtn.exec:\thnhtn.exe39⤵
- Executes dropped EXE
PID:3760 -
\??\c:\dpdpj.exec:\dpdpj.exe40⤵
- Executes dropped EXE
PID:2496 -
\??\c:\rllrrxl.exec:\rllrrxl.exe41⤵
- Executes dropped EXE
PID:4600 -
\??\c:\nbnthb.exec:\nbnthb.exe42⤵
- Executes dropped EXE
PID:5004 -
\??\c:\dvjdp.exec:\dvjdp.exe43⤵
- Executes dropped EXE
PID:2244 -
\??\c:\lfxrlff.exec:\lfxrlff.exe44⤵
- Executes dropped EXE
PID:2708 -
\??\c:\llflrfr.exec:\llflrfr.exe45⤵
- Executes dropped EXE
PID:3036 -
\??\c:\tbtnnh.exec:\tbtnnh.exe46⤵
- Executes dropped EXE
PID:3872 -
\??\c:\jvpjd.exec:\jvpjd.exe47⤵
- Executes dropped EXE
PID:2480 -
\??\c:\9llfxrx.exec:\9llfxrx.exe48⤵
- Executes dropped EXE
PID:4336 -
\??\c:\rrxxlxx.exec:\rrxxlxx.exe49⤵
- Executes dropped EXE
PID:3080 -
\??\c:\bbthbn.exec:\bbthbn.exe50⤵
- Executes dropped EXE
PID:1248 -
\??\c:\jpdpj.exec:\jpdpj.exe51⤵
- Executes dropped EXE
PID:3044 -
\??\c:\djpdv.exec:\djpdv.exe52⤵
- Executes dropped EXE
PID:4628 -
\??\c:\frfffxr.exec:\frfffxr.exe53⤵
- Executes dropped EXE
PID:2040 -
\??\c:\ntthtn.exec:\ntthtn.exe54⤵
- Executes dropped EXE
PID:5100 -
\??\c:\ntbtnh.exec:\ntbtnh.exe55⤵
- Executes dropped EXE
PID:2652 -
\??\c:\dvpdv.exec:\dvpdv.exe56⤵
- Executes dropped EXE
PID:3916 -
\??\c:\xflfrll.exec:\xflfrll.exe57⤵
- Executes dropped EXE
PID:3964 -
\??\c:\tntntt.exec:\tntntt.exe58⤵
- Executes dropped EXE
PID:1976 -
\??\c:\bbhbbh.exec:\bbhbbh.exe59⤵
- Executes dropped EXE
PID:1228 -
\??\c:\3vjvd.exec:\3vjvd.exe60⤵
- Executes dropped EXE
PID:4912 -
\??\c:\lffxrlf.exec:\lffxrlf.exe61⤵
- Executes dropped EXE
PID:1692 -
\??\c:\nbnhbt.exec:\nbnhbt.exe62⤵
- Executes dropped EXE
PID:908 -
\??\c:\vvjjd.exec:\vvjjd.exe63⤵
- Executes dropped EXE
PID:1676 -
\??\c:\jvvvj.exec:\jvvvj.exe64⤵
- Executes dropped EXE
PID:4188 -
\??\c:\fxrlllf.exec:\fxrlllf.exe65⤵
- Executes dropped EXE
PID:1716 -
\??\c:\lxrlfll.exec:\lxrlfll.exe66⤵PID:4632
-
\??\c:\5bbttt.exec:\5bbttt.exe67⤵PID:3200
-
\??\c:\dvpjj.exec:\dvpjj.exe68⤵PID:2552
-
\??\c:\lrrlfxr.exec:\lrrlfxr.exe69⤵PID:3492
-
\??\c:\flxlfxl.exec:\flxlfxl.exe70⤵PID:3304
-
\??\c:\hhnhbb.exec:\hhnhbb.exe71⤵PID:548
-
\??\c:\jvvpv.exec:\jvvpv.exe72⤵PID:1928
-
\??\c:\rfffrrl.exec:\rfffrrl.exe73⤵PID:2556
-
\??\c:\xlrffxr.exec:\xlrffxr.exe74⤵PID:1540
-
\??\c:\bhbtnn.exec:\bhbtnn.exe75⤵PID:1208
-
\??\c:\5hhbtn.exec:\5hhbtn.exe76⤵PID:4108
-
\??\c:\dvpjj.exec:\dvpjj.exe77⤵PID:2164
-
\??\c:\rrxfxrl.exec:\rrxfxrl.exe78⤵PID:1152
-
\??\c:\bbnhbb.exec:\bbnhbb.exe79⤵PID:4408
-
\??\c:\ntnhbt.exec:\ntnhbt.exe80⤵PID:1140
-
\??\c:\jjvvd.exec:\jjvvd.exe81⤵PID:5000
-
\??\c:\pddvj.exec:\pddvj.exe82⤵PID:2416
-
\??\c:\rflrlrr.exec:\rflrlrr.exe83⤵PID:1076
-
\??\c:\nnhbth.exec:\nnhbth.exe84⤵PID:3516
-
\??\c:\nththb.exec:\nththb.exe85⤵PID:3820
-
\??\c:\dpdvp.exec:\dpdvp.exe86⤵PID:5052
-
\??\c:\dpvpj.exec:\dpvpj.exe87⤵PID:844
-
\??\c:\1xfrllx.exec:\1xfrllx.exe88⤵PID:2708
-
\??\c:\bthhhn.exec:\bthhhn.exe89⤵PID:3988
-
\??\c:\htbtbb.exec:\htbtbb.exe90⤵PID:2128
-
\??\c:\pjvjd.exec:\pjvjd.exe91⤵PID:3244
-
\??\c:\ffxxxff.exec:\ffxxxff.exe92⤵PID:1224
-
\??\c:\frlrflf.exec:\frlrflf.exe93⤵PID:4376
-
\??\c:\nhtnhh.exec:\nhtnhh.exe94⤵PID:2280
-
\??\c:\ddddv.exec:\ddddv.exe95⤵PID:856
-
\??\c:\vvvpp.exec:\vvvpp.exe96⤵PID:1396
-
\??\c:\xxffxxr.exec:\xxffxxr.exe97⤵PID:1868
-
\??\c:\bhnhbb.exec:\bhnhbb.exe98⤵PID:3504
-
\??\c:\pdjdd.exec:\pdjdd.exe99⤵PID:3512
-
\??\c:\3jppp.exec:\3jppp.exe100⤵PID:1776
-
\??\c:\ffxllll.exec:\ffxllll.exe101⤵PID:3728
-
\??\c:\tbbtbb.exec:\tbbtbb.exe102⤵PID:2588
-
\??\c:\tnbtbb.exec:\tnbtbb.exe103⤵PID:4324
-
\??\c:\9dvvd.exec:\9dvvd.exe104⤵PID:3120
-
\??\c:\5rxrrff.exec:\5rxrrff.exe105⤵PID:4872
-
\??\c:\7xlfffl.exec:\7xlfffl.exe106⤵PID:1660
-
\??\c:\bnhbbh.exec:\bnhbbh.exe107⤵PID:5080
-
\??\c:\ppddd.exec:\ppddd.exe108⤵PID:4188
-
\??\c:\ppjjp.exec:\ppjjp.exe109⤵PID:3296
-
\??\c:\1frlxxl.exec:\1frlxxl.exe110⤵PID:3520
-
\??\c:\tnbhnt.exec:\tnbhnt.exe111⤵PID:2056
-
\??\c:\tbbbbh.exec:\tbbbbh.exe112⤵PID:1484
-
\??\c:\pvddv.exec:\pvddv.exe113⤵PID:4904
-
\??\c:\ddjjj.exec:\ddjjj.exe114⤵PID:548
-
\??\c:\ffffxxx.exec:\ffffxxx.exe115⤵PID:1112
-
\??\c:\lrxrrll.exec:\lrxrrll.exe116⤵PID:2428
-
\??\c:\9tbbtb.exec:\9tbbtb.exe117⤵PID:2332
-
\??\c:\jjvdp.exec:\jjvdp.exe118⤵PID:3312
-
\??\c:\ppdvd.exec:\ppdvd.exe119⤵PID:1152
-
\??\c:\5flrrff.exec:\5flrrff.exe120⤵PID:4408
-
\??\c:\bnnhbt.exec:\bnnhbt.exe121⤵PID:1140
-
\??\c:\bttntb.exec:\bttntb.exe122⤵PID:5000
-
\??\c:\vppjv.exec:\vppjv.exe123⤵PID:5040
-
\??\c:\3vjdv.exec:\3vjdv.exe124⤵PID:1032
-
\??\c:\3xrfxxx.exec:\3xrfxxx.exe125⤵PID:3732
-
\??\c:\nhnhbb.exec:\nhnhbb.exe126⤵PID:3068
-
\??\c:\nnbbbn.exec:\nnbbbn.exe127⤵PID:2244
-
\??\c:\jvvpj.exec:\jvvpj.exe128⤵PID:1744
-
\??\c:\vvvpv.exec:\vvvpv.exe129⤵PID:3872
-
\??\c:\xrxxrxr.exec:\xrxxrxr.exe130⤵PID:3988
-
\??\c:\9nttth.exec:\9nttth.exe131⤵PID:4944
-
\??\c:\btbttt.exec:\btbttt.exe132⤵PID:4864
-
\??\c:\vvpjv.exec:\vvpjv.exe133⤵PID:3952
-
\??\c:\jddvp.exec:\jddvp.exe134⤵PID:4916
-
\??\c:\3rrrrrr.exec:\3rrrrrr.exe135⤵PID:1988
-
\??\c:\btnbtn.exec:\btnbtn.exe136⤵PID:1712
-
\??\c:\3nhntb.exec:\3nhntb.exe137⤵PID:4628
-
\??\c:\1ddvv.exec:\1ddvv.exe138⤵PID:4116
-
\??\c:\xxlrfxl.exec:\xxlrfxl.exe139⤵PID:1020
-
\??\c:\llrlffx.exec:\llrlffx.exe140⤵PID:3536
-
\??\c:\3hhnbt.exec:\3hhnbt.exe141⤵PID:3964
-
\??\c:\vvppp.exec:\vvppp.exe142⤵PID:3728
-
\??\c:\jpvpj.exec:\jpvpj.exe143⤵PID:1572
-
\??\c:\xffxlfx.exec:\xffxlfx.exe144⤵PID:4040
-
\??\c:\nttbtt.exec:\nttbtt.exe145⤵PID:5028
-
\??\c:\pjppj.exec:\pjppj.exe146⤵PID:964
-
\??\c:\xxrrfxx.exec:\xxrrfxx.exe147⤵PID:4104
-
\??\c:\tnnnnh.exec:\tnnnnh.exe148⤵PID:3588
-
\??\c:\ppvdd.exec:\ppvdd.exe149⤵PID:2388
-
\??\c:\jpvpj.exec:\jpvpj.exe150⤵PID:2556
-
\??\c:\rrxrlff.exec:\rrxrlff.exe151⤵PID:2428
-
\??\c:\htnhhh.exec:\htnhhh.exe152⤵PID:2332
-
\??\c:\jvddd.exec:\jvddd.exe153⤵PID:3312
-
\??\c:\1xfffll.exec:\1xfffll.exe154⤵PID:3256
-
\??\c:\lfxflfl.exec:\lfxflfl.exe155⤵PID:3760
-
\??\c:\nnttnt.exec:\nnttnt.exe156⤵PID:2496
-
\??\c:\jvvdv.exec:\jvvdv.exe157⤵PID:4924
-
\??\c:\xxfxxrf.exec:\xxfxxrf.exe158⤵PID:4476
-
\??\c:\xrrlfff.exec:\xrrlfff.exe159⤵PID:3748
-
\??\c:\tbnhbb.exec:\tbnhbb.exe160⤵PID:668
-
\??\c:\ddvvv.exec:\ddvvv.exe161⤵PID:4516
-
\??\c:\rflxrfl.exec:\rflxrfl.exe162⤵PID:1924
-
\??\c:\lfrxlfr.exec:\lfrxlfr.exe163⤵PID:4472
-
\??\c:\htnbbb.exec:\htnbbb.exe164⤵PID:2128
-
\??\c:\jpjdp.exec:\jpjdp.exe165⤵PID:4336
-
\??\c:\lrrlffx.exec:\lrrlffx.exe166⤵PID:3244
-
\??\c:\rrfflrf.exec:\rrfflrf.exe167⤵PID:4376
-
\??\c:\tntttb.exec:\tntttb.exe168⤵PID:396
-
\??\c:\ntthhb.exec:\ntthhb.exe169⤵PID:3900
-
\??\c:\5pddj.exec:\5pddj.exe170⤵PID:3576
-
\??\c:\vpjjd.exec:\vpjjd.exe171⤵PID:3708
-
\??\c:\9rffxfx.exec:\9rffxfx.exe172⤵PID:4264
-
\??\c:\tntttt.exec:\tntttt.exe173⤵PID:1648
-
\??\c:\jjjvv.exec:\jjjvv.exe174⤵PID:2944
-
\??\c:\jjdvp.exec:\jjdvp.exe175⤵PID:4876
-
\??\c:\frfxlll.exec:\frfxlll.exe176⤵PID:3764
-
\??\c:\llxrxxx.exec:\llxrxxx.exe177⤵PID:3236
-
\??\c:\thhnnn.exec:\thhnnn.exe178⤵PID:748
-
\??\c:\jddjj.exec:\jddjj.exe179⤵PID:4680
-
\??\c:\vvpdv.exec:\vvpdv.exe180⤵PID:3364
-
\??\c:\1rxrlrl.exec:\1rxrlrl.exe181⤵PID:632
-
\??\c:\7lfxllx.exec:\7lfxllx.exe182⤵PID:2620
-
\??\c:\bbhbnn.exec:\bbhbnn.exe183⤵PID:4840
-
\??\c:\5jjvj.exec:\5jjvj.exe184⤵PID:3636
-
\??\c:\9vvjv.exec:\9vvjv.exe185⤵PID:3288
-
\??\c:\rfxffrl.exec:\rfxffrl.exe186⤵PID:1484
-
\??\c:\hhbtnn.exec:\hhbtnn.exe187⤵PID:548
-
\??\c:\hhbttt.exec:\hhbttt.exe188⤵PID:392
-
\??\c:\jdvpj.exec:\jdvpj.exe189⤵PID:2428
-
\??\c:\rllfxxx.exec:\rllfxxx.exe190⤵PID:2012
-
\??\c:\flrlfff.exec:\flrlfff.exe191⤵PID:3312
-
\??\c:\xxlfxfx.exec:\xxlfxfx.exe192⤵PID:3276
-
\??\c:\bnhtht.exec:\bnhtht.exe193⤵PID:5000
-
\??\c:\ddjdd.exec:\ddjdd.exe194⤵PID:2824
-
\??\c:\djvjp.exec:\djvjp.exe195⤵PID:5040
-
\??\c:\rfxlrxx.exec:\rfxlrxx.exe196⤵PID:1032
-
\??\c:\llrlffx.exec:\llrlffx.exe197⤵PID:1076
-
\??\c:\hhhhbb.exec:\hhhhbb.exe198⤵PID:1768
-
\??\c:\vjvpj.exec:\vjvpj.exe199⤵PID:2244
-
\??\c:\dvvvp.exec:\dvvvp.exe200⤵PID:1784
-
\??\c:\rxrlffx.exec:\rxrlffx.exe201⤵PID:2480
-
\??\c:\xrxxrrl.exec:\xrxxrrl.exe202⤵PID:3988
-
\??\c:\hhttnn.exec:\hhttnn.exe203⤵PID:4944
-
\??\c:\pdvvv.exec:\pdvvv.exe204⤵PID:744
-
\??\c:\pddjd.exec:\pddjd.exe205⤵PID:1176
-
\??\c:\llrxlrf.exec:\llrxlrf.exe206⤵PID:4916
-
\??\c:\xlrrlll.exec:\xlrrlll.exe207⤵PID:4816
-
\??\c:\3btttt.exec:\3btttt.exe208⤵PID:1800
-
\??\c:\jddpj.exec:\jddpj.exe209⤵PID:2248
-
\??\c:\9dpjv.exec:\9dpjv.exe210⤵PID:4508
-
\??\c:\5rfxrxr.exec:\5rfxrxr.exe211⤵PID:4136
-
\??\c:\ffxxffr.exec:\ffxxffr.exe212⤵PID:1868
-
\??\c:\btnhbb.exec:\btnhbb.exe213⤵PID:5008
-
\??\c:\vdjdv.exec:\vdjdv.exe214⤵PID:1932
-
\??\c:\pdjdd.exec:\pdjdd.exe215⤵PID:1908
-
\??\c:\lrxxflr.exec:\lrxxflr.exe216⤵PID:3916
-
\??\c:\rlrfrlr.exec:\rlrfrlr.exe217⤵PID:2648
-
\??\c:\btbtnh.exec:\btbtnh.exe218⤵PID:4672
-
\??\c:\vppvj.exec:\vppvj.exe219⤵PID:4176
-
\??\c:\3ppdd.exec:\3ppdd.exe220⤵PID:2352
-
\??\c:\xxlfxlx.exec:\xxlfxlx.exe221⤵PID:4680
-
\??\c:\tbbnhb.exec:\tbbnhb.exe222⤵PID:3364
-
\??\c:\bbhhbh.exec:\bbhhbh.exe223⤵PID:2464
-
\??\c:\pjdvp.exec:\pjdvp.exe224⤵PID:1640
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe225⤵PID:3360
-
\??\c:\lllfxrx.exec:\lllfxrx.exe226⤵PID:3352
-
\??\c:\btbtth.exec:\btbtth.exe227⤵PID:1928
-
\??\c:\bhttbb.exec:\bhttbb.exe228⤵PID:4676
-
\??\c:\dpvvd.exec:\dpvvd.exe229⤵PID:4428
-
\??\c:\3xlflrl.exec:\3xlflrl.exe230⤵PID:392
-
\??\c:\frrlrrf.exec:\frrlrrf.exe231⤵PID:2428
-
\??\c:\hbtnbb.exec:\hbtnbb.exe232⤵PID:3156
-
\??\c:\ddppp.exec:\ddppp.exe233⤵PID:3256
-
\??\c:\pddvv.exec:\pddvv.exe234⤵PID:3760
-
\??\c:\lffxrrl.exec:\lffxrrl.exe235⤵PID:5000
-
\??\c:\1xxrrrr.exec:\1xxrrrr.exe236⤵PID:2824
-
\??\c:\7ntnhb.exec:\7ntnhb.exe237⤵PID:1016
-
\??\c:\hbhtnh.exec:\hbhtnh.exe238⤵PID:3068
-
\??\c:\9vdpj.exec:\9vdpj.exe239⤵PID:1076
-
\??\c:\xxfrffl.exec:\xxfrffl.exe240⤵PID:368
-
\??\c:\bntnht.exec:\bntnht.exe241⤵PID:2244
-
\??\c:\hbnhbh.exec:\hbnhbh.exe242⤵PID:2128