Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 17:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe
-
Size
360KB
-
MD5
fcae6540e1585145d312dab9a8468f90
-
SHA1
0dce0402c15e45c5cfb550268084b6a4d6b207c7
-
SHA256
68797d06cd6a266264ff1b7eb81d0ba1e934d2983eb1ad3c26a51d7b0d24a776
-
SHA512
0defc10c64699858e551ee7c0e645e7ebf1aaee044900c073b7b6f9547ef9b73f9c004f5bbaf42454ec5baa293e57d6bf34a5f605c205bb5d60f70ece4e7547e
-
SSDEEP
6144:Zcm7ImGddX4S8cm7ImGddEJcm7ImGddXRS8E91cm7IFbYLcm7ImGdga1v:j7Tcov7TcQ7TchI7l7Tba1v
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2116-8-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2280-32-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2392-28-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2280-38-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1796-18-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2664-48-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2520-56-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2896-67-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2624-68-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2624-76-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2560-87-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2564-97-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2032-108-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2848-117-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1896-146-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1700-154-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2760-165-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/264-174-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2608-200-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1156-210-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2104-221-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1124-231-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/824-242-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1644-250-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1644-249-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/940-259-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2468-269-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/688-279-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1876-281-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1876-289-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1876-288-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/984-291-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/984-302-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2992-309-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2992-310-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2080-312-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2080-320-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1796-327-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2176-328-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1796-326-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2176-336-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2176-335-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2708-337-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2708-344-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2736-345-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2736-352-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2940-358-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2288-361-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/984-360-0x0000000000220000-0x000000000028C000-memory.dmp family_blackmoon behavioral1/memory/2940-359-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2288-368-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2648-375-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2648-374-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2896-376-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2896-383-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2896-382-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2544-384-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1216-398-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2564-404-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2768-411-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2768-410-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1660-418-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/1660-417-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon behavioral1/memory/2908-419-0x0000000000400000-0x000000000046C000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
lfrrxxx.exe7ttbbh.exe1jddv.exe1rrrrrx.exebbbtnt.exejddjp.exe9vjjp.exerflrflx.exetthntb.exelfxfrrf.exe9pdvd.exevvjpj.exetnhhtt.exebhhhnt.exe5rflrxf.exebntthh.exe3lxxlrf.exehhbnhb.exe7hhhnn.exehhbhtb.exerrffrxf.exepjvjv.exe5tbbhb.exedvpvj.exefxffxrx.exe3xlrflx.exe7ntbnt.exejdppp.exehbbntt.exelfxxxxl.exevpdpv.exepdvdd.exehbntbb.exejdjjd.exefrxffll.exejdvdv.exexxrfxfr.exetntbtn.exefffrxfr.exetnnbnt.exedpdjj.exelfrrflx.exebbntbb.exeddvdp.exeflxflfl.exenhtthn.exefrlxffl.exelxfrxxx.exe1pdjv.exejvppd.exebnhnnn.exebbtnnb.exevpvjp.exepdppd.exe1htnnb.exenhtbhn.exexlxxlfx.exexlxrrll.exe7bhhhb.exeddpvj.exevvpjj.exe9rxxxff.exebnnhnh.exehhthhn.exepid process 1796 lfrrxxx.exe 2392 7ttbbh.exe 2280 1jddv.exe 2664 1rrrrrx.exe 2520 bbbtnt.exe 2896 jddjp.exe 2624 9vjjp.exe 2560 rflrflx.exe 2564 tthntb.exe 2032 lfxfrrf.exe 2848 9pdvd.exe 2916 vvjpj.exe 1812 tnhhtt.exe 1896 bhhhnt.exe 1700 5rflrxf.exe 2760 bntthh.exe 264 3lxxlrf.exe 2488 hhbnhb.exe 1608 7hhhnn.exe 2608 hhbhtb.exe 1156 rrffrxf.exe 2104 pjvjv.exe 1124 5tbbhb.exe 824 dvpvj.exe 1644 fxffxrx.exe 940 3xlrflx.exe 2468 7ntbnt.exe 688 jdppp.exe 1876 hbbntt.exe 984 lfxxxxl.exe 2992 vpdpv.exe 2080 pdvdd.exe 1796 hbntbb.exe 2176 jdjjd.exe 2708 frxffll.exe 2736 jdvdv.exe 2940 xxrfxfr.exe 2288 tntbtn.exe 2648 fffrxfr.exe 2896 tnnbnt.exe 2544 dpdjj.exe 1216 lfrrflx.exe 2564 bbntbb.exe 2768 ddvdp.exe 1660 flxflfl.exe 2908 nhtthn.exe 1052 frlxffl.exe 2036 lxfrxxx.exe 1668 1pdjv.exe 2044 jvppd.exe 1696 bnhnnn.exe 532 bbtnnb.exe 264 vpvjp.exe 376 pdppd.exe 2284 1htnnb.exe 568 nhtbhn.exe 2060 xlxxlfx.exe 2204 xlxrrll.exe 1516 7bhhhb.exe 2460 ddpvj.exe 1532 vvpjj.exe 1772 9rxxxff.exe 2952 bnnhnh.exe 2100 hhthhn.exe -
Processes:
resource yara_rule behavioral1/memory/2116-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2116-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1796-12-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2280-32-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2392-28-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2392-27-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2280-38-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2392-20-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1796-18-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2664-48-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2520-56-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2896-67-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2624-68-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2624-76-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2560-87-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2564-97-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2032-108-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2848-109-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2848-117-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1812-128-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1896-137-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1896-146-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1700-154-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2760-165-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/264-174-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2608-200-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1156-210-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2104-212-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2104-221-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1124-225-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/824-233-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1124-231-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/824-242-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1644-250-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/940-259-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2468-261-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2468-269-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/688-279-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1876-289-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/984-291-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/984-302-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2992-310-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2080-320-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1796-327-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2176-328-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2176-336-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2708-337-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2708-344-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2736-352-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2940-358-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2288-361-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2940-359-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2288-368-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2648-375-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2896-376-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2896-383-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2544-384-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1216-398-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2768-411-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1660-418-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2908-419-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2908-427-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1052-434-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1696-457-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exelfrrxxx.exe7ttbbh.exe1jddv.exe1rrrrrx.exebbbtnt.exejddjp.exe9vjjp.exerflrflx.exetthntb.exelfxfrrf.exe9pdvd.exevvjpj.exetnhhtt.exebhhhnt.exe5rflrxf.exedescription pid process target process PID 2116 wrote to memory of 1796 2116 fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe lfrrxxx.exe PID 2116 wrote to memory of 1796 2116 fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe lfrrxxx.exe PID 2116 wrote to memory of 1796 2116 fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe lfrrxxx.exe PID 2116 wrote to memory of 1796 2116 fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe lfrrxxx.exe PID 1796 wrote to memory of 2392 1796 lfrrxxx.exe 7ttbbh.exe PID 1796 wrote to memory of 2392 1796 lfrrxxx.exe 7ttbbh.exe PID 1796 wrote to memory of 2392 1796 lfrrxxx.exe 7ttbbh.exe PID 1796 wrote to memory of 2392 1796 lfrrxxx.exe 7ttbbh.exe PID 2392 wrote to memory of 2280 2392 7ttbbh.exe 1jddv.exe PID 2392 wrote to memory of 2280 2392 7ttbbh.exe 1jddv.exe PID 2392 wrote to memory of 2280 2392 7ttbbh.exe 1jddv.exe PID 2392 wrote to memory of 2280 2392 7ttbbh.exe 1jddv.exe PID 2280 wrote to memory of 2664 2280 1jddv.exe 1rrrrrx.exe PID 2280 wrote to memory of 2664 2280 1jddv.exe 1rrrrrx.exe PID 2280 wrote to memory of 2664 2280 1jddv.exe 1rrrrrx.exe PID 2280 wrote to memory of 2664 2280 1jddv.exe 1rrrrrx.exe PID 2664 wrote to memory of 2520 2664 1rrrrrx.exe bbbtnt.exe PID 2664 wrote to memory of 2520 2664 1rrrrrx.exe bbbtnt.exe PID 2664 wrote to memory of 2520 2664 1rrrrrx.exe bbbtnt.exe PID 2664 wrote to memory of 2520 2664 1rrrrrx.exe bbbtnt.exe PID 2520 wrote to memory of 2896 2520 bbbtnt.exe jddjp.exe PID 2520 wrote to memory of 2896 2520 bbbtnt.exe jddjp.exe PID 2520 wrote to memory of 2896 2520 bbbtnt.exe jddjp.exe PID 2520 wrote to memory of 2896 2520 bbbtnt.exe jddjp.exe PID 2896 wrote to memory of 2624 2896 jddjp.exe 9vjjp.exe PID 2896 wrote to memory of 2624 2896 jddjp.exe 9vjjp.exe PID 2896 wrote to memory of 2624 2896 jddjp.exe 9vjjp.exe PID 2896 wrote to memory of 2624 2896 jddjp.exe 9vjjp.exe PID 2624 wrote to memory of 2560 2624 9vjjp.exe rflrflx.exe PID 2624 wrote to memory of 2560 2624 9vjjp.exe rflrflx.exe PID 2624 wrote to memory of 2560 2624 9vjjp.exe rflrflx.exe PID 2624 wrote to memory of 2560 2624 9vjjp.exe rflrflx.exe PID 2560 wrote to memory of 2564 2560 rflrflx.exe tthntb.exe PID 2560 wrote to memory of 2564 2560 rflrflx.exe tthntb.exe PID 2560 wrote to memory of 2564 2560 rflrflx.exe tthntb.exe PID 2560 wrote to memory of 2564 2560 rflrflx.exe tthntb.exe PID 2564 wrote to memory of 2032 2564 tthntb.exe lfxfrrf.exe PID 2564 wrote to memory of 2032 2564 tthntb.exe lfxfrrf.exe PID 2564 wrote to memory of 2032 2564 tthntb.exe lfxfrrf.exe PID 2564 wrote to memory of 2032 2564 tthntb.exe lfxfrrf.exe PID 2032 wrote to memory of 2848 2032 lfxfrrf.exe 9pdvd.exe PID 2032 wrote to memory of 2848 2032 lfxfrrf.exe 9pdvd.exe PID 2032 wrote to memory of 2848 2032 lfxfrrf.exe 9pdvd.exe PID 2032 wrote to memory of 2848 2032 lfxfrrf.exe 9pdvd.exe PID 2848 wrote to memory of 2916 2848 9pdvd.exe vvjpj.exe PID 2848 wrote to memory of 2916 2848 9pdvd.exe vvjpj.exe PID 2848 wrote to memory of 2916 2848 9pdvd.exe vvjpj.exe PID 2848 wrote to memory of 2916 2848 9pdvd.exe vvjpj.exe PID 2916 wrote to memory of 1812 2916 vvjpj.exe tnhhtt.exe PID 2916 wrote to memory of 1812 2916 vvjpj.exe tnhhtt.exe PID 2916 wrote to memory of 1812 2916 vvjpj.exe tnhhtt.exe PID 2916 wrote to memory of 1812 2916 vvjpj.exe tnhhtt.exe PID 1812 wrote to memory of 1896 1812 tnhhtt.exe bhhhnt.exe PID 1812 wrote to memory of 1896 1812 tnhhtt.exe bhhhnt.exe PID 1812 wrote to memory of 1896 1812 tnhhtt.exe bhhhnt.exe PID 1812 wrote to memory of 1896 1812 tnhhtt.exe bhhhnt.exe PID 1896 wrote to memory of 1700 1896 bhhhnt.exe 5rflrxf.exe PID 1896 wrote to memory of 1700 1896 bhhhnt.exe 5rflrxf.exe PID 1896 wrote to memory of 1700 1896 bhhhnt.exe 5rflrxf.exe PID 1896 wrote to memory of 1700 1896 bhhhnt.exe 5rflrxf.exe PID 1700 wrote to memory of 2760 1700 5rflrxf.exe bntthh.exe PID 1700 wrote to memory of 2760 1700 5rflrxf.exe bntthh.exe PID 1700 wrote to memory of 2760 1700 5rflrxf.exe bntthh.exe PID 1700 wrote to memory of 2760 1700 5rflrxf.exe bntthh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\fcae6540e1585145d312dab9a8468f90_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\lfrrxxx.exec:\lfrrxxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\7ttbbh.exec:\7ttbbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\1jddv.exec:\1jddv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\1rrrrrx.exec:\1rrrrrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\bbbtnt.exec:\bbbtnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\jddjp.exec:\jddjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\9vjjp.exec:\9vjjp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\rflrflx.exec:\rflrflx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\tthntb.exec:\tthntb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\lfxfrrf.exec:\lfxfrrf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\9pdvd.exec:\9pdvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\vvjpj.exec:\vvjpj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\tnhhtt.exec:\tnhhtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\bhhhnt.exec:\bhhhnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\5rflrxf.exec:\5rflrxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\bntthh.exec:\bntthh.exe17⤵
- Executes dropped EXE
PID:2760 -
\??\c:\3lxxlrf.exec:\3lxxlrf.exe18⤵
- Executes dropped EXE
PID:264 -
\??\c:\hhbnhb.exec:\hhbnhb.exe19⤵
- Executes dropped EXE
PID:2488 -
\??\c:\7hhhnn.exec:\7hhhnn.exe20⤵
- Executes dropped EXE
PID:1608 -
\??\c:\hhbhtb.exec:\hhbhtb.exe21⤵
- Executes dropped EXE
PID:2608 -
\??\c:\rrffrxf.exec:\rrffrxf.exe22⤵
- Executes dropped EXE
PID:1156 -
\??\c:\pjvjv.exec:\pjvjv.exe23⤵
- Executes dropped EXE
PID:2104 -
\??\c:\5tbbhb.exec:\5tbbhb.exe24⤵
- Executes dropped EXE
PID:1124 -
\??\c:\dvpvj.exec:\dvpvj.exe25⤵
- Executes dropped EXE
PID:824 -
\??\c:\fxffxrx.exec:\fxffxrx.exe26⤵
- Executes dropped EXE
PID:1644 -
\??\c:\3xlrflx.exec:\3xlrflx.exe27⤵
- Executes dropped EXE
PID:940 -
\??\c:\7ntbnt.exec:\7ntbnt.exe28⤵
- Executes dropped EXE
PID:2468 -
\??\c:\jdppp.exec:\jdppp.exe29⤵
- Executes dropped EXE
PID:688 -
\??\c:\hbbntt.exec:\hbbntt.exe30⤵
- Executes dropped EXE
PID:1876 -
\??\c:\lfxxxxl.exec:\lfxxxxl.exe31⤵
- Executes dropped EXE
PID:984 -
\??\c:\vpdpv.exec:\vpdpv.exe32⤵
- Executes dropped EXE
PID:2992 -
\??\c:\pdvdd.exec:\pdvdd.exe33⤵
- Executes dropped EXE
PID:2080 -
\??\c:\hbntbb.exec:\hbntbb.exe34⤵
- Executes dropped EXE
PID:1796 -
\??\c:\jdjjd.exec:\jdjjd.exe35⤵
- Executes dropped EXE
PID:2176 -
\??\c:\frxffll.exec:\frxffll.exe36⤵
- Executes dropped EXE
PID:2708 -
\??\c:\jdvdv.exec:\jdvdv.exe37⤵
- Executes dropped EXE
PID:2736 -
\??\c:\xxrfxfr.exec:\xxrfxfr.exe38⤵
- Executes dropped EXE
PID:2940 -
\??\c:\tntbtn.exec:\tntbtn.exe39⤵
- Executes dropped EXE
PID:2288 -
\??\c:\fffrxfr.exec:\fffrxfr.exe40⤵
- Executes dropped EXE
PID:2648 -
\??\c:\tnnbnt.exec:\tnnbnt.exe41⤵
- Executes dropped EXE
PID:2896 -
\??\c:\dpdjj.exec:\dpdjj.exe42⤵
- Executes dropped EXE
PID:2544 -
\??\c:\lfrrflx.exec:\lfrrflx.exe43⤵
- Executes dropped EXE
PID:1216 -
\??\c:\bbntbb.exec:\bbntbb.exe44⤵
- Executes dropped EXE
PID:2564 -
\??\c:\ddvdp.exec:\ddvdp.exe45⤵
- Executes dropped EXE
PID:2768 -
\??\c:\flxflfl.exec:\flxflfl.exe46⤵
- Executes dropped EXE
PID:1660 -
\??\c:\nhtthn.exec:\nhtthn.exe47⤵
- Executes dropped EXE
PID:2908 -
\??\c:\frlxffl.exec:\frlxffl.exe48⤵
- Executes dropped EXE
PID:1052 -
\??\c:\lxfrxxx.exec:\lxfrxxx.exe49⤵
- Executes dropped EXE
PID:2036 -
\??\c:\1pdjv.exec:\1pdjv.exe50⤵
- Executes dropped EXE
PID:1668 -
\??\c:\jvppd.exec:\jvppd.exe51⤵
- Executes dropped EXE
PID:2044 -
\??\c:\bnhnnn.exec:\bnhnnn.exe52⤵
- Executes dropped EXE
PID:1696 -
\??\c:\bbtnnb.exec:\bbtnnb.exe53⤵
- Executes dropped EXE
PID:532 -
\??\c:\vpvjp.exec:\vpvjp.exe54⤵
- Executes dropped EXE
PID:264 -
\??\c:\pdppd.exec:\pdppd.exe55⤵
- Executes dropped EXE
PID:376 -
\??\c:\1htnnb.exec:\1htnnb.exe56⤵
- Executes dropped EXE
PID:2284 -
\??\c:\nhtbhn.exec:\nhtbhn.exe57⤵
- Executes dropped EXE
PID:568 -
\??\c:\xlxxlfx.exec:\xlxxlfx.exe58⤵
- Executes dropped EXE
PID:2060 -
\??\c:\xlxrrll.exec:\xlxrrll.exe59⤵
- Executes dropped EXE
PID:2204 -
\??\c:\7bhhhb.exec:\7bhhhb.exe60⤵
- Executes dropped EXE
PID:1516 -
\??\c:\ddpvj.exec:\ddpvj.exe61⤵
- Executes dropped EXE
PID:2460 -
\??\c:\vvpjj.exec:\vvpjj.exe62⤵
- Executes dropped EXE
PID:1532 -
\??\c:\9rxxxff.exec:\9rxxxff.exe63⤵
- Executes dropped EXE
PID:1772 -
\??\c:\bnnhnh.exec:\bnnhnh.exe64⤵
- Executes dropped EXE
PID:2952 -
\??\c:\hhthhn.exec:\hhthhn.exe65⤵
- Executes dropped EXE
PID:2100 -
\??\c:\dpddd.exec:\dpddd.exe66⤵PID:604
-
\??\c:\xrlxlrx.exec:\xrlxlrx.exe67⤵PID:1504
-
\??\c:\bntbnn.exec:\bntbnn.exe68⤵PID:2348
-
\??\c:\1nbhbb.exec:\1nbhbb.exe69⤵PID:1840
-
\??\c:\pjvjj.exec:\pjvjj.exe70⤵PID:1676
-
\??\c:\3lrxffl.exec:\3lrxffl.exe71⤵PID:2116
-
\??\c:\xlxxffr.exec:\xlxxffr.exe72⤵PID:1580
-
\??\c:\htbbbh.exec:\htbbbh.exe73⤵PID:1576
-
\??\c:\3vddd.exec:\3vddd.exe74⤵PID:2728
-
\??\c:\pjvvp.exec:\pjvvp.exe75⤵PID:2660
-
\??\c:\9lffllr.exec:\9lffllr.exe76⤵PID:2748
-
\??\c:\lfxffrl.exec:\lfxffrl.exe77⤵PID:2640
-
\??\c:\3bnthh.exec:\3bnthh.exe78⤵PID:2696
-
\??\c:\7pdvv.exec:\7pdvv.exe79⤵PID:300
-
\??\c:\ppdvj.exec:\ppdvj.exe80⤵PID:2624
-
\??\c:\9rfflrx.exec:\9rfflrx.exe81⤵PID:2532
-
\??\c:\fxfrffx.exec:\fxfrffx.exe82⤵PID:2368
-
\??\c:\hbntbn.exec:\hbntbn.exe83⤵PID:2212
-
\??\c:\1vvdp.exec:\1vvdp.exe84⤵PID:2836
-
\??\c:\llflxlx.exec:\llflxlx.exe85⤵PID:2772
-
\??\c:\xrlllrx.exec:\xrlllrx.exe86⤵PID:2868
-
\??\c:\nhbtbb.exec:\nhbtbb.exe87⤵PID:3012
-
\??\c:\nntttb.exec:\nntttb.exe88⤵PID:548
-
\??\c:\7dppj.exec:\7dppj.exe89⤵PID:2916
-
\??\c:\5vppv.exec:\5vppv.exe90⤵PID:2036
-
\??\c:\3rfflrf.exec:\3rfflrf.exe91⤵PID:1048
-
\??\c:\thbntb.exec:\thbntb.exe92⤵PID:1896
-
\??\c:\pjvdj.exec:\pjvdj.exe93⤵PID:2572
-
\??\c:\lrxrlxr.exec:\lrxrlxr.exe94⤵PID:1064
-
\??\c:\hbnntb.exec:\hbnntb.exe95⤵PID:372
-
\??\c:\dpjjp.exec:\dpjjp.exe96⤵PID:1648
-
\??\c:\7pjpd.exec:\7pjpd.exe97⤵PID:1552
-
\??\c:\llxflxx.exec:\llxflxx.exe98⤵PID:1264
-
\??\c:\1lllxff.exec:\1lllxff.exe99⤵PID:2960
-
\??\c:\hbhbnt.exec:\hbhbnt.exe100⤵PID:2440
-
\??\c:\3jvpp.exec:\3jvpp.exe101⤵PID:2236
-
\??\c:\xlflrrr.exec:\xlflrrr.exe102⤵PID:2204
-
\??\c:\xllrxxf.exec:\xllrxxf.exe103⤵PID:1516
-
\??\c:\7nhhtn.exec:\7nhhtn.exe104⤵PID:2296
-
\??\c:\bthntb.exec:\bthntb.exe105⤵PID:1856
-
\??\c:\pjvvv.exec:\pjvvv.exe106⤵PID:1320
-
\??\c:\3pvpv.exec:\3pvpv.exe107⤵PID:1336
-
\??\c:\rlflllr.exec:\rlflllr.exe108⤵PID:892
-
\??\c:\1thnbn.exec:\1thnbn.exe109⤵PID:2100
-
\??\c:\bnbhtt.exec:\bnbhtt.exe110⤵PID:900
-
\??\c:\vpjdd.exec:\vpjdd.exe111⤵PID:2164
-
\??\c:\ppvvj.exec:\ppvvj.exe112⤵PID:2452
-
\??\c:\fxrfllr.exec:\fxrfllr.exe113⤵PID:2404
-
\??\c:\rfrxllx.exec:\rfrxllx.exe114⤵PID:1768
-
\??\c:\1bnnbt.exec:\1bnnbt.exe115⤵PID:2948
-
\??\c:\dpvpp.exec:\dpvpp.exe116⤵PID:1548
-
\??\c:\jjjjj.exec:\jjjjj.exe117⤵PID:1932
-
\??\c:\5frlxrx.exec:\5frlxrx.exe118⤵PID:2132
-
\??\c:\hhttbb.exec:\hhttbb.exe119⤵PID:2700
-
\??\c:\httbnn.exec:\httbnn.exe120⤵PID:2728
-
\??\c:\vjpjp.exec:\vjpjp.exe121⤵PID:2616
-
\??\c:\ffrxrlr.exec:\ffrxrlr.exe122⤵PID:1240
-
\??\c:\llxfrxf.exec:\llxfrxf.exe123⤵PID:2940
-
\??\c:\nbnthn.exec:\nbnthn.exe124⤵PID:1392
-
\??\c:\bbhnth.exec:\bbhnth.exe125⤵PID:2696
-
\??\c:\jjvvd.exec:\jjvvd.exe126⤵PID:2568
-
\??\c:\1lxxrrx.exec:\1lxxrrx.exe127⤵PID:2896
-
\??\c:\rlxrrrx.exec:\rlxrrrx.exe128⤵PID:2376
-
\??\c:\3tnbnt.exec:\3tnbnt.exe129⤵PID:2300
-
\??\c:\nhhhbb.exec:\nhhhbb.exe130⤵PID:2564
-
\??\c:\9jddp.exec:\9jddp.exe131⤵PID:2860
-
\??\c:\5lxxfll.exec:\5lxxfll.exe132⤵PID:2892
-
\??\c:\rlrxfrf.exec:\rlrxfrf.exe133⤵PID:2032
-
\??\c:\htbhtb.exec:\htbhtb.exe134⤵PID:2840
-
\??\c:\thtbnh.exec:\thtbnh.exe135⤵PID:1332
-
\??\c:\djvvp.exec:\djvvp.exe136⤵PID:2012
-
\??\c:\rlxrxxr.exec:\rlxrxxr.exe137⤵PID:2040
-
\??\c:\3rfflrf.exec:\3rfflrf.exe138⤵PID:288
-
\??\c:\nbnntb.exec:\nbnntb.exe139⤵PID:2788
-
\??\c:\htntbh.exec:\htntbh.exe140⤵PID:2800
-
\??\c:\vvpdj.exec:\vvpdj.exe141⤵PID:2008
-
\??\c:\dvddj.exec:\dvddj.exe142⤵PID:1672
-
\??\c:\3rxlrrx.exec:\3rxlrrx.exe143⤵PID:1760
-
\??\c:\7xffrrx.exec:\7xffrrx.exe144⤵PID:1568
-
\??\c:\htbttb.exec:\htbttb.exe145⤵PID:2180
-
\??\c:\vpjpv.exec:\vpjpv.exe146⤵PID:612
-
\??\c:\9dpvj.exec:\9dpvj.exe147⤵PID:836
-
\??\c:\lxfrrrr.exec:\lxfrrrr.exe148⤵PID:2496
-
\??\c:\1nbhtt.exec:\1nbhtt.exe149⤵PID:1872
-
\??\c:\9nhhbh.exec:\9nhhbh.exe150⤵PID:1588
-
\??\c:\1jjpv.exec:\1jjpv.exe151⤵PID:272
-
\??\c:\djpvv.exec:\djpvv.exe152⤵PID:1124
-
\??\c:\xlrrxxx.exec:\xlrrxxx.exe153⤵PID:1532
-
\??\c:\3tntht.exec:\3tntht.exe154⤵PID:824
-
\??\c:\hthntb.exec:\hthntb.exe155⤵PID:2340
-
\??\c:\vpdjv.exec:\vpdjv.exe156⤵PID:2316
-
\??\c:\1vjpp.exec:\1vjpp.exe157⤵PID:2468
-
\??\c:\xrlrrrx.exec:\xrlrrrx.exe158⤵PID:2192
-
\??\c:\3hbhth.exec:\3hbhth.exe159⤵PID:1504
-
\??\c:\ttbnhh.exec:\ttbnhh.exe160⤵PID:2164
-
\??\c:\pddpj.exec:\pddpj.exe161⤵PID:2024
-
\??\c:\fxlrflx.exec:\fxlrflx.exe162⤵PID:2216
-
\??\c:\xxllrrx.exec:\xxllrrx.exe163⤵PID:1524
-
\??\c:\hhnthn.exec:\hhnthn.exe164⤵PID:2428
-
\??\c:\7jvvj.exec:\7jvvj.exe165⤵PID:2604
-
\??\c:\pvvpv.exec:\pvvpv.exe166⤵PID:2620
-
\??\c:\xxfxrrx.exec:\xxfxrrx.exe167⤵PID:2944
-
\??\c:\hnhbnb.exec:\hnhbnb.exe168⤵PID:2636
-
\??\c:\5ntbnb.exec:\5ntbnb.exe169⤵PID:2728
-
\??\c:\vpdjv.exec:\vpdjv.exe170⤵PID:2712
-
\??\c:\xrxxxxl.exec:\xrxxxxl.exe171⤵PID:2864
-
\??\c:\rlfrffx.exec:\rlfrffx.exe172⤵PID:2288
-
\??\c:\3btbnb.exec:\3btbnb.exe173⤵PID:2380
-
\??\c:\jjvdj.exec:\jjvdj.exe174⤵PID:2632
-
\??\c:\1dpvj.exec:\1dpvj.exe175⤵PID:2524
-
\??\c:\ffrfxxl.exec:\ffrfxxl.exe176⤵PID:3032
-
\??\c:\hbhthh.exec:\hbhthh.exe177⤵PID:2852
-
\??\c:\tnnbbn.exec:\tnnbbn.exe178⤵PID:2872
-
\??\c:\ddvvj.exec:\ddvvj.exe179⤵PID:2912
-
\??\c:\7dddv.exec:\7dddv.exe180⤵PID:2772
-
\??\c:\5rrfxlf.exec:\5rrfxlf.exe181⤵PID:2208
-
\??\c:\tbhbnb.exec:\tbhbnb.exe182⤵PID:2000
-
\??\c:\jvddj.exec:\jvddj.exe183⤵PID:548
-
\??\c:\pdpvd.exec:\pdpvd.exe184⤵PID:392
-
\??\c:\7xrrfxf.exec:\7xrrfxf.exe185⤵PID:2036
-
\??\c:\rrflrrf.exec:\rrflrrf.exe186⤵PID:1904
-
\??\c:\5hbtht.exec:\5hbtht.exe187⤵PID:1896
-
\??\c:\dvjpj.exec:\dvjpj.exe188⤵PID:2076
-
\??\c:\jdvvd.exec:\jdvvd.exe189⤵PID:2572
-
\??\c:\ffrfflr.exec:\ffrfflr.exe190⤵PID:1064
-
\??\c:\5thtnh.exec:\5thtnh.exe191⤵PID:1784
-
\??\c:\tbntht.exec:\tbntht.exe192⤵PID:2252
-
\??\c:\vjvpv.exec:\vjvpv.exe193⤵PID:1552
-
\??\c:\9xlxlrl.exec:\9xlxlrl.exe194⤵PID:700
-
\??\c:\xffrlxl.exec:\xffrlxl.exe195⤵PID:2372
-
\??\c:\nhthbh.exec:\nhthbh.exe196⤵PID:2440
-
\??\c:\7jvdj.exec:\7jvdj.exe197⤵PID:1408
-
\??\c:\jddjv.exec:\jddjv.exe198⤵PID:2448
-
\??\c:\1xlrrxf.exec:\1xlrrxf.exe199⤵PID:2140
-
\??\c:\3lrfrrx.exec:\3lrfrrx.exe200⤵PID:1636
-
\??\c:\hbbntb.exec:\hbbntb.exe201⤵PID:1856
-
\??\c:\thbttb.exec:\thbttb.exe202⤵PID:1320
-
\??\c:\pjvdj.exec:\pjvdj.exe203⤵PID:1596
-
\??\c:\lfxxxrx.exec:\lfxxxrx.exe204⤵PID:1712
-
\??\c:\fflrflx.exec:\fflrflx.exe205⤵PID:1736
-
\??\c:\bthhnn.exec:\bthhnn.exe206⤵PID:2108
-
\??\c:\5vpjp.exec:\5vpjp.exe207⤵PID:2968
-
\??\c:\lfrrflx.exec:\lfrrflx.exe208⤵PID:2452
-
\??\c:\llxrffr.exec:\llxrffr.exe209⤵PID:2404
-
\??\c:\nhbnbb.exec:\nhbnbb.exe210⤵PID:1624
-
\??\c:\tnbhnt.exec:\tnbhnt.exe211⤵PID:2136
-
\??\c:\vvddj.exec:\vvddj.exe212⤵PID:1584
-
\??\c:\lfxrflf.exec:\lfxrflf.exe213⤵PID:1796
-
\??\c:\xxxrxxr.exec:\xxxrxxr.exe214⤵PID:1576
-
\??\c:\bthnbb.exec:\bthnbb.exe215⤵PID:2740
-
\??\c:\nhhtnb.exec:\nhhtnb.exe216⤵PID:2956
-
\??\c:\1pjjj.exec:\1pjjj.exe217⤵PID:2804
-
\??\c:\5xrxlxf.exec:\5xrxlxf.exe218⤵PID:2812
-
\??\c:\rlxfrrf.exec:\rlxfrrf.exe219⤵PID:2540
-
\??\c:\9httbh.exec:\9httbh.exe220⤵PID:2864
-
\??\c:\dpjjj.exec:\dpjjj.exe221⤵PID:2696
-
\??\c:\ppddj.exec:\ppddj.exe222⤵PID:2220
-
\??\c:\5lfrxlx.exec:\5lfrxlx.exe223⤵PID:2896
-
\??\c:\lfxfffl.exec:\lfxfffl.exe224⤵PID:2244
-
\??\c:\tntthh.exec:\tntthh.exe225⤵PID:2300
-
\??\c:\1pddp.exec:\1pddp.exe226⤵PID:2844
-
\??\c:\jdvdv.exec:\jdvdv.exe227⤵PID:2768
-
\??\c:\5xrxfxf.exec:\5xrxfxf.exe228⤵PID:2900
-
\??\c:\ffxlfxl.exec:\ffxlfxl.exe229⤵PID:2032
-
\??\c:\hthnbh.exec:\hthnbh.exe230⤵PID:1900
-
\??\c:\pvjjp.exec:\pvjjp.exe231⤵PID:1812
-
\??\c:\3jpdd.exec:\3jpdd.exe232⤵PID:796
-
\??\c:\9lxflrf.exec:\9lxflrf.exe233⤵PID:2040
-
\??\c:\1htnbb.exec:\1htnbb.exe234⤵PID:1700
-
\??\c:\hhbtht.exec:\hhbtht.exe235⤵PID:2796
-
\??\c:\jdpvj.exec:\jdpvj.exe236⤵PID:2800
-
\??\c:\vdddp.exec:\vdddp.exe237⤵PID:672
-
\??\c:\flrrfll.exec:\flrrfll.exe238⤵PID:3016
-
\??\c:\hbthnt.exec:\hbthnt.exe239⤵PID:560
-
\??\c:\tnhntn.exec:\tnhntn.exe240⤵PID:1088
-
\??\c:\jjjvv.exec:\jjjvv.exe241⤵PID:1608
-
\??\c:\pjpvd.exec:\pjpvd.exe242⤵PID:612