Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 17:44
Behavioral task
behavioral1
Sample
09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exe
-
Size
76KB
-
MD5
09e6aa3d3e60dc00b470934de5d97ab0
-
SHA1
a5c57105f78a40df83342e475f2e722fd273eb48
-
SHA256
d8e4c0814cf07fa59cfd057e446b77983b093671accfe7fe2422d3790a39e786
-
SHA512
17644028e926a86d34abf0cff7bef52c6f03a1089d89354bd88da7a94f192c4dd73e6057a27413996b2ae8fc23e698f79b092065c1e4d54fea5d943ec227d801
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8PbhnyLFWoFLAxZhMDzE87X:9hOmTsF93UYfwC6GIoutz5yLpOSDRX
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4928-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5100-8-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/224-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3124-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3236-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4908-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3148-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3280-50-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4184-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2708-62-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3456-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4472-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4520-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3028-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3624-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/640-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4264-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3512-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2840-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2132-138-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1556-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4608-158-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4564-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4016-177-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1956-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4504-186-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4744-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4860-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2228-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3012-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3988-212-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4432-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4968-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4060-228-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/452-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4868-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3236-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3712-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4964-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1128-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-282-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2940-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4804-290-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1084-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1944-323-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/868-356-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2608-384-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1212-391-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4452-450-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2312-454-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2360-478-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4824-519-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1316-562-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3260-572-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3928-669-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2608-694-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4704-752-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2828-843-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1676-865-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1872-878-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4336-925-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3444-976-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
nbnhhh.exepddvv.exevppjj.exefxlfrrf.exerrrlffx.exethhhbb.exevdpvd.exellfxxxr.exetttttt.exevdvpj.exeflrlffx.exe1frlfxr.exehhhbtt.exepdjdv.exelfxrlrl.exentbhbb.exebtbbbt.exejpjdd.exerffxrlf.exethnhhb.exejvpjd.exe5ffxxxl.exeflxxllx.exe1nhbtt.exedpjdj.exepppjj.exelllfrlx.exelxfxrrl.exebnnhbb.exenhhbtn.exedvpjd.exeddjpv.exerlllfff.exerxrrrxr.exehthhtt.exejjpjj.exe1jjdp.exeflrrffl.exenhhbtn.exenbnnnn.exedppvv.exepddpv.exe5rxlffx.exexxxrlfl.exehbnnhh.exennnnhh.exepjdvp.exerlxxflf.exelfrxrrr.exetbbbnn.exehhnnbh.exenthtnh.exedvvdv.exerrfxffl.exerlrffff.exehtnhhh.exentbttn.exenbntbt.exepjdjv.exejvvjv.exe3fxrllf.exeffffxrf.exe9pppp.exefxrrllf.exepid process 5100 nbnhhh.exe 224 pddvv.exe 3124 vppjj.exe 4908 fxlfrrf.exe 3236 rrrlffx.exe 3148 thhhbb.exe 3280 vdpvd.exe 4184 llfxxxr.exe 2708 tttttt.exe 1676 vdvpj.exe 4840 flrlffx.exe 1728 1frlfxr.exe 3456 hhhbtt.exe 4472 pdjdv.exe 4520 lfxrlrl.exe 3028 ntbhbb.exe 3624 btbbbt.exe 640 jpjdd.exe 4264 rffxrlf.exe 3512 thnhhb.exe 2840 jvpjd.exe 2132 5ffxxxl.exe 1556 flxxllx.exe 4032 1nhbtt.exe 4564 dpjdj.exe 4608 pppjj.exe 1856 lllfrlx.exe 2892 lxfxrrl.exe 4016 bnnhbb.exe 1956 nhhbtn.exe 4504 dvpjd.exe 888 ddjpv.exe 4744 rlllfff.exe 4860 rxrrrxr.exe 2228 hthhtt.exe 3012 jjpjj.exe 3988 1jjdp.exe 452 flrrffl.exe 4968 nhhbtn.exe 4432 nbnnnn.exe 4584 dppvv.exe 4060 pddpv.exe 4440 5rxlffx.exe 4892 xxxrlfl.exe 4868 hbnnhh.exe 1608 nnnnhh.exe 1468 pjdvp.exe 3236 rlxxflf.exe 2124 lfrxrrr.exe 4316 tbbbnn.exe 3952 hhnnbh.exe 3712 nthtnh.exe 4964 dvvdv.exe 1128 rrfxffl.exe 1380 rlrffff.exe 4840 htnhhh.exe 2940 ntbttn.exe 1456 nbntbt.exe 4804 pjdjv.exe 2136 jvvjv.exe 4172 3fxrllf.exe 3964 ffffxrf.exe 1044 9pppp.exe 3120 fxrrllf.exe -
Processes:
resource yara_rule behavioral2/memory/4928-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbnhhh.exe upx behavioral2/memory/4928-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5100-8-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pddvv.exe upx behavioral2/memory/224-13-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vppjj.exe upx behavioral2/memory/224-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3124-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4908-25-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fxlfrrf.exe upx \??\c:\rrrlffx.exe upx behavioral2/memory/3236-34-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\thhhbb.exe upx behavioral2/memory/4908-33-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vdpvd.exe upx behavioral2/memory/3148-42-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3280-45-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\llfxxxr.exe upx behavioral2/memory/3280-50-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4184-56-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tttttt.exe upx C:\vdvpj.exe upx behavioral2/memory/2708-62-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\flrlffx.exe upx behavioral2/memory/4840-69-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1frlfxr.exe upx C:\hhhbtt.exe upx C:\pdjdv.exe upx behavioral2/memory/3456-84-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfxrlrl.exe upx behavioral2/memory/4472-90-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ntbhbb.exe upx behavioral2/memory/4520-95-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\btbbbt.exe upx behavioral2/memory/3028-101-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jpjdd.exe upx behavioral2/memory/3624-107-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rffxrlf.exe upx behavioral2/memory/640-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4264-119-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\thnhhb.exe upx behavioral2/memory/3512-121-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvpjd.exe upx behavioral2/memory/2840-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2840-132-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5ffxxxl.exe upx behavioral2/memory/2132-138-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\flxxllx.exe upx behavioral2/memory/1556-141-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1nhbtt.exe upx C:\dpjdj.exe upx \??\c:\pppjj.exe upx behavioral2/memory/4608-158-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4564-157-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lllfrlx.exe upx \??\c:\lxfxrrl.exe upx \??\c:\bnnhbb.exe upx behavioral2/memory/4016-177-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nhhbtn.exe upx C:\dvpjd.exe upx behavioral2/memory/1956-184-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ddjpv.exe upx behavioral2/memory/4504-186-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exenbnhhh.exepddvv.exevppjj.exefxlfrrf.exerrrlffx.exethhhbb.exevdpvd.exellfxxxr.exetttttt.exevdvpj.exeflrlffx.exe1frlfxr.exehhhbtt.exepdjdv.exelfxrlrl.exentbhbb.exebtbbbt.exejpjdd.exerffxrlf.exethnhhb.exejvpjd.exedescription pid process target process PID 4928 wrote to memory of 5100 4928 09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exe nbnhhh.exe PID 4928 wrote to memory of 5100 4928 09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exe nbnhhh.exe PID 4928 wrote to memory of 5100 4928 09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exe nbnhhh.exe PID 5100 wrote to memory of 224 5100 nbnhhh.exe pddvv.exe PID 5100 wrote to memory of 224 5100 nbnhhh.exe pddvv.exe PID 5100 wrote to memory of 224 5100 nbnhhh.exe pddvv.exe PID 224 wrote to memory of 3124 224 pddvv.exe vppjj.exe PID 224 wrote to memory of 3124 224 pddvv.exe vppjj.exe PID 224 wrote to memory of 3124 224 pddvv.exe vppjj.exe PID 3124 wrote to memory of 4908 3124 vppjj.exe fxlfrrf.exe PID 3124 wrote to memory of 4908 3124 vppjj.exe fxlfrrf.exe PID 3124 wrote to memory of 4908 3124 vppjj.exe fxlfrrf.exe PID 4908 wrote to memory of 3236 4908 fxlfrrf.exe rrrlffx.exe PID 4908 wrote to memory of 3236 4908 fxlfrrf.exe rrrlffx.exe PID 4908 wrote to memory of 3236 4908 fxlfrrf.exe rrrlffx.exe PID 3236 wrote to memory of 3148 3236 rrrlffx.exe thhhbb.exe PID 3236 wrote to memory of 3148 3236 rrrlffx.exe thhhbb.exe PID 3236 wrote to memory of 3148 3236 rrrlffx.exe thhhbb.exe PID 3148 wrote to memory of 3280 3148 thhhbb.exe vdpvd.exe PID 3148 wrote to memory of 3280 3148 thhhbb.exe vdpvd.exe PID 3148 wrote to memory of 3280 3148 thhhbb.exe vdpvd.exe PID 3280 wrote to memory of 4184 3280 vdpvd.exe llfxxxr.exe PID 3280 wrote to memory of 4184 3280 vdpvd.exe llfxxxr.exe PID 3280 wrote to memory of 4184 3280 vdpvd.exe llfxxxr.exe PID 4184 wrote to memory of 2708 4184 llfxxxr.exe tttttt.exe PID 4184 wrote to memory of 2708 4184 llfxxxr.exe tttttt.exe PID 4184 wrote to memory of 2708 4184 llfxxxr.exe tttttt.exe PID 2708 wrote to memory of 1676 2708 tttttt.exe vdvpj.exe PID 2708 wrote to memory of 1676 2708 tttttt.exe vdvpj.exe PID 2708 wrote to memory of 1676 2708 tttttt.exe vdvpj.exe PID 1676 wrote to memory of 4840 1676 vdvpj.exe flrlffx.exe PID 1676 wrote to memory of 4840 1676 vdvpj.exe flrlffx.exe PID 1676 wrote to memory of 4840 1676 vdvpj.exe flrlffx.exe PID 4840 wrote to memory of 1728 4840 flrlffx.exe 1frlfxr.exe PID 4840 wrote to memory of 1728 4840 flrlffx.exe 1frlfxr.exe PID 4840 wrote to memory of 1728 4840 flrlffx.exe 1frlfxr.exe PID 1728 wrote to memory of 3456 1728 1frlfxr.exe hhhbtt.exe PID 1728 wrote to memory of 3456 1728 1frlfxr.exe hhhbtt.exe PID 1728 wrote to memory of 3456 1728 1frlfxr.exe hhhbtt.exe PID 3456 wrote to memory of 4472 3456 hhhbtt.exe pdjdv.exe PID 3456 wrote to memory of 4472 3456 hhhbtt.exe pdjdv.exe PID 3456 wrote to memory of 4472 3456 hhhbtt.exe pdjdv.exe PID 4472 wrote to memory of 4520 4472 pdjdv.exe lfxrlrl.exe PID 4472 wrote to memory of 4520 4472 pdjdv.exe lfxrlrl.exe PID 4472 wrote to memory of 4520 4472 pdjdv.exe lfxrlrl.exe PID 4520 wrote to memory of 3028 4520 lfxrlrl.exe ntbhbb.exe PID 4520 wrote to memory of 3028 4520 lfxrlrl.exe ntbhbb.exe PID 4520 wrote to memory of 3028 4520 lfxrlrl.exe ntbhbb.exe PID 3028 wrote to memory of 3624 3028 ntbhbb.exe btbbbt.exe PID 3028 wrote to memory of 3624 3028 ntbhbb.exe btbbbt.exe PID 3028 wrote to memory of 3624 3028 ntbhbb.exe btbbbt.exe PID 3624 wrote to memory of 640 3624 btbbbt.exe jpjdd.exe PID 3624 wrote to memory of 640 3624 btbbbt.exe jpjdd.exe PID 3624 wrote to memory of 640 3624 btbbbt.exe jpjdd.exe PID 640 wrote to memory of 4264 640 jpjdd.exe rffxrlf.exe PID 640 wrote to memory of 4264 640 jpjdd.exe rffxrlf.exe PID 640 wrote to memory of 4264 640 jpjdd.exe rffxrlf.exe PID 4264 wrote to memory of 3512 4264 rffxrlf.exe thnhhb.exe PID 4264 wrote to memory of 3512 4264 rffxrlf.exe thnhhb.exe PID 4264 wrote to memory of 3512 4264 rffxrlf.exe thnhhb.exe PID 3512 wrote to memory of 2840 3512 thnhhb.exe jvpjd.exe PID 3512 wrote to memory of 2840 3512 thnhhb.exe jvpjd.exe PID 3512 wrote to memory of 2840 3512 thnhhb.exe jvpjd.exe PID 2840 wrote to memory of 2132 2840 jvpjd.exe 5ffxxxl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09e6aa3d3e60dc00b470934de5d97ab0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\nbnhhh.exec:\nbnhhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\pddvv.exec:\pddvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
\??\c:\vppjj.exec:\vppjj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\fxlfrrf.exec:\fxlfrrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
\??\c:\rrrlffx.exec:\rrrlffx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
\??\c:\thhhbb.exec:\thhhbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\vdpvd.exec:\vdpvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
\??\c:\llfxxxr.exec:\llfxxxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
\??\c:\tttttt.exec:\tttttt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\vdvpj.exec:\vdvpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\flrlffx.exec:\flrlffx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\1frlfxr.exec:\1frlfxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\hhhbtt.exec:\hhhbtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
\??\c:\pdjdv.exec:\pdjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\lfxrlrl.exec:\lfxrlrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\ntbhbb.exec:\ntbhbb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\btbbbt.exec:\btbbbt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\jpjdd.exec:\jpjdd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\rffxrlf.exec:\rffxrlf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
\??\c:\thnhhb.exec:\thnhhb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\jvpjd.exec:\jvpjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\5ffxxxl.exec:\5ffxxxl.exe23⤵
- Executes dropped EXE
PID:2132 -
\??\c:\flxxllx.exec:\flxxllx.exe24⤵
- Executes dropped EXE
PID:1556 -
\??\c:\1nhbtt.exec:\1nhbtt.exe25⤵
- Executes dropped EXE
PID:4032 -
\??\c:\dpjdj.exec:\dpjdj.exe26⤵
- Executes dropped EXE
PID:4564 -
\??\c:\pppjj.exec:\pppjj.exe27⤵
- Executes dropped EXE
PID:4608 -
\??\c:\lllfrlx.exec:\lllfrlx.exe28⤵
- Executes dropped EXE
PID:1856 -
\??\c:\lxfxrrl.exec:\lxfxrrl.exe29⤵
- Executes dropped EXE
PID:2892 -
\??\c:\bnnhbb.exec:\bnnhbb.exe30⤵
- Executes dropped EXE
PID:4016 -
\??\c:\nhhbtn.exec:\nhhbtn.exe31⤵
- Executes dropped EXE
PID:1956 -
\??\c:\dvpjd.exec:\dvpjd.exe32⤵
- Executes dropped EXE
PID:4504 -
\??\c:\ddjpv.exec:\ddjpv.exe33⤵
- Executes dropped EXE
PID:888 -
\??\c:\rlllfff.exec:\rlllfff.exe34⤵
- Executes dropped EXE
PID:4744 -
\??\c:\rxrrrxr.exec:\rxrrrxr.exe35⤵
- Executes dropped EXE
PID:4860 -
\??\c:\hthhtt.exec:\hthhtt.exe36⤵
- Executes dropped EXE
PID:2228 -
\??\c:\jjpjj.exec:\jjpjj.exe37⤵
- Executes dropped EXE
PID:3012 -
\??\c:\1jjdp.exec:\1jjdp.exe38⤵
- Executes dropped EXE
PID:3988 -
\??\c:\flrrffl.exec:\flrrffl.exe39⤵
- Executes dropped EXE
PID:452 -
\??\c:\nhhbtn.exec:\nhhbtn.exe40⤵
- Executes dropped EXE
PID:4968 -
\??\c:\nbnnnn.exec:\nbnnnn.exe41⤵
- Executes dropped EXE
PID:4432 -
\??\c:\dppvv.exec:\dppvv.exe42⤵
- Executes dropped EXE
PID:4584 -
\??\c:\pddpv.exec:\pddpv.exe43⤵
- Executes dropped EXE
PID:4060 -
\??\c:\5rxlffx.exec:\5rxlffx.exe44⤵
- Executes dropped EXE
PID:4440 -
\??\c:\xxxrlfl.exec:\xxxrlfl.exe45⤵
- Executes dropped EXE
PID:4892 -
\??\c:\hbnnhh.exec:\hbnnhh.exe46⤵
- Executes dropped EXE
PID:4868 -
\??\c:\nnnnhh.exec:\nnnnhh.exe47⤵
- Executes dropped EXE
PID:1608 -
\??\c:\pjdvp.exec:\pjdvp.exe48⤵
- Executes dropped EXE
PID:1468 -
\??\c:\rlxxflf.exec:\rlxxflf.exe49⤵
- Executes dropped EXE
PID:3236 -
\??\c:\lfrxrrr.exec:\lfrxrrr.exe50⤵
- Executes dropped EXE
PID:2124 -
\??\c:\tbbbnn.exec:\tbbbnn.exe51⤵
- Executes dropped EXE
PID:4316 -
\??\c:\hhnnbh.exec:\hhnnbh.exe52⤵
- Executes dropped EXE
PID:3952 -
\??\c:\nthtnh.exec:\nthtnh.exe53⤵
- Executes dropped EXE
PID:3712 -
\??\c:\dvvdv.exec:\dvvdv.exe54⤵
- Executes dropped EXE
PID:4964 -
\??\c:\rrfxffl.exec:\rrfxffl.exe55⤵
- Executes dropped EXE
PID:1128 -
\??\c:\rlrffff.exec:\rlrffff.exe56⤵
- Executes dropped EXE
PID:1380 -
\??\c:\htnhhh.exec:\htnhhh.exe57⤵
- Executes dropped EXE
PID:4840 -
\??\c:\ntbttn.exec:\ntbttn.exe58⤵
- Executes dropped EXE
PID:2940 -
\??\c:\nbntbt.exec:\nbntbt.exe59⤵
- Executes dropped EXE
PID:1456 -
\??\c:\pjdjv.exec:\pjdjv.exe60⤵
- Executes dropped EXE
PID:4804 -
\??\c:\jvvjv.exec:\jvvjv.exe61⤵
- Executes dropped EXE
PID:2136 -
\??\c:\3fxrllf.exec:\3fxrllf.exe62⤵
- Executes dropped EXE
PID:4172 -
\??\c:\ffffxrf.exec:\ffffxrf.exe63⤵
- Executes dropped EXE
PID:3964 -
\??\c:\9pppp.exec:\9pppp.exe64⤵
- Executes dropped EXE
PID:1044 -
\??\c:\fxrrllf.exec:\fxrrllf.exe65⤵
- Executes dropped EXE
PID:3120 -
\??\c:\tnbtbt.exec:\tnbtbt.exe66⤵PID:1512
-
\??\c:\dvpjv.exec:\dvpjv.exe67⤵PID:1084
-
\??\c:\jdvpj.exec:\jdvpj.exe68⤵PID:4728
-
\??\c:\1ffxrrl.exec:\1ffxrrl.exe69⤵PID:1944
-
\??\c:\fxxlrlf.exec:\fxxlrlf.exe70⤵PID:744
-
\??\c:\bttnnh.exec:\bttnnh.exe71⤵PID:4564
-
\??\c:\bhbbnn.exec:\bhbbnn.exe72⤵PID:2452
-
\??\c:\9ppjv.exec:\9ppjv.exe73⤵PID:3220
-
\??\c:\pdjjv.exec:\pdjjv.exe74⤵PID:4028
-
\??\c:\lflrflx.exec:\lflrflx.exe75⤵PID:4216
-
\??\c:\frlfrrl.exec:\frlfrrl.exe76⤵PID:3212
-
\??\c:\htnnhh.exec:\htnnhh.exe77⤵PID:1712
-
\??\c:\bnnhbb.exec:\bnnhbb.exe78⤵PID:1008
-
\??\c:\9jvpj.exec:\9jvpj.exe79⤵PID:724
-
\??\c:\9pvpj.exec:\9pvpj.exe80⤵PID:868
-
\??\c:\lrxrfll.exec:\lrxrfll.exe81⤵PID:2164
-
\??\c:\xlrrllf.exec:\xlrrllf.exe82⤵PID:880
-
\??\c:\3bnhbb.exec:\3bnhbb.exe83⤵PID:4380
-
\??\c:\tbnhht.exec:\tbnhht.exe84⤵PID:2580
-
\??\c:\vjdvp.exec:\vjdvp.exe85⤵PID:3868
-
\??\c:\vvdvv.exec:\vvdvv.exe86⤵PID:4132
-
\??\c:\fxrlxxx.exec:\fxrlxxx.exe87⤵PID:4992
-
\??\c:\flllffr.exec:\flllffr.exe88⤵PID:2608
-
\??\c:\xffffxl.exec:\xffffxl.exe89⤵PID:4968
-
\??\c:\hbhbbt.exec:\hbhbbt.exe90⤵PID:1212
-
\??\c:\ppjvd.exec:\ppjvd.exe91⤵PID:668
-
\??\c:\ppvpj.exec:\ppvpj.exe92⤵PID:4656
-
\??\c:\frlxrrf.exec:\frlxrrf.exe93⤵PID:3348
-
\??\c:\lfxlfxr.exec:\lfxlfxr.exe94⤵PID:4124
-
\??\c:\lfrlxfr.exec:\lfrlxfr.exe95⤵PID:860
-
\??\c:\hnhhtt.exec:\hnhhtt.exe96⤵PID:4900
-
\??\c:\httnbb.exec:\httnbb.exe97⤵PID:2952
-
\??\c:\jjdjp.exec:\jjdjp.exe98⤵PID:1188
-
\??\c:\pdjpp.exec:\pdjpp.exe99⤵PID:3236
-
\??\c:\fxlfrrl.exec:\fxlfrrl.exe100⤵PID:3752
-
\??\c:\btbtnn.exec:\btbtnn.exe101⤵PID:4064
-
\??\c:\bbnhtt.exec:\bbnhtt.exe102⤵PID:3856
-
\??\c:\ddpdp.exec:\ddpdp.exe103⤵PID:4748
-
\??\c:\1pvpp.exec:\1pvpp.exe104⤵PID:3528
-
\??\c:\xrxrfff.exec:\xrxrfff.exe105⤵PID:1984
-
\??\c:\rffxrrl.exec:\rffxrrl.exe106⤵PID:3292
-
\??\c:\nhtntt.exec:\nhtntt.exe107⤵PID:4840
-
\??\c:\bbhbnn.exec:\bbhbnn.exe108⤵PID:3720
-
\??\c:\pdddv.exec:\pdddv.exe109⤵PID:4452
-
\??\c:\lrrxrll.exec:\lrrxrll.exe110⤵PID:2312
-
\??\c:\xrxlxxf.exec:\xrxlxxf.exe111⤵PID:1440
-
\??\c:\btnnhh.exec:\btnnhh.exe112⤵PID:2824
-
\??\c:\tbhhnh.exec:\tbhhnh.exe113⤵PID:4832
-
\??\c:\bnhbnh.exec:\bnhbnh.exe114⤵PID:372
-
\??\c:\pvjdp.exec:\pvjdp.exe115⤵PID:4400
-
\??\c:\ddjvj.exec:\ddjvj.exe116⤵PID:2336
-
\??\c:\xfxlxrx.exec:\xfxlxrx.exe117⤵PID:2436
-
\??\c:\xxlfxrl.exec:\xxlfxrl.exe118⤵PID:2360
-
\??\c:\bnnbtn.exec:\bnnbtn.exe119⤵PID:896
-
\??\c:\bhbhtn.exec:\bhbhtn.exe120⤵PID:4728
-
\??\c:\9pdpp.exec:\9pdpp.exe121⤵PID:4828
-
\??\c:\vvvpv.exec:\vvvpv.exe122⤵PID:744
-
\??\c:\rxxrxrl.exec:\rxxrxrl.exe123⤵PID:4608
-
\??\c:\lfffrrr.exec:\lfffrrr.exe124⤵PID:4304
-
\??\c:\xlxrxxf.exec:\xlxrxxf.exe125⤵PID:4092
-
\??\c:\btbtnh.exec:\btbtnh.exe126⤵PID:4028
-
\??\c:\nnthtb.exec:\nnthtb.exe127⤵PID:4216
-
\??\c:\vddjd.exec:\vddjd.exe128⤵PID:2140
-
\??\c:\ppdvp.exec:\ppdvp.exe129⤵PID:4348
-
\??\c:\fxfrlxl.exec:\fxfrlxl.exe130⤵PID:4824
-
\??\c:\htnnhh.exec:\htnnhh.exe131⤵PID:2620
-
\??\c:\5bhhtn.exec:\5bhhtn.exe132⤵PID:868
-
\??\c:\djjpj.exec:\djjpj.exe133⤵PID:1528
-
\??\c:\dvvpj.exec:\dvvpj.exe134⤵PID:516
-
\??\c:\lxrlfxx.exec:\lxrlfxx.exe135⤵PID:2228
-
\??\c:\hnnnhh.exec:\hnnnhh.exe136⤵PID:3228
-
\??\c:\btnnnn.exec:\btnnnn.exe137⤵PID:3012
-
\??\c:\vjpjj.exec:\vjpjj.exe138⤵PID:3984
-
\??\c:\vjjjd.exec:\vjjjd.exe139⤵PID:4000
-
\??\c:\9fffxxx.exec:\9fffxxx.exe140⤵PID:4272
-
\??\c:\rxxrllf.exec:\rxxrllf.exe141⤵PID:2316
-
\??\c:\hhnnhn.exec:\hhnnhn.exe142⤵PID:3208
-
\??\c:\pddvp.exec:\pddvp.exe143⤵PID:4708
-
\??\c:\vjpjd.exec:\vjpjd.exe144⤵PID:1316
-
\??\c:\rffxllf.exec:\rffxllf.exe145⤵PID:3124
-
\??\c:\rfflfrl.exec:\rfflfrl.exe146⤵PID:2932
-
\??\c:\btbbtt.exec:\btbbtt.exe147⤵PID:3260
-
\??\c:\rxxlrfx.exec:\rxxlrfx.exe148⤵PID:3056
-
\??\c:\bnhbnh.exec:\bnhbnh.exe149⤵PID:2776
-
\??\c:\tbbtnb.exec:\tbbtnb.exe150⤵PID:4512
-
\??\c:\dvpdv.exec:\dvpdv.exe151⤵PID:4064
-
\??\c:\jpvpv.exec:\jpvpv.exe152⤵PID:3856
-
\??\c:\frxrlxx.exec:\frxrlxx.exe153⤵PID:4748
-
\??\c:\fllfxxl.exec:\fllfxxl.exe154⤵PID:3528
-
\??\c:\tntnnh.exec:\tntnnh.exe155⤵PID:1984
-
\??\c:\ntbthh.exec:\ntbthh.exe156⤵PID:3272
-
\??\c:\pjvjd.exec:\pjvjd.exe157⤵PID:1176
-
\??\c:\jvvdp.exec:\jvvdp.exe158⤵PID:3784
-
\??\c:\xrrlfrr.exec:\xrrlfrr.exe159⤵PID:4804
-
\??\c:\9xflffx.exec:\9xflffx.exe160⤵PID:4172
-
\??\c:\htttnt.exec:\htttnt.exe161⤵PID:1356
-
\??\c:\3bnhnn.exec:\3bnhnn.exe162⤵PID:2876
-
\??\c:\vdjdp.exec:\vdjdp.exe163⤵PID:3892
-
\??\c:\jjjdv.exec:\jjjdv.exe164⤵PID:4520
-
\??\c:\lxlfrrf.exec:\lxlfrrf.exe165⤵PID:4212
-
\??\c:\ntnthn.exec:\ntnthn.exe166⤵PID:2128
-
\??\c:\tnhhhb.exec:\tnhhhb.exe167⤵PID:3468
-
\??\c:\5vdvj.exec:\5vdvj.exe168⤵PID:2596
-
\??\c:\vddpd.exec:\vddpd.exe169⤵PID:2240
-
\??\c:\ffrrffx.exec:\ffrrffx.exe170⤵PID:440
-
\??\c:\ffrxffr.exec:\ffrxffr.exe171⤵PID:5084
-
\??\c:\fflxrrl.exec:\fflxrrl.exe172⤵PID:744
-
\??\c:\tbbbbn.exec:\tbbbbn.exe173⤵PID:4652
-
\??\c:\djppj.exec:\djppj.exe174⤵PID:2428
-
\??\c:\vvppj.exec:\vvppj.exe175⤵PID:4332
-
\??\c:\fffxrlf.exec:\fffxrlf.exe176⤵PID:5092
-
\??\c:\nbnnhh.exec:\nbnnhh.exe177⤵PID:3264
-
\??\c:\5btbbb.exec:\5btbbb.exe178⤵PID:3928
-
\??\c:\9jdvp.exec:\9jdvp.exe179⤵PID:888
-
\??\c:\vjvvv.exec:\vjvvv.exe180⤵PID:3064
-
\??\c:\lxrfrlf.exec:\lxrfrlf.exe181⤵PID:2164
-
\??\c:\flrlfxf.exec:\flrlfxf.exe182⤵PID:880
-
\??\c:\bnnbtn.exec:\bnnbtn.exe183⤵PID:1236
-
\??\c:\3hhbnh.exec:\3hhbnh.exe184⤵PID:4492
-
\??\c:\jpvpj.exec:\jpvpj.exe185⤵PID:3984
-
\??\c:\djpjp.exec:\djpjp.exe186⤵PID:2608
-
\??\c:\lfffxrl.exec:\lfffxrl.exe187⤵PID:4252
-
\??\c:\lxfxrrf.exec:\lxfxrrf.exe188⤵PID:4060
-
\??\c:\1rrllfr.exec:\1rrllfr.exe189⤵PID:332
-
\??\c:\3bbtnn.exec:\3bbtnn.exe190⤵PID:4788
-
\??\c:\htnnnn.exec:\htnnnn.exe191⤵PID:2828
-
\??\c:\dvdvj.exec:\dvdvj.exe192⤵PID:3148
-
\??\c:\jjpjd.exec:\jjpjd.exe193⤵PID:2776
-
\??\c:\rxxxrrr.exec:\rxxxrrr.exe194⤵PID:3604
-
\??\c:\lxxrrrl.exec:\lxxrrrl.exe195⤵PID:4588
-
\??\c:\3lxrllf.exec:\3lxrllf.exe196⤵PID:4560
-
\??\c:\ppvvd.exec:\ppvvd.exe197⤵PID:1676
-
\??\c:\llfffff.exec:\llfffff.exe198⤵PID:1760
-
\??\c:\hntnbb.exec:\hntnbb.exe199⤵PID:2940
-
\??\c:\pdddv.exec:\pdddv.exe200⤵PID:4840
-
\??\c:\1flflll.exec:\1flflll.exe201⤵PID:1872
-
\??\c:\rfffflf.exec:\rfffflf.exe202⤵PID:3784
-
\??\c:\5nnhbt.exec:\5nnhbt.exe203⤵PID:4704
-
\??\c:\pvppj.exec:\pvppj.exe204⤵PID:4448
-
\??\c:\5jjdv.exec:\5jjdv.exe205⤵PID:3464
-
\??\c:\fxxlfxr.exec:\fxxlfxr.exe206⤵PID:4832
-
\??\c:\lfxxxrr.exec:\lfxxxrr.exe207⤵PID:2132
-
\??\c:\htnnhn.exec:\htnnhn.exe208⤵PID:1640
-
\??\c:\pjdpj.exec:\pjdpj.exe209⤵PID:1556
-
\??\c:\tbhbtn.exec:\tbhbtn.exe210⤵PID:2068
-
\??\c:\3bbtnt.exec:\3bbtnt.exe211⤵PID:384
-
\??\c:\ppdjj.exec:\ppdjj.exe212⤵PID:1192
-
\??\c:\djvdj.exec:\djvdj.exe213⤵PID:4828
-
\??\c:\rlrrfxx.exec:\rlrrfxx.exe214⤵PID:3548
-
\??\c:\hbbbtt.exec:\hbbbtt.exe215⤵PID:4092
-
\??\c:\vjdvj.exec:\vjdvj.exe216⤵PID:4336
-
\??\c:\llxrrfx.exec:\llxrrfx.exe217⤵PID:2184
-
\??\c:\3bhbbb.exec:\3bhbbb.exe218⤵PID:5012
-
\??\c:\bthhnn.exec:\bthhnn.exe219⤵PID:4684
-
\??\c:\jdjdd.exec:\jdjdd.exe220⤵PID:724
-
\??\c:\xxfxrlr.exec:\xxfxrlr.exe221⤵PID:4744
-
\??\c:\thhntt.exec:\thhntt.exe222⤵PID:3820
-
\??\c:\9vjjd.exec:\9vjjd.exe223⤵PID:3240
-
\??\c:\jjvpj.exec:\jjvpj.exe224⤵PID:4380
-
\??\c:\rrxrrrf.exec:\rrxrrrf.exe225⤵PID:3228
-
\??\c:\rlllfxl.exec:\rlllfxl.exe226⤵PID:4068
-
\??\c:\llllffx.exec:\llllffx.exe227⤵PID:2432
-
\??\c:\tbbbtt.exec:\tbbbtt.exe228⤵PID:4992
-
\??\c:\nhhttt.exec:\nhhttt.exe229⤵PID:2608
-
\??\c:\pvpvv.exec:\pvpvv.exe230⤵PID:4252
-
\??\c:\dpvpj.exec:\dpvpj.exe231⤵PID:1316
-
\??\c:\jdddp.exec:\jdddp.exe232⤵PID:4908
-
\??\c:\rlrlxxx.exec:\rlrlxxx.exe233⤵PID:4788
-
\??\c:\fxfxxxf.exec:\fxfxxxf.exe234⤵PID:2828
-
\??\c:\thbtnh.exec:\thbtnh.exe235⤵PID:2776
-
\??\c:\ttnbhh.exec:\ttnbhh.exe236⤵PID:3612
-
\??\c:\vpvvv.exec:\vpvvv.exe237⤵PID:3280
-
\??\c:\jjvpd.exec:\jjvpd.exe238⤵PID:4588
-
\??\c:\xlrfxxr.exec:\xlrfxxr.exe239⤵PID:2696
-
\??\c:\lxlfxxl.exec:\lxlfxxl.exe240⤵PID:1676
-
\??\c:\7flrlrr.exec:\7flrlrr.exe241⤵PID:3456
-
\??\c:\ttnnhh.exec:\ttnnhh.exe242⤵PID:2940