Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:03
Behavioral task
behavioral1
Sample
a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exe
-
Size
363KB
-
MD5
a79b23cb810908a8f499421e19a22cb0
-
SHA1
0962cf27925bf727c835933f2d35c49e0760ec84
-
SHA256
7bc9346d800ce1b1bcfde5fe104a3badd2fa9d4e196f6dc47646f4afed0f5a70
-
SHA512
eec7eed501a52a983db3f8585f63d11dd24631b27c683d0ab850423a3b39643383ea0e1c8b8f40a82d0b38fbb1d76abf1e20c064a32ada0029288dd8be7e00e5
-
SSDEEP
6144:9cm4FmowdHoSdSyEAxyx/ZrTTr4qIMgE8F:/4wFHoSQuxy3rTXIM18F
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3968-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3808-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2872-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2012-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2012-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1936-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/680-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1768-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/400-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1368-39-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2008-60-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1548-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/816-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4204-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2252-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3136-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4540-105-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3528-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3660-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3288-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1400-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4980-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3700-170-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3492-177-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3600-191-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2424-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4772-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3684-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3116-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5000-210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1064-231-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3400-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4792-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/764-254-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/372-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-271-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1288-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2540-283-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3448-292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4776-294-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4392-300-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4076-305-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2916-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2916-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3032-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5004-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2416-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4664-328-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4436-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1012-350-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/968-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3600-367-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2548-373-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-386-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4396-409-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3688-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3968-528-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4964-559-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2444-567-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/864-648-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3476-655-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3056-693-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4532-852-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vjjjd.exe7dpjd.exeffrrlff.exerlrllll.exe5nnhbb.exe1rxxrrx.exehbhnhh.exehhhhth.exedddvp.exe5rffxxf.exetbtttt.exejdjvv.exebhnnhn.exejddvp.exebhhnhn.exe5jdjd.exerlrlllf.exetnbbth.exejddvd.exexxrlxxr.exerfxrflr.exettbbtb.exedvjdp.exedpdpj.exexrrrrrx.exerllffff.exe1nttnn.exevppvp.exelxfxlxx.exefrffffr.exejpdjv.exebbbbht.exejdpvp.exe7xxxrrl.exelrxfrfr.exebnnthb.exejdpjj.exe7fxrlll.exebbhbbt.exe1hnhbb.exejdddv.exerllfrff.exehhnbbn.exehntttn.exelrrlfxx.exexrrlfff.exevjjdv.exelffxrrx.exe5nhhbt.exedvjdv.exexrfxfll.exelxxxxxx.exevvvpp.exevpdvd.exe1rrfxxr.exebbttbn.exepddvp.exexlrllrl.exe3bbtnn.exevvjpj.exerrfxrrl.exe7bbthn.exebbhbtt.exe3jdvp.exepid process 3808 vjjjd.exe 2872 7dpjd.exe 2012 ffrrlff.exe 1936 rlrllll.exe 4652 5nnhbb.exe 1368 1rxxrrx.exe 680 hbhnhh.exe 1768 hhhhth.exe 400 dddvp.exe 2008 5rffxxf.exe 1548 tbtttt.exe 3024 jdjvv.exe 816 bhnnhn.exe 4204 jddvp.exe 2252 bhhnhn.exe 3136 5jdjd.exe 4392 rlrlllf.exe 4540 tnbbth.exe 3440 jddvd.exe 3528 xxrlxxr.exe 5060 rfxrflr.exe 2512 ttbbtb.exe 3660 dvjdp.exe 3004 dpdpj.exe 3288 xrrrrrx.exe 4180 rllffff.exe 1400 1nttnn.exe 4980 vppvp.exe 3700 lxfxlxx.exe 3492 frffffr.exe 1676 jpdjv.exe 1748 bbbbht.exe 3600 jdpvp.exe 668 7xxxrrl.exe 2424 lrxfrfr.exe 4772 bnnthb.exe 3684 jdpjj.exe 3116 7fxrlll.exe 5000 bbhbbt.exe 2476 1hnhbb.exe 2692 jdddv.exe 2780 rllfrff.exe 872 hhnbbn.exe 1064 hntttn.exe 1528 lrrlfxx.exe 3400 xrrlfff.exe 4792 vjjdv.exe 4984 lffxrrx.exe 4652 5nhhbt.exe 3144 dvjdv.exe 764 xrfxfll.exe 632 lxxxxxx.exe 4968 vvvpp.exe 4808 vpdvd.exe 372 1rrfxxr.exe 1712 bbttbn.exe 1288 pddvp.exe 3024 xlrllrl.exe 1048 3bbtnn.exe 2540 vvjpj.exe 2852 rrfxrrl.exe 3448 7bbthn.exe 4776 bbhbtt.exe 4392 3jdvp.exe -
Processes:
resource yara_rule behavioral2/memory/3968-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vjjjd.exe upx behavioral2/memory/3968-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3808-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7dpjd.exe upx behavioral2/memory/2872-12-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ffrrlff.exe upx behavioral2/memory/2012-19-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlrllll.exe upx behavioral2/memory/2012-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1936-26-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\5nnhbb.exe upx \??\c:\1rxxrrx.exe upx behavioral2/memory/680-43-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hbhnhh.exe upx \??\c:\hhhhth.exe upx behavioral2/memory/1768-49-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\dddvp.exe upx behavioral2/memory/400-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1368-39-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5rffxxf.exe upx behavioral2/memory/2008-60-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tbtttt.exe upx C:\jdjvv.exe upx behavioral2/memory/1548-70-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bhnnhn.exe upx behavioral2/memory/816-78-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jddvp.exe upx behavioral2/memory/4204-83-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bhhnhn.exe upx behavioral2/memory/4204-87-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2252-92-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5jdjd.exe upx C:\rlrlllf.exe upx behavioral2/memory/3136-96-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tnbbth.exe upx behavioral2/memory/4540-105-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jddvd.exe upx C:\xxrlxxr.exe upx behavioral2/memory/3528-121-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rfxrflr.exe upx \??\c:\ttbbtb.exe upx C:\dvjdp.exe upx behavioral2/memory/3660-134-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\dpdpj.exe upx \??\c:\xrrrrrx.exe upx behavioral2/memory/3288-147-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rllffff.exe upx \??\c:\1nttnn.exe upx behavioral2/memory/1400-156-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\vppvp.exe upx behavioral2/memory/4980-162-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lxfxlxx.exe upx behavioral2/memory/3700-170-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\frffffr.exe upx C:\jpdjv.exe upx behavioral2/memory/3492-177-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1676-179-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bbbbht.exe upx behavioral2/memory/3600-191-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2424-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4772-200-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3684-205-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3116-206-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exevjjjd.exe7dpjd.exeffrrlff.exerlrllll.exe5nnhbb.exe1rxxrrx.exehbhnhh.exehhhhth.exedddvp.exe5rffxxf.exetbtttt.exejdjvv.exebhnnhn.exejddvp.exebhhnhn.exe5jdjd.exerlrlllf.exetnbbth.exejddvd.exexxrlxxr.exerfxrflr.exedescription pid process target process PID 3968 wrote to memory of 3808 3968 a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exe vjjjd.exe PID 3968 wrote to memory of 3808 3968 a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exe vjjjd.exe PID 3968 wrote to memory of 3808 3968 a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exe vjjjd.exe PID 3808 wrote to memory of 2872 3808 vjjjd.exe 7dpjd.exe PID 3808 wrote to memory of 2872 3808 vjjjd.exe 7dpjd.exe PID 3808 wrote to memory of 2872 3808 vjjjd.exe 7dpjd.exe PID 2872 wrote to memory of 2012 2872 7dpjd.exe ffrrlff.exe PID 2872 wrote to memory of 2012 2872 7dpjd.exe ffrrlff.exe PID 2872 wrote to memory of 2012 2872 7dpjd.exe ffrrlff.exe PID 2012 wrote to memory of 1936 2012 ffrrlff.exe rlrllll.exe PID 2012 wrote to memory of 1936 2012 ffrrlff.exe rlrllll.exe PID 2012 wrote to memory of 1936 2012 ffrrlff.exe rlrllll.exe PID 1936 wrote to memory of 4652 1936 rlrllll.exe 5nnhbb.exe PID 1936 wrote to memory of 4652 1936 rlrllll.exe 5nnhbb.exe PID 1936 wrote to memory of 4652 1936 rlrllll.exe 5nnhbb.exe PID 4652 wrote to memory of 1368 4652 5nnhbb.exe 1rxxrrx.exe PID 4652 wrote to memory of 1368 4652 5nnhbb.exe 1rxxrrx.exe PID 4652 wrote to memory of 1368 4652 5nnhbb.exe 1rxxrrx.exe PID 1368 wrote to memory of 680 1368 1rxxrrx.exe hbhnhh.exe PID 1368 wrote to memory of 680 1368 1rxxrrx.exe hbhnhh.exe PID 1368 wrote to memory of 680 1368 1rxxrrx.exe hbhnhh.exe PID 680 wrote to memory of 1768 680 hbhnhh.exe hhhhth.exe PID 680 wrote to memory of 1768 680 hbhnhh.exe hhhhth.exe PID 680 wrote to memory of 1768 680 hbhnhh.exe hhhhth.exe PID 1768 wrote to memory of 400 1768 hhhhth.exe dddvp.exe PID 1768 wrote to memory of 400 1768 hhhhth.exe dddvp.exe PID 1768 wrote to memory of 400 1768 hhhhth.exe dddvp.exe PID 400 wrote to memory of 2008 400 dddvp.exe 5rffxxf.exe PID 400 wrote to memory of 2008 400 dddvp.exe 5rffxxf.exe PID 400 wrote to memory of 2008 400 dddvp.exe 5rffxxf.exe PID 2008 wrote to memory of 1548 2008 5rffxxf.exe tbtttt.exe PID 2008 wrote to memory of 1548 2008 5rffxxf.exe tbtttt.exe PID 2008 wrote to memory of 1548 2008 5rffxxf.exe tbtttt.exe PID 1548 wrote to memory of 3024 1548 tbtttt.exe jdjvv.exe PID 1548 wrote to memory of 3024 1548 tbtttt.exe jdjvv.exe PID 1548 wrote to memory of 3024 1548 tbtttt.exe jdjvv.exe PID 3024 wrote to memory of 816 3024 jdjvv.exe bhnnhn.exe PID 3024 wrote to memory of 816 3024 jdjvv.exe bhnnhn.exe PID 3024 wrote to memory of 816 3024 jdjvv.exe bhnnhn.exe PID 816 wrote to memory of 4204 816 bhnnhn.exe jddvp.exe PID 816 wrote to memory of 4204 816 bhnnhn.exe jddvp.exe PID 816 wrote to memory of 4204 816 bhnnhn.exe jddvp.exe PID 4204 wrote to memory of 2252 4204 jddvp.exe bhhnhn.exe PID 4204 wrote to memory of 2252 4204 jddvp.exe bhhnhn.exe PID 4204 wrote to memory of 2252 4204 jddvp.exe bhhnhn.exe PID 2252 wrote to memory of 3136 2252 bhhnhn.exe 5jdjd.exe PID 2252 wrote to memory of 3136 2252 bhhnhn.exe 5jdjd.exe PID 2252 wrote to memory of 3136 2252 bhhnhn.exe 5jdjd.exe PID 3136 wrote to memory of 4392 3136 5jdjd.exe rlrlllf.exe PID 3136 wrote to memory of 4392 3136 5jdjd.exe rlrlllf.exe PID 3136 wrote to memory of 4392 3136 5jdjd.exe rlrlllf.exe PID 4392 wrote to memory of 4540 4392 rlrlllf.exe tnbbth.exe PID 4392 wrote to memory of 4540 4392 rlrlllf.exe tnbbth.exe PID 4392 wrote to memory of 4540 4392 rlrlllf.exe tnbbth.exe PID 4540 wrote to memory of 3440 4540 tnbbth.exe jddvd.exe PID 4540 wrote to memory of 3440 4540 tnbbth.exe jddvd.exe PID 4540 wrote to memory of 3440 4540 tnbbth.exe jddvd.exe PID 3440 wrote to memory of 3528 3440 jddvd.exe xxrlxxr.exe PID 3440 wrote to memory of 3528 3440 jddvd.exe xxrlxxr.exe PID 3440 wrote to memory of 3528 3440 jddvd.exe xxrlxxr.exe PID 3528 wrote to memory of 5060 3528 xxrlxxr.exe rfxrflr.exe PID 3528 wrote to memory of 5060 3528 xxrlxxr.exe rfxrflr.exe PID 3528 wrote to memory of 5060 3528 xxrlxxr.exe rfxrflr.exe PID 5060 wrote to memory of 2512 5060 rfxrflr.exe ttbbtb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a79b23cb810908a8f499421e19a22cb0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\vjjjd.exec:\vjjjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
\??\c:\7dpjd.exec:\7dpjd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\ffrrlff.exec:\ffrrlff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\rlrllll.exec:\rlrllll.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\5nnhbb.exec:\5nnhbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
\??\c:\1rxxrrx.exec:\1rxxrrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
\??\c:\hbhnhh.exec:\hbhnhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\hhhhth.exec:\hhhhth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\dddvp.exec:\dddvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\5rffxxf.exec:\5rffxxf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\tbtttt.exec:\tbtttt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\jdjvv.exec:\jdjvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\bhnnhn.exec:\bhnnhn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:816 -
\??\c:\jddvp.exec:\jddvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
\??\c:\bhhnhn.exec:\bhhnhn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\5jdjd.exec:\5jdjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
\??\c:\rlrlllf.exec:\rlrlllf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\tnbbth.exec:\tnbbth.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
\??\c:\jddvd.exec:\jddvd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\xxrlxxr.exec:\xxrlxxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\rfxrflr.exec:\rfxrflr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\ttbbtb.exec:\ttbbtb.exe23⤵
- Executes dropped EXE
PID:2512 -
\??\c:\dvjdp.exec:\dvjdp.exe24⤵
- Executes dropped EXE
PID:3660 -
\??\c:\dpdpj.exec:\dpdpj.exe25⤵
- Executes dropped EXE
PID:3004 -
\??\c:\xrrrrrx.exec:\xrrrrrx.exe26⤵
- Executes dropped EXE
PID:3288 -
\??\c:\rllffff.exec:\rllffff.exe27⤵
- Executes dropped EXE
PID:4180 -
\??\c:\1nttnn.exec:\1nttnn.exe28⤵
- Executes dropped EXE
PID:1400 -
\??\c:\vppvp.exec:\vppvp.exe29⤵
- Executes dropped EXE
PID:4980 -
\??\c:\lxfxlxx.exec:\lxfxlxx.exe30⤵
- Executes dropped EXE
PID:3700 -
\??\c:\frffffr.exec:\frffffr.exe31⤵
- Executes dropped EXE
PID:3492 -
\??\c:\jpdjv.exec:\jpdjv.exe32⤵
- Executes dropped EXE
PID:1676 -
\??\c:\bbbbht.exec:\bbbbht.exe33⤵
- Executes dropped EXE
PID:1748 -
\??\c:\jdpvp.exec:\jdpvp.exe34⤵
- Executes dropped EXE
PID:3600 -
\??\c:\7xxxrrl.exec:\7xxxrrl.exe35⤵
- Executes dropped EXE
PID:668 -
\??\c:\lrxfrfr.exec:\lrxfrfr.exe36⤵
- Executes dropped EXE
PID:2424 -
\??\c:\bnnthb.exec:\bnnthb.exe37⤵
- Executes dropped EXE
PID:4772 -
\??\c:\jdpjj.exec:\jdpjj.exe38⤵
- Executes dropped EXE
PID:3684 -
\??\c:\7fxrlll.exec:\7fxrlll.exe39⤵
- Executes dropped EXE
PID:3116 -
\??\c:\bbhbbt.exec:\bbhbbt.exe40⤵
- Executes dropped EXE
PID:5000 -
\??\c:\1hnhbb.exec:\1hnhbb.exe41⤵
- Executes dropped EXE
PID:2476 -
\??\c:\jdddv.exec:\jdddv.exe42⤵
- Executes dropped EXE
PID:2692 -
\??\c:\rllfrff.exec:\rllfrff.exe43⤵
- Executes dropped EXE
PID:2780 -
\??\c:\hhnbbn.exec:\hhnbbn.exe44⤵
- Executes dropped EXE
PID:872 -
\??\c:\hntttn.exec:\hntttn.exe45⤵
- Executes dropped EXE
PID:1064 -
\??\c:\lrrlfxx.exec:\lrrlfxx.exe46⤵
- Executes dropped EXE
PID:1528 -
\??\c:\xrrlfff.exec:\xrrlfff.exe47⤵
- Executes dropped EXE
PID:3400 -
\??\c:\vjjdv.exec:\vjjdv.exe48⤵
- Executes dropped EXE
PID:4792 -
\??\c:\lffxrrx.exec:\lffxrrx.exe49⤵
- Executes dropped EXE
PID:4984 -
\??\c:\5nhhbt.exec:\5nhhbt.exe50⤵
- Executes dropped EXE
PID:4652 -
\??\c:\dvjdv.exec:\dvjdv.exe51⤵
- Executes dropped EXE
PID:3144 -
\??\c:\xrfxfll.exec:\xrfxfll.exe52⤵
- Executes dropped EXE
PID:764 -
\??\c:\lxxxxxx.exec:\lxxxxxx.exe53⤵
- Executes dropped EXE
PID:632 -
\??\c:\vvvpp.exec:\vvvpp.exe54⤵
- Executes dropped EXE
PID:4968 -
\??\c:\vpdvd.exec:\vpdvd.exe55⤵
- Executes dropped EXE
PID:4808 -
\??\c:\1rrfxxr.exec:\1rrfxxr.exe56⤵
- Executes dropped EXE
PID:372 -
\??\c:\bbttbn.exec:\bbttbn.exe57⤵
- Executes dropped EXE
PID:1712 -
\??\c:\pddvp.exec:\pddvp.exe58⤵
- Executes dropped EXE
PID:1288 -
\??\c:\xlrllrl.exec:\xlrllrl.exe59⤵
- Executes dropped EXE
PID:3024 -
\??\c:\3bbtnn.exec:\3bbtnn.exe60⤵
- Executes dropped EXE
PID:1048 -
\??\c:\vvjpj.exec:\vvjpj.exe61⤵
- Executes dropped EXE
PID:2540 -
\??\c:\rrfxrrl.exec:\rrfxrrl.exe62⤵
- Executes dropped EXE
PID:2852 -
\??\c:\7bbthn.exec:\7bbthn.exe63⤵
- Executes dropped EXE
PID:3448 -
\??\c:\bbhbtt.exec:\bbhbtt.exe64⤵
- Executes dropped EXE
PID:4776 -
\??\c:\3jdvp.exec:\3jdvp.exe65⤵
- Executes dropped EXE
PID:4392 -
\??\c:\rxfxrll.exec:\rxfxrll.exe66⤵PID:2244
-
\??\c:\9bbbtt.exec:\9bbbtt.exe67⤵PID:4076
-
\??\c:\vdvvv.exec:\vdvvv.exe68⤵PID:2916
-
\??\c:\jdjjp.exec:\jdjjp.exe69⤵PID:3032
-
\??\c:\3lfrxrr.exec:\3lfrxrr.exe70⤵PID:5004
-
\??\c:\hhbbnn.exec:\hhbbnn.exe71⤵PID:2416
-
\??\c:\dpvpj.exec:\dpvpj.exe72⤵PID:4664
-
\??\c:\pddvp.exec:\pddvp.exe73⤵PID:3740
-
\??\c:\xxllxfl.exec:\xxllxfl.exe74⤵PID:944
-
\??\c:\bttnhb.exec:\bttnhb.exe75⤵PID:4436
-
\??\c:\bnbnhb.exec:\bnbnhb.exe76⤵PID:4932
-
\??\c:\jdpjv.exec:\jdpjv.exe77⤵PID:2532
-
\??\c:\fxrlfrr.exec:\fxrlfrr.exe78⤵PID:3632
-
\??\c:\rlrlfll.exec:\rlrlfll.exe79⤵PID:1012
-
\??\c:\nbhbtt.exec:\nbhbtt.exe80⤵PID:4348
-
\??\c:\rllfllr.exec:\rllfllr.exe81⤵PID:2368
-
\??\c:\hhbbtn.exec:\hhbbtn.exe82⤵PID:968
-
\??\c:\5jvvj.exec:\5jvvj.exe83⤵PID:3408
-
\??\c:\fffxlll.exec:\fffxlll.exe84⤵PID:3600
-
\??\c:\xrlffff.exec:\xrlffff.exe85⤵PID:404
-
\??\c:\ntnnhh.exec:\ntnnhh.exe86⤵PID:2548
-
\??\c:\jpjpj.exec:\jpjpj.exe87⤵PID:1632
-
\??\c:\rlllrxx.exec:\rlllrxx.exe88⤵PID:5012
-
\??\c:\hnnthn.exec:\hnnthn.exe89⤵PID:2476
-
\??\c:\bttnht.exec:\bttnht.exe90⤵PID:2692
-
\??\c:\jpjjp.exec:\jpjjp.exe91⤵PID:2780
-
\??\c:\xlllfff.exec:\xlllfff.exe92⤵PID:872
-
\??\c:\frxllxr.exec:\frxllxr.exe93⤵PID:2012
-
\??\c:\nnbtbb.exec:\nnbtbb.exe94⤵PID:5044
-
\??\c:\vvppv.exec:\vvppv.exe95⤵PID:2404
-
\??\c:\xlrrfrf.exec:\xlrrfrf.exe96⤵PID:4396
-
\??\c:\hhhbtt.exec:\hhhbtt.exe97⤵PID:1792
-
\??\c:\vpddj.exec:\vpddj.exe98⤵PID:3036
-
\??\c:\rxlffxr.exec:\rxlffxr.exe99⤵PID:1708
-
\??\c:\nhnnnn.exec:\nhnnnn.exe100⤵PID:4668
-
\??\c:\vdddv.exec:\vdddv.exe101⤵PID:1664
-
\??\c:\jjdjp.exec:\jjdjp.exe102⤵PID:4808
-
\??\c:\flrlxlf.exec:\flrlxlf.exe103⤵PID:372
-
\??\c:\1nbbbb.exec:\1nbbbb.exe104⤵PID:1548
-
\??\c:\rrrlllf.exec:\rrrlllf.exe105⤵PID:5100
-
\??\c:\tnnbbh.exec:\tnnbbh.exe106⤵PID:3688
-
\??\c:\7djdd.exec:\7djdd.exe107⤵PID:4908
-
\??\c:\nhnhbb.exec:\nhnhbb.exe108⤵PID:2252
-
\??\c:\flfflrx.exec:\flfflrx.exe109⤵PID:5104
-
\??\c:\nbnnhh.exec:\nbnnhh.exe110⤵PID:4836
-
\??\c:\jjppj.exec:\jjppj.exe111⤵PID:3076
-
\??\c:\xxrlfff.exec:\xxrlfff.exe112⤵PID:1932
-
\??\c:\bbhbbh.exec:\bbhbbh.exe113⤵PID:1580
-
\??\c:\dvvpj.exec:\dvvpj.exe114⤵PID:2464
-
\??\c:\pjjdv.exec:\pjjdv.exe115⤵PID:2916
-
\??\c:\9llrffx.exec:\9llrffx.exe116⤵PID:3032
-
\??\c:\tbnnnt.exec:\tbnnnt.exe117⤵PID:5004
-
\??\c:\vpdjj.exec:\vpdjj.exe118⤵PID:3660
-
\??\c:\xrxfflx.exec:\xrxfflx.exe119⤵PID:4664
-
\??\c:\xfrrffl.exec:\xfrrffl.exe120⤵PID:5084
-
\??\c:\3ntntt.exec:\3ntntt.exe121⤵PID:4180
-
\??\c:\vjvjp.exec:\vjvjp.exe122⤵PID:3536
-
\??\c:\lfxrlfx.exec:\lfxrlfx.exe123⤵PID:1720
-
\??\c:\tnhhhh.exec:\tnhhhh.exe124⤵PID:1612
-
\??\c:\7vdpj.exec:\7vdpj.exe125⤵PID:1840
-
\??\c:\1xrlffr.exec:\1xrlffr.exe126⤵PID:1012
-
\??\c:\bthnhb.exec:\bthnhb.exe127⤵PID:2796
-
\??\c:\7dvpv.exec:\7dvpv.exe128⤵PID:2368
-
\??\c:\rllxrrl.exec:\rllxrrl.exe129⤵PID:2204
-
\??\c:\nnhtnh.exec:\nnhtnh.exe130⤵PID:2592
-
\??\c:\ppvpv.exec:\ppvpv.exe131⤵PID:640
-
\??\c:\dpppp.exec:\dpppp.exe132⤵PID:952
-
\??\c:\xxrrfrf.exec:\xxrrfrf.exe133⤵PID:4336
-
\??\c:\ttbttb.exec:\ttbttb.exe134⤵PID:3968
-
\??\c:\jdjpp.exec:\jdjpp.exe135⤵PID:3672
-
\??\c:\xllflxr.exec:\xllflxr.exe136⤵PID:2388
-
\??\c:\1tbttt.exec:\1tbttt.exe137⤵PID:3088
-
\??\c:\jjjdv.exec:\jjjdv.exe138⤵PID:2556
-
\??\c:\xlllllf.exec:\xlllllf.exe139⤵PID:3400
-
\??\c:\nbhbbb.exec:\nbhbbb.exe140⤵PID:1936
-
\??\c:\nttnhb.exec:\nttnhb.exe141⤵PID:1284
-
\??\c:\ppjpj.exec:\ppjpj.exe142⤵PID:4320
-
\??\c:\xrllffx.exec:\xrllffx.exe143⤵PID:4024
-
\??\c:\nbhhhh.exec:\nbhhhh.exe144⤵PID:1804
-
\??\c:\1vppp.exec:\1vppp.exe145⤵PID:4964
-
\??\c:\9jvpv.exec:\9jvpv.exe146⤵PID:2444
-
\??\c:\frxrllr.exec:\frxrllr.exe147⤵PID:2908
-
\??\c:\thbnnt.exec:\thbnnt.exe148⤵PID:4808
-
\??\c:\dpvpp.exec:\dpvpp.exe149⤵PID:4720
-
\??\c:\7fffffx.exec:\7fffffx.exe150⤵PID:2508
-
\??\c:\hbhhhn.exec:\hbhhhn.exe151⤵PID:3928
-
\??\c:\thhntt.exec:\thhntt.exe152⤵PID:3396
-
\??\c:\ppppp.exec:\ppppp.exe153⤵PID:4696
-
\??\c:\5fxxfff.exec:\5fxxfff.exe154⤵PID:3596
-
\??\c:\bhnnnb.exec:\bhnnnb.exe155⤵PID:3012
-
\??\c:\bntnnh.exec:\bntnnh.exe156⤵PID:4380
-
\??\c:\dvvdp.exec:\dvvdp.exe157⤵PID:3528
-
\??\c:\9lrrlrl.exec:\9lrrlrl.exe158⤵PID:4832
-
\??\c:\nnnnhb.exec:\nnnnhb.exe159⤵PID:4004
-
\??\c:\pjvpp.exec:\pjvpp.exe160⤵PID:2416
-
\??\c:\vdjdd.exec:\vdjdd.exe161⤵PID:1716
-
\??\c:\xxxxllf.exec:\xxxxllf.exe162⤵PID:3740
-
\??\c:\tthbhh.exec:\tthbhh.exe163⤵PID:5036
-
\??\c:\1btnhh.exec:\1btnhh.exe164⤵PID:2876
-
\??\c:\vdjdd.exec:\vdjdd.exe165⤵PID:1088
-
\??\c:\lflfxxx.exec:\lflfxxx.exe166⤵PID:3608
-
\??\c:\frrrlll.exec:\frrrlll.exe167⤵PID:1612
-
\??\c:\nhnhhh.exec:\nhnhhh.exe168⤵PID:1840
-
\??\c:\ddjdd.exec:\ddjdd.exe169⤵PID:1012
-
\??\c:\xllfxrl.exec:\xllfxrl.exe170⤵PID:3712
-
\??\c:\lfxfxxl.exec:\lfxfxxl.exe171⤵PID:864
-
\??\c:\5ttttt.exec:\5ttttt.exe172⤵PID:712
-
\??\c:\vpvpj.exec:\vpvpj.exe173⤵PID:3476
-
\??\c:\7xlllrx.exec:\7xlllrx.exe174⤵PID:1828
-
\??\c:\bbhhhh.exec:\bbhhhh.exe175⤵PID:3776
-
\??\c:\pjppj.exec:\pjppj.exe176⤵PID:3904
-
\??\c:\vpddp.exec:\vpddp.exe177⤵PID:2780
-
\??\c:\rrllllf.exec:\rrllllf.exe178⤵PID:1212
-
\??\c:\hbhhhb.exec:\hbhhhb.exe179⤵PID:1496
-
\??\c:\9djdp.exec:\9djdp.exe180⤵PID:3400
-
\??\c:\ppvpv.exec:\ppvpv.exe181⤵PID:60
-
\??\c:\xxxllxx.exec:\xxxllxx.exe182⤵PID:3556
-
\??\c:\3nhbbb.exec:\3nhbbb.exe183⤵PID:1792
-
\??\c:\vpdvv.exec:\vpdvv.exe184⤵PID:3036
-
\??\c:\xlxxrxr.exec:\xlxxrxr.exe185⤵PID:3056
-
\??\c:\hbnhbn.exec:\hbnhbn.exe186⤵PID:4964
-
\??\c:\jdjvj.exec:\jdjvj.exe187⤵PID:740
-
\??\c:\rrrrxlr.exec:\rrrrxlr.exe188⤵PID:1276
-
\??\c:\hhntbb.exec:\hhntbb.exe189⤵PID:2620
-
\??\c:\dvvpv.exec:\dvvpv.exe190⤵PID:4960
-
\??\c:\5llfxxr.exec:\5llfxxr.exe191⤵PID:2900
-
\??\c:\ntbtth.exec:\ntbtth.exe192⤵PID:2540
-
\??\c:\7vjdv.exec:\7vjdv.exe193⤵PID:2252
-
\??\c:\djvjp.exec:\djvjp.exe194⤵PID:4272
-
\??\c:\rfxxffl.exec:\rfxxffl.exe195⤵PID:4540
-
\??\c:\hhnhbt.exec:\hhnhbt.exe196⤵PID:2436
-
\??\c:\xrflxfl.exec:\xrflxfl.exe197⤵PID:5064
-
\??\c:\lxfrrrx.exec:\lxfrrrx.exe198⤵PID:1428
-
\??\c:\hnbhtt.exec:\hnbhtt.exe199⤵PID:3528
-
\??\c:\vvjjj.exec:\vvjjj.exe200⤵PID:4832
-
\??\c:\rrrrlrr.exec:\rrrrlrr.exe201⤵PID:3164
-
\??\c:\lfffxxr.exec:\lfffxxr.exe202⤵PID:1940
-
\??\c:\hhthhh.exec:\hhthhh.exe203⤵PID:4664
-
\??\c:\vvddd.exec:\vvddd.exe204⤵PID:2472
-
\??\c:\dpppj.exec:\dpppj.exe205⤵PID:684
-
\??\c:\xxrrxxr.exec:\xxrrxxr.exe206⤵PID:4484
-
\??\c:\hhhhhn.exec:\hhhhhn.exe207⤵PID:4392
-
\??\c:\tnhbtn.exec:\tnhbtn.exe208⤵PID:2688
-
\??\c:\vpvpp.exec:\vpvpp.exe209⤵PID:2384
-
\??\c:\lrxrlff.exec:\lrxrlff.exe210⤵PID:2796
-
\??\c:\nntnhh.exec:\nntnhh.exe211⤵PID:4592
-
\??\c:\hnbtnh.exec:\hnbtnh.exe212⤵PID:2548
-
\??\c:\dvvpj.exec:\dvvpj.exe213⤵PID:640
-
\??\c:\9frflrl.exec:\9frflrl.exe214⤵PID:5000
-
\??\c:\ttthbt.exec:\ttthbt.exe215⤵PID:2864
-
\??\c:\5jdjj.exec:\5jdjj.exe216⤵PID:2064
-
\??\c:\vvpdd.exec:\vvpdd.exe217⤵PID:2872
-
\??\c:\rrfrlll.exec:\rrfrlll.exe218⤵PID:1064
-
\??\c:\7hhhbb.exec:\7hhhbb.exe219⤵PID:2556
-
\??\c:\ddpjj.exec:\ddpjj.exe220⤵PID:4936
-
\??\c:\ddddv.exec:\ddddv.exe221⤵PID:1368
-
\??\c:\lllffff.exec:\lllffff.exe222⤵PID:3736
-
\??\c:\nnbtnn.exec:\nnbtnn.exe223⤵PID:3144
-
\??\c:\nhnhbb.exec:\nhnhbb.exe224⤵PID:3052
-
\??\c:\jdppj.exec:\jdppj.exe225⤵PID:916
-
\??\c:\frxrllf.exec:\frxrllf.exe226⤵PID:632
-
\??\c:\frrrllf.exec:\frrrllf.exe227⤵PID:2372
-
\??\c:\nbhnhh.exec:\nbhnhh.exe228⤵PID:2616
-
\??\c:\ntbbnn.exec:\ntbbnn.exe229⤵PID:1756
-
\??\c:\dppdj.exec:\dppdj.exe230⤵PID:4720
-
\??\c:\lrfxrxx.exec:\lrfxrxx.exe231⤵PID:628
-
\??\c:\7fxlffx.exec:\7fxlffx.exe232⤵PID:4204
-
\??\c:\tnhbth.exec:\tnhbth.exe233⤵PID:5076
-
\??\c:\dvvpj.exec:\dvvpj.exe234⤵PID:2228
-
\??\c:\pjdjv.exec:\pjdjv.exe235⤵PID:3396
-
\??\c:\1flfxxr.exec:\1flfxxr.exe236⤵PID:5104
-
\??\c:\hbbttt.exec:\hbbttt.exe237⤵PID:4532
-
\??\c:\nbhbtn.exec:\nbhbtn.exe238⤵PID:5060
-
\??\c:\ddpjd.exec:\ddpjd.exe239⤵PID:1852
-
\??\c:\flxrlfx.exec:\flxrlfx.exe240⤵PID:3724
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe241⤵PID:400
-
\??\c:\hbnhbb.exec:\hbnhbb.exe242⤵PID:2108