Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe
-
Size
275KB
-
MD5
aa7d31d9257c14d8ee133014f4e4f950
-
SHA1
003d44b87fe0553af83ade1c1969f39e72b6a19a
-
SHA256
3365078b6169eee2d1fd9d01a5dec4313607c27e87528ef925e4d309f2e5865b
-
SHA512
34af5a7130e3b8e95ddecebcc1d3d1d952f53b24722cbebc346b5695762c773760d332b3d41f7666200af5a0abff74ae7c4c8ea813607eb9d80e5d88f6eef0bc
-
SSDEEP
3072:8hOm2sI93UufdC67cimD5t251UrRE9TTF6:8cm7ImGddXmNt251UriZF6
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1672-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-20-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4976-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4412-29-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3176-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1148-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/868-38-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5056-47-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4952-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2624-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1572-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1872-80-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4636-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2536-58-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5060-57-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4940-103-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3864-115-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2188-120-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4216-132-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2780-140-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5016-158-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5012-182-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2444-189-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3816-194-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2500-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2660-170-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4552-166-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2256-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1296-210-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1552-215-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4344-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1672-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1616-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1784-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2844-249-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5032-253-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3092-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1768-270-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/64-284-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2460-296-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/548-310-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4744-317-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3624-322-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2176-326-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2172-333-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1160-359-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3216-373-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5080-393-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3000-414-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1768-438-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1888-452-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4180-464-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/760-471-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3544-484-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5060-569-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3700-585-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4768-592-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3696-753-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4640-924-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4324-946-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5000-1117-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1084-1302-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4460-1611-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/920-1643-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3pvpj.exellrlffl.exe3hhhth.exebnbttn.exevpvpj.exevvjpj.exe9llxrff.exevpvdv.exellrrxxf.exebnbtnh.exeddvpv.exe1vvpp.exerlrrrlx.exenbtnhn.exe3tnnnn.exejdjdv.exerfxlxrx.exehtbbbb.exejdvdd.exe7djjp.exexxfrfll.exedvpjd.exerflrxxl.exehtbbtt.exe1ddjp.exerxfxrrf.exerrxlffx.exentbbtt.exedppjj.exehtbbtt.exeppddv.exejjvpd.exefflfrxl.exentttbt.exe9pjjd.exexllrrfl.exenhbtnn.exejpvvp.exe9bhbbn.exennthtn.exepdvpp.exelffxxxr.exetnbnbh.exejdjjd.exedjjdv.exerllxrll.exedjpjv.exe9pvpj.exebtbtbb.exe1pdpp.exeddpvv.exexfrxrxf.exebhttnh.exenthbth.exepdpjj.exehbnhnn.exenhnhtn.exejjjdj.exexrrlffx.exe3fxrllf.exe3ttnht.exe9pjjd.exellrflff.exe9bhbtt.exepid process 1672 3pvpj.exe 3176 llrlffl.exe 5052 3hhhth.exe 4976 bnbttn.exe 4412 vpvpj.exe 868 vvjpj.exe 5056 9llxrff.exe 5060 vpvdv.exe 2536 llrrxxf.exe 4636 bnbtnh.exe 4528 ddvpv.exe 4952 1vvpp.exe 1872 rlrrrlx.exe 1604 nbtnhn.exe 2624 3tnnnn.exe 1572 jdjdv.exe 4940 rfxlxrx.exe 2432 htbbbb.exe 3864 jdvdd.exe 2188 7djjp.exe 4172 xxfrfll.exe 4216 dvpjd.exe 2780 rflrxxl.exe 388 htbbtt.exe 1728 1ddjp.exe 4184 rxfxrrf.exe 5016 rrxlffx.exe 4552 ntbbtt.exe 2660 dppjj.exe 2500 htbbtt.exe 5012 ppddv.exe 2444 jjvpd.exe 3816 fflfrxl.exe 4984 ntttbt.exe 3216 9pjjd.exe 3600 xllrrfl.exe 2256 nhbtnn.exe 1296 jpvvp.exe 1552 9bhbbn.exe 1420 nnthtn.exe 4344 pdvpp.exe 1724 lffxxxr.exe 1672 tnbnbh.exe 1704 jdjjd.exe 1616 djjdv.exe 3632 rllxrll.exe 1784 djpjv.exe 2844 9pvpj.exe 5032 btbtbb.exe 3092 1pdpp.exe 2900 ddpvv.exe 2340 xfrxrxf.exe 4440 bhttnh.exe 1768 nthbth.exe 4988 pdpjj.exe 1808 hbnhnn.exe 64 nhnhtn.exe 3440 jjjdj.exe 4572 xrrlffx.exe 2196 3fxrllf.exe 4368 3ttnht.exe 2460 9pjjd.exe 4016 llrflff.exe 2520 9bhbtt.exe -
Processes:
resource yara_rule behavioral2/memory/1672-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5052-20-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4412-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3176-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1148-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/868-38-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5056-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5056-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4952-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2624-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1572-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1872-80-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4636-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2536-58-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5060-57-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-103-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3864-115-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2188-120-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4216-132-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2780-140-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5016-158-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5012-182-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2444-189-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3816-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2500-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2660-170-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4552-166-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2256-205-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2256-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1296-210-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1552-215-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4344-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1616-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1784-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2844-249-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5032-253-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3092-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1768-270-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/64-277-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3440-280-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4572-285-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/64-284-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2460-296-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/548-310-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4744-317-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3624-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3624-322-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2176-326-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2172-333-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2660-346-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1160-359-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3216-369-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3216-373-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5080-393-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3000-414-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2020-426-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1768-434-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1768-438-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1888-452-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4180-464-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/760-471-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3544-484-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe3pvpj.exellrlffl.exe3hhhth.exebnbttn.exevpvpj.exevvjpj.exe9llxrff.exevpvdv.exellrrxxf.exebnbtnh.exeddvpv.exe1vvpp.exerlrrrlx.exenbtnhn.exe3tnnnn.exejdjdv.exerfxlxrx.exehtbbbb.exejdvdd.exe7djjp.exexxfrfll.exedescription pid process target process PID 1148 wrote to memory of 1672 1148 aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe 3pvpj.exe PID 1148 wrote to memory of 1672 1148 aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe 3pvpj.exe PID 1148 wrote to memory of 1672 1148 aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe 3pvpj.exe PID 1672 wrote to memory of 3176 1672 3pvpj.exe llrlffl.exe PID 1672 wrote to memory of 3176 1672 3pvpj.exe llrlffl.exe PID 1672 wrote to memory of 3176 1672 3pvpj.exe llrlffl.exe PID 3176 wrote to memory of 5052 3176 llrlffl.exe 3hhhth.exe PID 3176 wrote to memory of 5052 3176 llrlffl.exe 3hhhth.exe PID 3176 wrote to memory of 5052 3176 llrlffl.exe 3hhhth.exe PID 5052 wrote to memory of 4976 5052 3hhhth.exe bnbttn.exe PID 5052 wrote to memory of 4976 5052 3hhhth.exe bnbttn.exe PID 5052 wrote to memory of 4976 5052 3hhhth.exe bnbttn.exe PID 4976 wrote to memory of 4412 4976 bnbttn.exe vpvpj.exe PID 4976 wrote to memory of 4412 4976 bnbttn.exe vpvpj.exe PID 4976 wrote to memory of 4412 4976 bnbttn.exe vpvpj.exe PID 4412 wrote to memory of 868 4412 vpvpj.exe vvjpj.exe PID 4412 wrote to memory of 868 4412 vpvpj.exe vvjpj.exe PID 4412 wrote to memory of 868 4412 vpvpj.exe vvjpj.exe PID 868 wrote to memory of 5056 868 vvjpj.exe 9llxrff.exe PID 868 wrote to memory of 5056 868 vvjpj.exe 9llxrff.exe PID 868 wrote to memory of 5056 868 vvjpj.exe 9llxrff.exe PID 5056 wrote to memory of 5060 5056 9llxrff.exe vpvdv.exe PID 5056 wrote to memory of 5060 5056 9llxrff.exe vpvdv.exe PID 5056 wrote to memory of 5060 5056 9llxrff.exe vpvdv.exe PID 5060 wrote to memory of 2536 5060 vpvdv.exe llrrxxf.exe PID 5060 wrote to memory of 2536 5060 vpvdv.exe llrrxxf.exe PID 5060 wrote to memory of 2536 5060 vpvdv.exe llrrxxf.exe PID 2536 wrote to memory of 4636 2536 llrrxxf.exe bnbtnh.exe PID 2536 wrote to memory of 4636 2536 llrrxxf.exe bnbtnh.exe PID 2536 wrote to memory of 4636 2536 llrrxxf.exe bnbtnh.exe PID 4636 wrote to memory of 4528 4636 bnbtnh.exe ddvpv.exe PID 4636 wrote to memory of 4528 4636 bnbtnh.exe ddvpv.exe PID 4636 wrote to memory of 4528 4636 bnbtnh.exe ddvpv.exe PID 4528 wrote to memory of 4952 4528 ddvpv.exe 1vvpp.exe PID 4528 wrote to memory of 4952 4528 ddvpv.exe 1vvpp.exe PID 4528 wrote to memory of 4952 4528 ddvpv.exe 1vvpp.exe PID 4952 wrote to memory of 1872 4952 1vvpp.exe rlrrrlx.exe PID 4952 wrote to memory of 1872 4952 1vvpp.exe rlrrrlx.exe PID 4952 wrote to memory of 1872 4952 1vvpp.exe rlrrrlx.exe PID 1872 wrote to memory of 1604 1872 rlrrrlx.exe nbtnhn.exe PID 1872 wrote to memory of 1604 1872 rlrrrlx.exe nbtnhn.exe PID 1872 wrote to memory of 1604 1872 rlrrrlx.exe nbtnhn.exe PID 1604 wrote to memory of 2624 1604 nbtnhn.exe 3tnnnn.exe PID 1604 wrote to memory of 2624 1604 nbtnhn.exe 3tnnnn.exe PID 1604 wrote to memory of 2624 1604 nbtnhn.exe 3tnnnn.exe PID 2624 wrote to memory of 1572 2624 3tnnnn.exe jdjdv.exe PID 2624 wrote to memory of 1572 2624 3tnnnn.exe jdjdv.exe PID 2624 wrote to memory of 1572 2624 3tnnnn.exe jdjdv.exe PID 1572 wrote to memory of 4940 1572 jdjdv.exe rfxlxrx.exe PID 1572 wrote to memory of 4940 1572 jdjdv.exe rfxlxrx.exe PID 1572 wrote to memory of 4940 1572 jdjdv.exe rfxlxrx.exe PID 4940 wrote to memory of 2432 4940 rfxlxrx.exe htbbbb.exe PID 4940 wrote to memory of 2432 4940 rfxlxrx.exe htbbbb.exe PID 4940 wrote to memory of 2432 4940 rfxlxrx.exe htbbbb.exe PID 2432 wrote to memory of 3864 2432 htbbbb.exe jdvdd.exe PID 2432 wrote to memory of 3864 2432 htbbbb.exe jdvdd.exe PID 2432 wrote to memory of 3864 2432 htbbbb.exe jdvdd.exe PID 3864 wrote to memory of 2188 3864 jdvdd.exe 7djjp.exe PID 3864 wrote to memory of 2188 3864 jdvdd.exe 7djjp.exe PID 3864 wrote to memory of 2188 3864 jdvdd.exe 7djjp.exe PID 2188 wrote to memory of 4172 2188 7djjp.exe xxfrfll.exe PID 2188 wrote to memory of 4172 2188 7djjp.exe xxfrfll.exe PID 2188 wrote to memory of 4172 2188 7djjp.exe xxfrfll.exe PID 4172 wrote to memory of 4216 4172 xxfrfll.exe dvpjd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\aa7d31d9257c14d8ee133014f4e4f950_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\3pvpj.exec:\3pvpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\llrlffl.exec:\llrlffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3176 -
\??\c:\3hhhth.exec:\3hhhth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\bnbttn.exec:\bnbttn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
\??\c:\vpvpj.exec:\vpvpj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\vvjpj.exec:\vvjpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
\??\c:\9llxrff.exec:\9llxrff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\vpvdv.exec:\vpvdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\llrrxxf.exec:\llrrxxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\bnbtnh.exec:\bnbtnh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\ddvpv.exec:\ddvpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\1vvpp.exec:\1vvpp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\rlrrrlx.exec:\rlrrrlx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\nbtnhn.exec:\nbtnhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\3tnnnn.exec:\3tnnnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\jdjdv.exec:\jdjdv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\rfxlxrx.exec:\rfxlxrx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\htbbbb.exec:\htbbbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\jdvdd.exec:\jdvdd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\7djjp.exec:\7djjp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\xxfrfll.exec:\xxfrfll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\dvpjd.exec:\dvpjd.exe23⤵
- Executes dropped EXE
PID:4216 -
\??\c:\rflrxxl.exec:\rflrxxl.exe24⤵
- Executes dropped EXE
PID:2780 -
\??\c:\htbbtt.exec:\htbbtt.exe25⤵
- Executes dropped EXE
PID:388 -
\??\c:\1ddjp.exec:\1ddjp.exe26⤵
- Executes dropped EXE
PID:1728 -
\??\c:\rxfxrrf.exec:\rxfxrrf.exe27⤵
- Executes dropped EXE
PID:4184 -
\??\c:\rrxlffx.exec:\rrxlffx.exe28⤵
- Executes dropped EXE
PID:5016 -
\??\c:\ntbbtt.exec:\ntbbtt.exe29⤵
- Executes dropped EXE
PID:4552 -
\??\c:\dppjj.exec:\dppjj.exe30⤵
- Executes dropped EXE
PID:2660 -
\??\c:\htbbtt.exec:\htbbtt.exe31⤵
- Executes dropped EXE
PID:2500 -
\??\c:\ppddv.exec:\ppddv.exe32⤵
- Executes dropped EXE
PID:5012 -
\??\c:\jjvpd.exec:\jjvpd.exe33⤵
- Executes dropped EXE
PID:2444 -
\??\c:\fflfrxl.exec:\fflfrxl.exe34⤵
- Executes dropped EXE
PID:3816 -
\??\c:\ntttbt.exec:\ntttbt.exe35⤵
- Executes dropped EXE
PID:4984 -
\??\c:\9pjjd.exec:\9pjjd.exe36⤵
- Executes dropped EXE
PID:3216 -
\??\c:\xllrrfl.exec:\xllrrfl.exe37⤵
- Executes dropped EXE
PID:3600 -
\??\c:\nhbtnn.exec:\nhbtnn.exe38⤵
- Executes dropped EXE
PID:2256 -
\??\c:\jpvvp.exec:\jpvvp.exe39⤵
- Executes dropped EXE
PID:1296 -
\??\c:\9bhbbn.exec:\9bhbbn.exe40⤵
- Executes dropped EXE
PID:1552 -
\??\c:\nnthtn.exec:\nnthtn.exe41⤵
- Executes dropped EXE
PID:1420 -
\??\c:\pdvpp.exec:\pdvpp.exe42⤵
- Executes dropped EXE
PID:4344 -
\??\c:\lffxxxr.exec:\lffxxxr.exe43⤵
- Executes dropped EXE
PID:1724 -
\??\c:\tnbnbh.exec:\tnbnbh.exe44⤵
- Executes dropped EXE
PID:1672 -
\??\c:\jdjjd.exec:\jdjjd.exe45⤵
- Executes dropped EXE
PID:1704 -
\??\c:\djjdv.exec:\djjdv.exe46⤵
- Executes dropped EXE
PID:1616 -
\??\c:\rllxrll.exec:\rllxrll.exe47⤵
- Executes dropped EXE
PID:3632 -
\??\c:\djpjv.exec:\djpjv.exe48⤵
- Executes dropped EXE
PID:1784 -
\??\c:\9pvpj.exec:\9pvpj.exe49⤵
- Executes dropped EXE
PID:2844 -
\??\c:\btbtbb.exec:\btbtbb.exe50⤵
- Executes dropped EXE
PID:5032 -
\??\c:\1pdpp.exec:\1pdpp.exe51⤵
- Executes dropped EXE
PID:3092 -
\??\c:\ddpvv.exec:\ddpvv.exe52⤵
- Executes dropped EXE
PID:2900 -
\??\c:\xfrxrxf.exec:\xfrxrxf.exe53⤵
- Executes dropped EXE
PID:2340 -
\??\c:\bhttnh.exec:\bhttnh.exe54⤵
- Executes dropped EXE
PID:4440 -
\??\c:\nthbth.exec:\nthbth.exe55⤵
- Executes dropped EXE
PID:1768 -
\??\c:\pdpjj.exec:\pdpjj.exe56⤵
- Executes dropped EXE
PID:4988 -
\??\c:\hbnhnn.exec:\hbnhnn.exe57⤵
- Executes dropped EXE
PID:1808 -
\??\c:\nhnhtn.exec:\nhnhtn.exe58⤵
- Executes dropped EXE
PID:64 -
\??\c:\jjjdj.exec:\jjjdj.exe59⤵
- Executes dropped EXE
PID:3440 -
\??\c:\xrrlffx.exec:\xrrlffx.exe60⤵
- Executes dropped EXE
PID:4572 -
\??\c:\3fxrllf.exec:\3fxrllf.exe61⤵
- Executes dropped EXE
PID:2196 -
\??\c:\3ttnht.exec:\3ttnht.exe62⤵
- Executes dropped EXE
PID:4368 -
\??\c:\9pjjd.exec:\9pjjd.exe63⤵
- Executes dropped EXE
PID:2460 -
\??\c:\llrflff.exec:\llrflff.exe64⤵
- Executes dropped EXE
PID:4016 -
\??\c:\9bhbtt.exec:\9bhbtt.exe65⤵
- Executes dropped EXE
PID:2520 -
\??\c:\xllxrxr.exec:\xllxrxr.exe66⤵PID:548
-
\??\c:\9xfxflr.exec:\9xfxflr.exe67⤵PID:1508
-
\??\c:\jdddv.exec:\jdddv.exe68⤵PID:4744
-
\??\c:\rlfxxxl.exec:\rlfxxxl.exe69⤵PID:3624
-
\??\c:\frrlfxx.exec:\frrlfxx.exe70⤵PID:2176
-
\??\c:\hthbbb.exec:\hthbbb.exe71⤵PID:1588
-
\??\c:\vjvpp.exec:\vjvpp.exe72⤵PID:2172
-
\??\c:\rflfllr.exec:\rflfllr.exe73⤵PID:4268
-
\??\c:\hthhbb.exec:\hthhbb.exe74⤵PID:1712
-
\??\c:\5tbtnn.exec:\5tbtnn.exe75⤵PID:1828
-
\??\c:\jddvp.exec:\jddvp.exe76⤵PID:3480
-
\??\c:\5fxffll.exec:\5fxffll.exe77⤵PID:2660
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe78⤵PID:3948
-
\??\c:\hhhbnt.exec:\hhhbnt.exe79⤵PID:1448
-
\??\c:\vppjd.exec:\vppjd.exe80⤵PID:1160
-
\??\c:\fxxxllr.exec:\fxxxllr.exe81⤵PID:4504
-
\??\c:\bhnnhb.exec:\bhnnhb.exe82⤵PID:4568
-
\??\c:\7ppjd.exec:\7ppjd.exe83⤵PID:3404
-
\??\c:\vdvpd.exec:\vdvpd.exe84⤵PID:3216
-
\??\c:\rlrlflx.exec:\rlrlflx.exe85⤵PID:948
-
\??\c:\nhnhnh.exec:\nhnhnh.exe86⤵PID:1444
-
\??\c:\vvjdd.exec:\vvjdd.exe87⤵PID:1596
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe88⤵PID:1504
-
\??\c:\xxxxxll.exec:\xxxxxll.exe89⤵PID:4548
-
\??\c:\jpjvd.exec:\jpjvd.exe90⤵PID:4776
-
\??\c:\frlxrxf.exec:\frlxrxf.exe91⤵PID:5080
-
\??\c:\btbttt.exec:\btbttt.exe92⤵PID:2136
-
\??\c:\bbbbbb.exec:\bbbbbb.exe93⤵PID:636
-
\??\c:\vvjjj.exec:\vvjjj.exe94⤵PID:4976
-
\??\c:\lxlfxxx.exec:\lxlfxxx.exe95⤵PID:1616
-
\??\c:\llllrrl.exec:\llllrrl.exe96⤵PID:3632
-
\??\c:\1hhhbb.exec:\1hhhbb.exe97⤵PID:3000
-
\??\c:\5pvpj.exec:\5pvpj.exe98⤵PID:1436
-
\??\c:\vvdvp.exec:\vvdvp.exe99⤵PID:1792
-
\??\c:\rrffffl.exec:\rrffffl.exe100⤵PID:3092
-
\??\c:\btbnhh.exec:\btbnhh.exe101⤵PID:3900
-
\??\c:\5thbtt.exec:\5thbtt.exe102⤵PID:2020
-
\??\c:\ddjdp.exec:\ddjdp.exe103⤵PID:2512
-
\??\c:\fxrllxx.exec:\fxrllxx.exe104⤵PID:1768
-
\??\c:\flrlrrx.exec:\flrlrrx.exe105⤵PID:4988
-
\??\c:\bttnnn.exec:\bttnnn.exe106⤵PID:1244
-
\??\c:\9jpjj.exec:\9jpjj.exe107⤵PID:864
-
\??\c:\7jdvd.exec:\7jdvd.exe108⤵PID:3812
-
\??\c:\rlrlfff.exec:\rlrlfff.exe109⤵PID:1888
-
\??\c:\btbtnn.exec:\btbtnn.exe110⤵PID:2432
-
\??\c:\hnhhbb.exec:\hnhhbb.exe111⤵PID:4904
-
\??\c:\dvvvp.exec:\dvvvp.exe112⤵PID:4180
-
\??\c:\lxllfxr.exec:\lxllfxr.exe113⤵PID:3924
-
\??\c:\7xflffx.exec:\7xflffx.exe114⤵PID:760
-
\??\c:\nbhnnn.exec:\nbhnnn.exe115⤵PID:3536
-
\??\c:\bntnbn.exec:\bntnbn.exe116⤵PID:832
-
\??\c:\xrllxll.exec:\xrllxll.exe117⤵PID:3696
-
\??\c:\hnbtnn.exec:\hnbtnn.exe118⤵PID:3544
-
\??\c:\ttbtnt.exec:\ttbtnt.exe119⤵PID:4552
-
\??\c:\3rlffxr.exec:\3rlffxr.exe120⤵PID:676
-
\??\c:\tnnhhb.exec:\tnnhhb.exe121⤵PID:936
-
\??\c:\rrffxfx.exec:\rrffxfx.exe122⤵PID:5012
-
\??\c:\bbhhhh.exec:\bbhhhh.exe123⤵PID:1448
-
\??\c:\hbtttt.exec:\hbtttt.exe124⤵PID:2912
-
\??\c:\jpdvp.exec:\jpdvp.exe125⤵PID:4612
-
\??\c:\ntbhnh.exec:\ntbhnh.exe126⤵PID:4984
-
\??\c:\tbnhbb.exec:\tbnhbb.exe127⤵PID:1876
-
\??\c:\vvppp.exec:\vvppp.exe128⤵PID:4044
-
\??\c:\bntnhh.exec:\bntnhh.exe129⤵PID:4620
-
\??\c:\jjppj.exec:\jjppj.exe130⤵PID:4248
-
\??\c:\nnhbnt.exec:\nnhbnt.exe131⤵PID:1552
-
\??\c:\thnbnn.exec:\thnbnn.exe132⤵PID:1264
-
\??\c:\djjdp.exec:\djjdp.exe133⤵PID:4324
-
\??\c:\btbtth.exec:\btbtth.exe134⤵PID:4040
-
\??\c:\vdppd.exec:\vdppd.exe135⤵PID:3740
-
\??\c:\lfffffr.exec:\lfffffr.exe136⤵PID:1068
-
\??\c:\bnntbb.exec:\bnntbb.exe137⤵PID:4464
-
\??\c:\pjvpj.exec:\pjvpj.exe138⤵PID:1796
-
\??\c:\vvddv.exec:\vvddv.exe139⤵PID:3652
-
\??\c:\rfffxxr.exec:\rfffxxr.exe140⤵PID:5116
-
\??\c:\hbnnnn.exec:\hbnnnn.exe141⤵PID:4560
-
\??\c:\vvdvv.exec:\vvdvv.exe142⤵PID:224
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe143⤵PID:3620
-
\??\c:\rlrllll.exec:\rlrllll.exe144⤵PID:3092
-
\??\c:\hhnnbh.exec:\hhnnbh.exe145⤵PID:5060
-
\??\c:\vpdvv.exec:\vpdvv.exe146⤵PID:2020
-
\??\c:\dvdvp.exec:\dvdvp.exe147⤵PID:1608
-
\??\c:\frlfxrf.exec:\frlfxrf.exe148⤵PID:1872
-
\??\c:\thnbbt.exec:\thnbbt.exe149⤵PID:3416
-
\??\c:\bttnhn.exec:\bttnhn.exe150⤵PID:3700
-
\??\c:\vdjpj.exec:\vdjpj.exe151⤵PID:864
-
\??\c:\jdjpp.exec:\jdjpp.exe152⤵PID:4768
-
\??\c:\xrxxrrl.exec:\xrxxrrl.exe153⤵PID:2236
-
\??\c:\9tnhhh.exec:\9tnhhh.exe154⤵PID:2100
-
\??\c:\dpppj.exec:\dpppj.exe155⤵PID:1592
-
\??\c:\pppjv.exec:\pppjv.exe156⤵PID:1700
-
\??\c:\flrrrrr.exec:\flrrrrr.exe157⤵PID:4184
-
\??\c:\xffxrrr.exec:\xffxrrr.exe158⤵PID:1612
-
\??\c:\tntnhh.exec:\tntnhh.exe159⤵PID:1932
-
\??\c:\1djjd.exec:\1djjd.exe160⤵PID:3696
-
\??\c:\5xxffff.exec:\5xxffff.exe161⤵PID:3544
-
\??\c:\ffxlfff.exec:\ffxlfff.exe162⤵PID:4400
-
\??\c:\tnbtnh.exec:\tnbtnh.exe163⤵PID:4456
-
\??\c:\pdpjd.exec:\pdpjd.exe164⤵PID:936
-
\??\c:\pjvpd.exec:\pjvpd.exe165⤵PID:5012
-
\??\c:\3flfxxx.exec:\3flfxxx.exe166⤵PID:1448
-
\??\c:\xrrlffx.exec:\xrrlffx.exe167⤵PID:2912
-
\??\c:\bbhbbn.exec:\bbhbbn.exe168⤵PID:4612
-
\??\c:\5dpvd.exec:\5dpvd.exe169⤵PID:1404
-
\??\c:\rxfrxfx.exec:\rxfrxfx.exe170⤵PID:1876
-
\??\c:\xflffll.exec:\xflffll.exe171⤵PID:3704
-
\??\c:\llxxrrr.exec:\llxxrrr.exe172⤵PID:1444
-
\??\c:\lrxrrlf.exec:\lrxrrlf.exe173⤵PID:4364
-
\??\c:\nhhbhh.exec:\nhhbhh.exe174⤵PID:4392
-
\??\c:\dvjdv.exec:\dvjdv.exe175⤵PID:1288
-
\??\c:\jjpjj.exec:\jjpjj.exe176⤵PID:4776
-
\??\c:\rrrrlll.exec:\rrrrlll.exe177⤵PID:2720
-
\??\c:\xxrrlll.exec:\xxrrlll.exe178⤵PID:2136
-
\??\c:\tbbtth.exec:\tbbtth.exe179⤵PID:2676
-
\??\c:\9tnhtb.exec:\9tnhtb.exe180⤵PID:2940
-
\??\c:\vpjjd.exec:\vpjjd.exe181⤵PID:1752
-
\??\c:\3xfxrxr.exec:\3xfxrxr.exe182⤵PID:920
-
\??\c:\1rxxrrl.exec:\1rxxrrl.exe183⤵PID:1928
-
\??\c:\hnbttt.exec:\hnbttt.exe184⤵PID:4292
-
\??\c:\thnhbb.exec:\thnhbb.exe185⤵PID:4832
-
\??\c:\jvpjd.exec:\jvpjd.exe186⤵PID:1804
-
\??\c:\jvddv.exec:\jvddv.exe187⤵PID:4080
-
\??\c:\fxlfxxr.exec:\fxlfxxr.exe188⤵PID:2536
-
\??\c:\flxxrxx.exec:\flxxrxx.exe189⤵PID:2020
-
\??\c:\nntnnn.exec:\nntnnn.exe190⤵PID:840
-
\??\c:\vjppp.exec:\vjppp.exe191⤵PID:1916
-
\??\c:\pjvpd.exec:\pjvpd.exe192⤵PID:3084
-
\??\c:\fllrfff.exec:\fllrfff.exe193⤵PID:3700
-
\??\c:\1lrlfff.exec:\1lrlfff.exe194⤵PID:3548
-
\??\c:\btttnn.exec:\btttnn.exe195⤵PID:116
-
\??\c:\dvvvp.exec:\dvvvp.exe196⤵PID:4188
-
\??\c:\dvjdv.exec:\dvjdv.exe197⤵PID:2504
-
\??\c:\5rfxxff.exec:\5rfxxff.exe198⤵PID:2892
-
\??\c:\bbbhtn.exec:\bbbhtn.exe199⤵PID:1328
-
\??\c:\jdvpv.exec:\jdvpv.exe200⤵PID:3536
-
\??\c:\jjvvp.exec:\jjvvp.exe201⤵PID:4184
-
\??\c:\lllxffl.exec:\lllxffl.exe202⤵PID:3924
-
\??\c:\5tttnt.exec:\5tttnt.exe203⤵PID:3412
-
\??\c:\dvddv.exec:\dvddv.exe204⤵PID:1932
-
\??\c:\ffrrlll.exec:\ffrrlll.exe205⤵PID:3696
-
\??\c:\hbthhb.exec:\hbthhb.exe206⤵PID:3544
-
\??\c:\vdpjd.exec:\vdpjd.exe207⤵PID:4708
-
\??\c:\vjjdv.exec:\vjjdv.exe208⤵PID:1632
-
\??\c:\lfffffx.exec:\lfffffx.exe209⤵PID:3856
-
\??\c:\bbbhth.exec:\bbbhth.exe210⤵PID:3988
-
\??\c:\7ttbtt.exec:\7ttbtt.exe211⤵PID:3664
-
\??\c:\jpvpj.exec:\jpvpj.exe212⤵PID:2480
-
\??\c:\llxxllf.exec:\llxxllf.exe213⤵PID:3596
-
\??\c:\tbbbtt.exec:\tbbbtt.exe214⤵PID:1404
-
\??\c:\7ntnnn.exec:\7ntnnn.exe215⤵PID:3388
-
\??\c:\vjjdv.exec:\vjjdv.exe216⤵PID:4596
-
\??\c:\llxxrfr.exec:\llxxrfr.exe217⤵PID:1296
-
\??\c:\9xxrlfl.exec:\9xxrlfl.exe218⤵PID:3540
-
\??\c:\9tnnhh.exec:\9tnnhh.exe219⤵PID:4352
-
\??\c:\pjdvp.exec:\pjdvp.exe220⤵PID:4632
-
\??\c:\rffrrlf.exec:\rffrrlf.exe221⤵PID:3904
-
\??\c:\nbbbbb.exec:\nbbbbb.exe222⤵PID:5080
-
\??\c:\ttbhbh.exec:\ttbhbh.exe223⤵PID:1704
-
\??\c:\jvdpd.exec:\jvdpd.exe224⤵PID:912
-
\??\c:\jvpjd.exec:\jvpjd.exe225⤵PID:1144
-
\??\c:\llfxfxr.exec:\llfxfxr.exe226⤵PID:2672
-
\??\c:\thtnhh.exec:\thtnhh.exe227⤵PID:3632
-
\??\c:\vjjdp.exec:\vjjdp.exe228⤵PID:2384
-
\??\c:\xfrfxfr.exec:\xfrfxfr.exe229⤵PID:1792
-
\??\c:\bbnhbb.exec:\bbnhbb.exe230⤵PID:4832
-
\??\c:\nbhbtt.exec:\nbhbtt.exe231⤵PID:1804
-
\??\c:\pdpjd.exec:\pdpjd.exe232⤵PID:4080
-
\??\c:\flxrrrx.exec:\flxrrrx.exe233⤵PID:2536
-
\??\c:\fxlxlfr.exec:\fxlxlfr.exe234⤵PID:2020
-
\??\c:\bnbtbb.exec:\bnbtbb.exe235⤵PID:840
-
\??\c:\dvdvv.exec:\dvdvv.exe236⤵PID:1916
-
\??\c:\3rlfxrl.exec:\3rlfxrl.exe237⤵PID:3084
-
\??\c:\3lrfxrf.exec:\3lrfxrf.exe238⤵PID:3700
-
\??\c:\nnbbnn.exec:\nnbbnn.exe239⤵PID:1460
-
\??\c:\pjpjj.exec:\pjpjj.exe240⤵PID:4768
-
\??\c:\7ffxrrf.exec:\7ffxrrf.exe241⤵PID:4016
-
\??\c:\rrllllx.exec:\rrllllx.exe242⤵PID:3624