Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 10:49
Behavioral task
behavioral1
Sample
39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe
-
Size
76KB
-
MD5
001dd22f05cc9796a84014b119eed8d0
-
SHA1
1d9e22c51183b6e590083e12bee52d66fd8ce218
-
SHA256
39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2
-
SHA512
0d95da7a85a59e2853087766607919cc4bca4f83898d0c04818d43244e58d0447a82fdb634bd1d311b2daafa3b4b4dff26e81b68aea96327f36961b07fe1685f
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8PbhnyLFWoFLAxZhMDzE87N:9hOmTsF93UYfwC6GIoutz5yLpOSDRN
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1972-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3684-8-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/560-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3656-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4824-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/488-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2960-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4948-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2916-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1328-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/456-71-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3256-77-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4092-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2176-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2224-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2096-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4488-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1488-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4388-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2808-129-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/224-144-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1836-150-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1756-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5108-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/520-177-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4284-183-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2104-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3288-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4768-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3004-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1512-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1964-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3780-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3440-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3556-251-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2336-263-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4176-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4336-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3460-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2172-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4836-334-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1136-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3248-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/648-355-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2592-359-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/220-363-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2156-370-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-374-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3712-384-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4648-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4116-407-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3352-423-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1568-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2260-435-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2600-467-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2412-477-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2208-529-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3068-643-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/228-682-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2592-805-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4680-1072-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4100-1398-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3ntw7.exec58xau.exe4n68qwg.exe321f4b5.exeg78r5d.exeifp89e.exejagw64.exegp7045f.exe533s6w5.exekqnw9.exee0g1w7.exepbr5a.exe69a61.exe84g568q.exe56i1227.exe7lw64u.exe060qndl.exeu6cc2.exe49323d9.exe32ed9.exeoux863.exe8ei7a.exe473cj.execu2324.exe2963d.exe8f7d1.exe91rohu.exe03912.exek70kd4.exel68qkk.exe9hn9c.exe2isw173.exedklm8.exe0588h.exe494c3m.exep9hbu.exexps091.exec3b2536.exe1dp789.exe02ds6.exe9g348o3.exeat3o8dq.exe9m14c.exeqhvn36q.exe216275p.exe3284l0.exee2655.exe645o3.exes7ue31.exexgp507s.exewrc4j.exe3g3m5i4.exe87mhib.exetu44g.exea0av5.exe4773ux.exeu1qn1x.exe5cdb2e.exe4rm04j.exe20cmnm5.exe2k2wl9.execs0im.exe5njsv04.exen64060v.exepid process 3684 3ntw7.exe 560 c58xau.exe 3656 4n68qwg.exe 4824 321f4b5.exe 488 g78r5d.exe 4440 ifp89e.exe 2960 jagw64.exe 4948 gp7045f.exe 2916 533s6w5.exe 1328 kqnw9.exe 456 e0g1w7.exe 3256 pbr5a.exe 3028 69a61.exe 4092 84g568q.exe 2176 56i1227.exe 2224 7lw64u.exe 2096 060qndl.exe 4488 u6cc2.exe 1488 49323d9.exe 4388 32ed9.exe 2808 oux863.exe 2260 8ei7a.exe 3828 473cj.exe 224 cu2324.exe 1836 2963d.exe 4608 8f7d1.exe 1756 91rohu.exe 2932 03912.exe 5108 k70kd4.exe 520 l68qkk.exe 4284 9hn9c.exe 4956 2isw173.exe 3480 dklm8.exe 2104 0588h.exe 3288 494c3m.exe 4768 p9hbu.exe 3004 xps091.exe 1616 c3b2536.exe 1512 1dp789.exe 1712 02ds6.exe 1856 9g348o3.exe 1964 at3o8dq.exe 3780 9m14c.exe 1912 qhvn36q.exe 3440 216275p.exe 1544 3284l0.exe 1680 e2655.exe 4580 645o3.exe 4820 s7ue31.exe 3564 xgp507s.exe 3556 wrc4j.exe 3584 3g3m5i4.exe 4300 87mhib.exe 2336 tu44g.exe 5012 a0av5.exe 2968 4773ux.exe 4176 u1qn1x.exe 3856 5cdb2e.exe 4336 4rm04j.exe 4180 20cmnm5.exe 3540 2k2wl9.exe 4640 cs0im.exe 916 5njsv04.exe 3460 n64060v.exe -
Processes:
resource yara_rule behavioral2/memory/1972-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3ntw7.exe upx behavioral2/memory/1972-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3684-8-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\c58xau.exe upx C:\4n68qwg.exe upx behavioral2/memory/560-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3656-23-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\321f4b5.exe upx behavioral2/memory/4824-29-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\g78r5d.exe upx behavioral2/memory/488-32-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ifp89e.exe upx behavioral2/memory/4440-40-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jagw64.exe upx C:\gp7045f.exe upx behavioral2/memory/2960-46-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\533s6w5.exe upx behavioral2/memory/4948-54-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\kqnw9.exe upx behavioral2/memory/2916-59-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\e0g1w7.exe upx behavioral2/memory/1328-65-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pbr5a.exe upx behavioral2/memory/456-71-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\69a61.exe upx behavioral2/memory/3256-77-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\84g568q.exe upx C:\56i1227.exe upx behavioral2/memory/4092-88-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7lw64u.exe upx behavioral2/memory/2176-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2224-97-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\060qndl.exe upx behavioral2/memory/2096-102-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\u6cc2.exe upx behavioral2/memory/4488-112-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\49323d9.exe upx behavioral2/memory/1488-114-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1488-119-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\32ed9.exe upx behavioral2/memory/4388-124-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\oux863.exe upx C:\8ei7a.exe upx behavioral2/memory/2808-129-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\473cj.exe upx C:\cu2324.exe upx C:\2963d.exe upx behavioral2/memory/224-144-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\8f7d1.exe upx behavioral2/memory/1836-150-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\91rohu.exe upx C:\03912.exe upx behavioral2/memory/1756-161-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\k70kd4.exe upx behavioral2/memory/5108-171-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\l68qkk.exe upx C:\9hn9c.exe upx behavioral2/memory/520-177-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\2isw173.exe upx behavioral2/memory/4284-183-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2104-194-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3288-198-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4768-201-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe3ntw7.exec58xau.exe4n68qwg.exe321f4b5.exeg78r5d.exeifp89e.exejagw64.exegp7045f.exe533s6w5.exekqnw9.exee0g1w7.exepbr5a.exe69a61.exe84g568q.exe56i1227.exe7lw64u.exe060qndl.exeu6cc2.exe49323d9.exe32ed9.exeoux863.exedescription pid process target process PID 1972 wrote to memory of 3684 1972 39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe 3ntw7.exe PID 1972 wrote to memory of 3684 1972 39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe 3ntw7.exe PID 1972 wrote to memory of 3684 1972 39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe 3ntw7.exe PID 3684 wrote to memory of 560 3684 3ntw7.exe c58xau.exe PID 3684 wrote to memory of 560 3684 3ntw7.exe c58xau.exe PID 3684 wrote to memory of 560 3684 3ntw7.exe c58xau.exe PID 560 wrote to memory of 3656 560 c58xau.exe 4n68qwg.exe PID 560 wrote to memory of 3656 560 c58xau.exe 4n68qwg.exe PID 560 wrote to memory of 3656 560 c58xau.exe 4n68qwg.exe PID 3656 wrote to memory of 4824 3656 4n68qwg.exe 321f4b5.exe PID 3656 wrote to memory of 4824 3656 4n68qwg.exe 321f4b5.exe PID 3656 wrote to memory of 4824 3656 4n68qwg.exe 321f4b5.exe PID 4824 wrote to memory of 488 4824 321f4b5.exe g78r5d.exe PID 4824 wrote to memory of 488 4824 321f4b5.exe g78r5d.exe PID 4824 wrote to memory of 488 4824 321f4b5.exe g78r5d.exe PID 488 wrote to memory of 4440 488 g78r5d.exe ifp89e.exe PID 488 wrote to memory of 4440 488 g78r5d.exe ifp89e.exe PID 488 wrote to memory of 4440 488 g78r5d.exe ifp89e.exe PID 4440 wrote to memory of 2960 4440 ifp89e.exe jagw64.exe PID 4440 wrote to memory of 2960 4440 ifp89e.exe jagw64.exe PID 4440 wrote to memory of 2960 4440 ifp89e.exe jagw64.exe PID 2960 wrote to memory of 4948 2960 jagw64.exe gp7045f.exe PID 2960 wrote to memory of 4948 2960 jagw64.exe gp7045f.exe PID 2960 wrote to memory of 4948 2960 jagw64.exe gp7045f.exe PID 4948 wrote to memory of 2916 4948 gp7045f.exe 533s6w5.exe PID 4948 wrote to memory of 2916 4948 gp7045f.exe 533s6w5.exe PID 4948 wrote to memory of 2916 4948 gp7045f.exe 533s6w5.exe PID 2916 wrote to memory of 1328 2916 533s6w5.exe kqnw9.exe PID 2916 wrote to memory of 1328 2916 533s6w5.exe kqnw9.exe PID 2916 wrote to memory of 1328 2916 533s6w5.exe kqnw9.exe PID 1328 wrote to memory of 456 1328 kqnw9.exe e0g1w7.exe PID 1328 wrote to memory of 456 1328 kqnw9.exe e0g1w7.exe PID 1328 wrote to memory of 456 1328 kqnw9.exe e0g1w7.exe PID 456 wrote to memory of 3256 456 e0g1w7.exe pbr5a.exe PID 456 wrote to memory of 3256 456 e0g1w7.exe pbr5a.exe PID 456 wrote to memory of 3256 456 e0g1w7.exe pbr5a.exe PID 3256 wrote to memory of 3028 3256 pbr5a.exe 69a61.exe PID 3256 wrote to memory of 3028 3256 pbr5a.exe 69a61.exe PID 3256 wrote to memory of 3028 3256 pbr5a.exe 69a61.exe PID 3028 wrote to memory of 4092 3028 69a61.exe 84g568q.exe PID 3028 wrote to memory of 4092 3028 69a61.exe 84g568q.exe PID 3028 wrote to memory of 4092 3028 69a61.exe 84g568q.exe PID 4092 wrote to memory of 2176 4092 84g568q.exe 56i1227.exe PID 4092 wrote to memory of 2176 4092 84g568q.exe 56i1227.exe PID 4092 wrote to memory of 2176 4092 84g568q.exe 56i1227.exe PID 2176 wrote to memory of 2224 2176 56i1227.exe 7lw64u.exe PID 2176 wrote to memory of 2224 2176 56i1227.exe 7lw64u.exe PID 2176 wrote to memory of 2224 2176 56i1227.exe 7lw64u.exe PID 2224 wrote to memory of 2096 2224 7lw64u.exe 060qndl.exe PID 2224 wrote to memory of 2096 2224 7lw64u.exe 060qndl.exe PID 2224 wrote to memory of 2096 2224 7lw64u.exe 060qndl.exe PID 2096 wrote to memory of 4488 2096 060qndl.exe u6cc2.exe PID 2096 wrote to memory of 4488 2096 060qndl.exe u6cc2.exe PID 2096 wrote to memory of 4488 2096 060qndl.exe u6cc2.exe PID 4488 wrote to memory of 1488 4488 u6cc2.exe 49323d9.exe PID 4488 wrote to memory of 1488 4488 u6cc2.exe 49323d9.exe PID 4488 wrote to memory of 1488 4488 u6cc2.exe 49323d9.exe PID 1488 wrote to memory of 4388 1488 49323d9.exe 32ed9.exe PID 1488 wrote to memory of 4388 1488 49323d9.exe 32ed9.exe PID 1488 wrote to memory of 4388 1488 49323d9.exe 32ed9.exe PID 4388 wrote to memory of 2808 4388 32ed9.exe oux863.exe PID 4388 wrote to memory of 2808 4388 32ed9.exe oux863.exe PID 4388 wrote to memory of 2808 4388 32ed9.exe oux863.exe PID 2808 wrote to memory of 2260 2808 oux863.exe 8ei7a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39c9f5190938136c87d16ca28c6bb0082301bc9196df1f08fd37eacdc3dc2ae2_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\3ntw7.exec:\3ntw7.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\c58xau.exec:\c58xau.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\4n68qwg.exec:\4n68qwg.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\321f4b5.exec:\321f4b5.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\g78r5d.exec:\g78r5d.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ifp89e.exec:\ifp89e.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jagw64.exec:\jagw64.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\gp7045f.exec:\gp7045f.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\533s6w5.exec:\533s6w5.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\kqnw9.exec:\kqnw9.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\e0g1w7.exec:\e0g1w7.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pbr5a.exec:\pbr5a.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\69a61.exec:\69a61.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\84g568q.exec:\84g568q.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\56i1227.exec:\56i1227.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7lw64u.exec:\7lw64u.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\060qndl.exec:\060qndl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\u6cc2.exec:\u6cc2.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\49323d9.exec:\49323d9.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\32ed9.exec:\32ed9.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\oux863.exec:\oux863.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\8ei7a.exec:\8ei7a.exe23⤵
- Executes dropped EXE
-
\??\c:\473cj.exec:\473cj.exe24⤵
- Executes dropped EXE
-
\??\c:\cu2324.exec:\cu2324.exe25⤵
- Executes dropped EXE
-
\??\c:\2963d.exec:\2963d.exe26⤵
- Executes dropped EXE
-
\??\c:\8f7d1.exec:\8f7d1.exe27⤵
- Executes dropped EXE
-
\??\c:\91rohu.exec:\91rohu.exe28⤵
- Executes dropped EXE
-
\??\c:\03912.exec:\03912.exe29⤵
- Executes dropped EXE
-
\??\c:\k70kd4.exec:\k70kd4.exe30⤵
- Executes dropped EXE
-
\??\c:\l68qkk.exec:\l68qkk.exe31⤵
- Executes dropped EXE
-
\??\c:\9hn9c.exec:\9hn9c.exe32⤵
- Executes dropped EXE
-
\??\c:\2isw173.exec:\2isw173.exe33⤵
- Executes dropped EXE
-
\??\c:\dklm8.exec:\dklm8.exe34⤵
- Executes dropped EXE
-
\??\c:\0588h.exec:\0588h.exe35⤵
- Executes dropped EXE
-
\??\c:\494c3m.exec:\494c3m.exe36⤵
- Executes dropped EXE
-
\??\c:\p9hbu.exec:\p9hbu.exe37⤵
- Executes dropped EXE
-
\??\c:\xps091.exec:\xps091.exe38⤵
- Executes dropped EXE
-
\??\c:\c3b2536.exec:\c3b2536.exe39⤵
- Executes dropped EXE
-
\??\c:\1dp789.exec:\1dp789.exe40⤵
- Executes dropped EXE
-
\??\c:\02ds6.exec:\02ds6.exe41⤵
- Executes dropped EXE
-
\??\c:\9g348o3.exec:\9g348o3.exe42⤵
- Executes dropped EXE
-
\??\c:\at3o8dq.exec:\at3o8dq.exe43⤵
- Executes dropped EXE
-
\??\c:\9m14c.exec:\9m14c.exe44⤵
- Executes dropped EXE
-
\??\c:\qhvn36q.exec:\qhvn36q.exe45⤵
- Executes dropped EXE
-
\??\c:\216275p.exec:\216275p.exe46⤵
- Executes dropped EXE
-
\??\c:\3284l0.exec:\3284l0.exe47⤵
- Executes dropped EXE
-
\??\c:\e2655.exec:\e2655.exe48⤵
- Executes dropped EXE
-
\??\c:\645o3.exec:\645o3.exe49⤵
- Executes dropped EXE
-
\??\c:\s7ue31.exec:\s7ue31.exe50⤵
- Executes dropped EXE
-
\??\c:\xgp507s.exec:\xgp507s.exe51⤵
- Executes dropped EXE
-
\??\c:\wrc4j.exec:\wrc4j.exe52⤵
- Executes dropped EXE
-
\??\c:\3g3m5i4.exec:\3g3m5i4.exe53⤵
- Executes dropped EXE
-
\??\c:\87mhib.exec:\87mhib.exe54⤵
- Executes dropped EXE
-
\??\c:\tu44g.exec:\tu44g.exe55⤵
- Executes dropped EXE
-
\??\c:\a0av5.exec:\a0av5.exe56⤵
- Executes dropped EXE
-
\??\c:\4773ux.exec:\4773ux.exe57⤵
- Executes dropped EXE
-
\??\c:\u1qn1x.exec:\u1qn1x.exe58⤵
- Executes dropped EXE
-
\??\c:\5cdb2e.exec:\5cdb2e.exe59⤵
- Executes dropped EXE
-
\??\c:\4rm04j.exec:\4rm04j.exe60⤵
- Executes dropped EXE
-
\??\c:\20cmnm5.exec:\20cmnm5.exe61⤵
- Executes dropped EXE
-
\??\c:\2k2wl9.exec:\2k2wl9.exe62⤵
- Executes dropped EXE
-
\??\c:\cs0im.exec:\cs0im.exe63⤵
- Executes dropped EXE
-
\??\c:\5njsv04.exec:\5njsv04.exe64⤵
- Executes dropped EXE
-
\??\c:\n64060v.exec:\n64060v.exe65⤵
- Executes dropped EXE
-
\??\c:\2l4qp.exec:\2l4qp.exe66⤵
-
\??\c:\4t9e3cd.exec:\4t9e3cd.exe67⤵
-
\??\c:\2315g80.exec:\2315g80.exe68⤵
-
\??\c:\aw036.exec:\aw036.exe69⤵
-
\??\c:\c60o60.exec:\c60o60.exe70⤵
-
\??\c:\6ic05.exec:\6ic05.exe71⤵
-
\??\c:\90l76.exec:\90l76.exe72⤵
-
\??\c:\jtqh937.exec:\jtqh937.exe73⤵
-
\??\c:\9s4n43.exec:\9s4n43.exe74⤵
-
\??\c:\394u59.exec:\394u59.exe75⤵
-
\??\c:\7htcm4.exec:\7htcm4.exe76⤵
-
\??\c:\331cm.exec:\331cm.exe77⤵
-
\??\c:\hq4fm.exec:\hq4fm.exe78⤵
-
\??\c:\k228917.exec:\k228917.exe79⤵
-
\??\c:\pmefg.exec:\pmefg.exe80⤵
-
\??\c:\s20n1.exec:\s20n1.exe81⤵
-
\??\c:\2iccs.exec:\2iccs.exe82⤵
-
\??\c:\jdn79r.exec:\jdn79r.exe83⤵
-
\??\c:\374ur9.exec:\374ur9.exe84⤵
-
\??\c:\6oxwcl5.exec:\6oxwcl5.exe85⤵
-
\??\c:\f4pg67.exec:\f4pg67.exe86⤵
-
\??\c:\gdk76q.exec:\gdk76q.exe87⤵
-
\??\c:\96ku603.exec:\96ku603.exe88⤵
-
\??\c:\bi37x7.exec:\bi37x7.exe89⤵
-
\??\c:\pbq6261.exec:\pbq6261.exe90⤵
-
\??\c:\0xg8f.exec:\0xg8f.exe91⤵
-
\??\c:\4kogw.exec:\4kogw.exe92⤵
-
\??\c:\26tt9.exec:\26tt9.exe93⤵
-
\??\c:\4d3s3.exec:\4d3s3.exe94⤵
-
\??\c:\vd97j1.exec:\vd97j1.exe95⤵
-
\??\c:\80864w.exec:\80864w.exe96⤵
-
\??\c:\tula86t.exec:\tula86t.exe97⤵
-
\??\c:\e0393.exec:\e0393.exe98⤵
-
\??\c:\si716u9.exec:\si716u9.exe99⤵
-
\??\c:\9d30nh2.exec:\9d30nh2.exe100⤵
-
\??\c:\p54h1.exec:\p54h1.exe101⤵
-
\??\c:\kw867.exec:\kw867.exe102⤵
-
\??\c:\b5j1b.exec:\b5j1b.exe103⤵
-
\??\c:\o9dan.exec:\o9dan.exe104⤵
-
\??\c:\3cp3h3.exec:\3cp3h3.exe105⤵
-
\??\c:\eqtk1x.exec:\eqtk1x.exe106⤵
-
\??\c:\2fg7v.exec:\2fg7v.exe107⤵
-
\??\c:\ii25677.exec:\ii25677.exe108⤵
-
\??\c:\r25st5.exec:\r25st5.exe109⤵
-
\??\c:\7au2hhk.exec:\7au2hhk.exe110⤵
-
\??\c:\h23b4.exec:\h23b4.exe111⤵
-
\??\c:\21s42.exec:\21s42.exe112⤵
-
\??\c:\xivmmq.exec:\xivmmq.exe113⤵
-
\??\c:\ef6dv4v.exec:\ef6dv4v.exe114⤵
-
\??\c:\litl155.exec:\litl155.exe115⤵
-
\??\c:\875307.exec:\875307.exe116⤵
-
\??\c:\4xx9h3.exec:\4xx9h3.exe117⤵
-
\??\c:\886280.exec:\886280.exe118⤵
-
\??\c:\1h8421.exec:\1h8421.exe119⤵
-
\??\c:\oi6nw.exec:\oi6nw.exe120⤵
-
\??\c:\ic82q3.exec:\ic82q3.exe121⤵
-
\??\c:\mgw10.exec:\mgw10.exe122⤵
-
\??\c:\37eko9a.exec:\37eko9a.exe123⤵
-
\??\c:\1ci2fv8.exec:\1ci2fv8.exe124⤵
-
\??\c:\f31v1.exec:\f31v1.exe125⤵
-
\??\c:\9f1lc.exec:\9f1lc.exe126⤵
-
\??\c:\74dw1ig.exec:\74dw1ig.exe127⤵
-
\??\c:\2085n.exec:\2085n.exe128⤵
-
\??\c:\52t8a.exec:\52t8a.exe129⤵
-
\??\c:\m005043.exec:\m005043.exe130⤵
-
\??\c:\om8dp.exec:\om8dp.exe131⤵
-
\??\c:\2et0c7d.exec:\2et0c7d.exe132⤵
-
\??\c:\e8pjg.exec:\e8pjg.exe133⤵
-
\??\c:\r3a582w.exec:\r3a582w.exe134⤵
-
\??\c:\85cca.exec:\85cca.exe135⤵
-
\??\c:\14p9u6.exec:\14p9u6.exe136⤵
-
\??\c:\k3936hn.exec:\k3936hn.exe137⤵
-
\??\c:\cnx6t.exec:\cnx6t.exe138⤵
-
\??\c:\3fv680.exec:\3fv680.exe139⤵
-
\??\c:\q7881.exec:\q7881.exe140⤵
-
\??\c:\2co411.exec:\2co411.exe141⤵
-
\??\c:\3i0a24s.exec:\3i0a24s.exe142⤵
-
\??\c:\059q7w.exec:\059q7w.exe143⤵
-
\??\c:\9n55q4x.exec:\9n55q4x.exe144⤵
-
\??\c:\kc996n.exec:\kc996n.exe145⤵
-
\??\c:\95v029.exec:\95v029.exe146⤵
-
\??\c:\xa13be.exec:\xa13be.exe147⤵
-
\??\c:\gee1m.exec:\gee1m.exe148⤵
-
\??\c:\ou7i76.exec:\ou7i76.exe149⤵
-
\??\c:\0913p.exec:\0913p.exe150⤵
-
\??\c:\9ir2p.exec:\9ir2p.exe151⤵
-
\??\c:\6715j7x.exec:\6715j7x.exe152⤵
-
\??\c:\k8i848u.exec:\k8i848u.exe153⤵
-
\??\c:\rsd7woc.exec:\rsd7woc.exe154⤵
-
\??\c:\060599u.exec:\060599u.exe155⤵
-
\??\c:\6lnk953.exec:\6lnk953.exe156⤵
-
\??\c:\13s538.exec:\13s538.exe157⤵
-
\??\c:\k6cmll.exec:\k6cmll.exe158⤵
-
\??\c:\mc4k23.exec:\mc4k23.exe159⤵
-
\??\c:\2v9hage.exec:\2v9hage.exe160⤵
-
\??\c:\cad2vmw.exec:\cad2vmw.exe161⤵
-
\??\c:\810xqo.exec:\810xqo.exe162⤵
-
\??\c:\094471a.exec:\094471a.exe163⤵
-
\??\c:\2mqa01.exec:\2mqa01.exe164⤵
-
\??\c:\7rm5d10.exec:\7rm5d10.exe165⤵
-
\??\c:\kdn4q7e.exec:\kdn4q7e.exe166⤵
-
\??\c:\l53vg.exec:\l53vg.exe167⤵
-
\??\c:\vn0fd0l.exec:\vn0fd0l.exe168⤵
-
\??\c:\615pk.exec:\615pk.exe169⤵
-
\??\c:\844220.exec:\844220.exe170⤵
-
\??\c:\jveuaec.exec:\jveuaec.exe171⤵
-
\??\c:\84dx6g.exec:\84dx6g.exe172⤵
-
\??\c:\i8wnt1.exec:\i8wnt1.exe173⤵
-
\??\c:\q9i0115.exec:\q9i0115.exe174⤵
-
\??\c:\k27ro.exec:\k27ro.exe175⤵
-
\??\c:\4408204.exec:\4408204.exe176⤵
-
\??\c:\7lpd0w5.exec:\7lpd0w5.exe177⤵
-
\??\c:\5b5s995.exec:\5b5s995.exe178⤵
-
\??\c:\53o3l.exec:\53o3l.exe179⤵
-
\??\c:\042093.exec:\042093.exe180⤵
-
\??\c:\tvx535.exec:\tvx535.exe181⤵
-
\??\c:\7t22vj4.exec:\7t22vj4.exe182⤵
-
\??\c:\44028.exec:\44028.exe183⤵
-
\??\c:\30equ.exec:\30equ.exe184⤵
-
\??\c:\017v62o.exec:\017v62o.exe185⤵
-
\??\c:\1so6d.exec:\1so6d.exe186⤵
-
\??\c:\4757u.exec:\4757u.exe187⤵
-
\??\c:\et8ip.exec:\et8ip.exe188⤵
-
\??\c:\q58d0.exec:\q58d0.exe189⤵
-
\??\c:\o8q9u3.exec:\o8q9u3.exe190⤵
-
\??\c:\tsb8s06.exec:\tsb8s06.exe191⤵
-
\??\c:\p9mqw14.exec:\p9mqw14.exe192⤵
-
\??\c:\ju48r2n.exec:\ju48r2n.exe193⤵
-
\??\c:\v0x40.exec:\v0x40.exe194⤵
-
\??\c:\85dwse2.exec:\85dwse2.exe195⤵
-
\??\c:\dx3ahq.exec:\dx3ahq.exe196⤵
-
\??\c:\fl7hn0.exec:\fl7hn0.exe197⤵
-
\??\c:\0rp01c.exec:\0rp01c.exe198⤵
-
\??\c:\03h99.exec:\03h99.exe199⤵
-
\??\c:\5cg0dg.exec:\5cg0dg.exe200⤵
-
\??\c:\hxb2s4v.exec:\hxb2s4v.exe201⤵
-
\??\c:\mqiu0.exec:\mqiu0.exe202⤵
-
\??\c:\l16ws16.exec:\l16ws16.exe203⤵
-
\??\c:\5aqr68.exec:\5aqr68.exe204⤵
-
\??\c:\aeea0.exec:\aeea0.exe205⤵
-
\??\c:\1981g3.exec:\1981g3.exe206⤵
-
\??\c:\28899.exec:\28899.exe207⤵
-
\??\c:\9pm1ash.exec:\9pm1ash.exe208⤵
-
\??\c:\6h175.exec:\6h175.exe209⤵
-
\??\c:\xp526.exec:\xp526.exe210⤵
-
\??\c:\cmw57o.exec:\cmw57o.exe211⤵
-
\??\c:\04800.exec:\04800.exe212⤵
-
\??\c:\9q1932w.exec:\9q1932w.exe213⤵
-
\??\c:\oga6cr2.exec:\oga6cr2.exe214⤵
-
\??\c:\3645ek.exec:\3645ek.exe215⤵
-
\??\c:\675qtri.exec:\675qtri.exe216⤵
-
\??\c:\abir1w5.exec:\abir1w5.exe217⤵
-
\??\c:\i4cbh1.exec:\i4cbh1.exe218⤵
-
\??\c:\xxj2l7.exec:\xxj2l7.exe219⤵
-
\??\c:\531t8f.exec:\531t8f.exe220⤵
-
\??\c:\s6q2sw.exec:\s6q2sw.exe221⤵
-
\??\c:\u3ri6a1.exec:\u3ri6a1.exe222⤵
-
\??\c:\1s37r7a.exec:\1s37r7a.exe223⤵
-
\??\c:\md41e.exec:\md41e.exe224⤵
-
\??\c:\vq82o.exec:\vq82o.exe225⤵
-
\??\c:\3o42355.exec:\3o42355.exe226⤵
-
\??\c:\0tq213.exec:\0tq213.exe227⤵
-
\??\c:\xvm03ko.exec:\xvm03ko.exe228⤵
-
\??\c:\623tj9c.exec:\623tj9c.exe229⤵
-
\??\c:\ad9he.exec:\ad9he.exe230⤵
-
\??\c:\c16sms.exec:\c16sms.exe231⤵
-
\??\c:\m900q.exec:\m900q.exe232⤵
-
\??\c:\jac7eor.exec:\jac7eor.exe233⤵
-
\??\c:\lq4g1t.exec:\lq4g1t.exe234⤵
-
\??\c:\819t5ol.exec:\819t5ol.exe235⤵
-
\??\c:\9f429.exec:\9f429.exe236⤵
-
\??\c:\k2581a.exec:\k2581a.exe237⤵
-
\??\c:\44770gw.exec:\44770gw.exe238⤵
-
\??\c:\x190s.exec:\x190s.exe239⤵
-
\??\c:\m4370.exec:\m4370.exe240⤵
-
\??\c:\u2l4j6.exec:\u2l4j6.exe241⤵