Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exe
-
Size
180KB
-
MD5
3553cd3bade39be409c92cd52bab4790
-
SHA1
4475f20a8318a35322b07eba09d2098e2ca90097
-
SHA256
a13cd3087700b87ee781123c09d4e666b462b12412b0433bd210498f97e7a8b5
-
SHA512
67fdadb7bfd27c2dae7a3867fb3523b689adcb90fa47cded7e70ba3125ba2829e62a6b318cd6c634d26ac76beb115b9f056c1a9a4c0d1dc82c4fd89d1a5bea10
-
SSDEEP
1536:PvQBeOGtrYSSsrc93UBIfdC67m6AJiqgT4+IJPhbMY:PhOm2sI93UufdC67ciJTm5hIY
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4156-1-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4452-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1460-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2916-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1152-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1956-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1616-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2604-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/760-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4932-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4056-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/436-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2656-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3864-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1244-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1284-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3660-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1176-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1136-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/8-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3472-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/116-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4500-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4312-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2456-225-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-229-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2420-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2076-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4084-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4744-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4744-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2808-278-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1436-299-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5060-303-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2484-308-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1284-311-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3968-333-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-374-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2636-395-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1532-400-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/812-424-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/860-432-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4700-439-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-452-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1340-457-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-459-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5088-461-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3652-468-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2060-479-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4028-486-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1552-508-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4832-546-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3672-619-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-652-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3180-661-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2844-664-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
djvdd.exexrlxfrl.exe7rrrllr.exehbbbbb.exebthnnn.exeddvpv.exerfxrlfx.exetnhhtb.exexllfxxx.exerlrllll.exebthhhn.exeflxrxxr.exelrxxrll.exepjvpp.exelrllrll.exebbhttn.exebhtnbb.exe5vjdd.exerxfxrrl.exenhbbhh.exehnnhhh.exedvpjj.exejdpjp.exexrfxllf.exettbhhh.exevjvvv.exehttntt.exehbtntt.exeddvpv.exevvddp.exexrlrrfr.exebbhhnn.exe9pjpd.exe9flfxxx.exerlrrllr.exehtbhnn.exepdpvv.exepdjjv.exeflrxflr.exe1nbtbt.exevpddd.exejpdvp.exefrrlxxr.exe9hnbbt.exebtbbtt.exeddvpp.exexfflflr.exe7fllxxx.exenbhhhh.exejddvp.exepdppd.exelfrrlll.exe5hnhbb.exenbbbbb.exe9pppp.exe5ddpp.exerrxxfll.exexrrrlxr.exebhhtnb.exeppppj.exe1jpjd.exelffxrxr.exelxlxlff.exehttnhh.exepid process 1152 djvdd.exe 4452 xrlxfrl.exe 2916 7rrrllr.exe 3344 hbbbbb.exe 2252 bthnnn.exe 1460 ddvpv.exe 1956 rfxrlfx.exe 2180 tnhhtb.exe 1616 xllfxxx.exe 2604 rlrllll.exe 760 bthhhn.exe 4932 flxrxxr.exe 4056 lrxxrll.exe 5100 pjvpp.exe 436 lrllrll.exe 2656 bbhttn.exe 4076 bhtnbb.exe 756 5vjdd.exe 3864 rxfxrrl.exe 3660 nhbbhh.exe 1244 hnnhhh.exe 1284 dvpjj.exe 4864 jdpjp.exe 2788 xrfxllf.exe 4684 ttbhhh.exe 1580 vjvvv.exe 1176 httntt.exe 1136 hbtntt.exe 2888 ddvpv.exe 1968 vvddp.exe 3500 xrlrrfr.exe 2528 bbhhnn.exe 544 9pjpd.exe 2516 9flfxxx.exe 8 rlrrllr.exe 3472 htbhnn.exe 3736 pdpvv.exe 116 pdjjv.exe 4500 flrxflr.exe 3680 1nbtbt.exe 4312 vpddd.exe 2456 jpdvp.exe 4860 frrlxxr.exe 2420 9hnbbt.exe 728 btbbtt.exe 880 ddvpp.exe 4180 xfflflr.exe 1048 7fllxxx.exe 4172 nbhhhh.exe 4380 jddvp.exe 1816 pdppd.exe 5048 lfrrlll.exe 2076 5hnhbb.exe 4084 nbbbbb.exe 4744 9pppp.exe 2808 5ddpp.exe 4844 rrxxfll.exe 3240 xrrrlxr.exe 3940 bhhtnb.exe 5088 ppppj.exe 4540 1jpjd.exe 1436 lffxrxr.exe 5060 lxlxlff.exe 5024 httnhh.exe -
Processes:
resource yara_rule behavioral2/memory/4156-1-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1152-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4452-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1460-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2916-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1152-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1956-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1616-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2604-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/760-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4932-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/436-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2656-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/756-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3864-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1244-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3660-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1176-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2888-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/8-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3472-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/116-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/116-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4500-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4312-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2456-225-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2420-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2076-267-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4084-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4744-274-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4744-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2808-278-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3240-285-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1436-295-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1436-299-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5060-303-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2484-308-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-311-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3968-333-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2860-358-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-374-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2636-391-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2636-395-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1532-400-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/812-424-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/860-432-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4700-439-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1976-448-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3240-452-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1340-457-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3240-459-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5088-461-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exedjvdd.exexrlxfrl.exe7rrrllr.exehbbbbb.exebthnnn.exeddvpv.exerfxrlfx.exetnhhtb.exexllfxxx.exerlrllll.exebthhhn.exeflxrxxr.exelrxxrll.exepjvpp.exelrllrll.exebbhttn.exebhtnbb.exe5vjdd.exerxfxrrl.exenhbbhh.exehnnhhh.exedescription pid process target process PID 4156 wrote to memory of 1152 4156 3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exe djvdd.exe PID 4156 wrote to memory of 1152 4156 3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exe djvdd.exe PID 4156 wrote to memory of 1152 4156 3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exe djvdd.exe PID 1152 wrote to memory of 4452 1152 djvdd.exe xrlxfrl.exe PID 1152 wrote to memory of 4452 1152 djvdd.exe xrlxfrl.exe PID 1152 wrote to memory of 4452 1152 djvdd.exe xrlxfrl.exe PID 4452 wrote to memory of 2916 4452 xrlxfrl.exe 7rrrllr.exe PID 4452 wrote to memory of 2916 4452 xrlxfrl.exe 7rrrllr.exe PID 4452 wrote to memory of 2916 4452 xrlxfrl.exe 7rrrllr.exe PID 2916 wrote to memory of 3344 2916 7rrrllr.exe hbbbbb.exe PID 2916 wrote to memory of 3344 2916 7rrrllr.exe hbbbbb.exe PID 2916 wrote to memory of 3344 2916 7rrrllr.exe hbbbbb.exe PID 3344 wrote to memory of 2252 3344 hbbbbb.exe bthnnn.exe PID 3344 wrote to memory of 2252 3344 hbbbbb.exe bthnnn.exe PID 3344 wrote to memory of 2252 3344 hbbbbb.exe bthnnn.exe PID 2252 wrote to memory of 1460 2252 bthnnn.exe ddvpv.exe PID 2252 wrote to memory of 1460 2252 bthnnn.exe ddvpv.exe PID 2252 wrote to memory of 1460 2252 bthnnn.exe ddvpv.exe PID 1460 wrote to memory of 1956 1460 ddvpv.exe rfxrlfx.exe PID 1460 wrote to memory of 1956 1460 ddvpv.exe rfxrlfx.exe PID 1460 wrote to memory of 1956 1460 ddvpv.exe rfxrlfx.exe PID 1956 wrote to memory of 2180 1956 rfxrlfx.exe tnhhtb.exe PID 1956 wrote to memory of 2180 1956 rfxrlfx.exe tnhhtb.exe PID 1956 wrote to memory of 2180 1956 rfxrlfx.exe tnhhtb.exe PID 2180 wrote to memory of 1616 2180 tnhhtb.exe xllfxxx.exe PID 2180 wrote to memory of 1616 2180 tnhhtb.exe xllfxxx.exe PID 2180 wrote to memory of 1616 2180 tnhhtb.exe xllfxxx.exe PID 1616 wrote to memory of 2604 1616 xllfxxx.exe rlrllll.exe PID 1616 wrote to memory of 2604 1616 xllfxxx.exe rlrllll.exe PID 1616 wrote to memory of 2604 1616 xllfxxx.exe rlrllll.exe PID 2604 wrote to memory of 760 2604 rlrllll.exe bthhhn.exe PID 2604 wrote to memory of 760 2604 rlrllll.exe bthhhn.exe PID 2604 wrote to memory of 760 2604 rlrllll.exe bthhhn.exe PID 760 wrote to memory of 4932 760 bthhhn.exe flxrxxr.exe PID 760 wrote to memory of 4932 760 bthhhn.exe flxrxxr.exe PID 760 wrote to memory of 4932 760 bthhhn.exe flxrxxr.exe PID 4932 wrote to memory of 4056 4932 flxrxxr.exe lrxxrll.exe PID 4932 wrote to memory of 4056 4932 flxrxxr.exe lrxxrll.exe PID 4932 wrote to memory of 4056 4932 flxrxxr.exe lrxxrll.exe PID 4056 wrote to memory of 5100 4056 lrxxrll.exe pjvpp.exe PID 4056 wrote to memory of 5100 4056 lrxxrll.exe pjvpp.exe PID 4056 wrote to memory of 5100 4056 lrxxrll.exe pjvpp.exe PID 5100 wrote to memory of 436 5100 pjvpp.exe lrllrll.exe PID 5100 wrote to memory of 436 5100 pjvpp.exe lrllrll.exe PID 5100 wrote to memory of 436 5100 pjvpp.exe lrllrll.exe PID 436 wrote to memory of 2656 436 lrllrll.exe bbhttn.exe PID 436 wrote to memory of 2656 436 lrllrll.exe bbhttn.exe PID 436 wrote to memory of 2656 436 lrllrll.exe bbhttn.exe PID 2656 wrote to memory of 4076 2656 bbhttn.exe bhtnbb.exe PID 2656 wrote to memory of 4076 2656 bbhttn.exe bhtnbb.exe PID 2656 wrote to memory of 4076 2656 bbhttn.exe bhtnbb.exe PID 4076 wrote to memory of 756 4076 bhtnbb.exe 5vjdd.exe PID 4076 wrote to memory of 756 4076 bhtnbb.exe 5vjdd.exe PID 4076 wrote to memory of 756 4076 bhtnbb.exe 5vjdd.exe PID 756 wrote to memory of 3864 756 5vjdd.exe rxfxrrl.exe PID 756 wrote to memory of 3864 756 5vjdd.exe rxfxrrl.exe PID 756 wrote to memory of 3864 756 5vjdd.exe rxfxrrl.exe PID 3864 wrote to memory of 3660 3864 rxfxrrl.exe nhbbhh.exe PID 3864 wrote to memory of 3660 3864 rxfxrrl.exe nhbbhh.exe PID 3864 wrote to memory of 3660 3864 rxfxrrl.exe nhbbhh.exe PID 3660 wrote to memory of 1244 3660 nhbbhh.exe hnnhhh.exe PID 3660 wrote to memory of 1244 3660 nhbbhh.exe hnnhhh.exe PID 3660 wrote to memory of 1244 3660 nhbbhh.exe hnnhhh.exe PID 1244 wrote to memory of 1284 1244 hnnhhh.exe dvpjj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3553cd3bade39be409c92cd52bab4790_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
\??\c:\djvdd.exec:\djvdd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\xrlxfrl.exec:\xrlxfrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\7rrrllr.exec:\7rrrllr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\hbbbbb.exec:\hbbbbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\bthnnn.exec:\bthnnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\ddvpv.exec:\ddvpv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\rfxrlfx.exec:\rfxrlfx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\tnhhtb.exec:\tnhhtb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\xllfxxx.exec:\xllfxxx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\rlrllll.exec:\rlrllll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\bthhhn.exec:\bthhhn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
\??\c:\flxrxxr.exec:\flxrxxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
\??\c:\lrxxrll.exec:\lrxxrll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\pjvpp.exec:\pjvpp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\lrllrll.exec:\lrllrll.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
\??\c:\bbhttn.exec:\bbhttn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\bhtnbb.exec:\bhtnbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
\??\c:\5vjdd.exec:\5vjdd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
\??\c:\rxfxrrl.exec:\rxfxrrl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\nhbbhh.exec:\nhbbhh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
\??\c:\hnnhhh.exec:\hnnhhh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
\??\c:\dvpjj.exec:\dvpjj.exe23⤵
- Executes dropped EXE
PID:1284 -
\??\c:\jdpjp.exec:\jdpjp.exe24⤵
- Executes dropped EXE
PID:4864 -
\??\c:\xrfxllf.exec:\xrfxllf.exe25⤵
- Executes dropped EXE
PID:2788 -
\??\c:\ttbhhh.exec:\ttbhhh.exe26⤵
- Executes dropped EXE
PID:4684 -
\??\c:\vjvvv.exec:\vjvvv.exe27⤵
- Executes dropped EXE
PID:1580 -
\??\c:\httntt.exec:\httntt.exe28⤵
- Executes dropped EXE
PID:1176 -
\??\c:\hbtntt.exec:\hbtntt.exe29⤵
- Executes dropped EXE
PID:1136 -
\??\c:\ddvpv.exec:\ddvpv.exe30⤵
- Executes dropped EXE
PID:2888 -
\??\c:\vvddp.exec:\vvddp.exe31⤵
- Executes dropped EXE
PID:1968 -
\??\c:\xrlrrfr.exec:\xrlrrfr.exe32⤵
- Executes dropped EXE
PID:3500 -
\??\c:\bbhhnn.exec:\bbhhnn.exe33⤵
- Executes dropped EXE
PID:2528 -
\??\c:\9pjpd.exec:\9pjpd.exe34⤵
- Executes dropped EXE
PID:544 -
\??\c:\9flfxxx.exec:\9flfxxx.exe35⤵
- Executes dropped EXE
PID:2516 -
\??\c:\rlrrllr.exec:\rlrrllr.exe36⤵
- Executes dropped EXE
PID:8 -
\??\c:\htbhnn.exec:\htbhnn.exe37⤵
- Executes dropped EXE
PID:3472 -
\??\c:\pdpvv.exec:\pdpvv.exe38⤵
- Executes dropped EXE
PID:3736 -
\??\c:\pdjjv.exec:\pdjjv.exe39⤵
- Executes dropped EXE
PID:116 -
\??\c:\flrxflr.exec:\flrxflr.exe40⤵
- Executes dropped EXE
PID:4500 -
\??\c:\1nbtbt.exec:\1nbtbt.exe41⤵
- Executes dropped EXE
PID:3680 -
\??\c:\vpddd.exec:\vpddd.exe42⤵
- Executes dropped EXE
PID:4312 -
\??\c:\jpdvp.exec:\jpdvp.exe43⤵
- Executes dropped EXE
PID:2456 -
\??\c:\frrlxxr.exec:\frrlxxr.exe44⤵
- Executes dropped EXE
PID:4860 -
\??\c:\9hnbbt.exec:\9hnbbt.exe45⤵
- Executes dropped EXE
PID:2420 -
\??\c:\btbbtt.exec:\btbbtt.exe46⤵
- Executes dropped EXE
PID:728 -
\??\c:\ddvpp.exec:\ddvpp.exe47⤵
- Executes dropped EXE
PID:880 -
\??\c:\xfflflr.exec:\xfflflr.exe48⤵
- Executes dropped EXE
PID:4180 -
\??\c:\7fllxxx.exec:\7fllxxx.exe49⤵
- Executes dropped EXE
PID:1048 -
\??\c:\nbhhhh.exec:\nbhhhh.exe50⤵
- Executes dropped EXE
PID:4172 -
\??\c:\jddvp.exec:\jddvp.exe51⤵
- Executes dropped EXE
PID:4380 -
\??\c:\pdppd.exec:\pdppd.exe52⤵
- Executes dropped EXE
PID:1816 -
\??\c:\lfrrlll.exec:\lfrrlll.exe53⤵
- Executes dropped EXE
PID:5048 -
\??\c:\5hnhbb.exec:\5hnhbb.exe54⤵
- Executes dropped EXE
PID:2076 -
\??\c:\nbbbbb.exec:\nbbbbb.exe55⤵
- Executes dropped EXE
PID:4084 -
\??\c:\9pppp.exec:\9pppp.exe56⤵
- Executes dropped EXE
PID:4744 -
\??\c:\5ddpp.exec:\5ddpp.exe57⤵
- Executes dropped EXE
PID:2808 -
\??\c:\rrxxfll.exec:\rrxxfll.exe58⤵
- Executes dropped EXE
PID:4844 -
\??\c:\xrrrlxr.exec:\xrrrlxr.exe59⤵
- Executes dropped EXE
PID:3240 -
\??\c:\bhhtnb.exec:\bhhtnb.exe60⤵
- Executes dropped EXE
PID:3940 -
\??\c:\ppppj.exec:\ppppj.exe61⤵
- Executes dropped EXE
PID:5088 -
\??\c:\1jpjd.exec:\1jpjd.exe62⤵
- Executes dropped EXE
PID:4540 -
\??\c:\lffxrxr.exec:\lffxrxr.exe63⤵
- Executes dropped EXE
PID:1436 -
\??\c:\lxlxlff.exec:\lxlxlff.exe64⤵
- Executes dropped EXE
PID:5060 -
\??\c:\httnhh.exec:\httnhh.exe65⤵
- Executes dropped EXE
PID:5024 -
\??\c:\vpjpv.exec:\vpjpv.exe66⤵PID:2484
-
\??\c:\ppvvd.exec:\ppvvd.exe67⤵PID:1284
-
\??\c:\rxxrllf.exec:\rxxrllf.exe68⤵PID:3928
-
\??\c:\bhnnnn.exec:\bhnnnn.exe69⤵PID:3168
-
\??\c:\nttttt.exec:\nttttt.exe70⤵PID:2228
-
\??\c:\7bnnhh.exec:\7bnnhh.exe71⤵PID:4216
-
\??\c:\pvvvp.exec:\pvvvp.exe72⤵PID:4684
-
\??\c:\llfxrlr.exec:\llfxrlr.exe73⤵PID:3968
-
\??\c:\frrrrll.exec:\frrrrll.exe74⤵PID:3524
-
\??\c:\7bhnhh.exec:\7bhnhh.exe75⤵PID:1552
-
\??\c:\vpjdv.exec:\vpjdv.exe76⤵PID:4736
-
\??\c:\5dvpd.exec:\5dvpd.exe77⤵PID:1304
-
\??\c:\5rrxllr.exec:\5rrxllr.exe78⤵PID:4048
-
\??\c:\7nbtbb.exec:\7nbtbb.exe79⤵PID:2188
-
\??\c:\tttnbh.exec:\tttnbh.exe80⤵PID:664
-
\??\c:\nbnhtt.exec:\nbnhtt.exe81⤵PID:3992
-
\??\c:\pjvpv.exec:\pjvpv.exe82⤵PID:2860
-
\??\c:\ddjdj.exec:\ddjdj.exe83⤵PID:1868
-
\??\c:\fxxxrll.exec:\fxxxrll.exe84⤵PID:4092
-
\??\c:\nhbbtt.exec:\nhbbtt.exe85⤵PID:4548
-
\??\c:\nhnhbb.exec:\nhnhbb.exe86⤵PID:1132
-
\??\c:\5jdpj.exec:\5jdpj.exe87⤵PID:4672
-
\??\c:\jdjdv.exec:\jdjdv.exe88⤵PID:1064
-
\??\c:\xlrrllx.exec:\xlrrllx.exe89⤵PID:4532
-
\??\c:\hbbbbt.exec:\hbbbbt.exe90⤵PID:116
-
\??\c:\thhbbn.exec:\thhbbn.exe91⤵PID:2072
-
\??\c:\vpvjd.exec:\vpvjd.exe92⤵PID:3328
-
\??\c:\1jddv.exec:\1jddv.exe93⤵PID:2636
-
\??\c:\djdvv.exec:\djdvv.exe94⤵PID:3436
-
\??\c:\xfrlxxl.exec:\xfrlxxl.exe95⤵PID:1532
-
\??\c:\1fllflf.exec:\1fllflf.exe96⤵PID:2252
-
\??\c:\1nnnhh.exec:\1nnnhh.exe97⤵PID:4936
-
\??\c:\5pjdv.exec:\5pjdv.exe98⤵PID:1460
-
\??\c:\pjpjd.exec:\pjpjd.exe99⤵PID:1956
-
\??\c:\9flfffr.exec:\9flfffr.exe100⤵PID:2180
-
\??\c:\7rrrllf.exec:\7rrrllf.exe101⤵PID:1680
-
\??\c:\fxllrrl.exec:\fxllrrl.exe102⤵PID:812
-
\??\c:\thnbtn.exec:\thnbtn.exe103⤵PID:2308
-
\??\c:\tbnhtt.exec:\tbnhtt.exe104⤵PID:780
-
\??\c:\vddjd.exec:\vddjd.exe105⤵PID:860
-
\??\c:\ddvpp.exec:\ddvpp.exe106⤵PID:4648
-
\??\c:\5frlffx.exec:\5frlffx.exe107⤵PID:4700
-
\??\c:\xrffllx.exec:\xrffllx.exe108⤵PID:1804
-
\??\c:\nhttnn.exec:\nhttnn.exe109⤵PID:3124
-
\??\c:\hbtttt.exec:\hbtttt.exe110⤵PID:1976
-
\??\c:\5jppd.exec:\5jppd.exe111⤵PID:3240
-
\??\c:\pddvv.exec:\pddvv.exe112⤵PID:1340
-
\??\c:\llrlffx.exec:\llrlffx.exe113⤵PID:5088
-
\??\c:\xrxrllf.exec:\xrxrllf.exe114⤵PID:3652
-
\??\c:\1ttnhh.exec:\1ttnhh.exe115⤵PID:4584
-
\??\c:\7pvpj.exec:\7pvpj.exe116⤵PID:1884
-
\??\c:\vjddp.exec:\vjddp.exe117⤵PID:2060
-
\??\c:\lrxrlxx.exec:\lrxrlxx.exe118⤵PID:2368
-
\??\c:\fxfxrrx.exec:\fxfxrrx.exe119⤵PID:4028
-
\??\c:\hbbtnt.exec:\hbbtnt.exe120⤵PID:60
-
\??\c:\bbbtnn.exec:\bbbtnn.exe121⤵PID:2152
-
\??\c:\vvddv.exec:\vvddv.exe122⤵PID:4840
-
\??\c:\3vdvv.exec:\3vdvv.exe123⤵PID:4216
-
\??\c:\xxxrfrf.exec:\xxxrfrf.exe124⤵PID:732
-
\??\c:\5xlflfl.exec:\5xlflfl.exe125⤵PID:2844
-
\??\c:\hbbtnn.exec:\hbbtnn.exe126⤵PID:3524
-
\??\c:\7bhbtt.exec:\7bhbtt.exe127⤵PID:1552
-
\??\c:\9jppj.exec:\9jppj.exe128⤵PID:4344
-
\??\c:\pjvpp.exec:\pjvpp.exe129⤵PID:3160
-
\??\c:\3rrrfff.exec:\3rrrfff.exe130⤵PID:3088
-
\??\c:\fxlfxrl.exec:\fxlfxrl.exe131⤵PID:3540
-
\??\c:\btbttb.exec:\btbttb.exe132⤵PID:4624
-
\??\c:\thtnnn.exec:\thtnnn.exe133⤵PID:1600
-
\??\c:\dpppj.exec:\dpppj.exe134⤵PID:3876
-
\??\c:\9vdvv.exec:\9vdvv.exe135⤵PID:4336
-
\??\c:\3lfxrrf.exec:\3lfxrrf.exe136⤵PID:4016
-
\??\c:\bttnhh.exec:\bttnhh.exe137⤵PID:2776
-
\??\c:\ppdvv.exec:\ppdvv.exe138⤵PID:3964
-
\??\c:\7xffxrl.exec:\7xffxrl.exe139⤵PID:4832
-
\??\c:\hntnhh.exec:\hntnhh.exe140⤵PID:1712
-
\??\c:\1jvdd.exec:\1jvdd.exe141⤵PID:3432
-
\??\c:\jjdjp.exec:\jjdjp.exe142⤵PID:2900
-
\??\c:\xrrrlll.exec:\xrrrlll.exe143⤵PID:2636
-
\??\c:\hbnntb.exec:\hbnntb.exe144⤵PID:3828
-
\??\c:\vpddp.exec:\vpddp.exe145⤵PID:636
-
\??\c:\llfffxx.exec:\llfffxx.exe146⤵PID:868
-
\??\c:\rlllffx.exec:\rlllffx.exe147⤵PID:2324
-
\??\c:\rlfxrrl.exec:\rlfxrrl.exe148⤵PID:2260
-
\??\c:\9bhhbn.exec:\9bhhbn.exe149⤵PID:1956
-
\??\c:\9jdvp.exec:\9jdvp.exe150⤵PID:2180
-
\??\c:\dpdpv.exec:\dpdpv.exe151⤵PID:1680
-
\??\c:\1lrlxrr.exec:\1lrlxrr.exe152⤵PID:812
-
\??\c:\rlffxxx.exec:\rlffxxx.exe153⤵PID:2308
-
\??\c:\bthhnn.exec:\bthhnn.exe154⤵PID:780
-
\??\c:\1jpjd.exec:\1jpjd.exe155⤵PID:860
-
\??\c:\dvjjj.exec:\dvjjj.exe156⤵PID:4648
-
\??\c:\7ffxlll.exec:\7ffxlll.exe157⤵PID:4988
-
\??\c:\tnbtbb.exec:\tnbtbb.exe158⤵PID:1804
-
\??\c:\ntbbbb.exec:\ntbbbb.exe159⤵PID:4836
-
\??\c:\pvpjd.exec:\pvpjd.exe160⤵PID:1976
-
\??\c:\5vvvp.exec:\5vvvp.exe161⤵PID:3400
-
\??\c:\flrrllf.exec:\flrrllf.exe162⤵PID:3672
-
\??\c:\xfflfxx.exec:\xfflfxx.exe163⤵PID:3864
-
\??\c:\hbtnhb.exec:\hbtnhb.exe164⤵PID:3172
-
\??\c:\9hnnhh.exec:\9hnnhh.exe165⤵PID:5060
-
\??\c:\vjpdv.exec:\vjpdv.exe166⤵PID:5024
-
\??\c:\jvdvv.exec:\jvdvv.exe167⤵PID:3336
-
\??\c:\rllfrrr.exec:\rllfrrr.exe168⤵PID:2332
-
\??\c:\xxffxxx.exec:\xxffxxx.exe169⤵PID:2368
-
\??\c:\3rffrrl.exec:\3rffrrl.exe170⤵PID:428
-
\??\c:\7tthbn.exec:\7tthbn.exe171⤵PID:1556
-
\??\c:\bnhbnn.exec:\bnhbnn.exe172⤵PID:3300
-
\??\c:\vpppj.exec:\vpppj.exe173⤵PID:1540
-
\??\c:\fxlxrfl.exec:\fxlxrfl.exe174⤵PID:3408
-
\??\c:\rlrxxfx.exec:\rlrxxfx.exe175⤵PID:3180
-
\??\c:\5hbbtt.exec:\5hbbtt.exe176⤵PID:2844
-
\??\c:\nttnnn.exec:\nttnnn.exe177⤵PID:4280
-
\??\c:\pjjdd.exec:\pjjdd.exe178⤵PID:2524
-
\??\c:\ppjvp.exec:\ppjvp.exe179⤵PID:3620
-
\??\c:\lffrlrr.exec:\lffrlrr.exe180⤵PID:664
-
\??\c:\bnnhhb.exec:\bnnhhb.exe181⤵PID:724
-
\??\c:\dvjpp.exec:\dvjpp.exe182⤵PID:1404
-
\??\c:\vvvvv.exec:\vvvvv.exe183⤵PID:548
-
\??\c:\rfrlfff.exec:\rfrlfff.exe184⤵PID:1868
-
\??\c:\1fllflf.exec:\1fllflf.exe185⤵PID:2256
-
\??\c:\hbbbbb.exec:\hbbbbb.exe186⤵PID:748
-
\??\c:\tntnbt.exec:\tntnbt.exe187⤵PID:4388
-
\??\c:\jjvvd.exec:\jjvvd.exe188⤵PID:2728
-
\??\c:\vvppd.exec:\vvppd.exe189⤵PID:4600
-
\??\c:\3xlfxlf.exec:\3xlfxlf.exe190⤵PID:4452
-
\??\c:\ffrlffx.exec:\ffrlffx.exe191⤵PID:3680
-
\??\c:\hhhhhh.exec:\hhhhhh.exe192⤵PID:3344
-
\??\c:\tbbhth.exec:\tbbhth.exe193⤵PID:3456
-
\??\c:\ddvvv.exec:\ddvvv.exe194⤵PID:2232
-
\??\c:\pjpjd.exec:\pjpjd.exe195⤵PID:3588
-
\??\c:\flxffff.exec:\flxffff.exe196⤵PID:4852
-
\??\c:\xrllrrf.exec:\xrllrrf.exe197⤵PID:4272
-
\??\c:\3nbtnn.exec:\3nbtnn.exe198⤵PID:932
-
\??\c:\btbthn.exec:\btbthn.exe199⤵PID:2120
-
\??\c:\pjvpj.exec:\pjvpj.exe200⤵PID:4172
-
\??\c:\lrffxxf.exec:\lrffxxf.exe201⤵PID:3788
-
\??\c:\xfrllfx.exec:\xfrllfx.exe202⤵PID:1424
-
\??\c:\ntttnn.exec:\ntttnn.exe203⤵PID:4044
-
\??\c:\httnhh.exec:\httnhh.exe204⤵PID:2884
-
\??\c:\1pvvd.exec:\1pvvd.exe205⤵PID:4056
-
\??\c:\pvdpv.exec:\pvdpv.exe206⤵PID:3140
-
\??\c:\flrfrff.exec:\flrfrff.exe207⤵PID:396
-
\??\c:\tntnhh.exec:\tntnhh.exe208⤵PID:2784
-
\??\c:\nbbbtt.exec:\nbbbtt.exe209⤵PID:4884
-
\??\c:\1pvpd.exec:\1pvpd.exe210⤵PID:1208
-
\??\c:\lfxxxfl.exec:\lfxxxfl.exe211⤵PID:3924
-
\??\c:\5xfffff.exec:\5xfffff.exe212⤵PID:2476
-
\??\c:\nbnnht.exec:\nbnnht.exe213⤵PID:1436
-
\??\c:\tnbbtt.exec:\tnbbtt.exe214⤵PID:4232
-
\??\c:\jjpjd.exec:\jjpjd.exe215⤵PID:4764
-
\??\c:\dpvpd.exec:\dpvpd.exe216⤵PID:2064
-
\??\c:\pjvpp.exec:\pjvpp.exe217⤵PID:3448
-
\??\c:\llxrlrf.exec:\llxrlrf.exe218⤵PID:4068
-
\??\c:\nnntbh.exec:\nnntbh.exe219⤵PID:3168
-
\??\c:\3ttnhh.exec:\3ttnhh.exe220⤵PID:2788
-
\??\c:\bnbbnt.exec:\bnbbnt.exe221⤵PID:4840
-
\??\c:\3jjdv.exec:\3jjdv.exe222⤵PID:3716
-
\??\c:\xrxxrrl.exec:\xrxxrrl.exe223⤵PID:5032
-
\??\c:\3rxxxlx.exec:\3rxxxlx.exe224⤵PID:4892
-
\??\c:\btttnn.exec:\btttnn.exe225⤵PID:3048
-
\??\c:\7bhbtt.exec:\7bhbtt.exe226⤵PID:4736
-
\??\c:\9dpvd.exec:\9dpvd.exe227⤵PID:1304
-
\??\c:\vdvvd.exec:\vdvvd.exe228⤵PID:3088
-
\??\c:\1llfxxr.exec:\1llfxxr.exe229⤵PID:3540
-
\??\c:\rlxrffr.exec:\rlxrffr.exe230⤵PID:3904
-
\??\c:\bttnnh.exec:\bttnnh.exe231⤵PID:1600
-
\??\c:\7nhhth.exec:\7nhhth.exe232⤵PID:1164
-
\??\c:\pdjdv.exec:\pdjdv.exe233⤵PID:3664
-
\??\c:\pddvv.exec:\pddvv.exe234⤵PID:8
-
\??\c:\xffxfrr.exec:\xffxfrr.exe235⤵PID:2776
-
\??\c:\thbbbn.exec:\thbbbn.exe236⤵PID:3964
-
\??\c:\nhnnhh.exec:\nhnnhh.exe237⤵PID:4832
-
\??\c:\5vjpp.exec:\5vjpp.exe238⤵PID:528
-
\??\c:\jpjjv.exec:\jpjjv.exe239⤵PID:2760
-
\??\c:\frxxrrr.exec:\frxxrrr.exe240⤵PID:4088
-
\??\c:\bbnnhn.exec:\bbnnhn.exe241⤵PID:4312
-