Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:45
Behavioral task
behavioral1
Sample
2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exe
-
Size
453KB
-
MD5
2d06dc20b8fe2704b1c86da70fe913b0
-
SHA1
b05fd18fdfdf28e51fc6ec045f95ac25290e603d
-
SHA256
811ed67606e34d4a9adfdb5c819278537957684db1fb97c8a37b85d04f3d5105
-
SHA512
3fcaa8dc1fd4a98b268ff4566802e3e70d5ed745e147ec22a83ed85d2660d6fe4b43bea7d688d58e821fa04d22f97e4f44a7a43c0caee35726845b2c2988adb1
-
SSDEEP
6144:rcm4FmowdHoSphraHcpOaKHpXfRo0V8JcgE+ezpg1xrloBNTNm9:x4wFHoS3eFaKHpv/VycgE81lg+
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4604-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1792-8-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1820-13-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1012-20-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1372-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2416-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3352-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/428-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5104-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4548-57-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1200-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2364-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3052-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4972-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3236-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2524-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4772-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2704-126-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1624-131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/724-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/724-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4576-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2464-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4528-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2908-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2632-182-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1612-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3212-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/392-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4340-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4196-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1292-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3476-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5064-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1476-238-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4184-286-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4016-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4260-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1684-305-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1908-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4452-315-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3960-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4392-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4988-385-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/540-395-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2480-396-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3312-400-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3696-417-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-428-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1840-457-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3028-463-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3552-492-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3032-500-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4868-516-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2088-520-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2844-536-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/988-546-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4808-696-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/336-788-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1368-801-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4092-814-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3420-821-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2080-907-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
dpddd.exexxxrlll.exetnnbtt.exe3dvvp.exefrxxxxx.exelrrxrrl.exe1xrlfff.exepjjdd.exexrfxffl.exenhttbb.exetnnbbt.exevpjjp.exevdpjj.exelfflflf.exebbtbtn.exevpjjd.exennnhbb.exedvddp.exe3nhtht.exedvvpp.exetnhbnh.exe7hnhnn.exexrfrrlr.exehbhnnh.exevpvvv.exebnnbtn.exejvdvv.exerxfxrlf.exefrxrxrx.exenbbbtt.exe3flrlxf.exeppvpp.exexrrlxlx.exentttbt.exejpdjp.exerlxrlfx.exethbnbt.exejpvvp.exelxlxllx.exehhnbnh.exeppjdd.exelrlxllx.exe3vvpj.exe1rfxrfx.exebhnhtt.exevvjvj.exexxxfrxr.exe7tthtt.exejvvpj.exellfrfxl.exefffrlfr.exenbbbtn.exedvdvp.exefffrlrl.exentnhhb.exepdjdd.exelffxrrl.exelrrfxrl.exenbhhtt.exe5jpjv.exerfxrlxr.exettbthh.exejjpdd.exefxfxflf.exepid process 1792 dpddd.exe 1820 xxxrlll.exe 1012 tnnbtt.exe 2416 3dvvp.exe 1372 frxxxxx.exe 3352 lrrxrrl.exe 428 1xrlfff.exe 5104 pjjdd.exe 4548 xrfxffl.exe 1200 nhttbb.exe 2364 tnnbbt.exe 3052 vpjjp.exe 4804 vdpjj.exe 2592 lfflflf.exe 4972 bbtbtn.exe 3236 vpjjd.exe 1864 nnnhbb.exe 2524 dvddp.exe 2408 3nhtht.exe 2704 dvvpp.exe 4772 tnhbnh.exe 1624 7hnhnn.exe 4244 xrfrrlr.exe 4940 hbhnnh.exe 724 vpvvv.exe 4576 bnnbtn.exe 2464 jvdvv.exe 4528 rxfxrlf.exe 2908 frxrxrx.exe 2632 nbbbtt.exe 1612 3flrlxf.exe 3212 ppvpp.exe 392 xrrlxlx.exe 1356 ntttbt.exe 4340 jpdjp.exe 4196 rlxrlfx.exe 1292 thbnbt.exe 5076 jpvvp.exe 3476 lxlxllx.exe 5064 hhnbnh.exe 2940 ppjdd.exe 4988 lrlxllx.exe 1372 3vvpj.exe 1476 1rfxrfx.exe 4424 bhnhtt.exe 3352 vvjvj.exe 5104 xxxfrxr.exe 4060 7tthtt.exe 4268 jvvpj.exe 5048 llfrfxl.exe 3696 fffrlfr.exe 2292 nbbbtn.exe 1388 dvdvp.exe 692 fffrlrl.exe 336 ntnhhb.exe 3528 pdjdd.exe 1416 lffxrrl.exe 4384 lrrfxrl.exe 4184 nbhhtt.exe 4016 5jpjv.exe 2460 rfxrlxr.exe 2168 ttbthh.exe 4260 jjpdd.exe 2936 fxfxflf.exe -
Processes:
resource yara_rule behavioral2/memory/4604-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dpddd.exe upx behavioral2/memory/4604-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1792-8-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnnbtt.exe upx behavioral2/memory/1820-13-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxxrlll.exe upx behavioral2/memory/1012-20-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3dvvp.exe upx C:\frxxxxx.exe upx behavioral2/memory/1372-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2416-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3352-36-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\lrrxrrl.exe upx C:\1xrlfff.exe upx behavioral2/memory/3352-43-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/428-44-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjjdd.exe upx behavioral2/memory/428-49-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5104-52-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xrfxffl.exe upx behavioral2/memory/4548-57-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhttbb.exe upx C:\tnnbbt.exe upx behavioral2/memory/1200-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2364-70-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpjjp.exe upx behavioral2/memory/3052-75-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vdpjj.exe upx C:\lfflflf.exe upx \??\c:\bbtbtn.exe upx behavioral2/memory/4972-92-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpjjd.exe upx C:\nnnhbb.exe upx behavioral2/memory/3236-101-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvddp.exe upx behavioral2/memory/2524-109-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3nhtht.exe upx C:\dvvpp.exe upx C:\tnhbnh.exe upx behavioral2/memory/4772-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2704-126-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\7hnhnn.exe upx behavioral2/memory/1624-131-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xrfrrlr.exe upx C:\hbhnnh.exe upx C:\vpvvv.exe upx behavioral2/memory/724-147-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bnnbtn.exe upx behavioral2/memory/724-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4576-154-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jvdvv.exe upx behavioral2/memory/2464-161-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rxfxrlf.exe upx C:\frxrxrx.exe upx behavioral2/memory/4528-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2908-172-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbbbtt.exe upx C:\3flrlxf.exe upx behavioral2/memory/2632-182-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1612-184-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ppvpp.exe upx behavioral2/memory/3212-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3212-194-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exedpddd.exexxxrlll.exetnnbtt.exe3dvvp.exefrxxxxx.exelrrxrrl.exe1xrlfff.exepjjdd.exexrfxffl.exenhttbb.exetnnbbt.exevpjjp.exevdpjj.exelfflflf.exebbtbtn.exevpjjd.exennnhbb.exedvddp.exe3nhtht.exedvvpp.exetnhbnh.exedescription pid process target process PID 4604 wrote to memory of 1792 4604 2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exe dpddd.exe PID 4604 wrote to memory of 1792 4604 2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exe dpddd.exe PID 4604 wrote to memory of 1792 4604 2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exe dpddd.exe PID 1792 wrote to memory of 1820 1792 dpddd.exe xxxrlll.exe PID 1792 wrote to memory of 1820 1792 dpddd.exe xxxrlll.exe PID 1792 wrote to memory of 1820 1792 dpddd.exe xxxrlll.exe PID 1820 wrote to memory of 1012 1820 xxxrlll.exe tnnbtt.exe PID 1820 wrote to memory of 1012 1820 xxxrlll.exe tnnbtt.exe PID 1820 wrote to memory of 1012 1820 xxxrlll.exe tnnbtt.exe PID 1012 wrote to memory of 2416 1012 tnnbtt.exe 3dvvp.exe PID 1012 wrote to memory of 2416 1012 tnnbtt.exe 3dvvp.exe PID 1012 wrote to memory of 2416 1012 tnnbtt.exe 3dvvp.exe PID 2416 wrote to memory of 1372 2416 3dvvp.exe frxxxxx.exe PID 2416 wrote to memory of 1372 2416 3dvvp.exe frxxxxx.exe PID 2416 wrote to memory of 1372 2416 3dvvp.exe frxxxxx.exe PID 1372 wrote to memory of 3352 1372 frxxxxx.exe lrrxrrl.exe PID 1372 wrote to memory of 3352 1372 frxxxxx.exe lrrxrrl.exe PID 1372 wrote to memory of 3352 1372 frxxxxx.exe lrrxrrl.exe PID 3352 wrote to memory of 428 3352 lrrxrrl.exe 1xrlfff.exe PID 3352 wrote to memory of 428 3352 lrrxrrl.exe 1xrlfff.exe PID 3352 wrote to memory of 428 3352 lrrxrrl.exe 1xrlfff.exe PID 428 wrote to memory of 5104 428 1xrlfff.exe pjjdd.exe PID 428 wrote to memory of 5104 428 1xrlfff.exe pjjdd.exe PID 428 wrote to memory of 5104 428 1xrlfff.exe pjjdd.exe PID 5104 wrote to memory of 4548 5104 pjjdd.exe xrfxffl.exe PID 5104 wrote to memory of 4548 5104 pjjdd.exe xrfxffl.exe PID 5104 wrote to memory of 4548 5104 pjjdd.exe xrfxffl.exe PID 4548 wrote to memory of 1200 4548 xrfxffl.exe nhttbb.exe PID 4548 wrote to memory of 1200 4548 xrfxffl.exe nhttbb.exe PID 4548 wrote to memory of 1200 4548 xrfxffl.exe nhttbb.exe PID 1200 wrote to memory of 2364 1200 nhttbb.exe tnnbbt.exe PID 1200 wrote to memory of 2364 1200 nhttbb.exe tnnbbt.exe PID 1200 wrote to memory of 2364 1200 nhttbb.exe tnnbbt.exe PID 2364 wrote to memory of 3052 2364 tnnbbt.exe vpjjp.exe PID 2364 wrote to memory of 3052 2364 tnnbbt.exe vpjjp.exe PID 2364 wrote to memory of 3052 2364 tnnbbt.exe vpjjp.exe PID 3052 wrote to memory of 4804 3052 vpjjp.exe vdpjj.exe PID 3052 wrote to memory of 4804 3052 vpjjp.exe vdpjj.exe PID 3052 wrote to memory of 4804 3052 vpjjp.exe vdpjj.exe PID 4804 wrote to memory of 2592 4804 vdpjj.exe lfflflf.exe PID 4804 wrote to memory of 2592 4804 vdpjj.exe lfflflf.exe PID 4804 wrote to memory of 2592 4804 vdpjj.exe lfflflf.exe PID 2592 wrote to memory of 4972 2592 lfflflf.exe bbtbtn.exe PID 2592 wrote to memory of 4972 2592 lfflflf.exe bbtbtn.exe PID 2592 wrote to memory of 4972 2592 lfflflf.exe bbtbtn.exe PID 4972 wrote to memory of 3236 4972 bbtbtn.exe vpjjd.exe PID 4972 wrote to memory of 3236 4972 bbtbtn.exe vpjjd.exe PID 4972 wrote to memory of 3236 4972 bbtbtn.exe vpjjd.exe PID 3236 wrote to memory of 1864 3236 vpjjd.exe nnnhbb.exe PID 3236 wrote to memory of 1864 3236 vpjjd.exe nnnhbb.exe PID 3236 wrote to memory of 1864 3236 vpjjd.exe nnnhbb.exe PID 1864 wrote to memory of 2524 1864 nnnhbb.exe dvddp.exe PID 1864 wrote to memory of 2524 1864 nnnhbb.exe dvddp.exe PID 1864 wrote to memory of 2524 1864 nnnhbb.exe dvddp.exe PID 2524 wrote to memory of 2408 2524 dvddp.exe 3nhtht.exe PID 2524 wrote to memory of 2408 2524 dvddp.exe 3nhtht.exe PID 2524 wrote to memory of 2408 2524 dvddp.exe 3nhtht.exe PID 2408 wrote to memory of 2704 2408 3nhtht.exe dvvpp.exe PID 2408 wrote to memory of 2704 2408 3nhtht.exe dvvpp.exe PID 2408 wrote to memory of 2704 2408 3nhtht.exe dvvpp.exe PID 2704 wrote to memory of 4772 2704 dvvpp.exe tnhbnh.exe PID 2704 wrote to memory of 4772 2704 dvvpp.exe tnhbnh.exe PID 2704 wrote to memory of 4772 2704 dvvpp.exe tnhbnh.exe PID 4772 wrote to memory of 1624 4772 tnhbnh.exe 7hnhnn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2d06dc20b8fe2704b1c86da70fe913b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
\??\c:\dpddd.exec:\dpddd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
\??\c:\xxxrlll.exec:\xxxrlll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\tnnbtt.exec:\tnnbtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
\??\c:\3dvvp.exec:\3dvvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\frxxxxx.exec:\frxxxxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\lrrxrrl.exec:\lrrxrrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\1xrlfff.exec:\1xrlfff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
\??\c:\pjjdd.exec:\pjjdd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\xrfxffl.exec:\xrfxffl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\nhttbb.exec:\nhttbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
\??\c:\tnnbbt.exec:\tnnbbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\vpjjp.exec:\vpjjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\vdpjj.exec:\vdpjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\lfflflf.exec:\lfflflf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\bbtbtn.exec:\bbtbtn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
\??\c:\vpjjd.exec:\vpjjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
\??\c:\nnnhbb.exec:\nnnhbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\dvddp.exec:\dvddp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\3nhtht.exec:\3nhtht.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\dvvpp.exec:\dvvpp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\tnhbnh.exec:\tnhbnh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
\??\c:\7hnhnn.exec:\7hnhnn.exe23⤵
- Executes dropped EXE
PID:1624 -
\??\c:\xrfrrlr.exec:\xrfrrlr.exe24⤵
- Executes dropped EXE
PID:4244 -
\??\c:\hbhnnh.exec:\hbhnnh.exe25⤵
- Executes dropped EXE
PID:4940 -
\??\c:\vpvvv.exec:\vpvvv.exe26⤵
- Executes dropped EXE
PID:724 -
\??\c:\bnnbtn.exec:\bnnbtn.exe27⤵
- Executes dropped EXE
PID:4576 -
\??\c:\jvdvv.exec:\jvdvv.exe28⤵
- Executes dropped EXE
PID:2464 -
\??\c:\rxfxrlf.exec:\rxfxrlf.exe29⤵
- Executes dropped EXE
PID:4528 -
\??\c:\frxrxrx.exec:\frxrxrx.exe30⤵
- Executes dropped EXE
PID:2908 -
\??\c:\nbbbtt.exec:\nbbbtt.exe31⤵
- Executes dropped EXE
PID:2632 -
\??\c:\3flrlxf.exec:\3flrlxf.exe32⤵
- Executes dropped EXE
PID:1612 -
\??\c:\ppvpp.exec:\ppvpp.exe33⤵
- Executes dropped EXE
PID:3212 -
\??\c:\xrrlxlx.exec:\xrrlxlx.exe34⤵
- Executes dropped EXE
PID:392 -
\??\c:\ntttbt.exec:\ntttbt.exe35⤵
- Executes dropped EXE
PID:1356 -
\??\c:\jpdjp.exec:\jpdjp.exe36⤵
- Executes dropped EXE
PID:4340 -
\??\c:\rlxrlfx.exec:\rlxrlfx.exe37⤵
- Executes dropped EXE
PID:4196 -
\??\c:\thbnbt.exec:\thbnbt.exe38⤵
- Executes dropped EXE
PID:1292 -
\??\c:\jpvvp.exec:\jpvvp.exe39⤵
- Executes dropped EXE
PID:5076 -
\??\c:\lxlxllx.exec:\lxlxllx.exe40⤵
- Executes dropped EXE
PID:3476 -
\??\c:\hhnbnh.exec:\hhnbnh.exe41⤵
- Executes dropped EXE
PID:5064 -
\??\c:\ppjdd.exec:\ppjdd.exe42⤵
- Executes dropped EXE
PID:2940 -
\??\c:\lrlxllx.exec:\lrlxllx.exe43⤵
- Executes dropped EXE
PID:4988 -
\??\c:\3vvpj.exec:\3vvpj.exe44⤵
- Executes dropped EXE
PID:1372 -
\??\c:\1rfxrfx.exec:\1rfxrfx.exe45⤵
- Executes dropped EXE
PID:1476 -
\??\c:\bhnhtt.exec:\bhnhtt.exe46⤵
- Executes dropped EXE
PID:4424 -
\??\c:\vvjvj.exec:\vvjvj.exe47⤵
- Executes dropped EXE
PID:3352 -
\??\c:\xxxfrxr.exec:\xxxfrxr.exe48⤵
- Executes dropped EXE
PID:5104 -
\??\c:\7tthtt.exec:\7tthtt.exe49⤵
- Executes dropped EXE
PID:4060 -
\??\c:\jvvpj.exec:\jvvpj.exe50⤵
- Executes dropped EXE
PID:4268 -
\??\c:\llfrfxl.exec:\llfrfxl.exe51⤵
- Executes dropped EXE
PID:5048 -
\??\c:\fffrlfr.exec:\fffrlfr.exe52⤵
- Executes dropped EXE
PID:3696 -
\??\c:\nbbbtn.exec:\nbbbtn.exe53⤵
- Executes dropped EXE
PID:2292 -
\??\c:\dvdvp.exec:\dvdvp.exe54⤵
- Executes dropped EXE
PID:1388 -
\??\c:\fffrlrl.exec:\fffrlrl.exe55⤵
- Executes dropped EXE
PID:692 -
\??\c:\ntnhhb.exec:\ntnhhb.exe56⤵
- Executes dropped EXE
PID:336 -
\??\c:\pdjdd.exec:\pdjdd.exe57⤵
- Executes dropped EXE
PID:3528 -
\??\c:\lffxrrl.exec:\lffxrrl.exe58⤵
- Executes dropped EXE
PID:1416 -
\??\c:\lrrfxrl.exec:\lrrfxrl.exe59⤵
- Executes dropped EXE
PID:4384 -
\??\c:\nbhhtt.exec:\nbhhtt.exe60⤵
- Executes dropped EXE
PID:4184 -
\??\c:\5jpjv.exec:\5jpjv.exe61⤵
- Executes dropped EXE
PID:4016 -
\??\c:\rfxrlxr.exec:\rfxrlxr.exe62⤵
- Executes dropped EXE
PID:2460 -
\??\c:\ttbthh.exec:\ttbthh.exe63⤵
- Executes dropped EXE
PID:2168 -
\??\c:\jjpdd.exec:\jjpdd.exe64⤵
- Executes dropped EXE
PID:4260 -
\??\c:\fxfxflf.exec:\fxfxflf.exe65⤵
- Executes dropped EXE
PID:2936 -
\??\c:\bnhtnt.exec:\bnhtnt.exe66⤵PID:1684
-
\??\c:\pdjvj.exec:\pdjvj.exe67⤵PID:1908
-
\??\c:\lfllrrl.exec:\lfllrrl.exe68⤵PID:4452
-
\??\c:\vdvdp.exec:\vdvdp.exe69⤵PID:2216
-
\??\c:\xrrllff.exec:\xrrllff.exe70⤵PID:4632
-
\??\c:\nbhbtb.exec:\nbhbtb.exe71⤵PID:408
-
\??\c:\jjjpv.exec:\jjjpv.exe72⤵PID:3652
-
\??\c:\jjppp.exec:\jjppp.exe73⤵PID:4676
-
\??\c:\frrlffl.exec:\frrlffl.exe74⤵PID:4900
-
\??\c:\htbbnn.exec:\htbbnn.exe75⤵PID:4380
-
\??\c:\9jjdv.exec:\9jjdv.exe76⤵PID:2924
-
\??\c:\lfrlrlr.exec:\lfrlrlr.exe77⤵PID:2412
-
\??\c:\1hnnnn.exec:\1hnnnn.exe78⤵PID:2396
-
\??\c:\3jjdj.exec:\3jjdj.exe79⤵PID:1044
-
\??\c:\fxrlxxl.exec:\fxrlxxl.exe80⤵PID:1612
-
\??\c:\hbnbnb.exec:\hbnbnb.exe81⤵PID:3960
-
\??\c:\nhbbtt.exec:\nhbbtt.exe82⤵PID:1456
-
\??\c:\5vvjd.exec:\5vvjd.exe83⤵PID:5092
-
\??\c:\3xxlxxl.exec:\3xxlxxl.exe84⤵PID:4340
-
\??\c:\ntnhtb.exec:\ntnhtb.exe85⤵PID:3472
-
\??\c:\vdvdv.exec:\vdvdv.exe86⤵PID:3932
-
\??\c:\lrrxxxx.exec:\lrrxxxx.exe87⤵PID:4816
-
\??\c:\xflllrx.exec:\xflllrx.exe88⤵PID:3904
-
\??\c:\btntbb.exec:\btntbb.exe89⤵PID:4392
-
\??\c:\7jjdv.exec:\7jjdv.exe90⤵PID:2316
-
\??\c:\rlffffx.exec:\rlffffx.exe91⤵PID:4988
-
\??\c:\thbbhh.exec:\thbbhh.exe92⤵PID:4544
-
\??\c:\vvjjj.exec:\vvjjj.exe93⤵PID:540
-
\??\c:\dvvvd.exec:\dvvvd.exe94⤵PID:2480
-
\??\c:\frlffrr.exec:\frlffrr.exe95⤵PID:3312
-
\??\c:\bnnnth.exec:\bnnnth.exe96⤵PID:4660
-
\??\c:\ppppv.exec:\ppppv.exe97⤵PID:1384
-
\??\c:\7frrxxr.exec:\7frrxxr.exe98⤵PID:988
-
\??\c:\nttbbt.exec:\nttbbt.exe99⤵PID:3696
-
\??\c:\jvvdj.exec:\jvvdj.exe100⤵PID:3052
-
\??\c:\djppj.exec:\djppj.exe101⤵PID:4672
-
\??\c:\9lrrxxl.exec:\9lrrxxl.exe102⤵PID:4440
-
\??\c:\nnnbbn.exec:\nnnbbn.exe103⤵PID:3192
-
\??\c:\3pvvv.exec:\3pvvv.exe104⤵PID:5012
-
\??\c:\xrxxxxf.exec:\xrxxxxf.exe105⤵PID:1972
-
\??\c:\hbbttb.exec:\hbbttb.exe106⤵PID:1912
-
\??\c:\bhttht.exec:\bhttht.exe107⤵PID:1864
-
\??\c:\ddjdd.exec:\ddjdd.exe108⤵PID:3236
-
\??\c:\frrrxfr.exec:\frrrxfr.exe109⤵PID:4092
-
\??\c:\lrlfrrl.exec:\lrlfrrl.exe110⤵PID:3316
-
\??\c:\9bbbtt.exec:\9bbbtt.exe111⤵PID:4008
-
\??\c:\jjpdv.exec:\jjpdv.exe112⤵PID:1840
-
\??\c:\jvjdv.exec:\jvjdv.exe113⤵PID:2652
-
\??\c:\rlrlffx.exec:\rlrlffx.exe114⤵PID:3028
-
\??\c:\bntnhh.exec:\bntnhh.exe115⤵PID:4632
-
\??\c:\dpvpv.exec:\dpvpv.exe116⤵PID:1984
-
\??\c:\dvpjp.exec:\dvpjp.exe117⤵PID:624
-
\??\c:\lflxrff.exec:\lflxrff.exe118⤵PID:4528
-
\??\c:\nhbbht.exec:\nhbbht.exe119⤵PID:2932
-
\??\c:\pddjv.exec:\pddjv.exe120⤵PID:2548
-
\??\c:\7jvpj.exec:\7jvpj.exe121⤵PID:4360
-
\??\c:\9fxrllf.exec:\9fxrllf.exe122⤵PID:3492
-
\??\c:\nhbttt.exec:\nhbttt.exe123⤵PID:3552
-
\??\c:\7bnhhh.exec:\7bnhhh.exe124⤵PID:1792
-
\??\c:\pdjdv.exec:\pdjdv.exe125⤵PID:4112
-
\??\c:\rlxrfxf.exec:\rlxrfxf.exe126⤵PID:3032
-
\??\c:\tbhhtn.exec:\tbhhtn.exe127⤵PID:1012
-
\??\c:\dpvvp.exec:\dpvvp.exe128⤵PID:5108
-
\??\c:\flfxrrr.exec:\flfxrrr.exe129⤵PID:5064
-
\??\c:\5lrllfx.exec:\5lrllfx.exe130⤵PID:4868
-
\??\c:\btbbbb.exec:\btbbbb.exe131⤵PID:2088
-
\??\c:\rrfxrrl.exec:\rrfxrrl.exe132⤵PID:3224
-
\??\c:\9bbbnn.exec:\9bbbnn.exe133⤵PID:3928
-
\??\c:\thhnnh.exec:\thhnnh.exe134⤵PID:2084
-
\??\c:\ppppj.exec:\ppppj.exe135⤵PID:2480
-
\??\c:\fxxrlll.exec:\fxxrlll.exe136⤵PID:2844
-
\??\c:\ttbbhh.exec:\ttbbhh.exe137⤵PID:4660
-
\??\c:\jdjdd.exec:\jdjdd.exe138⤵PID:1384
-
\??\c:\lflxllf.exec:\lflxllf.exe139⤵PID:988
-
\??\c:\thnbnn.exec:\thnbnn.exe140⤵PID:2448
-
\??\c:\vvvvv.exec:\vvvvv.exe141⤵PID:3420
-
\??\c:\xlfllxr.exec:\xlfllxr.exe142⤵PID:444
-
\??\c:\bnhbtb.exec:\bnhbtb.exe143⤵PID:3752
-
\??\c:\dpvvv.exec:\dpvvv.exe144⤵PID:3192
-
\??\c:\1vvpv.exec:\1vvpv.exe145⤵PID:3900
-
\??\c:\fxlfrlx.exec:\fxlfrlx.exe146⤵PID:4796
-
\??\c:\bbbbtb.exec:\bbbbtb.exe147⤵PID:2524
-
\??\c:\vdpjd.exec:\vdpjd.exe148⤵PID:4092
-
\??\c:\jjjdd.exec:\jjjdd.exe149⤵PID:1684
-
\??\c:\fxrlrlx.exec:\fxrlrlx.exe150⤵PID:3272
-
\??\c:\hnhnnn.exec:\hnhnnn.exe151⤵PID:4652
-
\??\c:\5hhbbb.exec:\5hhbbb.exe152⤵PID:2652
-
\??\c:\jjppd.exec:\jjppd.exe153⤵PID:3448
-
\??\c:\xxlfxrr.exec:\xxlfxrr.exe154⤵PID:2348
-
\??\c:\llllrxf.exec:\llllrxf.exe155⤵PID:4584
-
\??\c:\tbhhhh.exec:\tbhhhh.exe156⤵PID:4532
-
\??\c:\ddvjv.exec:\ddvjv.exe157⤵PID:2632
-
\??\c:\ffrlxlf.exec:\ffrlxlf.exe158⤵PID:2932
-
\??\c:\xrrffxl.exec:\xrrffxl.exe159⤵PID:2548
-
\??\c:\btbttb.exec:\btbttb.exe160⤵PID:4352
-
\??\c:\pvjjd.exec:\pvjjd.exe161⤵PID:4320
-
\??\c:\xlrxlrx.exec:\xlrxlrx.exe162⤵PID:5092
-
\??\c:\rrlxxxf.exec:\rrlxxxf.exe163⤵PID:1292
-
\??\c:\bhbbbn.exec:\bhbbbn.exe164⤵PID:2252
-
\??\c:\pjdvv.exec:\pjdvv.exe165⤵PID:4636
-
\??\c:\5pvdd.exec:\5pvdd.exe166⤵PID:4204
-
\??\c:\hhhhbh.exec:\hhhhbh.exe167⤵PID:640
-
\??\c:\djjjd.exec:\djjjd.exe168⤵PID:4404
-
\??\c:\pppjj.exec:\pppjj.exe169⤵PID:4988
-
\??\c:\9flffff.exec:\9flffff.exe170⤵PID:2456
-
\??\c:\nhnnhh.exec:\nhnnhh.exe171⤵PID:540
-
\??\c:\dpjvp.exec:\dpjvp.exe172⤵PID:3220
-
\??\c:\rrlfllr.exec:\rrlfllr.exe173⤵PID:1688
-
\??\c:\3xlffrr.exec:\3xlffrr.exe174⤵PID:2080
-
\??\c:\bbbtnn.exec:\bbbtnn.exe175⤵PID:368
-
\??\c:\dddvd.exec:\dddvd.exe176⤵PID:2004
-
\??\c:\fxxlffl.exec:\fxxlffl.exe177⤵PID:4648
-
\??\c:\nhtbtt.exec:\nhtbtt.exe178⤵PID:1548
-
\??\c:\thnhbb.exec:\thnhbb.exe179⤵PID:1324
-
\??\c:\pvvpj.exec:\pvvpj.exe180⤵PID:4972
-
\??\c:\fxxrrxx.exec:\fxxrrxx.exe181⤵PID:1932
-
\??\c:\9htnhh.exec:\9htnhh.exe182⤵PID:1164
-
\??\c:\1vdjd.exec:\1vdjd.exe183⤵PID:1864
-
\??\c:\jpppj.exec:\jpppj.exe184⤵PID:4904
-
\??\c:\fxxrlxr.exec:\fxxrlxr.exe185⤵PID:4260
-
\??\c:\btbbhh.exec:\btbbhh.exe186⤵PID:2424
-
\??\c:\jjdvv.exec:\jjdvv.exe187⤵PID:4808
-
\??\c:\fflrrlr.exec:\fflrrlr.exe188⤵PID:1624
-
\??\c:\5bhnbb.exec:\5bhnbb.exe189⤵PID:3284
-
\??\c:\jjjjj.exec:\jjjjj.exe190⤵PID:3372
-
\??\c:\rlxxrrf.exec:\rlxxrrf.exe191⤵PID:4576
-
\??\c:\9rrllxx.exec:\9rrllxx.exe192⤵PID:2348
-
\??\c:\tbbnnt.exec:\tbbnnt.exe193⤵PID:4448
-
\??\c:\djppp.exec:\djppp.exe194⤵PID:4532
-
\??\c:\xlfxrlx.exec:\xlfxrlx.exe195⤵PID:4084
-
\??\c:\rlxrfxr.exec:\rlxrfxr.exe196⤵PID:1612
-
\??\c:\nnnnbb.exec:\nnnnbb.exe197⤵PID:1356
-
\??\c:\pvvpj.exec:\pvvpj.exe198⤵PID:1708
-
\??\c:\5fffxfx.exec:\5fffxfx.exe199⤵PID:4112
-
\??\c:\1tnhtt.exec:\1tnhtt.exe200⤵PID:1896
-
\??\c:\nhbtnh.exec:\nhbtnh.exe201⤵PID:1012
-
\??\c:\vdddv.exec:\vdddv.exe202⤵PID:4636
-
\??\c:\rlxrxxf.exec:\rlxrxxf.exe203⤵PID:4204
-
\??\c:\nbnbbt.exec:\nbnbbt.exe204⤵PID:640
-
\??\c:\pvppd.exec:\pvppd.exe205⤵PID:4424
-
\??\c:\xrlflfr.exec:\xrlflfr.exe206⤵PID:4988
-
\??\c:\tttnnh.exec:\tttnnh.exe207⤵PID:2456
-
\??\c:\nhhbnh.exec:\nhhbnh.exe208⤵PID:4976
-
\??\c:\vdjpj.exec:\vdjpj.exe209⤵PID:2480
-
\??\c:\rrlrxrf.exec:\rrlrxrf.exe210⤵PID:1688
-
\??\c:\btntth.exec:\btntth.exe211⤵PID:2080
-
\??\c:\pdjvp.exec:\pdjvp.exe212⤵PID:4960
-
\??\c:\jpjvd.exec:\jpjvd.exe213⤵PID:3176
-
\??\c:\llrxlfx.exec:\llrxlfx.exe214⤵PID:3364
-
\??\c:\thnhnn.exec:\thnhnn.exe215⤵PID:2324
-
\??\c:\djpjp.exec:\djpjp.exe216⤵PID:4836
-
\??\c:\xxlfxxx.exec:\xxlfxxx.exe217⤵PID:4804
-
\??\c:\hhnhbb.exec:\hhnhbb.exe218⤵PID:336
-
\??\c:\nntnhb.exec:\nntnhb.exe219⤵PID:2204
-
\??\c:\jddjd.exec:\jddjd.exe220⤵PID:5036
-
\??\c:\rflxlxr.exec:\rflxlxr.exe221⤵PID:3236
-
\??\c:\ntbttn.exec:\ntbttn.exe222⤵PID:1368
-
\??\c:\jjvjj.exec:\jjvjj.exe223⤵PID:2728
-
\??\c:\vdpjp.exec:\vdpjp.exe224⤵PID:1584
-
\??\c:\5llllll.exec:\5llllll.exe225⤵PID:2524
-
\??\c:\thnbbh.exec:\thnbbh.exe226⤵PID:4092
-
\??\c:\jvvdd.exec:\jvvdd.exe227⤵PID:3420
-
\??\c:\3djvv.exec:\3djvv.exe228⤵PID:3272
-
\??\c:\1bnnth.exec:\1bnnth.exe229⤵PID:3284
-
\??\c:\htbtbb.exec:\htbtbb.exe230⤵PID:3784
-
\??\c:\vppjd.exec:\vppjd.exe231⤵PID:4900
-
\??\c:\5frfxlf.exec:\5frfxlf.exe232⤵PID:2348
-
\??\c:\bttntt.exec:\bttntt.exe233⤵PID:4448
-
\??\c:\btnhbb.exec:\btnhbb.exe234⤵PID:2932
-
\??\c:\jpvpv.exec:\jpvpv.exe235⤵PID:1620
-
\??\c:\1lffxrl.exec:\1lffxrl.exe236⤵PID:60
-
\??\c:\bhbbhn.exec:\bhbbhn.exe237⤵PID:4336
-
\??\c:\9vdvp.exec:\9vdvp.exe238⤵PID:2556
-
\??\c:\1jppj.exec:\1jppj.exe239⤵PID:3824
-
\??\c:\9xrxlrr.exec:\9xrxlrr.exe240⤵PID:4000
-
\??\c:\hbnnbb.exec:\hbnnbb.exe241⤵PID:3396
-
\??\c:\5jdvj.exec:\5jdvj.exe242⤵PID:4816