Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 04:57
Behavioral task
behavioral1
Sample
ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe
-
Size
76KB
-
MD5
ad5b1800eb93b415db85922481b26060
-
SHA1
df1986dca1dc4e4c0cf6bbff4c229f0588f55f8f
-
SHA256
b2060952273cf03d8cc6a5567f64846ba3d3145c06f7f952dca602fdd910d8bc
-
SHA512
0fa30772e4361e7f5fcd8aa639cb516139b11c0661bb2ad4ee070986edeee37e010da3afd78c3e5a2d2c84890ab676a1b31a9148c9226ed68409f6a8b2a6491f
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8PbhnyLFWoFLAxZhMDzE871:9hOmTsF93UYfwC6GIoutz5yLpOSDR1
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1704-1-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2112-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2280-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2948-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/464-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4396-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1452-53-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3632-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4784-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3996-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3404-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4288-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2560-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1012-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3020-111-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2900-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4880-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1448-138-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3508-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3964-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3616-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1000-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/380-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3956-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4536-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4536-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3024-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/716-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4168-210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5112-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1836-231-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2756-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1452-254-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2804-257-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1832-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4016-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1508-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1500-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1360-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1176-315-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3836-328-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2096-353-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1740-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3068-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4700-372-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2280-382-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1032-386-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4288-424-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2808-428-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2724-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/716-507-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-530-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2884-551-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3020-588-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4256-610-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/540-659-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3672-712-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1264-718-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1508-800-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4656-825-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4680-852-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-874-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2280-896-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
5ffrlfx.exelrrlfxr.exenbnbnh.exevvvdj.exexllxffr.exe7lllffx.exebtnnnn.exejjpjp.exevpjpp.exelxfxrrl.exexrffxxr.exehbbttt.exettnhbb.exe3jppd.exeflrlfff.exenbtbht.exethhbtt.exepjjjd.exevjjdv.exexxlfrxr.exennbbtt.exe3hbbnt.exepjpjd.exelflfxfx.exelflflxr.exenbhhbb.exenbbtnn.exevjjpv.exerlllxxx.exellxxxxx.exenhtnnn.exepjppv.exevjpjj.exerflrlrl.exe5hbtnn.exenbhhbh.exejvddp.exefxffrrr.exefxxxfxx.exe1tttbb.exethhhtb.exe9pvvv.exefxxrlfx.exerfxllfx.exehbnhnn.exenhttnn.exepvvvv.exe9rrfxfx.exetnnnbb.exenbthbt.exepdjjv.exexllfxxr.exefflrlfl.exerlfxrrl.exebntbbb.exedjpjd.exepjpjv.exe9ffxlll.exe3tbthh.exebtthbt.exebntnbb.exejvppd.exevpjdp.exexxlfxxf.exepid process 2112 5ffrlfx.exe 2280 lrrlfxr.exe 2948 nbnbnh.exe 3360 vvvdj.exe 2168 xllxffr.exe 464 7lllffx.exe 3308 btnnnn.exe 4396 jjpjp.exe 1452 vpjpp.exe 3632 lxfxrrl.exe 4784 xrffxxr.exe 3996 hbbttt.exe 3404 ttnhbb.exe 4288 3jppd.exe 3816 flrlfff.exe 2560 nbtbht.exe 1012 thhbtt.exe 3020 pjjjd.exe 3596 vjjdv.exe 2900 xxlfrxr.exe 3160 nnbbtt.exe 4880 3hbbnt.exe 1448 pjpjd.exe 3508 lflfxfx.exe 3616 lflflxr.exe 3964 nbhhbb.exe 2896 nbbtnn.exe 4984 vjjpv.exe 1440 rlllxxx.exe 1000 llxxxxx.exe 380 nhtnnn.exe 3956 pjppv.exe 4536 vjpjj.exe 3024 rflrlrl.exe 716 5hbtnn.exe 2864 nbhhbh.exe 4168 jvddp.exe 4780 fxffrrr.exe 4172 fxxxfxx.exe 2252 1tttbb.exe 2356 thhhtb.exe 4280 9pvvv.exe 1836 fxxrlfx.exe 5112 rfxllfx.exe 548 hbnhnn.exe 2220 nhttnn.exe 2032 pvvvv.exe 2756 9rrfxfx.exe 1452 tnnnbb.exe 2804 nbthbt.exe 1832 pdjjv.exe 4016 xllfxxr.exe 1508 fflrlfl.exe 2724 rlfxrrl.exe 3028 bntbbb.exe 1500 djpjd.exe 2092 pjpjv.exe 1360 9ffxlll.exe 1436 3tbthh.exe 2632 btthbt.exe 912 bntnbb.exe 4080 jvppd.exe 5076 vpjdp.exe 1672 xxlfxxf.exe -
Processes:
resource yara_rule behavioral2/memory/1704-1-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5ffrlfx.exe upx behavioral2/memory/2112-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lrrlfxr.exe upx behavioral2/memory/2280-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2112-12-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbnbnh.exe upx behavioral2/memory/2280-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2948-23-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vvvdj.exe upx C:\xllxffr.exe upx C:\7lllffx.exe upx behavioral2/memory/464-40-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\btnnnn.exe upx \??\c:\jjpjp.exe upx behavioral2/memory/4396-48-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpjpp.exe upx behavioral2/memory/1452-53-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lxfxrrl.exe upx C:\xrffxxr.exe upx behavioral2/memory/3632-63-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbbttt.exe upx behavioral2/memory/4784-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3996-72-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ttnhbb.exe upx C:\3jppd.exe upx behavioral2/memory/3404-79-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\flrlfff.exe upx behavioral2/memory/4288-87-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3816-88-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbtbht.exe upx C:\thhbtt.exe upx behavioral2/memory/2560-99-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1012-101-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjjjd.exe upx behavioral2/memory/3020-105-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vjjdv.exe upx behavioral2/memory/3020-111-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxlfrxr.exe upx C:\nnbbtt.exe upx behavioral2/memory/2900-122-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3hbbnt.exe upx C:\pjpjd.exe upx behavioral2/memory/4880-133-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lflfxfx.exe upx behavioral2/memory/1448-138-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lflflxr.exe upx behavioral2/memory/3508-145-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3616-147-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbhhbb.exe upx behavioral2/memory/3964-154-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3616-153-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbbtnn.exe upx C:\vjjpv.exe upx behavioral2/memory/4984-165-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4984-169-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlllxxx.exe upx C:\llxxxxx.exe upx C:\nhtnnn.exe upx behavioral2/memory/1000-181-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/380-184-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjppv.exe upx behavioral2/memory/3956-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4536-194-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe5ffrlfx.exelrrlfxr.exenbnbnh.exevvvdj.exexllxffr.exe7lllffx.exebtnnnn.exejjpjp.exevpjpp.exelxfxrrl.exexrffxxr.exehbbttt.exettnhbb.exe3jppd.exeflrlfff.exenbtbht.exethhbtt.exepjjjd.exevjjdv.exexxlfrxr.exennbbtt.exedescription pid process target process PID 1704 wrote to memory of 2112 1704 ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe 5ffrlfx.exe PID 1704 wrote to memory of 2112 1704 ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe 5ffrlfx.exe PID 1704 wrote to memory of 2112 1704 ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe 5ffrlfx.exe PID 2112 wrote to memory of 2280 2112 5ffrlfx.exe lrrlfxr.exe PID 2112 wrote to memory of 2280 2112 5ffrlfx.exe lrrlfxr.exe PID 2112 wrote to memory of 2280 2112 5ffrlfx.exe lrrlfxr.exe PID 2280 wrote to memory of 2948 2280 lrrlfxr.exe nbnbnh.exe PID 2280 wrote to memory of 2948 2280 lrrlfxr.exe nbnbnh.exe PID 2280 wrote to memory of 2948 2280 lrrlfxr.exe nbnbnh.exe PID 2948 wrote to memory of 3360 2948 nbnbnh.exe vvvdj.exe PID 2948 wrote to memory of 3360 2948 nbnbnh.exe vvvdj.exe PID 2948 wrote to memory of 3360 2948 nbnbnh.exe vvvdj.exe PID 3360 wrote to memory of 2168 3360 vvvdj.exe xllxffr.exe PID 3360 wrote to memory of 2168 3360 vvvdj.exe xllxffr.exe PID 3360 wrote to memory of 2168 3360 vvvdj.exe xllxffr.exe PID 2168 wrote to memory of 464 2168 xllxffr.exe 7lllffx.exe PID 2168 wrote to memory of 464 2168 xllxffr.exe 7lllffx.exe PID 2168 wrote to memory of 464 2168 xllxffr.exe 7lllffx.exe PID 464 wrote to memory of 3308 464 7lllffx.exe btnnnn.exe PID 464 wrote to memory of 3308 464 7lllffx.exe btnnnn.exe PID 464 wrote to memory of 3308 464 7lllffx.exe btnnnn.exe PID 3308 wrote to memory of 4396 3308 btnnnn.exe jjpjp.exe PID 3308 wrote to memory of 4396 3308 btnnnn.exe jjpjp.exe PID 3308 wrote to memory of 4396 3308 btnnnn.exe jjpjp.exe PID 4396 wrote to memory of 1452 4396 jjpjp.exe vpjpp.exe PID 4396 wrote to memory of 1452 4396 jjpjp.exe vpjpp.exe PID 4396 wrote to memory of 1452 4396 jjpjp.exe vpjpp.exe PID 1452 wrote to memory of 3632 1452 vpjpp.exe lxfxrrl.exe PID 1452 wrote to memory of 3632 1452 vpjpp.exe lxfxrrl.exe PID 1452 wrote to memory of 3632 1452 vpjpp.exe lxfxrrl.exe PID 3632 wrote to memory of 4784 3632 lxfxrrl.exe xrffxxr.exe PID 3632 wrote to memory of 4784 3632 lxfxrrl.exe xrffxxr.exe PID 3632 wrote to memory of 4784 3632 lxfxrrl.exe xrffxxr.exe PID 4784 wrote to memory of 3996 4784 xrffxxr.exe hbbttt.exe PID 4784 wrote to memory of 3996 4784 xrffxxr.exe hbbttt.exe PID 4784 wrote to memory of 3996 4784 xrffxxr.exe hbbttt.exe PID 3996 wrote to memory of 3404 3996 hbbttt.exe ttnhbb.exe PID 3996 wrote to memory of 3404 3996 hbbttt.exe ttnhbb.exe PID 3996 wrote to memory of 3404 3996 hbbttt.exe ttnhbb.exe PID 3404 wrote to memory of 4288 3404 ttnhbb.exe 3jppd.exe PID 3404 wrote to memory of 4288 3404 ttnhbb.exe 3jppd.exe PID 3404 wrote to memory of 4288 3404 ttnhbb.exe 3jppd.exe PID 4288 wrote to memory of 3816 4288 3jppd.exe flrlfff.exe PID 4288 wrote to memory of 3816 4288 3jppd.exe flrlfff.exe PID 4288 wrote to memory of 3816 4288 3jppd.exe flrlfff.exe PID 3816 wrote to memory of 2560 3816 flrlfff.exe nbtbht.exe PID 3816 wrote to memory of 2560 3816 flrlfff.exe nbtbht.exe PID 3816 wrote to memory of 2560 3816 flrlfff.exe nbtbht.exe PID 2560 wrote to memory of 1012 2560 nbtbht.exe thhbtt.exe PID 2560 wrote to memory of 1012 2560 nbtbht.exe thhbtt.exe PID 2560 wrote to memory of 1012 2560 nbtbht.exe thhbtt.exe PID 1012 wrote to memory of 3020 1012 thhbtt.exe pjjjd.exe PID 1012 wrote to memory of 3020 1012 thhbtt.exe pjjjd.exe PID 1012 wrote to memory of 3020 1012 thhbtt.exe pjjjd.exe PID 3020 wrote to memory of 3596 3020 pjjjd.exe vjjdv.exe PID 3020 wrote to memory of 3596 3020 pjjjd.exe vjjdv.exe PID 3020 wrote to memory of 3596 3020 pjjjd.exe vjjdv.exe PID 3596 wrote to memory of 2900 3596 vjjdv.exe xxlfrxr.exe PID 3596 wrote to memory of 2900 3596 vjjdv.exe xxlfrxr.exe PID 3596 wrote to memory of 2900 3596 vjjdv.exe xxlfrxr.exe PID 2900 wrote to memory of 3160 2900 xxlfrxr.exe nnbbtt.exe PID 2900 wrote to memory of 3160 2900 xxlfrxr.exe nnbbtt.exe PID 2900 wrote to memory of 3160 2900 xxlfrxr.exe nnbbtt.exe PID 3160 wrote to memory of 4880 3160 nnbbtt.exe 3hbbnt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\5ffrlfx.exec:\5ffrlfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\lrrlfxr.exec:\lrrlfxr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\nbnbnh.exec:\nbnbnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\vvvdj.exec:\vvvdj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
\??\c:\xllxffr.exec:\xllxffr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\7lllffx.exec:\7lllffx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\btnnnn.exec:\btnnnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
\??\c:\jjpjp.exec:\jjpjp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\vpjpp.exec:\vpjpp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\lxfxrrl.exec:\lxfxrrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
\??\c:\xrffxxr.exec:\xrffxxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\hbbttt.exec:\hbbttt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
\??\c:\ttnhbb.exec:\ttnhbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
\??\c:\3jppd.exec:\3jppd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
\??\c:\flrlfff.exec:\flrlfff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
\??\c:\nbtbht.exec:\nbtbht.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\thhbtt.exec:\thhbtt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
\??\c:\pjjjd.exec:\pjjjd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\vjjdv.exec:\vjjdv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\xxlfrxr.exec:\xxlfrxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\nnbbtt.exec:\nnbbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\3hbbnt.exec:\3hbbnt.exe23⤵
- Executes dropped EXE
PID:4880 -
\??\c:\pjpjd.exec:\pjpjd.exe24⤵
- Executes dropped EXE
PID:1448 -
\??\c:\lflfxfx.exec:\lflfxfx.exe25⤵
- Executes dropped EXE
PID:3508 -
\??\c:\lflflxr.exec:\lflflxr.exe26⤵
- Executes dropped EXE
PID:3616 -
\??\c:\nbhhbb.exec:\nbhhbb.exe27⤵
- Executes dropped EXE
PID:3964 -
\??\c:\nbbtnn.exec:\nbbtnn.exe28⤵
- Executes dropped EXE
PID:2896 -
\??\c:\vjjpv.exec:\vjjpv.exe29⤵
- Executes dropped EXE
PID:4984 -
\??\c:\rlllxxx.exec:\rlllxxx.exe30⤵
- Executes dropped EXE
PID:1440 -
\??\c:\llxxxxx.exec:\llxxxxx.exe31⤵
- Executes dropped EXE
PID:1000 -
\??\c:\nhtnnn.exec:\nhtnnn.exe32⤵
- Executes dropped EXE
PID:380 -
\??\c:\pjppv.exec:\pjppv.exe33⤵
- Executes dropped EXE
PID:3956 -
\??\c:\vjpjj.exec:\vjpjj.exe34⤵
- Executes dropped EXE
PID:4536 -
\??\c:\rflrlrl.exec:\rflrlrl.exe35⤵
- Executes dropped EXE
PID:3024 -
\??\c:\5hbtnn.exec:\5hbtnn.exe36⤵
- Executes dropped EXE
PID:716 -
\??\c:\nbhhbh.exec:\nbhhbh.exe37⤵
- Executes dropped EXE
PID:2864 -
\??\c:\jvddp.exec:\jvddp.exe38⤵
- Executes dropped EXE
PID:4168 -
\??\c:\fxffrrr.exec:\fxffrrr.exe39⤵
- Executes dropped EXE
PID:4780 -
\??\c:\fxxxfxx.exec:\fxxxfxx.exe40⤵
- Executes dropped EXE
PID:4172 -
\??\c:\1tttbb.exec:\1tttbb.exe41⤵
- Executes dropped EXE
PID:2252 -
\??\c:\thhhtb.exec:\thhhtb.exe42⤵
- Executes dropped EXE
PID:2356 -
\??\c:\9pvvv.exec:\9pvvv.exe43⤵
- Executes dropped EXE
PID:4280 -
\??\c:\fxxrlfx.exec:\fxxrlfx.exe44⤵
- Executes dropped EXE
PID:1836 -
\??\c:\rfxllfx.exec:\rfxllfx.exe45⤵
- Executes dropped EXE
PID:5112 -
\??\c:\hbnhnn.exec:\hbnhnn.exe46⤵
- Executes dropped EXE
PID:548 -
\??\c:\nhttnn.exec:\nhttnn.exe47⤵
- Executes dropped EXE
PID:2220 -
\??\c:\pvvvv.exec:\pvvvv.exe48⤵
- Executes dropped EXE
PID:2032 -
\??\c:\9rrfxfx.exec:\9rrfxfx.exe49⤵
- Executes dropped EXE
PID:2756 -
\??\c:\tnnnbb.exec:\tnnnbb.exe50⤵
- Executes dropped EXE
PID:1452 -
\??\c:\nbthbt.exec:\nbthbt.exe51⤵
- Executes dropped EXE
PID:2804 -
\??\c:\pdjjv.exec:\pdjjv.exe52⤵
- Executes dropped EXE
PID:1832 -
\??\c:\xllfxxr.exec:\xllfxxr.exe53⤵
- Executes dropped EXE
PID:4016 -
\??\c:\fflrlfl.exec:\fflrlfl.exe54⤵
- Executes dropped EXE
PID:1508 -
\??\c:\rlfxrrl.exec:\rlfxrrl.exe55⤵
- Executes dropped EXE
PID:2724 -
\??\c:\bntbbb.exec:\bntbbb.exe56⤵
- Executes dropped EXE
PID:3028 -
\??\c:\djpjd.exec:\djpjd.exe57⤵
- Executes dropped EXE
PID:1500 -
\??\c:\pjpjv.exec:\pjpjv.exe58⤵
- Executes dropped EXE
PID:2092 -
\??\c:\9ffxlll.exec:\9ffxlll.exe59⤵
- Executes dropped EXE
PID:1360 -
\??\c:\3tbthh.exec:\3tbthh.exe60⤵
- Executes dropped EXE
PID:1436 -
\??\c:\btthbt.exec:\btthbt.exe61⤵
- Executes dropped EXE
PID:2632 -
\??\c:\bntnbb.exec:\bntnbb.exe62⤵
- Executes dropped EXE
PID:912 -
\??\c:\jvppd.exec:\jvppd.exe63⤵
- Executes dropped EXE
PID:4080 -
\??\c:\vpjdp.exec:\vpjdp.exe64⤵
- Executes dropped EXE
PID:5076 -
\??\c:\xxlfxxf.exec:\xxlfxxf.exe65⤵
- Executes dropped EXE
PID:1672 -
\??\c:\rlllffx.exec:\rlllffx.exe66⤵PID:2572
-
\??\c:\3tnhbb.exec:\3tnhbb.exe67⤵PID:3508
-
\??\c:\nnbhtt.exec:\nnbhtt.exe68⤵PID:1176
-
\??\c:\dvjjv.exec:\dvjjv.exe69⤵PID:3648
-
\??\c:\vjvjj.exec:\vjvjj.exe70⤵PID:5072
-
\??\c:\9xffrll.exec:\9xffrll.exe71⤵PID:5004
-
\??\c:\rllffrr.exec:\rllffrr.exe72⤵PID:3836
-
\??\c:\7nbtnn.exec:\7nbtnn.exe73⤵PID:4236
-
\??\c:\bbhbbb.exec:\bbhbbb.exe74⤵PID:4232
-
\??\c:\jvppd.exec:\jvppd.exe75⤵PID:732
-
\??\c:\pddvv.exec:\pddvv.exe76⤵PID:3900
-
\??\c:\xfxrllf.exec:\xfxrllf.exe77⤵PID:2732
-
\??\c:\1xxlxrl.exec:\1xxlxrl.exe78⤵PID:860
-
\??\c:\tbbbth.exec:\tbbbth.exe79⤵PID:1940
-
\??\c:\5hnnhb.exec:\5hnnhb.exe80⤵PID:2096
-
\??\c:\vddpd.exec:\vddpd.exe81⤵PID:1740
-
\??\c:\pjdpj.exec:\pjdpj.exe82⤵PID:3068
-
\??\c:\3lrlfff.exec:\3lrlfff.exe83⤵PID:840
-
\??\c:\hntntb.exec:\hntntb.exe84⤵PID:3536
-
\??\c:\9hbhtt.exec:\9hbhtt.exe85⤵PID:4700
-
\??\c:\vjjvj.exec:\vjjvj.exe86⤵PID:2112
-
\??\c:\jpppd.exec:\jpppd.exe87⤵PID:2172
-
\??\c:\5rrrffx.exec:\5rrrffx.exe88⤵PID:2280
-
\??\c:\xlxrllf.exec:\xlxrllf.exe89⤵PID:1032
-
\??\c:\ttbthb.exec:\ttbthb.exe90⤵PID:4688
-
\??\c:\hnhnbb.exec:\hnhnbb.exe91⤵PID:1836
-
\??\c:\vppjd.exec:\vppjd.exe92⤵PID:1744
-
\??\c:\5ddjd.exec:\5ddjd.exe93⤵PID:4012
-
\??\c:\lfffxxf.exec:\lfffxxf.exe94⤵PID:4128
-
\??\c:\ffxllxf.exec:\ffxllxf.exe95⤵PID:2032
-
\??\c:\9jjdj.exec:\9jjdj.exe96⤵PID:4776
-
\??\c:\1jppp.exec:\1jppp.exe97⤵PID:4784
-
\??\c:\ffllxlf.exec:\ffllxlf.exe98⤵PID:880
-
\??\c:\5xxlxrl.exec:\5xxlxrl.exe99⤵PID:216
-
\??\c:\hhhbtt.exec:\hhhbtt.exe100⤵PID:4848
-
\??\c:\htbbnn.exec:\htbbnn.exe101⤵PID:4288
-
\??\c:\7ddvj.exec:\7ddvj.exe102⤵PID:2808
-
\??\c:\jjvvv.exec:\jjvvv.exe103⤵PID:2724
-
\??\c:\fxrlxfx.exec:\fxrlxfx.exe104⤵PID:2176
-
\??\c:\5lxxrrl.exec:\5lxxrrl.exe105⤵PID:4892
-
\??\c:\ttnnhh.exec:\ttnnhh.exe106⤵PID:3020
-
\??\c:\hnnhnh.exec:\hnnhnh.exe107⤵PID:3048
-
\??\c:\hbbnhn.exec:\hbbnhn.exe108⤵PID:2900
-
\??\c:\dddvv.exec:\dddvv.exe109⤵PID:3468
-
\??\c:\dvjdd.exec:\dvjdd.exe110⤵PID:2608
-
\??\c:\9llfrrf.exec:\9llfrrf.exe111⤵PID:2960
-
\??\c:\tnnnhh.exec:\tnnnhh.exe112⤵PID:3356
-
\??\c:\bttnbb.exec:\bttnbb.exe113⤵PID:3500
-
\??\c:\jdjjv.exec:\jdjjv.exe114⤵PID:2572
-
\??\c:\xxrlrlf.exec:\xxrlrlf.exe115⤵PID:3508
-
\??\c:\5rfrrxx.exec:\5rfrrxx.exe116⤵PID:2320
-
\??\c:\jdjjj.exec:\jdjjj.exe117⤵PID:4248
-
\??\c:\dpjdj.exec:\dpjdj.exe118⤵PID:4984
-
\??\c:\5rlfllf.exec:\5rlfllf.exe119⤵PID:1788
-
\??\c:\xfxrlfx.exec:\xfxrlfx.exe120⤵PID:4668
-
\??\c:\ttnthb.exec:\ttnthb.exe121⤵PID:3236
-
\??\c:\bhnbnh.exec:\bhnbnh.exe122⤵PID:1408
-
\??\c:\9vvjv.exec:\9vvjv.exe123⤵PID:3524
-
\??\c:\vjdpd.exec:\vjdpd.exe124⤵PID:3264
-
\??\c:\xrlxlfr.exec:\xrlxlfr.exe125⤵PID:1596
-
\??\c:\rffrlfr.exec:\rffrlfr.exe126⤵PID:4992
-
\??\c:\ttbhbn.exec:\ttbhbn.exe127⤵PID:4976
-
\??\c:\bbnhth.exec:\bbnhth.exe128⤵PID:716
-
\??\c:\pddpd.exec:\pddpd.exe129⤵PID:3068
-
\??\c:\rxllffx.exec:\rxllffx.exe130⤵PID:4724
-
\??\c:\lrfxxrr.exec:\lrfxxrr.exe131⤵PID:5008
-
\??\c:\bntnhb.exec:\bntnhb.exe132⤵PID:4700
-
\??\c:\dvjdv.exec:\dvjdv.exe133⤵PID:2112
-
\??\c:\xlflxxr.exec:\xlflxxr.exe134⤵PID:2308
-
\??\c:\tttbtn.exec:\tttbtn.exe135⤵PID:540
-
\??\c:\hnhhnh.exec:\hnhhnh.exe136⤵PID:3252
-
\??\c:\httntt.exec:\httntt.exe137⤵PID:2776
-
\??\c:\3pdpj.exec:\3pdpj.exe138⤵PID:3460
-
\??\c:\lxrlfxx.exec:\lxrlfxx.exe139⤵PID:4384
-
\??\c:\thbthh.exec:\thbthh.exe140⤵PID:2912
-
\??\c:\tnbttt.exec:\tnbttt.exe141⤵PID:4452
-
\??\c:\djpjp.exec:\djpjp.exe142⤵PID:2884
-
\??\c:\vpvjv.exec:\vpvjv.exe143⤵PID:4776
-
\??\c:\vjvjd.exec:\vjvjd.exe144⤵PID:3820
-
\??\c:\lrrrlfx.exec:\lrrrlfx.exe145⤵PID:1832
-
\??\c:\flfrlfx.exec:\flfrlfx.exe146⤵PID:3184
-
\??\c:\5jjdv.exec:\5jjdv.exe147⤵PID:2156
-
\??\c:\fflxffx.exec:\fflxffx.exe148⤵PID:1196
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe149⤵PID:4252
-
\??\c:\bnhhbt.exec:\bnhhbt.exe150⤵PID:2724
-
\??\c:\dppvp.exec:\dppvp.exe151⤵PID:1148
-
\??\c:\jjjdj.exec:\jjjdj.exe152⤵PID:2336
-
\??\c:\dvdpj.exec:\dvdpj.exe153⤵PID:3020
-
\??\c:\7ffrlff.exec:\7ffrlff.exe154⤵PID:3672
-
\??\c:\nbhbnh.exec:\nbhbnh.exe155⤵PID:4804
-
\??\c:\btnthb.exec:\btnthb.exe156⤵PID:3468
-
\??\c:\hbtntn.exec:\hbtntn.exe157⤵PID:2608
-
\??\c:\vdvpj.exec:\vdvpj.exe158⤵PID:1672
-
\??\c:\djpvd.exec:\djpvd.exe159⤵PID:2920
-
\??\c:\rrlxllx.exec:\rrlxllx.exe160⤵PID:4256
-
\??\c:\fllxrlf.exec:\fllxrlf.exe161⤵PID:4204
-
\??\c:\hhhbnh.exec:\hhhbnh.exe162⤵PID:4972
-
\??\c:\tttbhb.exec:\tttbhb.exe163⤵PID:5072
-
\??\c:\jjjdp.exec:\jjjdp.exe164⤵PID:4184
-
\??\c:\pdddj.exec:\pdddj.exe165⤵PID:1788
-
\??\c:\pjjdv.exec:\pjjdv.exe166⤵PID:4232
-
\??\c:\3xrflfx.exec:\3xrflfx.exe167⤵PID:4920
-
\??\c:\lxffxlf.exec:\lxffxlf.exe168⤵PID:2732
-
\??\c:\nhnnbn.exec:\nhnnbn.exe169⤵PID:2668
-
\??\c:\1bbnbt.exec:\1bbnbt.exe170⤵PID:4352
-
\??\c:\dvpjd.exec:\dvpjd.exe171⤵PID:716
-
\??\c:\vdpjv.exec:\vdpjv.exe172⤵PID:4780
-
\??\c:\xrlxlfx.exec:\xrlxlfx.exe173⤵PID:4744
-
\??\c:\1lfrlfr.exec:\1lfrlfr.exe174⤵PID:2224
-
\??\c:\thhtbn.exec:\thhtbn.exe175⤵PID:2948
-
\??\c:\nhhhbt.exec:\nhhhbt.exe176⤵PID:540
-
\??\c:\pjjvj.exec:\pjjvj.exe177⤵PID:1056
-
\??\c:\pjjvv.exec:\pjjvv.exe178⤵PID:4156
-
\??\c:\frlrfff.exec:\frlrfff.exe179⤵PID:2984
-
\??\c:\rrxlxrl.exec:\rrxlxrl.exe180⤵PID:4396
-
\??\c:\7bhthh.exec:\7bhthh.exe181⤵PID:1964
-
\??\c:\5ddvj.exec:\5ddvj.exe182⤵PID:384
-
\??\c:\pdjdd.exec:\pdjdd.exe183⤵PID:4776
-
\??\c:\xllxrlx.exec:\xllxrlx.exe184⤵PID:2880
-
\??\c:\rrxrxrr.exec:\rrxrxrr.exe185⤵PID:1832
-
\??\c:\bbtbnh.exec:\bbtbnh.exe186⤵PID:4848
-
\??\c:\bnnhnn.exec:\bnnhnn.exe187⤵PID:3764
-
\??\c:\tnbnbt.exec:\tnbnbt.exe188⤵PID:1520
-
\??\c:\vppjv.exec:\vppjv.exe189⤵PID:4596
-
\??\c:\7pdvj.exec:\7pdvj.exe190⤵PID:4892
-
\??\c:\fflxrff.exec:\fflxrff.exe191⤵PID:4448
-
\??\c:\rxllfrr.exec:\rxllfrr.exe192⤵PID:3020
-
\??\c:\tthttn.exec:\tthttn.exe193⤵PID:3672
-
\??\c:\tbbthn.exec:\tbbthn.exe194⤵PID:1264
-
\??\c:\3pvpp.exec:\3pvpp.exe195⤵PID:4532
-
\??\c:\dddvd.exec:\dddvd.exe196⤵PID:3356
-
\??\c:\rlrffxx.exec:\rlrffxx.exe197⤵PID:4856
-
\??\c:\lrrlxrf.exec:\lrrlxrf.exe198⤵PID:3964
-
\??\c:\frffflr.exec:\frffflr.exe199⤵PID:1176
-
\??\c:\bbntbh.exec:\bbntbh.exe200⤵PID:4468
-
\??\c:\7jpdp.exec:\7jpdp.exe201⤵PID:4984
-
\??\c:\fxfflff.exec:\fxfflff.exe202⤵PID:3836
-
\??\c:\fxrlfxr.exec:\fxrlfxr.exe203⤵PID:3420
-
\??\c:\5bhbbt.exec:\5bhbbt.exe204⤵PID:2352
-
\??\c:\hbthtn.exec:\hbthtn.exe205⤵PID:4936
-
\??\c:\nbhhbh.exec:\nbhhbh.exe206⤵PID:2952
-
\??\c:\pvdpv.exec:\pvdpv.exe207⤵PID:4332
-
\??\c:\pddjv.exec:\pddjv.exe208⤵PID:4348
-
\??\c:\pjdvp.exec:\pjdvp.exe209⤵PID:2684
-
\??\c:\rfrfrlx.exec:\rfrfrlx.exe210⤵PID:368
-
\??\c:\rrlfrlx.exec:\rrlfrlx.exe211⤵PID:3452
-
\??\c:\tbtnbt.exec:\tbtnbt.exe212⤵PID:2280
-
\??\c:\hnnnhb.exec:\hnnnhb.exe213⤵PID:3364
-
\??\c:\jvvpj.exec:\jvvpj.exe214⤵PID:2948
-
\??\c:\jvvvj.exec:\jvvvj.exe215⤵PID:4504
-
\??\c:\flrfrfx.exec:\flrfrfx.exe216⤵PID:1056
-
\??\c:\xlfxrlf.exec:\xlfxrlf.exe217⤵PID:2220
-
\??\c:\tnbtnh.exec:\tnbtnh.exe218⤵PID:3840
-
\??\c:\hbthth.exec:\hbthth.exe219⤵PID:3984
-
\??\c:\nnntbt.exec:\nnntbt.exe220⤵PID:4224
-
\??\c:\jvpdd.exec:\jvpdd.exe221⤵PID:4016
-
\??\c:\vjpdp.exec:\vjpdp.exe222⤵PID:1508
-
\??\c:\1xfrrlr.exec:\1xfrrlr.exe223⤵PID:1832
-
\??\c:\rrrlxfr.exec:\rrrlxfr.exe224⤵PID:4848
-
\??\c:\bnbthb.exec:\bnbthb.exe225⤵PID:3764
-
\??\c:\ntthtn.exec:\ntthtn.exe226⤵PID:1520
-
\??\c:\thnbbt.exec:\thnbbt.exe227⤵PID:1148
-
\??\c:\jjpdp.exec:\jjpdp.exe228⤵PID:4892
-
\??\c:\jvvjv.exec:\jvvjv.exe229⤵PID:4656
-
\??\c:\5xfxlfr.exec:\5xfxlfr.exe230⤵PID:3020
-
\??\c:\fxrllrf.exec:\fxrllrf.exe231⤵PID:5076
-
\??\c:\9hhthn.exec:\9hhthn.exe232⤵PID:2608
-
\??\c:\bhtnhb.exec:\bhtnhb.exe233⤵PID:1860
-
\??\c:\jvvpj.exec:\jvvpj.exe234⤵PID:3608
-
\??\c:\vppdp.exec:\vppdp.exe235⤵PID:3740
-
\??\c:\rxrfxrl.exec:\rxrfxrl.exe236⤵PID:404
-
\??\c:\bnhthb.exec:\bnhthb.exe237⤵PID:4680
-
\??\c:\5xrfllx.exec:\5xrfllx.exe238⤵PID:2508
-
\??\c:\rrrrffr.exec:\rrrrffr.exe239⤵PID:4984
-
\??\c:\5nhthb.exec:\5nhthb.exe240⤵PID:3836
-
\??\c:\frlrllf.exec:\frlrllf.exe241⤵PID:3420
-