Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 18:51
Behavioral task
behavioral1
Sample
6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exe
-
Size
273KB
-
MD5
6988e26cb1a2b99968301742db4cb230
-
SHA1
984ea435853848745b77be55ad0b9cf4f6cb4337
-
SHA256
0e60b37cb2a6e95760ceeb01c5909a247489f5a0a9540a40b263da4ca058d0f0
-
SHA512
27700d372444ab4c582c0a8118226b53fbaa9d827731087578096e01bf0a131c80149bea34fb2e7175b6d9d9a87100fa749c4202de2c9f5d99e842e67b918da7
-
SSDEEP
3072:9hOmTsF93UYfwC6GIoutz5yLpcgDE4JBuItR8pTsg8QO6GIouixsp+CvM56ATgLa:9cm4FmowdHoS4BftapTs8Hoo+6MjTVVZ
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2408-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1972-8-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1852-14-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2916-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3352-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3068-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2780-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4512-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2576-64-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2008-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1904-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4660-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3692-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4816-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3620-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4212-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3884-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3140-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1912-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2116-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3068-231-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1004-230-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1892-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4380-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2024-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1036-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4216-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5008-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5008-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1452-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3376-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3704-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/32-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5076-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4508-272-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3420-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1968-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1452-286-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/440-290-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2720-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1328-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3320-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2680-336-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4468-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2764-378-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2808-379-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4356-387-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4364-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4348-404-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2008-419-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4872-435-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1828-448-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4532-449-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-543-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3136-544-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/736-596-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1600-624-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4004-649-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2024-656-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2780-676-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2380-689-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/936-725-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1272-843-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
fxllxxf.exexxrxlll.exenthtnn.exepvvjd.exennhnhn.exejvddv.exepjjpp.exerfrfrrx.exe9ntttb.exexrrlfxx.exehthbhh.exebtbnbt.exedvjdp.exelrxlfxl.exelxlrrrr.exe1nhbtt.exe7dpjv.exerflffxx.exetnthnh.exedjjdv.exejdpjd.exerlrlffx.exebnnbtn.exejvjvp.exedvjdd.exexlrrxxx.exebbbbtt.exejjjdd.exelflfffl.exebhttnn.exehbhnhh.exejdpjd.exellrrlrr.exethhbtb.exe5nnhbb.exevddvv.exeffllxxr.exenbhbtb.exedpppp.exevdvpj.exe1xxrllf.exehtbtnn.exehbtntt.exevppjj.exexxrrlfl.exeffflfrl.exehttnhb.exevvvvd.exejdvpj.exefrxrrxx.exe9lrrrrr.exenhnhnt.exevdjdv.exedjvpp.exe7lxrrrr.exenhbtnt.exepjpjj.exexrrrrrl.exelfrrrrr.exehntnnn.exejdppp.exelrfffff.exerxlxxxr.exebtnnbb.exepid process 1972 fxllxxf.exe 1852 xxrxlll.exe 2916 nthtnn.exe 3352 pvvjd.exe 3068 nnhnhn.exe 32 jvddv.exe 2780 pjjpp.exe 4512 rfrfrrx.exe 4276 9ntttb.exe 2576 xrrlfxx.exe 2008 hthbhh.exe 1904 btbnbt.exe 3704 dvjdp.exe 3376 lrxlfxl.exe 4660 lxlrrrr.exe 2652 1nhbtt.exe 1452 7dpjv.exe 3692 rflffxx.exe 4304 tnthnh.exe 4816 djjdv.exe 3620 jdpjd.exe 368 rlrlffx.exe 3084 bnnbtn.exe 732 jvjvp.exe 5008 dvjdd.exe 4324 xlrrxxx.exe 4216 bbbbtt.exe 4212 jjjdd.exe 3508 lflfffl.exe 4504 bhttnn.exe 4104 hbhnhh.exe 4840 jdpjd.exe 2456 llrrlrr.exe 1036 thhbtb.exe 2024 5nnhbb.exe 3884 vddvv.exe 4380 ffllxxr.exe 2344 nbhbtb.exe 1892 dpppp.exe 3140 vdvpj.exe 1912 1xxrllf.exe 1004 htbtnn.exe 3068 hbtntt.exe 2140 vppjj.exe 772 xxrrlfl.exe 2116 ffflfrl.exe 3384 httnhb.exe 3968 vvvvd.exe 4972 jdvpj.exe 3832 frxrrxx.exe 2188 9lrrrrr.exe 2728 nhnhnt.exe 5076 vdjdv.exe 4508 djvpp.exe 3420 7lxrrrr.exe 5056 nhbtnt.exe 4164 pjpjj.exe 1968 xrrrrrl.exe 1452 lfrrrrr.exe 440 hntnnn.exe 8 jdppp.exe 1516 lrfffff.exe 2052 rxlxxxr.exe 1680 btnnbb.exe -
Processes:
resource yara_rule behavioral2/memory/2408-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2408-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1972-8-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xxrxlll.exe upx C:\nthtnn.exe upx behavioral2/memory/1852-14-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fxllxxf.exe upx C:\pvvjd.exe upx behavioral2/memory/2916-23-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3352-30-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nnhnhn.exe upx behavioral2/memory/3068-31-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvddv.exe upx \??\c:\pjjpp.exe upx behavioral2/memory/2780-44-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rfrfrrx.exe upx \??\c:\9ntttb.exe upx behavioral2/memory/4512-54-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xrrlfxx.exe upx \??\c:\hthbhh.exe upx behavioral2/memory/2576-64-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\btbnbt.exe upx behavioral2/memory/2008-67-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\dvjdp.exe upx behavioral2/memory/1904-76-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\lrxlfxl.exe upx C:\lxlrrrr.exe upx \??\c:\1nhbtt.exe upx behavioral2/memory/4660-94-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7dpjv.exe upx behavioral2/memory/3692-107-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rflffxx.exe upx \??\c:\tnthnh.exe upx \??\c:\djjdv.exe upx \??\c:\jdpjd.exe upx behavioral2/memory/3620-123-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4816-121-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlrlffx.exe upx behavioral2/memory/3620-128-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bnnbtn.exe upx \??\c:\jvjvp.exe upx \??\c:\dvjdd.exe upx behavioral2/memory/4324-157-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jjjdd.exe upx behavioral2/memory/4212-169-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\lflfffl.exe upx \??\c:\bhttnn.exe upx \??\c:\hbhnhh.exe upx behavioral2/memory/3884-204-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4380-205-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3140-221-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1912-222-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1912-226-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2140-236-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/772-239-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2116-246-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3068-231-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1004-230-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1892-214-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2344-210-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4380-209-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3884-200-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2024-197-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1036-192-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exefxllxxf.exexxrxlll.exenthtnn.exepvvjd.exennhnhn.exejvddv.exepjjpp.exerfrfrrx.exe9ntttb.exexrrlfxx.exehthbhh.exebtbnbt.exedvjdp.exelrxlfxl.exelxlrrrr.exe1nhbtt.exe7dpjv.exerflffxx.exetnthnh.exedjjdv.exejdpjd.exedescription pid process target process PID 2408 wrote to memory of 1972 2408 6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exe fxllxxf.exe PID 2408 wrote to memory of 1972 2408 6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exe fxllxxf.exe PID 2408 wrote to memory of 1972 2408 6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exe fxllxxf.exe PID 1972 wrote to memory of 1852 1972 fxllxxf.exe xxrxlll.exe PID 1972 wrote to memory of 1852 1972 fxllxxf.exe xxrxlll.exe PID 1972 wrote to memory of 1852 1972 fxllxxf.exe xxrxlll.exe PID 1852 wrote to memory of 2916 1852 xxrxlll.exe nthtnn.exe PID 1852 wrote to memory of 2916 1852 xxrxlll.exe nthtnn.exe PID 1852 wrote to memory of 2916 1852 xxrxlll.exe nthtnn.exe PID 2916 wrote to memory of 3352 2916 nthtnn.exe pvvjd.exe PID 2916 wrote to memory of 3352 2916 nthtnn.exe pvvjd.exe PID 2916 wrote to memory of 3352 2916 nthtnn.exe pvvjd.exe PID 3352 wrote to memory of 3068 3352 pvvjd.exe hbtntt.exe PID 3352 wrote to memory of 3068 3352 pvvjd.exe hbtntt.exe PID 3352 wrote to memory of 3068 3352 pvvjd.exe hbtntt.exe PID 3068 wrote to memory of 32 3068 nnhnhn.exe jvddv.exe PID 3068 wrote to memory of 32 3068 nnhnhn.exe jvddv.exe PID 3068 wrote to memory of 32 3068 nnhnhn.exe jvddv.exe PID 32 wrote to memory of 2780 32 jvddv.exe pjjpp.exe PID 32 wrote to memory of 2780 32 jvddv.exe pjjpp.exe PID 32 wrote to memory of 2780 32 jvddv.exe pjjpp.exe PID 2780 wrote to memory of 4512 2780 pjjpp.exe rfrfrrx.exe PID 2780 wrote to memory of 4512 2780 pjjpp.exe rfrfrrx.exe PID 2780 wrote to memory of 4512 2780 pjjpp.exe rfrfrrx.exe PID 4512 wrote to memory of 4276 4512 rfrfrrx.exe 9ntttb.exe PID 4512 wrote to memory of 4276 4512 rfrfrrx.exe 9ntttb.exe PID 4512 wrote to memory of 4276 4512 rfrfrrx.exe 9ntttb.exe PID 4276 wrote to memory of 2576 4276 9ntttb.exe xrrlfxx.exe PID 4276 wrote to memory of 2576 4276 9ntttb.exe xrrlfxx.exe PID 4276 wrote to memory of 2576 4276 9ntttb.exe xrrlfxx.exe PID 2576 wrote to memory of 2008 2576 xrrlfxx.exe hthbhh.exe PID 2576 wrote to memory of 2008 2576 xrrlfxx.exe hthbhh.exe PID 2576 wrote to memory of 2008 2576 xrrlfxx.exe hthbhh.exe PID 2008 wrote to memory of 1904 2008 hthbhh.exe btbnbt.exe PID 2008 wrote to memory of 1904 2008 hthbhh.exe btbnbt.exe PID 2008 wrote to memory of 1904 2008 hthbhh.exe btbnbt.exe PID 1904 wrote to memory of 3704 1904 btbnbt.exe dvjdp.exe PID 1904 wrote to memory of 3704 1904 btbnbt.exe dvjdp.exe PID 1904 wrote to memory of 3704 1904 btbnbt.exe dvjdp.exe PID 3704 wrote to memory of 3376 3704 dvjdp.exe lrxlfxl.exe PID 3704 wrote to memory of 3376 3704 dvjdp.exe lrxlfxl.exe PID 3704 wrote to memory of 3376 3704 dvjdp.exe lrxlfxl.exe PID 3376 wrote to memory of 4660 3376 lrxlfxl.exe lxlrrrr.exe PID 3376 wrote to memory of 4660 3376 lrxlfxl.exe lxlrrrr.exe PID 3376 wrote to memory of 4660 3376 lrxlfxl.exe lxlrrrr.exe PID 4660 wrote to memory of 2652 4660 lxlrrrr.exe 1nhbtt.exe PID 4660 wrote to memory of 2652 4660 lxlrrrr.exe 1nhbtt.exe PID 4660 wrote to memory of 2652 4660 lxlrrrr.exe 1nhbtt.exe PID 2652 wrote to memory of 1452 2652 1nhbtt.exe lfrrrrr.exe PID 2652 wrote to memory of 1452 2652 1nhbtt.exe lfrrrrr.exe PID 2652 wrote to memory of 1452 2652 1nhbtt.exe lfrrrrr.exe PID 1452 wrote to memory of 3692 1452 7dpjv.exe rflffxx.exe PID 1452 wrote to memory of 3692 1452 7dpjv.exe rflffxx.exe PID 1452 wrote to memory of 3692 1452 7dpjv.exe rflffxx.exe PID 3692 wrote to memory of 4304 3692 rflffxx.exe tnthnh.exe PID 3692 wrote to memory of 4304 3692 rflffxx.exe tnthnh.exe PID 3692 wrote to memory of 4304 3692 rflffxx.exe tnthnh.exe PID 4304 wrote to memory of 4816 4304 tnthnh.exe djjdv.exe PID 4304 wrote to memory of 4816 4304 tnthnh.exe djjdv.exe PID 4304 wrote to memory of 4816 4304 tnthnh.exe djjdv.exe PID 4816 wrote to memory of 3620 4816 djjdv.exe jdpjd.exe PID 4816 wrote to memory of 3620 4816 djjdv.exe jdpjd.exe PID 4816 wrote to memory of 3620 4816 djjdv.exe jdpjd.exe PID 3620 wrote to memory of 368 3620 jdpjd.exe rlrlffx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6988e26cb1a2b99968301742db4cb230_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\fxllxxf.exec:\fxllxxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxrxlll.exec:\xxrxlll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nthtnn.exec:\nthtnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvvjd.exec:\pvvjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnhnhn.exec:\nnhnhn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvddv.exec:\jvddv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjpp.exec:\pjjpp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rfrfrrx.exec:\rfrfrrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9ntttb.exec:\9ntttb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrlfxx.exec:\xrrlfxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hthbhh.exec:\hthbhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btbnbt.exec:\btbnbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvjdp.exec:\dvjdp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrxlfxl.exec:\lrxlfxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxlrrrr.exec:\lxlrrrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1nhbtt.exec:\1nhbtt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7dpjv.exec:\7dpjv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rflffxx.exec:\rflffxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnthnh.exec:\tnthnh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djjdv.exec:\djjdv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdpjd.exec:\jdpjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlrlffx.exec:\rlrlffx.exe23⤵
- Executes dropped EXE
-
\??\c:\bnnbtn.exec:\bnnbtn.exe24⤵
- Executes dropped EXE
-
\??\c:\jvjvp.exec:\jvjvp.exe25⤵
- Executes dropped EXE
-
\??\c:\dvjdd.exec:\dvjdd.exe26⤵
- Executes dropped EXE
-
\??\c:\xlrrxxx.exec:\xlrrxxx.exe27⤵
- Executes dropped EXE
-
\??\c:\bbbbtt.exec:\bbbbtt.exe28⤵
- Executes dropped EXE
-
\??\c:\jjjdd.exec:\jjjdd.exe29⤵
- Executes dropped EXE
-
\??\c:\lflfffl.exec:\lflfffl.exe30⤵
- Executes dropped EXE
-
\??\c:\bhttnn.exec:\bhttnn.exe31⤵
- Executes dropped EXE
-
\??\c:\hbhnhh.exec:\hbhnhh.exe32⤵
- Executes dropped EXE
-
\??\c:\jdpjd.exec:\jdpjd.exe33⤵
- Executes dropped EXE
-
\??\c:\llrrlrr.exec:\llrrlrr.exe34⤵
- Executes dropped EXE
-
\??\c:\thhbtb.exec:\thhbtb.exe35⤵
- Executes dropped EXE
-
\??\c:\5nnhbb.exec:\5nnhbb.exe36⤵
- Executes dropped EXE
-
\??\c:\vddvv.exec:\vddvv.exe37⤵
- Executes dropped EXE
-
\??\c:\ffllxxr.exec:\ffllxxr.exe38⤵
- Executes dropped EXE
-
\??\c:\nbhbtb.exec:\nbhbtb.exe39⤵
- Executes dropped EXE
-
\??\c:\dpppp.exec:\dpppp.exe40⤵
- Executes dropped EXE
-
\??\c:\vdvpj.exec:\vdvpj.exe41⤵
- Executes dropped EXE
-
\??\c:\1xxrllf.exec:\1xxrllf.exe42⤵
- Executes dropped EXE
-
\??\c:\htbtnn.exec:\htbtnn.exe43⤵
- Executes dropped EXE
-
\??\c:\hbtntt.exec:\hbtntt.exe44⤵
- Executes dropped EXE
-
\??\c:\vppjj.exec:\vppjj.exe45⤵
- Executes dropped EXE
-
\??\c:\xxrrlfl.exec:\xxrrlfl.exe46⤵
- Executes dropped EXE
-
\??\c:\ffflfrl.exec:\ffflfrl.exe47⤵
- Executes dropped EXE
-
\??\c:\httnhb.exec:\httnhb.exe48⤵
- Executes dropped EXE
-
\??\c:\vvvvd.exec:\vvvvd.exe49⤵
- Executes dropped EXE
-
\??\c:\jdvpj.exec:\jdvpj.exe50⤵
- Executes dropped EXE
-
\??\c:\frxrrxx.exec:\frxrrxx.exe51⤵
- Executes dropped EXE
-
\??\c:\9lrrrrr.exec:\9lrrrrr.exe52⤵
- Executes dropped EXE
-
\??\c:\nhnhnt.exec:\nhnhnt.exe53⤵
- Executes dropped EXE
-
\??\c:\vdjdv.exec:\vdjdv.exe54⤵
- Executes dropped EXE
-
\??\c:\djvpp.exec:\djvpp.exe55⤵
- Executes dropped EXE
-
\??\c:\7lxrrrr.exec:\7lxrrrr.exe56⤵
- Executes dropped EXE
-
\??\c:\nhbtnt.exec:\nhbtnt.exe57⤵
- Executes dropped EXE
-
\??\c:\pjpjj.exec:\pjpjj.exe58⤵
- Executes dropped EXE
-
\??\c:\xrrrrrl.exec:\xrrrrrl.exe59⤵
- Executes dropped EXE
-
\??\c:\lfrrrrr.exec:\lfrrrrr.exe60⤵
- Executes dropped EXE
-
\??\c:\hntnnn.exec:\hntnnn.exe61⤵
- Executes dropped EXE
-
\??\c:\jdppp.exec:\jdppp.exe62⤵
- Executes dropped EXE
-
\??\c:\lrfffff.exec:\lrfffff.exe63⤵
- Executes dropped EXE
-
\??\c:\rxlxxxr.exec:\rxlxxxr.exe64⤵
- Executes dropped EXE
-
\??\c:\btnnbb.exec:\btnnbb.exe65⤵
- Executes dropped EXE
-
\??\c:\jjpjv.exec:\jjpjv.exe66⤵
-
\??\c:\pjdvv.exec:\pjdvv.exe67⤵
-
\??\c:\9lffxff.exec:\9lffxff.exe68⤵
-
\??\c:\rrfllrr.exec:\rrfllrr.exe69⤵
-
\??\c:\btbtnn.exec:\btbtnn.exe70⤵
-
\??\c:\htbttt.exec:\htbttt.exe71⤵
-
\??\c:\vppjj.exec:\vppjj.exe72⤵
-
\??\c:\ppdjv.exec:\ppdjv.exe73⤵
-
\??\c:\lllffxf.exec:\lllffxf.exe74⤵
-
\??\c:\7tbtnn.exec:\7tbtnn.exe75⤵
-
\??\c:\vdjjj.exec:\vdjjj.exe76⤵
-
\??\c:\7djjp.exec:\7djjp.exe77⤵
-
\??\c:\xxllflx.exec:\xxllflx.exe78⤵
-
\??\c:\tbtnnt.exec:\tbtnnt.exe79⤵
-
\??\c:\dvddp.exec:\dvddp.exe80⤵
-
\??\c:\ppppp.exec:\ppppp.exe81⤵
-
\??\c:\frlxllf.exec:\frlxllf.exe82⤵
-
\??\c:\bhhnhn.exec:\bhhnhn.exe83⤵
-
\??\c:\vjjdp.exec:\vjjdp.exe84⤵
-
\??\c:\7xlffrr.exec:\7xlffrr.exe85⤵
-
\??\c:\hhnnbb.exec:\hhnnbb.exe86⤵
-
\??\c:\htbttn.exec:\htbttn.exe87⤵
-
\??\c:\vdvvv.exec:\vdvvv.exe88⤵
-
\??\c:\lffxrlf.exec:\lffxrlf.exe89⤵
-
\??\c:\xfxxlrl.exec:\xfxxlrl.exe90⤵
-
\??\c:\ttttbh.exec:\ttttbh.exe91⤵
-
\??\c:\bttnhb.exec:\bttnhb.exe92⤵
-
\??\c:\pdppv.exec:\pdppv.exe93⤵
-
\??\c:\rxfxxrl.exec:\rxfxxrl.exe94⤵
-
\??\c:\btbttb.exec:\btbttb.exe95⤵
-
\??\c:\vpvvd.exec:\vpvvd.exe96⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe97⤵
-
\??\c:\rlxrrll.exec:\rlxrrll.exe98⤵
-
\??\c:\hnbbbh.exec:\hnbbbh.exe99⤵
-
\??\c:\dppjd.exec:\dppjd.exe100⤵
-
\??\c:\xxxrlrl.exec:\xxxrlrl.exe101⤵
-
\??\c:\tthhnt.exec:\tthhnt.exe102⤵
-
\??\c:\dvdvd.exec:\dvdvd.exe103⤵
-
\??\c:\lfrrffr.exec:\lfrrffr.exe104⤵
-
\??\c:\nbnnnt.exec:\nbnnnt.exe105⤵
-
\??\c:\pjvvv.exec:\pjvvv.exe106⤵
-
\??\c:\djppj.exec:\djppj.exe107⤵
-
\??\c:\rlxfllx.exec:\rlxfllx.exe108⤵
-
\??\c:\ttnnbh.exec:\ttnnbh.exe109⤵
-
\??\c:\hbhttb.exec:\hbhttb.exe110⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe111⤵
-
\??\c:\1rrxxxr.exec:\1rrxxxr.exe112⤵
-
\??\c:\bhhnhh.exec:\bhhnhh.exe113⤵
-
\??\c:\jjjjd.exec:\jjjjd.exe114⤵
-
\??\c:\pjjdp.exec:\pjjdp.exe115⤵
-
\??\c:\rrlflrx.exec:\rrlflrx.exe116⤵
-
\??\c:\ttnnnb.exec:\ttnnnb.exe117⤵
-
\??\c:\pvjdv.exec:\pvjdv.exe118⤵
-
\??\c:\vddvp.exec:\vddvp.exe119⤵
-
\??\c:\fxrlxfx.exec:\fxrlxfx.exe120⤵
-
\??\c:\lllllll.exec:\lllllll.exe121⤵
-
\??\c:\thttnn.exec:\thttnn.exe122⤵
-
\??\c:\jpdvp.exec:\jpdvp.exe123⤵
-
\??\c:\tnbbtn.exec:\tnbbtn.exe124⤵
-
\??\c:\tbhntt.exec:\tbhntt.exe125⤵
-
\??\c:\7vppj.exec:\7vppj.exe126⤵
-
\??\c:\vvvpd.exec:\vvvpd.exe127⤵
-
\??\c:\fxrlffx.exec:\fxrlffx.exe128⤵
-
\??\c:\nbnhhn.exec:\nbnhhn.exe129⤵
-
\??\c:\1bbtnt.exec:\1bbtnt.exe130⤵
-
\??\c:\9vvvp.exec:\9vvvp.exe131⤵
-
\??\c:\jvvvp.exec:\jvvvp.exe132⤵
-
\??\c:\xrfffff.exec:\xrfffff.exe133⤵
-
\??\c:\lllrllr.exec:\lllrllr.exe134⤵
-
\??\c:\tbbbtt.exec:\tbbbtt.exe135⤵
-
\??\c:\nntttt.exec:\nntttt.exe136⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe137⤵
-
\??\c:\lfllfll.exec:\lfllfll.exe138⤵
-
\??\c:\7nhhht.exec:\7nhhht.exe139⤵
-
\??\c:\tbbbbt.exec:\tbbbbt.exe140⤵
-
\??\c:\jjvpp.exec:\jjvpp.exe141⤵
-
\??\c:\7jpjv.exec:\7jpjv.exe142⤵
-
\??\c:\xrrxxxx.exec:\xrrxxxx.exe143⤵
-
\??\c:\bnbbtt.exec:\bnbbtt.exe144⤵
-
\??\c:\hhhbtb.exec:\hhhbtb.exe145⤵
-
\??\c:\djjvv.exec:\djjvv.exe146⤵
-
\??\c:\lflfxff.exec:\lflfxff.exe147⤵
-
\??\c:\rxlxlll.exec:\rxlxlll.exe148⤵
-
\??\c:\hbbbtt.exec:\hbbbtt.exe149⤵
-
\??\c:\bttbth.exec:\bttbth.exe150⤵
-
\??\c:\pjppd.exec:\pjppd.exe151⤵
-
\??\c:\frlfxrf.exec:\frlfxrf.exe152⤵
-
\??\c:\ttttnn.exec:\ttttnn.exe153⤵
-
\??\c:\jvddd.exec:\jvddd.exe154⤵
-
\??\c:\jdpdv.exec:\jdpdv.exe155⤵
-
\??\c:\rrrlfff.exec:\rrrlfff.exe156⤵
-
\??\c:\9nthbb.exec:\9nthbb.exe157⤵
-
\??\c:\nhnnht.exec:\nhnnht.exe158⤵
-
\??\c:\jvjjj.exec:\jvjjj.exe159⤵
-
\??\c:\lrxffxx.exec:\lrxffxx.exe160⤵
-
\??\c:\xlrrlll.exec:\xlrrlll.exe161⤵
-
\??\c:\htbbtb.exec:\htbbtb.exe162⤵
-
\??\c:\jpddp.exec:\jpddp.exe163⤵
-
\??\c:\5djdv.exec:\5djdv.exe164⤵
-
\??\c:\tbnbnt.exec:\tbnbnt.exe165⤵
-
\??\c:\jvdvp.exec:\jvdvp.exe166⤵
-
\??\c:\fxlfxxl.exec:\fxlfxxl.exe167⤵
-
\??\c:\btnttt.exec:\btnttt.exe168⤵
-
\??\c:\lfxxffr.exec:\lfxxffr.exe169⤵
-
\??\c:\jjvpj.exec:\jjvpj.exe170⤵
-
\??\c:\xxrxrrr.exec:\xxrxrrr.exe171⤵
-
\??\c:\3hbbbt.exec:\3hbbbt.exe172⤵
-
\??\c:\xxfxffl.exec:\xxfxffl.exe173⤵
-
\??\c:\bthbbb.exec:\bthbbb.exe174⤵
-
\??\c:\dddvd.exec:\dddvd.exe175⤵
-
\??\c:\httttt.exec:\httttt.exe176⤵
-
\??\c:\pdvdp.exec:\pdvdp.exe177⤵
-
\??\c:\ppvpv.exec:\ppvpv.exe178⤵
-
\??\c:\1xfxrll.exec:\1xfxrll.exe179⤵
-
\??\c:\nhnnbt.exec:\nhnnbt.exe180⤵
-
\??\c:\xlfxxrr.exec:\xlfxxrr.exe181⤵
-
\??\c:\bbbtnb.exec:\bbbtnb.exe182⤵
-
\??\c:\pjvpv.exec:\pjvpv.exe183⤵
-
\??\c:\bhnbbt.exec:\bhnbbt.exe184⤵
-
\??\c:\vjdvv.exec:\vjdvv.exe185⤵
-
\??\c:\rrlfrll.exec:\rrlfrll.exe186⤵
-
\??\c:\hhnnnn.exec:\hhnnnn.exe187⤵
-
\??\c:\vdvvd.exec:\vdvvd.exe188⤵
-
\??\c:\ttbttt.exec:\ttbttt.exe189⤵
-
\??\c:\jvjpv.exec:\jvjpv.exe190⤵
-
\??\c:\flllflf.exec:\flllflf.exe191⤵
-
\??\c:\hthbtt.exec:\hthbtt.exe192⤵
-
\??\c:\nbhhhh.exec:\nbhhhh.exe193⤵
-
\??\c:\jjppj.exec:\jjppj.exe194⤵
-
\??\c:\xrffxlf.exec:\xrffxlf.exe195⤵
-
\??\c:\xrfrllf.exec:\xrfrllf.exe196⤵
-
\??\c:\hhntnh.exec:\hhntnh.exe197⤵
-
\??\c:\dpddv.exec:\dpddv.exe198⤵
-
\??\c:\pvddv.exec:\pvddv.exe199⤵
-
\??\c:\xrrlrrl.exec:\xrrlrrl.exe200⤵
-
\??\c:\tnbbhn.exec:\tnbbhn.exe201⤵
-
\??\c:\bnbbtt.exec:\bnbbtt.exe202⤵
-
\??\c:\pdpjj.exec:\pdpjj.exe203⤵
-
\??\c:\djppp.exec:\djppp.exe204⤵
-
\??\c:\lfrlrrr.exec:\lfrlrrr.exe205⤵
-
\??\c:\3rrrlrr.exec:\3rrrlrr.exe206⤵
-
\??\c:\5btnnn.exec:\5btnnn.exe207⤵
-
\??\c:\nbnnnn.exec:\nbnnnn.exe208⤵
-
\??\c:\vjpjd.exec:\vjpjd.exe209⤵
-
\??\c:\frrlfff.exec:\frrlfff.exe210⤵
-
\??\c:\lfxxrxx.exec:\lfxxrxx.exe211⤵
-
\??\c:\thtnnn.exec:\thtnnn.exe212⤵
-
\??\c:\nhnnhh.exec:\nhnnhh.exe213⤵
-
\??\c:\jddvv.exec:\jddvv.exe214⤵
-
\??\c:\jvpvp.exec:\jvpvp.exe215⤵
-
\??\c:\rrrlfxx.exec:\rrrlfxx.exe216⤵
-
\??\c:\xlfxxxf.exec:\xlfxxxf.exe217⤵
-
\??\c:\bhhnnt.exec:\bhhnnt.exe218⤵
-
\??\c:\ppvvp.exec:\ppvvp.exe219⤵
-
\??\c:\pjvvj.exec:\pjvvj.exe220⤵
-
\??\c:\7rrlffx.exec:\7rrlffx.exe221⤵
-
\??\c:\xxrlllr.exec:\xxrlllr.exe222⤵
-
\??\c:\bhbnhh.exec:\bhbnhh.exe223⤵
-
\??\c:\jvjdd.exec:\jvjdd.exe224⤵
-
\??\c:\lxxrrrr.exec:\lxxrrrr.exe225⤵
-
\??\c:\1llfxxx.exec:\1llfxxx.exe226⤵
-
\??\c:\hbhnth.exec:\hbhnth.exe227⤵
-
\??\c:\jvdvp.exec:\jvdvp.exe228⤵
-
\??\c:\1vpvj.exec:\1vpvj.exe229⤵
-
\??\c:\ffxllrr.exec:\ffxllrr.exe230⤵
-
\??\c:\xrffffx.exec:\xrffffx.exe231⤵
-
\??\c:\hnbhht.exec:\hnbhht.exe232⤵
-
\??\c:\bnbnhh.exec:\bnbnhh.exe233⤵
-
\??\c:\pvdpj.exec:\pvdpj.exe234⤵
-
\??\c:\9xfxrlf.exec:\9xfxrlf.exe235⤵
-
\??\c:\flrrlll.exec:\flrrlll.exe236⤵
-
\??\c:\bhbntn.exec:\bhbntn.exe237⤵
-
\??\c:\vddvv.exec:\vddvv.exe238⤵
-
\??\c:\rrxxrxx.exec:\rrxxrxx.exe239⤵
-
\??\c:\ffxrllf.exec:\ffxrllf.exe240⤵
-
\??\c:\nnnbhn.exec:\nnnbhn.exe241⤵