Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 22:55
Behavioral task
behavioral1
Sample
24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe
-
Size
441KB
-
MD5
24184fbe84a49c31bca442e24e193730
-
SHA1
d46cdeca238bebf93288f12de2c036a3ed80984d
-
SHA256
348db13714932ecffda8039d11264d7c0ac29d2c25db1500355509e55605229c
-
SHA512
209f25facff9842fa62041e98332416a43013f22c709e470b82d38b7eef1f7269a8072a05a5e93afc1f4accc4856229e7b03a0b0964b1a97edbee3ae62bee00a
-
SSDEEP
12288:w4wFHoS9KxbNnidEhjEJd1kNpeUgI95yRoZHVaoJMOxFXnRV4PiGO0hUmH0:kKxbNndhjEJd1kNpeUgI95yRoZHgoJMa
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2320-0-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1936-7-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2696-23-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3972-41-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4664-36-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4008-35-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4492-18-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3864-49-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3576-71-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/336-255-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2336-267-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2696-272-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1736-280-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1232-287-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3864-292-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3740-296-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4512-252-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1700-245-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2744-234-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/784-231-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2616-220-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3584-209-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2020-199-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1124-196-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2056-192-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1560-184-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2064-179-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1036-162-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4032-156-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4168-136-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1956-128-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3004-123-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2108-101-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4744-96-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/656-91-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2364-88-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3112-73-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1016-66-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2312-313-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2300-320-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4776-330-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4892-352-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4792-356-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2812-363-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4788-379-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4788-383-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/400-401-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4948-403-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4512-414-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1944-494-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1688-507-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1864-548-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2884-555-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1944-645-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4428-649-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/224-692-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4008-729-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1396-749-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4340-762-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2104-766-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2164-833-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1612-840-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1540-1196-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3040-1224-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000023305-3.dat family_berbew behavioral2/files/0x000800000002349f-9.dat family_berbew behavioral2/files/0x00070000000234a4-12.dat family_berbew behavioral2/files/0x00070000000234a7-32.dat family_berbew behavioral2/files/0x00070000000234a8-39.dat family_berbew behavioral2/files/0x00070000000234a6-27.dat family_berbew behavioral2/files/0x00070000000234a5-21.dat family_berbew behavioral2/files/0x00070000000234a9-44.dat family_berbew behavioral2/files/0x00070000000234aa-50.dat family_berbew behavioral2/files/0x00070000000234ac-58.dat family_berbew behavioral2/files/0x00070000000234ad-61.dat family_berbew behavioral2/files/0x00070000000234ae-70.dat family_berbew behavioral2/files/0x00070000000234af-76.dat family_berbew behavioral2/files/0x00070000000234b0-81.dat family_berbew behavioral2/files/0x00080000000234a0-86.dat family_berbew behavioral2/files/0x00070000000234b1-94.dat family_berbew behavioral2/files/0x00070000000234b2-99.dat family_berbew behavioral2/files/0x00070000000234b4-110.dat family_berbew behavioral2/files/0x00070000000234b5-115.dat family_berbew behavioral2/files/0x00070000000234b6-120.dat family_berbew behavioral2/files/0x00070000000234ba-142.dat family_berbew behavioral2/files/0x00070000000234c0-174.dat family_berbew behavioral2/files/0x00070000000234c1-181.dat family_berbew behavioral2/files/0x00070000000234bf-169.dat family_berbew behavioral2/files/0x00070000000234be-165.dat family_berbew behavioral2/files/0x00070000000234bd-159.dat family_berbew behavioral2/files/0x00070000000234bc-153.dat family_berbew behavioral2/files/0x00070000000234bb-148.dat family_berbew behavioral2/files/0x00070000000234b9-138.dat family_berbew behavioral2/files/0x00070000000234b8-132.dat family_berbew behavioral2/files/0x00070000000234b7-126.dat family_berbew behavioral2/files/0x00070000000234b3-105.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 1936 fllfxxx.exe 4516 xlxxrrr.exe 4492 64486.exe 2696 8222046.exe 4008 4282884.exe 4664 bbnhbt.exe 3972 1hbhbb.exe 3864 0622664.exe 2524 60228.exe 1016 062048.exe 3576 rxrllll.exe 3112 426606.exe 2312 60606.exe 2364 0660044.exe 656 llfrlrl.exe 4744 0482666.exe 2108 m0660.exe 5084 thnbbb.exe 3204 m0666.exe 3004 k06040.exe 1956 xrxrffl.exe 4168 ddvpd.exe 2376 28244.exe 1756 8026660.exe 4396 08482.exe 4032 8284482.exe 1036 80266.exe 4352 dpddp.exe 3020 flfxrrl.exe 2064 vddvp.exe 1560 e28602.exe 4088 2282660.exe 2056 xlxrffr.exe 1124 g0600.exe 2020 60604.exe 3756 xrlfxlx.exe 3584 i466662.exe 592 8864826.exe 3024 0466048.exe 1464 688222.exe 2616 tntnnh.exe 1876 462262.exe 1192 8462004.exe 784 0844848.exe 2744 lrrrllx.exe 2556 dpddv.exe 4252 hhhhtt.exe 1700 fxlfxxx.exe 1292 frlllff.exe 4512 hbhtnt.exe 336 8440626.exe 232 0888660.exe 1880 xrlfxxx.exe 2336 84226.exe 4628 xflrlrx.exe 2696 djdvp.exe 4008 1nhbtt.exe 1420 jpddd.exe 1736 42826.exe 4576 bhnbnn.exe 1232 644860.exe 4860 42608.exe 3864 bhbtnh.exe 3740 6282620.exe -
resource yara_rule behavioral2/memory/2320-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x0007000000023305-3.dat upx behavioral2/memory/1936-7-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x000800000002349f-9.dat upx behavioral2/files/0x00070000000234a4-12.dat upx behavioral2/memory/2696-23-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234a7-32.dat upx behavioral2/files/0x00070000000234a8-39.dat upx behavioral2/memory/3972-41-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4664-36-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4008-35-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234a6-27.dat upx behavioral2/files/0x00070000000234a5-21.dat upx behavioral2/memory/4492-18-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234a9-44.dat upx behavioral2/files/0x00070000000234aa-50.dat upx behavioral2/memory/3864-49-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2524-52-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234ac-58.dat upx behavioral2/files/0x00070000000234ad-61.dat upx behavioral2/files/0x00070000000234ae-70.dat upx behavioral2/memory/3576-71-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234af-76.dat upx behavioral2/files/0x00070000000234b0-81.dat upx behavioral2/files/0x00080000000234a0-86.dat upx behavioral2/files/0x00070000000234b1-94.dat upx behavioral2/files/0x00070000000234b2-99.dat upx behavioral2/files/0x00070000000234b4-110.dat upx behavioral2/files/0x00070000000234b5-115.dat upx behavioral2/files/0x00070000000234b6-120.dat upx behavioral2/files/0x00070000000234ba-142.dat upx behavioral2/files/0x00070000000234c0-174.dat upx behavioral2/memory/336-255-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2336-267-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2696-272-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1736-280-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1232-287-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3864-292-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3740-296-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4512-252-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1700-245-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2744-234-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/784-231-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2616-220-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3584-209-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2020-199-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1124-196-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2056-192-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1560-184-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234c1-181.dat upx behavioral2/memory/2064-179-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234bf-169.dat upx behavioral2/files/0x00070000000234be-165.dat upx behavioral2/memory/1036-162-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234bd-159.dat upx behavioral2/memory/4032-156-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234bc-153.dat upx behavioral2/files/0x00070000000234bb-148.dat upx behavioral2/files/0x00070000000234b9-138.dat upx behavioral2/memory/4168-136-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234b8-132.dat upx behavioral2/memory/1956-128-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/files/0x00070000000234b7-126.dat upx behavioral2/memory/3004-123-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1936 2320 24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe 82 PID 2320 wrote to memory of 1936 2320 24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe 82 PID 2320 wrote to memory of 1936 2320 24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe 82 PID 1936 wrote to memory of 4516 1936 fllfxxx.exe 83 PID 1936 wrote to memory of 4516 1936 fllfxxx.exe 83 PID 1936 wrote to memory of 4516 1936 fllfxxx.exe 83 PID 4516 wrote to memory of 4492 4516 xlxxrrr.exe 84 PID 4516 wrote to memory of 4492 4516 xlxxrrr.exe 84 PID 4516 wrote to memory of 4492 4516 xlxxrrr.exe 84 PID 4492 wrote to memory of 2696 4492 64486.exe 137 PID 4492 wrote to memory of 2696 4492 64486.exe 137 PID 4492 wrote to memory of 2696 4492 64486.exe 137 PID 2696 wrote to memory of 4008 2696 8222046.exe 138 PID 2696 wrote to memory of 4008 2696 8222046.exe 138 PID 2696 wrote to memory of 4008 2696 8222046.exe 138 PID 4008 wrote to memory of 4664 4008 4282884.exe 87 PID 4008 wrote to memory of 4664 4008 4282884.exe 87 PID 4008 wrote to memory of 4664 4008 4282884.exe 87 PID 4664 wrote to memory of 3972 4664 bbnhbt.exe 88 PID 4664 wrote to memory of 3972 4664 bbnhbt.exe 88 PID 4664 wrote to memory of 3972 4664 bbnhbt.exe 88 PID 3972 wrote to memory of 3864 3972 1hbhbb.exe 144 PID 3972 wrote to memory of 3864 3972 1hbhbb.exe 144 PID 3972 wrote to memory of 3864 3972 1hbhbb.exe 144 PID 3864 wrote to memory of 2524 3864 0622664.exe 90 PID 3864 wrote to memory of 2524 3864 0622664.exe 90 PID 3864 wrote to memory of 2524 3864 0622664.exe 90 PID 2524 wrote to memory of 1016 2524 60228.exe 91 PID 2524 wrote to memory of 1016 2524 60228.exe 91 PID 2524 wrote to memory of 1016 2524 60228.exe 91 PID 1016 wrote to memory of 3576 1016 062048.exe 92 PID 1016 wrote to memory of 3576 1016 062048.exe 92 PID 1016 wrote to memory of 3576 1016 062048.exe 92 PID 3576 wrote to memory of 3112 3576 rxrllll.exe 93 PID 3576 wrote to memory of 3112 3576 rxrllll.exe 93 PID 3576 wrote to memory of 3112 3576 rxrllll.exe 93 PID 3112 wrote to memory of 2312 3112 426606.exe 150 PID 3112 wrote to memory of 2312 3112 426606.exe 150 PID 3112 wrote to memory of 2312 3112 426606.exe 150 PID 2312 wrote to memory of 2364 2312 60606.exe 95 PID 2312 wrote to memory of 2364 2312 60606.exe 95 PID 2312 wrote to memory of 2364 2312 60606.exe 95 PID 2364 wrote to memory of 656 2364 0660044.exe 96 PID 2364 wrote to memory of 656 2364 0660044.exe 96 PID 2364 wrote to memory of 656 2364 0660044.exe 96 PID 656 wrote to memory of 4744 656 llfrlrl.exe 97 PID 656 wrote to memory of 4744 656 llfrlrl.exe 97 PID 656 wrote to memory of 4744 656 llfrlrl.exe 97 PID 4744 wrote to memory of 2108 4744 0482666.exe 98 PID 4744 wrote to memory of 2108 4744 0482666.exe 98 PID 4744 wrote to memory of 2108 4744 0482666.exe 98 PID 2108 wrote to memory of 5084 2108 m0660.exe 99 PID 2108 wrote to memory of 5084 2108 m0660.exe 99 PID 2108 wrote to memory of 5084 2108 m0660.exe 99 PID 5084 wrote to memory of 3204 5084 thnbbb.exe 100 PID 5084 wrote to memory of 3204 5084 thnbbb.exe 100 PID 5084 wrote to memory of 3204 5084 thnbbb.exe 100 PID 3204 wrote to memory of 3004 3204 m0666.exe 101 PID 3204 wrote to memory of 3004 3204 m0666.exe 101 PID 3204 wrote to memory of 3004 3204 m0666.exe 101 PID 3004 wrote to memory of 1956 3004 k06040.exe 102 PID 3004 wrote to memory of 1956 3004 k06040.exe 102 PID 3004 wrote to memory of 1956 3004 k06040.exe 102 PID 1956 wrote to memory of 4168 1956 xrxrffl.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\fllfxxx.exec:\fllfxxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\xlxxrrr.exec:\xlxxrrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\64486.exec:\64486.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
\??\c:\8222046.exec:\8222046.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\4282884.exec:\4282884.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\bbnhbt.exec:\bbnhbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\1hbhbb.exec:\1hbhbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\0622664.exec:\0622664.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\60228.exec:\60228.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\062048.exec:\062048.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\rxrllll.exec:\rxrllll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\426606.exec:\426606.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
\??\c:\60606.exec:\60606.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\0660044.exec:\0660044.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\llfrlrl.exec:\llfrlrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\0482666.exec:\0482666.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\m0660.exec:\m0660.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\thnbbb.exec:\thnbbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\m0666.exec:\m0666.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
\??\c:\k06040.exec:\k06040.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\xrxrffl.exec:\xrxrffl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\ddvpd.exec:\ddvpd.exe23⤵
- Executes dropped EXE
PID:4168 -
\??\c:\28244.exec:\28244.exe24⤵
- Executes dropped EXE
PID:2376 -
\??\c:\8026660.exec:\8026660.exe25⤵
- Executes dropped EXE
PID:1756 -
\??\c:\08482.exec:\08482.exe26⤵
- Executes dropped EXE
PID:4396 -
\??\c:\8284482.exec:\8284482.exe27⤵
- Executes dropped EXE
PID:4032 -
\??\c:\80266.exec:\80266.exe28⤵
- Executes dropped EXE
PID:1036 -
\??\c:\dpddp.exec:\dpddp.exe29⤵
- Executes dropped EXE
PID:4352 -
\??\c:\flfxrrl.exec:\flfxrrl.exe30⤵
- Executes dropped EXE
PID:3020 -
\??\c:\vddvp.exec:\vddvp.exe31⤵
- Executes dropped EXE
PID:2064 -
\??\c:\e28602.exec:\e28602.exe32⤵
- Executes dropped EXE
PID:1560 -
\??\c:\2282660.exec:\2282660.exe33⤵
- Executes dropped EXE
PID:4088 -
\??\c:\xlxrffr.exec:\xlxrffr.exe34⤵
- Executes dropped EXE
PID:2056 -
\??\c:\g0600.exec:\g0600.exe35⤵
- Executes dropped EXE
PID:1124 -
\??\c:\60604.exec:\60604.exe36⤵
- Executes dropped EXE
PID:2020 -
\??\c:\xrlfxlx.exec:\xrlfxlx.exe37⤵
- Executes dropped EXE
PID:3756 -
\??\c:\i466662.exec:\i466662.exe38⤵
- Executes dropped EXE
PID:3584 -
\??\c:\8864826.exec:\8864826.exe39⤵
- Executes dropped EXE
PID:592 -
\??\c:\0466048.exec:\0466048.exe40⤵
- Executes dropped EXE
PID:3024 -
\??\c:\688222.exec:\688222.exe41⤵
- Executes dropped EXE
PID:1464 -
\??\c:\tntnnh.exec:\tntnnh.exe42⤵
- Executes dropped EXE
PID:2616 -
\??\c:\462262.exec:\462262.exe43⤵
- Executes dropped EXE
PID:1876 -
\??\c:\8462004.exec:\8462004.exe44⤵
- Executes dropped EXE
PID:1192 -
\??\c:\0844848.exec:\0844848.exe45⤵
- Executes dropped EXE
PID:784 -
\??\c:\lrrrllx.exec:\lrrrllx.exe46⤵
- Executes dropped EXE
PID:2744 -
\??\c:\dpddv.exec:\dpddv.exe47⤵
- Executes dropped EXE
PID:2556 -
\??\c:\hhhhtt.exec:\hhhhtt.exe48⤵
- Executes dropped EXE
PID:4252 -
\??\c:\fxlfxxx.exec:\fxlfxxx.exe49⤵
- Executes dropped EXE
PID:1700 -
\??\c:\frlllff.exec:\frlllff.exe50⤵
- Executes dropped EXE
PID:1292 -
\??\c:\hbhtnt.exec:\hbhtnt.exe51⤵
- Executes dropped EXE
PID:4512 -
\??\c:\8440626.exec:\8440626.exe52⤵
- Executes dropped EXE
PID:336 -
\??\c:\0888660.exec:\0888660.exe53⤵
- Executes dropped EXE
PID:232 -
\??\c:\xrlfxxx.exec:\xrlfxxx.exe54⤵
- Executes dropped EXE
PID:1880 -
\??\c:\84226.exec:\84226.exe55⤵
- Executes dropped EXE
PID:2336 -
\??\c:\xflrlrx.exec:\xflrlrx.exe56⤵
- Executes dropped EXE
PID:4628 -
\??\c:\djdvp.exec:\djdvp.exe57⤵
- Executes dropped EXE
PID:2696 -
\??\c:\1nhbtt.exec:\1nhbtt.exe58⤵
- Executes dropped EXE
PID:4008 -
\??\c:\jpddd.exec:\jpddd.exe59⤵
- Executes dropped EXE
PID:1420 -
\??\c:\42826.exec:\42826.exe60⤵
- Executes dropped EXE
PID:1736 -
\??\c:\bhnbnn.exec:\bhnbnn.exe61⤵
- Executes dropped EXE
PID:4576 -
\??\c:\644860.exec:\644860.exe62⤵
- Executes dropped EXE
PID:1232 -
\??\c:\42608.exec:\42608.exe63⤵
- Executes dropped EXE
PID:4860 -
\??\c:\bhbtnh.exec:\bhbtnh.exe64⤵
- Executes dropped EXE
PID:3864 -
\??\c:\6282620.exec:\6282620.exe65⤵
- Executes dropped EXE
PID:3740 -
\??\c:\rlllrxf.exec:\rlllrxf.exe66⤵PID:3828
-
\??\c:\lflfrlx.exec:\lflfrlx.exe67⤵PID:4844
-
\??\c:\40604.exec:\40604.exe68⤵PID:3152
-
\??\c:\nhbthh.exec:\nhbthh.exe69⤵PID:852
-
\??\c:\220200.exec:\220200.exe70⤵PID:2312
-
\??\c:\66806.exec:\66806.exe71⤵PID:2300
-
\??\c:\40666.exec:\40666.exe72⤵PID:2704
-
\??\c:\nbbthb.exec:\nbbthb.exe73⤵PID:1520
-
\??\c:\jvvvj.exec:\jvvvj.exe74⤵PID:4776
-
\??\c:\flfxrrl.exec:\flfxrrl.exe75⤵PID:4392
-
\??\c:\04604.exec:\04604.exe76⤵PID:1328
-
\??\c:\tnthbt.exec:\tnthbt.exe77⤵PID:1440
-
\??\c:\bhnhbb.exec:\bhnhbb.exe78⤵PID:3452
-
\??\c:\xllffrf.exec:\xllffrf.exe79⤵PID:468
-
\??\c:\20286.exec:\20286.exe80⤵PID:3276
-
\??\c:\dvvpj.exec:\dvvpj.exe81⤵PID:4892
-
\??\c:\tnthbh.exec:\tnthbh.exe82⤵PID:2512
-
\??\c:\644260.exec:\644260.exe83⤵PID:4792
-
\??\c:\422044.exec:\422044.exe84⤵PID:1796
-
\??\c:\bttnbb.exec:\bttnbb.exe85⤵PID:2812
-
\??\c:\7fxlxxr.exec:\7fxlxxr.exe86⤵PID:2020
-
\??\c:\bbtnhb.exec:\bbtnhb.exe87⤵PID:1800
-
\??\c:\xlxxrfx.exec:\xlxxrfx.exe88⤵PID:3032
-
\??\c:\2882604.exec:\2882604.exe89⤵PID:3024
-
\??\c:\8268804.exec:\8268804.exe90⤵PID:4788
-
\??\c:\6206262.exec:\6206262.exe91⤵PID:3908
-
\??\c:\40204.exec:\40204.exe92⤵PID:1984
-
\??\c:\xfxlxxr.exec:\xfxlxxr.exe93⤵PID:1612
-
\??\c:\q68860.exec:\q68860.exe94⤵PID:1776
-
\??\c:\bhtnbt.exec:\bhtnbt.exe95⤵PID:1228
-
\??\c:\pppjp.exec:\pppjp.exe96⤵PID:400
-
\??\c:\q44484.exec:\q44484.exe97⤵PID:4948
-
\??\c:\62208.exec:\62208.exe98⤵PID:3988
-
\??\c:\086044.exec:\086044.exe99⤵PID:4512
-
\??\c:\668600.exec:\668600.exe100⤵PID:668
-
\??\c:\k46600.exec:\k46600.exe101⤵PID:984
-
\??\c:\86866.exec:\86866.exe102⤵PID:2292
-
\??\c:\fllfrlf.exec:\fllfrlf.exe103⤵PID:1936
-
\??\c:\08226.exec:\08226.exe104⤵PID:3572
-
\??\c:\xrxlfxx.exec:\xrxlfxx.exe105⤵PID:5072
-
\??\c:\866082.exec:\866082.exe106⤵PID:3916
-
\??\c:\4886048.exec:\4886048.exe107⤵PID:4168
-
\??\c:\60008.exec:\60008.exe108⤵PID:2308
-
\??\c:\4248660.exec:\4248660.exe109⤵PID:3124
-
\??\c:\bbtbnn.exec:\bbtbnn.exe110⤵PID:3588
-
\??\c:\ttbthh.exec:\ttbthh.exe111⤵PID:1396
-
\??\c:\hhnbtt.exec:\hhnbtt.exe112⤵PID:2644
-
\??\c:\xllxlrl.exec:\xllxlrl.exe113⤵PID:220
-
\??\c:\dppjv.exec:\dppjv.exe114⤵PID:3496
-
\??\c:\7ddvp.exec:\7ddvp.exe115⤵PID:1536
-
\??\c:\dvppp.exec:\dvppp.exe116⤵PID:4084
-
\??\c:\jvdjd.exec:\jvdjd.exe117⤵PID:4024
-
\??\c:\lxxrffx.exec:\lxxrffx.exe118⤵PID:5060
-
\??\c:\pddpd.exec:\pddpd.exe119⤵PID:2280
-
\??\c:\4886004.exec:\4886004.exe120⤵PID:1128
-
\??\c:\llfxrrr.exec:\llfxrrr.exe121⤵PID:4112
-
\??\c:\862220.exec:\862220.exe122⤵PID:852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-