Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 22:55
Behavioral task
behavioral1
Sample
24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe
-
Size
441KB
-
MD5
24184fbe84a49c31bca442e24e193730
-
SHA1
d46cdeca238bebf93288f12de2c036a3ed80984d
-
SHA256
348db13714932ecffda8039d11264d7c0ac29d2c25db1500355509e55605229c
-
SHA512
209f25facff9842fa62041e98332416a43013f22c709e470b82d38b7eef1f7269a8072a05a5e93afc1f4accc4856229e7b03a0b0964b1a97edbee3ae62bee00a
-
SSDEEP
12288:w4wFHoS9KxbNnidEhjEJd1kNpeUgI95yRoZHVaoJMOxFXnRV4PiGO0hUmH0:kKxbNndhjEJd1kNpeUgI95yRoZHgoJMa
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2320-0-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1936-7-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2696-23-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3972-41-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4664-36-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4008-35-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4492-18-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3864-49-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3576-71-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/336-255-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2336-267-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2696-272-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1736-280-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1232-287-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3864-292-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3740-296-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4512-252-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1700-245-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2744-234-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/784-231-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2616-220-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3584-209-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2020-199-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1124-196-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2056-192-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1560-184-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2064-179-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1036-162-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4032-156-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4168-136-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1956-128-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3004-123-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2108-101-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4744-96-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/656-91-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2364-88-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3112-73-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1016-66-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2312-313-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2300-320-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4776-330-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4892-352-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4792-356-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2812-363-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4788-379-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4788-383-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/400-401-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4948-403-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4512-414-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1944-494-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1688-507-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1864-548-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2884-555-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1944-645-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4428-649-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/224-692-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4008-729-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1396-749-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/4340-762-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2104-766-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/2164-833-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1612-840-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1540-1196-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/3040-1224-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\fllfxxx.exe family_berbew C:\xlxxrrr.exe family_berbew C:\64486.exe family_berbew \??\c:\bbnhbt.exe family_berbew \??\c:\1hbhbb.exe family_berbew \??\c:\4282884.exe family_berbew \??\c:\8222046.exe family_berbew C:\0622664.exe family_berbew C:\60228.exe family_berbew \??\c:\062048.exe family_berbew C:\rxrllll.exe family_berbew \??\c:\426606.exe family_berbew \??\c:\60606.exe family_berbew \??\c:\0660044.exe family_berbew \??\c:\llfrlrl.exe family_berbew \??\c:\0482666.exe family_berbew \??\c:\m0660.exe family_berbew \??\c:\m0666.exe family_berbew \??\c:\k06040.exe family_berbew \??\c:\xrxrffl.exe family_berbew \??\c:\08482.exe family_berbew C:\e28602.exe family_berbew \??\c:\2282660.exe family_berbew \??\c:\vddvp.exe family_berbew \??\c:\flfxrrl.exe family_berbew \??\c:\dpddp.exe family_berbew \??\c:\80266.exe family_berbew \??\c:\8284482.exe family_berbew \??\c:\8026660.exe family_berbew \??\c:\28244.exe family_berbew \??\c:\ddvpd.exe family_berbew \??\c:\thnbbb.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
fllfxxx.exexlxxrrr.exe64486.exe8222046.exe4282884.exebbnhbt.exe1hbhbb.exe0622664.exe60228.exe062048.exerxrllll.exe426606.exe60606.exe0660044.exellfrlrl.exe0482666.exem0660.exethnbbb.exem0666.exek06040.exexrxrffl.exeddvpd.exe28244.exe8026660.exe08482.exe8284482.exe80266.exedpddp.exeflfxrrl.exevddvp.exee28602.exe2282660.exexlxrffr.exeg0600.exe60604.exexrlfxlx.exei466662.exe8864826.exe0466048.exe688222.exetntnnh.exe462262.exe8462004.exe0844848.exelrrrllx.exedpddv.exehhhhtt.exefxlfxxx.exefrlllff.exehbhtnt.exe8440626.exe0888660.exexrlfxxx.exe84226.exexflrlrx.exedjdvp.exe1nhbtt.exejpddd.exe42826.exebhnbnn.exe644860.exe42608.exebhbtnh.exe6282620.exepid process 1936 fllfxxx.exe 4516 xlxxrrr.exe 4492 64486.exe 2696 8222046.exe 4008 4282884.exe 4664 bbnhbt.exe 3972 1hbhbb.exe 3864 0622664.exe 2524 60228.exe 1016 062048.exe 3576 rxrllll.exe 3112 426606.exe 2312 60606.exe 2364 0660044.exe 656 llfrlrl.exe 4744 0482666.exe 2108 m0660.exe 5084 thnbbb.exe 3204 m0666.exe 3004 k06040.exe 1956 xrxrffl.exe 4168 ddvpd.exe 2376 28244.exe 1756 8026660.exe 4396 08482.exe 4032 8284482.exe 1036 80266.exe 4352 dpddp.exe 3020 flfxrrl.exe 2064 vddvp.exe 1560 e28602.exe 4088 2282660.exe 2056 xlxrffr.exe 1124 g0600.exe 2020 60604.exe 3756 xrlfxlx.exe 3584 i466662.exe 592 8864826.exe 3024 0466048.exe 1464 688222.exe 2616 tntnnh.exe 1876 462262.exe 1192 8462004.exe 784 0844848.exe 2744 lrrrllx.exe 2556 dpddv.exe 4252 hhhhtt.exe 1700 fxlfxxx.exe 1292 frlllff.exe 4512 hbhtnt.exe 336 8440626.exe 232 0888660.exe 1880 xrlfxxx.exe 2336 84226.exe 4628 xflrlrx.exe 2696 djdvp.exe 4008 1nhbtt.exe 1420 jpddd.exe 1736 42826.exe 4576 bhnbnn.exe 1232 644860.exe 4860 42608.exe 3864 bhbtnh.exe 3740 6282620.exe -
Processes:
resource yara_rule behavioral2/memory/2320-0-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\fllfxxx.exe upx behavioral2/memory/1936-7-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\xlxxrrr.exe upx C:\64486.exe upx behavioral2/memory/2696-23-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\bbnhbt.exe upx \??\c:\1hbhbb.exe upx behavioral2/memory/3972-41-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4664-36-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4008-35-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\4282884.exe upx \??\c:\8222046.exe upx behavioral2/memory/4492-18-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\0622664.exe upx C:\60228.exe upx behavioral2/memory/3864-49-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2524-52-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\062048.exe upx C:\rxrllll.exe upx \??\c:\426606.exe upx behavioral2/memory/3576-71-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\60606.exe upx \??\c:\0660044.exe upx \??\c:\llfrlrl.exe upx \??\c:\0482666.exe upx \??\c:\m0660.exe upx \??\c:\m0666.exe upx \??\c:\k06040.exe upx \??\c:\xrxrffl.exe upx \??\c:\08482.exe upx C:\e28602.exe upx behavioral2/memory/336-255-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2336-267-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2696-272-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1736-280-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1232-287-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3864-292-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3740-296-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/4512-252-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1700-245-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2744-234-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/784-231-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2616-220-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3584-209-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2020-199-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1124-196-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/2056-192-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/1560-184-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\2282660.exe upx behavioral2/memory/2064-179-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\vddvp.exe upx \??\c:\flfxrrl.exe upx behavioral2/memory/1036-162-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\dpddp.exe upx behavioral2/memory/4032-156-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\80266.exe upx \??\c:\8284482.exe upx \??\c:\8026660.exe upx behavioral2/memory/4168-136-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\28244.exe upx behavioral2/memory/1956-128-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\ddvpd.exe upx behavioral2/memory/3004-123-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exefllfxxx.exexlxxrrr.exe64486.exe8222046.exe4282884.exebbnhbt.exe1hbhbb.exe0622664.exe60228.exe062048.exerxrllll.exe426606.exe60606.exe0660044.exellfrlrl.exe0482666.exem0660.exethnbbb.exem0666.exek06040.exexrxrffl.exedescription pid process target process PID 2320 wrote to memory of 1936 2320 24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe fllfxxx.exe PID 2320 wrote to memory of 1936 2320 24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe fllfxxx.exe PID 2320 wrote to memory of 1936 2320 24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe fllfxxx.exe PID 1936 wrote to memory of 4516 1936 fllfxxx.exe xlxxrrr.exe PID 1936 wrote to memory of 4516 1936 fllfxxx.exe xlxxrrr.exe PID 1936 wrote to memory of 4516 1936 fllfxxx.exe xlxxrrr.exe PID 4516 wrote to memory of 4492 4516 xlxxrrr.exe 64486.exe PID 4516 wrote to memory of 4492 4516 xlxxrrr.exe 64486.exe PID 4516 wrote to memory of 4492 4516 xlxxrrr.exe 64486.exe PID 4492 wrote to memory of 2696 4492 64486.exe djdvp.exe PID 4492 wrote to memory of 2696 4492 64486.exe djdvp.exe PID 4492 wrote to memory of 2696 4492 64486.exe djdvp.exe PID 2696 wrote to memory of 4008 2696 8222046.exe 1nhbtt.exe PID 2696 wrote to memory of 4008 2696 8222046.exe 1nhbtt.exe PID 2696 wrote to memory of 4008 2696 8222046.exe 1nhbtt.exe PID 4008 wrote to memory of 4664 4008 4282884.exe bbnhbt.exe PID 4008 wrote to memory of 4664 4008 4282884.exe bbnhbt.exe PID 4008 wrote to memory of 4664 4008 4282884.exe bbnhbt.exe PID 4664 wrote to memory of 3972 4664 bbnhbt.exe 1hbhbb.exe PID 4664 wrote to memory of 3972 4664 bbnhbt.exe 1hbhbb.exe PID 4664 wrote to memory of 3972 4664 bbnhbt.exe 1hbhbb.exe PID 3972 wrote to memory of 3864 3972 1hbhbb.exe bhbtnh.exe PID 3972 wrote to memory of 3864 3972 1hbhbb.exe bhbtnh.exe PID 3972 wrote to memory of 3864 3972 1hbhbb.exe bhbtnh.exe PID 3864 wrote to memory of 2524 3864 0622664.exe 60228.exe PID 3864 wrote to memory of 2524 3864 0622664.exe 60228.exe PID 3864 wrote to memory of 2524 3864 0622664.exe 60228.exe PID 2524 wrote to memory of 1016 2524 60228.exe 062048.exe PID 2524 wrote to memory of 1016 2524 60228.exe 062048.exe PID 2524 wrote to memory of 1016 2524 60228.exe 062048.exe PID 1016 wrote to memory of 3576 1016 062048.exe rxrllll.exe PID 1016 wrote to memory of 3576 1016 062048.exe rxrllll.exe PID 1016 wrote to memory of 3576 1016 062048.exe rxrllll.exe PID 3576 wrote to memory of 3112 3576 rxrllll.exe 426606.exe PID 3576 wrote to memory of 3112 3576 rxrllll.exe 426606.exe PID 3576 wrote to memory of 3112 3576 rxrllll.exe 426606.exe PID 3112 wrote to memory of 2312 3112 426606.exe 220200.exe PID 3112 wrote to memory of 2312 3112 426606.exe 220200.exe PID 3112 wrote to memory of 2312 3112 426606.exe 220200.exe PID 2312 wrote to memory of 2364 2312 60606.exe 0660044.exe PID 2312 wrote to memory of 2364 2312 60606.exe 0660044.exe PID 2312 wrote to memory of 2364 2312 60606.exe 0660044.exe PID 2364 wrote to memory of 656 2364 0660044.exe llfrlrl.exe PID 2364 wrote to memory of 656 2364 0660044.exe llfrlrl.exe PID 2364 wrote to memory of 656 2364 0660044.exe llfrlrl.exe PID 656 wrote to memory of 4744 656 llfrlrl.exe 0482666.exe PID 656 wrote to memory of 4744 656 llfrlrl.exe 0482666.exe PID 656 wrote to memory of 4744 656 llfrlrl.exe 0482666.exe PID 4744 wrote to memory of 2108 4744 0482666.exe m0660.exe PID 4744 wrote to memory of 2108 4744 0482666.exe m0660.exe PID 4744 wrote to memory of 2108 4744 0482666.exe m0660.exe PID 2108 wrote to memory of 5084 2108 m0660.exe thnbbb.exe PID 2108 wrote to memory of 5084 2108 m0660.exe thnbbb.exe PID 2108 wrote to memory of 5084 2108 m0660.exe thnbbb.exe PID 5084 wrote to memory of 3204 5084 thnbbb.exe m0666.exe PID 5084 wrote to memory of 3204 5084 thnbbb.exe m0666.exe PID 5084 wrote to memory of 3204 5084 thnbbb.exe m0666.exe PID 3204 wrote to memory of 3004 3204 m0666.exe k06040.exe PID 3204 wrote to memory of 3004 3204 m0666.exe k06040.exe PID 3204 wrote to memory of 3004 3204 m0666.exe k06040.exe PID 3004 wrote to memory of 1956 3004 k06040.exe xrxrffl.exe PID 3004 wrote to memory of 1956 3004 k06040.exe xrxrffl.exe PID 3004 wrote to memory of 1956 3004 k06040.exe xrxrffl.exe PID 1956 wrote to memory of 4168 1956 xrxrffl.exe ddvpd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\24184fbe84a49c31bca442e24e193730_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\fllfxxx.exec:\fllfxxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\xlxxrrr.exec:\xlxxrrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\64486.exec:\64486.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
\??\c:\8222046.exec:\8222046.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\4282884.exec:\4282884.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\bbnhbt.exec:\bbnhbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\1hbhbb.exec:\1hbhbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\0622664.exec:\0622664.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\60228.exec:\60228.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\062048.exec:\062048.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\rxrllll.exec:\rxrllll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\426606.exec:\426606.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
\??\c:\60606.exec:\60606.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\0660044.exec:\0660044.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\llfrlrl.exec:\llfrlrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\0482666.exec:\0482666.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\m0660.exec:\m0660.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\thnbbb.exec:\thnbbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\m0666.exec:\m0666.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
\??\c:\k06040.exec:\k06040.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\xrxrffl.exec:\xrxrffl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\ddvpd.exec:\ddvpd.exe23⤵
- Executes dropped EXE
PID:4168 -
\??\c:\28244.exec:\28244.exe24⤵
- Executes dropped EXE
PID:2376 -
\??\c:\8026660.exec:\8026660.exe25⤵
- Executes dropped EXE
PID:1756 -
\??\c:\08482.exec:\08482.exe26⤵
- Executes dropped EXE
PID:4396 -
\??\c:\8284482.exec:\8284482.exe27⤵
- Executes dropped EXE
PID:4032 -
\??\c:\80266.exec:\80266.exe28⤵
- Executes dropped EXE
PID:1036 -
\??\c:\dpddp.exec:\dpddp.exe29⤵
- Executes dropped EXE
PID:4352 -
\??\c:\flfxrrl.exec:\flfxrrl.exe30⤵
- Executes dropped EXE
PID:3020 -
\??\c:\vddvp.exec:\vddvp.exe31⤵
- Executes dropped EXE
PID:2064 -
\??\c:\e28602.exec:\e28602.exe32⤵
- Executes dropped EXE
PID:1560 -
\??\c:\2282660.exec:\2282660.exe33⤵
- Executes dropped EXE
PID:4088 -
\??\c:\xlxrffr.exec:\xlxrffr.exe34⤵
- Executes dropped EXE
PID:2056 -
\??\c:\g0600.exec:\g0600.exe35⤵
- Executes dropped EXE
PID:1124 -
\??\c:\60604.exec:\60604.exe36⤵
- Executes dropped EXE
PID:2020 -
\??\c:\xrlfxlx.exec:\xrlfxlx.exe37⤵
- Executes dropped EXE
PID:3756 -
\??\c:\i466662.exec:\i466662.exe38⤵
- Executes dropped EXE
PID:3584 -
\??\c:\8864826.exec:\8864826.exe39⤵
- Executes dropped EXE
PID:592 -
\??\c:\0466048.exec:\0466048.exe40⤵
- Executes dropped EXE
PID:3024 -
\??\c:\688222.exec:\688222.exe41⤵
- Executes dropped EXE
PID:1464 -
\??\c:\tntnnh.exec:\tntnnh.exe42⤵
- Executes dropped EXE
PID:2616 -
\??\c:\462262.exec:\462262.exe43⤵
- Executes dropped EXE
PID:1876 -
\??\c:\8462004.exec:\8462004.exe44⤵
- Executes dropped EXE
PID:1192 -
\??\c:\0844848.exec:\0844848.exe45⤵
- Executes dropped EXE
PID:784 -
\??\c:\lrrrllx.exec:\lrrrllx.exe46⤵
- Executes dropped EXE
PID:2744 -
\??\c:\dpddv.exec:\dpddv.exe47⤵
- Executes dropped EXE
PID:2556 -
\??\c:\hhhhtt.exec:\hhhhtt.exe48⤵
- Executes dropped EXE
PID:4252 -
\??\c:\fxlfxxx.exec:\fxlfxxx.exe49⤵
- Executes dropped EXE
PID:1700 -
\??\c:\frlllff.exec:\frlllff.exe50⤵
- Executes dropped EXE
PID:1292 -
\??\c:\hbhtnt.exec:\hbhtnt.exe51⤵
- Executes dropped EXE
PID:4512 -
\??\c:\8440626.exec:\8440626.exe52⤵
- Executes dropped EXE
PID:336 -
\??\c:\0888660.exec:\0888660.exe53⤵
- Executes dropped EXE
PID:232 -
\??\c:\xrlfxxx.exec:\xrlfxxx.exe54⤵
- Executes dropped EXE
PID:1880 -
\??\c:\84226.exec:\84226.exe55⤵
- Executes dropped EXE
PID:2336 -
\??\c:\xflrlrx.exec:\xflrlrx.exe56⤵
- Executes dropped EXE
PID:4628 -
\??\c:\djdvp.exec:\djdvp.exe57⤵
- Executes dropped EXE
PID:2696 -
\??\c:\1nhbtt.exec:\1nhbtt.exe58⤵
- Executes dropped EXE
PID:4008 -
\??\c:\jpddd.exec:\jpddd.exe59⤵
- Executes dropped EXE
PID:1420 -
\??\c:\42826.exec:\42826.exe60⤵
- Executes dropped EXE
PID:1736 -
\??\c:\bhnbnn.exec:\bhnbnn.exe61⤵
- Executes dropped EXE
PID:4576 -
\??\c:\644860.exec:\644860.exe62⤵
- Executes dropped EXE
PID:1232 -
\??\c:\42608.exec:\42608.exe63⤵
- Executes dropped EXE
PID:4860 -
\??\c:\bhbtnh.exec:\bhbtnh.exe64⤵
- Executes dropped EXE
PID:3864 -
\??\c:\6282620.exec:\6282620.exe65⤵
- Executes dropped EXE
PID:3740 -
\??\c:\rlllrxf.exec:\rlllrxf.exe66⤵PID:3828
-
\??\c:\lflfrlx.exec:\lflfrlx.exe67⤵PID:4844
-
\??\c:\40604.exec:\40604.exe68⤵PID:3152
-
\??\c:\nhbthh.exec:\nhbthh.exe69⤵PID:852
-
\??\c:\220200.exec:\220200.exe70⤵PID:2312
-
\??\c:\66806.exec:\66806.exe71⤵PID:2300
-
\??\c:\40666.exec:\40666.exe72⤵PID:2704
-
\??\c:\nbbthb.exec:\nbbthb.exe73⤵PID:1520
-
\??\c:\jvvvj.exec:\jvvvj.exe74⤵PID:4776
-
\??\c:\flfxrrl.exec:\flfxrrl.exe75⤵PID:4392
-
\??\c:\04604.exec:\04604.exe76⤵PID:1328
-
\??\c:\tnthbt.exec:\tnthbt.exe77⤵PID:1440
-
\??\c:\bhnhbb.exec:\bhnhbb.exe78⤵PID:3452
-
\??\c:\xllffrf.exec:\xllffrf.exe79⤵PID:468
-
\??\c:\20286.exec:\20286.exe80⤵PID:3276
-
\??\c:\dvvpj.exec:\dvvpj.exe81⤵PID:4892
-
\??\c:\tnthbh.exec:\tnthbh.exe82⤵PID:2512
-
\??\c:\644260.exec:\644260.exe83⤵PID:4792
-
\??\c:\422044.exec:\422044.exe84⤵PID:1796
-
\??\c:\bttnbb.exec:\bttnbb.exe85⤵PID:2812
-
\??\c:\7fxlxxr.exec:\7fxlxxr.exe86⤵PID:2020
-
\??\c:\bbtnhb.exec:\bbtnhb.exe87⤵PID:1800
-
\??\c:\xlxxrfx.exec:\xlxxrfx.exe88⤵PID:3032
-
\??\c:\2882604.exec:\2882604.exe89⤵PID:3024
-
\??\c:\8268804.exec:\8268804.exe90⤵PID:4788
-
\??\c:\6206262.exec:\6206262.exe91⤵PID:3908
-
\??\c:\40204.exec:\40204.exe92⤵PID:1984
-
\??\c:\xfxlxxr.exec:\xfxlxxr.exe93⤵PID:1612
-
\??\c:\q68860.exec:\q68860.exe94⤵PID:1776
-
\??\c:\bhtnbt.exec:\bhtnbt.exe95⤵PID:1228
-
\??\c:\pppjp.exec:\pppjp.exe96⤵PID:400
-
\??\c:\q44484.exec:\q44484.exe97⤵PID:4948
-
\??\c:\62208.exec:\62208.exe98⤵PID:3988
-
\??\c:\086044.exec:\086044.exe99⤵PID:4512
-
\??\c:\668600.exec:\668600.exe100⤵PID:668
-
\??\c:\k46600.exec:\k46600.exe101⤵PID:984
-
\??\c:\86866.exec:\86866.exe102⤵PID:2292
-
\??\c:\fllfrlf.exec:\fllfrlf.exe103⤵PID:1936
-
\??\c:\08226.exec:\08226.exe104⤵PID:3572
-
\??\c:\xrxlfxx.exec:\xrxlfxx.exe105⤵PID:5072
-
\??\c:\866082.exec:\866082.exe106⤵PID:3916
-
\??\c:\4886048.exec:\4886048.exe107⤵PID:4168
-
\??\c:\60008.exec:\60008.exe108⤵PID:2308
-
\??\c:\4248660.exec:\4248660.exe109⤵PID:3124
-
\??\c:\bbtbnn.exec:\bbtbnn.exe110⤵PID:3588
-
\??\c:\ttbthh.exec:\ttbthh.exe111⤵PID:1396
-
\??\c:\hhnbtt.exec:\hhnbtt.exe112⤵PID:2644
-
\??\c:\xllxlrl.exec:\xllxlrl.exe113⤵PID:220
-
\??\c:\dppjv.exec:\dppjv.exe114⤵PID:3496
-
\??\c:\7ddvp.exec:\7ddvp.exe115⤵PID:1536
-
\??\c:\dvppp.exec:\dvppp.exe116⤵PID:4084
-
\??\c:\jvdjd.exec:\jvdjd.exe117⤵PID:4024
-
\??\c:\lxxrffx.exec:\lxxrffx.exe118⤵PID:5060
-
\??\c:\pddpd.exec:\pddpd.exe119⤵PID:2280
-
\??\c:\4886004.exec:\4886004.exe120⤵PID:1128
-
\??\c:\llfxrrr.exec:\llfxrrr.exe121⤵PID:4112
-
\??\c:\862220.exec:\862220.exe122⤵PID:852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-