Analysis
-
max time kernel
72s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 21:47
Behavioral task
behavioral1
Sample
1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe
Resource
win7-20240220-en
5 signatures
150 seconds
General
-
Target
1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe
-
Size
234KB
-
MD5
6186641f31b66060ed80257a9e30ec90
-
SHA1
e53f3be89641de8cacf5f27e05e7899e4775be11
-
SHA256
1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54
-
SHA512
ca33f9a18c3bc47e6158d6233192b930d01e60201aac229f44fc4ac22e204ddc5efc75071be859e0001254b3b549e24282730a97d1e54496009cc8bd88b682da
-
SSDEEP
6144:kcm4FmowdHoSSGpJw4PqhraHcpOmFTHDGYhEf5X2aD:y4wFHoSSGpJwGeeFmFTNAp2+
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3540-38-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2716-55-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4264-85-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2112-102-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2404-110-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4612-191-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4904-216-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2848-239-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2628-245-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/384-256-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4696-255-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2280-264-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3276-287-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2024-347-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4256-357-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4928-378-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4240-390-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2000-423-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1700-464-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2324-562-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1188-576-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4964-983-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3480-967-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/632-942-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4880-883-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2060-744-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/856-694-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1448-552-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2104-503-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2824-493-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4280-459-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4884-440-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1308-419-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2236-415-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4888-379-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4216-368-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3040-364-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4676-334-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/432-322-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/852-320-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/792-297-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3304-268-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2280-260-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1948-232-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4880-228-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3392-213-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2560-209-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/640-202-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4556-197-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1188-180-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1872-168-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4864-160-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/452-154-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/388-142-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2912-116-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/632-105-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/668-95-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3464-74-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/792-72-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3816-63-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4852-45-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/3600-46-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2312-31-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/1012-25-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3rlfrfl.exethttht.exejvpvd.exerxfxxrf.exehbbtth.exejpvpd.exexfxllff.exethbbnt.exedddvj.exelfrrlll.exexrxlfll.exetnthtt.exejpdpp.exefxlfxlx.exejppdp.exexfllrfl.exelxrlxlx.exejvjdp.exefxlrrfr.exebhbntn.exejjddd.exevjppj.exenbbnnb.exethbbnb.exefrlxfrx.exehhbnbh.exevvddd.exerlflrxf.exetntnnn.exejdjdj.exedvdjp.exexffxxlf.exebnnhbb.exepddpp.exejdddp.exexlfxrfr.exetbbbth.exebbnhbb.exevvpjp.exexffxllx.exehtbbbh.exelfffxxx.exenbbbbb.exebbbtbb.exevdjdv.exelxfxlxx.exenhbntt.exedpvvd.exerfxffxx.exettbbbt.exenbnnhh.exelrlfxrf.exebbbntn.exe3pvpp.exeddpdj.exelrrfxxx.exebtbbhh.exethbtnt.exevjpjp.exeddddd.exerffxxxx.exehhbnnb.exejpvpv.exepvddv.exepid process 740 3rlfrfl.exe 1700 thttht.exe 1012 jvpvd.exe 2312 rxfxxrf.exe 3540 hbbtth.exe 4852 jpvpd.exe 3600 xfxllff.exe 2716 thbbnt.exe 3068 dddvj.exe 3816 lfrrlll.exe 792 xrxlfll.exe 3464 tnthtt.exe 4264 jpdpp.exe 656 fxlfxlx.exe 668 jppdp.exe 2112 xfllrfl.exe 632 lxrlxlx.exe 2404 jvjdp.exe 2912 fxlrrfr.exe 2864 bhbntn.exe 2252 jjddd.exe 1144 vjppj.exe 848 nbbnnb.exe 388 thbbnb.exe 1372 frlxfrx.exe 452 hhbnbh.exe 4864 vvddd.exe 1872 rlflrxf.exe 4848 tntnnn.exe 1720 jdjdj.exe 1188 dvdjp.exe 4612 xffxxlf.exe 4488 bnnhbb.exe 4556 pddpp.exe 640 jdddp.exe 3396 xlfxrfr.exe 2560 tbbbth.exe 3392 bbnhbb.exe 4904 vvpjp.exe 4680 xffxllx.exe 5016 htbbbh.exe 4448 lfffxxx.exe 4880 nbbbbb.exe 1948 bbbtbb.exe 224 vdjdv.exe 2848 lxfxlxx.exe 4892 nhbntt.exe 2628 dpvvd.exe 4324 rfxffxx.exe 1424 ttbbbt.exe 4696 nbnnhh.exe 384 lrlfxrf.exe 2280 bbbntn.exe 2552 3pvpp.exe 3304 ddpdj.exe 2596 lrrfxxx.exe 3956 btbbhh.exe 4752 thbtnt.exe 980 vjpjp.exe 3276 ddddd.exe 3896 rffxxxx.exe 1516 hhbnnb.exe 792 jpvpv.exe 4076 pvddv.exe -
Processes:
resource yara_rule behavioral2/memory/1700-14-0x0000000000400000-0x0000000000437000-memory.dmp upx \??\c:\jvpvd.exe upx \??\c:\rxfxxrf.exe upx \??\c:\hbbtth.exe upx behavioral2/memory/3540-38-0x0000000000400000-0x0000000000437000-memory.dmp upx \??\c:\thbbnt.exe upx C:\dddvj.exe upx behavioral2/memory/2716-55-0x0000000000400000-0x0000000000437000-memory.dmp upx \??\c:\lfrrlll.exe upx \??\c:\xrxlfll.exe upx \??\c:\jpdpp.exe upx behavioral2/memory/4264-85-0x0000000000400000-0x0000000000437000-memory.dmp upx \??\c:\fxlfxlx.exe upx \??\c:\jppdp.exe upx behavioral2/memory/2112-97-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2112-102-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2404-110-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\frlxfrx.exe upx \??\c:\hhbnbh.exe upx \??\c:\rlflrxf.exe upx behavioral2/memory/4612-191-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4904-216-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2848-239-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2628-245-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/384-256-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4696-255-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2280-264-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3276-287-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2024-347-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4256-357-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4928-378-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3236-383-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4240-390-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2000-423-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1888-427-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1700-464-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2324-562-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1188-576-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/5116-802-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2196-838-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1316-910-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2584-1020-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4964-983-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3480-967-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/632-942-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2276-926-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4880-883-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4796-842-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4268-825-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3176-812-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1188-771-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1720-761-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3516-745-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2060-744-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/432-731-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/856-694-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4548-684-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3576-671-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3760-667-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4880-627-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/4692-620-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1336-592-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1188-572-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/1448-552-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe3rlfrfl.exethttht.exejvpvd.exerxfxxrf.exehbbtth.exejpvpd.exexfxllff.exethbbnt.exedddvj.exelfrrlll.exexrxlfll.exetnthtt.exejpdpp.exefxlfxlx.exejppdp.exexfllrfl.exelxrlxlx.exejvjdp.exefxlrrfr.exebhbntn.exejjddd.exedescription pid process target process PID 2152 wrote to memory of 740 2152 1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe vjddv.exe PID 2152 wrote to memory of 740 2152 1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe vjddv.exe PID 2152 wrote to memory of 740 2152 1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe vjddv.exe PID 740 wrote to memory of 1700 740 3rlfrfl.exe thttht.exe PID 740 wrote to memory of 1700 740 3rlfrfl.exe thttht.exe PID 740 wrote to memory of 1700 740 3rlfrfl.exe thttht.exe PID 1700 wrote to memory of 1012 1700 thttht.exe jvpvd.exe PID 1700 wrote to memory of 1012 1700 thttht.exe jvpvd.exe PID 1700 wrote to memory of 1012 1700 thttht.exe jvpvd.exe PID 1012 wrote to memory of 2312 1012 jvpvd.exe rxfxxrf.exe PID 1012 wrote to memory of 2312 1012 jvpvd.exe rxfxxrf.exe PID 1012 wrote to memory of 2312 1012 jvpvd.exe rxfxxrf.exe PID 2312 wrote to memory of 3540 2312 rxfxxrf.exe hbbtth.exe PID 2312 wrote to memory of 3540 2312 rxfxxrf.exe hbbtth.exe PID 2312 wrote to memory of 3540 2312 rxfxxrf.exe hbbtth.exe PID 3540 wrote to memory of 4852 3540 hbbtth.exe jpvpd.exe PID 3540 wrote to memory of 4852 3540 hbbtth.exe jpvpd.exe PID 3540 wrote to memory of 4852 3540 hbbtth.exe jpvpd.exe PID 4852 wrote to memory of 3600 4852 jpvpd.exe xfxllff.exe PID 4852 wrote to memory of 3600 4852 jpvpd.exe xfxllff.exe PID 4852 wrote to memory of 3600 4852 jpvpd.exe xfxllff.exe PID 3600 wrote to memory of 2716 3600 xfxllff.exe thbbnt.exe PID 3600 wrote to memory of 2716 3600 xfxllff.exe thbbnt.exe PID 3600 wrote to memory of 2716 3600 xfxllff.exe thbbnt.exe PID 2716 wrote to memory of 3068 2716 thbbnt.exe dddvj.exe PID 2716 wrote to memory of 3068 2716 thbbnt.exe dddvj.exe PID 2716 wrote to memory of 3068 2716 thbbnt.exe dddvj.exe PID 3068 wrote to memory of 3816 3068 dddvj.exe lfrrlll.exe PID 3068 wrote to memory of 3816 3068 dddvj.exe lfrrlll.exe PID 3068 wrote to memory of 3816 3068 dddvj.exe lfrrlll.exe PID 3816 wrote to memory of 792 3816 lfrrlll.exe xrxlfll.exe PID 3816 wrote to memory of 792 3816 lfrrlll.exe xrxlfll.exe PID 3816 wrote to memory of 792 3816 lfrrlll.exe xrxlfll.exe PID 792 wrote to memory of 3464 792 xrxlfll.exe tnthtt.exe PID 792 wrote to memory of 3464 792 xrxlfll.exe tnthtt.exe PID 792 wrote to memory of 3464 792 xrxlfll.exe tnthtt.exe PID 3464 wrote to memory of 4264 3464 tnthtt.exe jpdpp.exe PID 3464 wrote to memory of 4264 3464 tnthtt.exe jpdpp.exe PID 3464 wrote to memory of 4264 3464 tnthtt.exe jpdpp.exe PID 4264 wrote to memory of 656 4264 jpdpp.exe fxlfxlx.exe PID 4264 wrote to memory of 656 4264 jpdpp.exe fxlfxlx.exe PID 4264 wrote to memory of 656 4264 jpdpp.exe fxlfxlx.exe PID 656 wrote to memory of 668 656 fxlfxlx.exe jppdp.exe PID 656 wrote to memory of 668 656 fxlfxlx.exe jppdp.exe PID 656 wrote to memory of 668 656 fxlfxlx.exe jppdp.exe PID 668 wrote to memory of 2112 668 jppdp.exe xfllrfl.exe PID 668 wrote to memory of 2112 668 jppdp.exe xfllrfl.exe PID 668 wrote to memory of 2112 668 jppdp.exe xfllrfl.exe PID 2112 wrote to memory of 632 2112 xfllrfl.exe lxrlxlx.exe PID 2112 wrote to memory of 632 2112 xfllrfl.exe lxrlxlx.exe PID 2112 wrote to memory of 632 2112 xfllrfl.exe lxrlxlx.exe PID 632 wrote to memory of 2404 632 lxrlxlx.exe jvjdp.exe PID 632 wrote to memory of 2404 632 lxrlxlx.exe jvjdp.exe PID 632 wrote to memory of 2404 632 lxrlxlx.exe jvjdp.exe PID 2404 wrote to memory of 2912 2404 jvjdp.exe fxlrrfr.exe PID 2404 wrote to memory of 2912 2404 jvjdp.exe fxlrrfr.exe PID 2404 wrote to memory of 2912 2404 jvjdp.exe fxlrrfr.exe PID 2912 wrote to memory of 2864 2912 fxlrrfr.exe dpjpj.exe PID 2912 wrote to memory of 2864 2912 fxlrrfr.exe dpjpj.exe PID 2912 wrote to memory of 2864 2912 fxlrrfr.exe dpjpj.exe PID 2864 wrote to memory of 2252 2864 bhbntn.exe PID 2864 wrote to memory of 2252 2864 bhbntn.exe PID 2864 wrote to memory of 2252 2864 bhbntn.exe PID 2252 wrote to memory of 1144 2252 jjddd.exe djvjd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1c8b1690cf1b4ce4004e120f8f634507d7cdde0e33e5c22072c207c8dc191b54_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\3rlfrfl.exec:\3rlfrfl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thttht.exec:\thttht.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvpvd.exec:\jvpvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxfxxrf.exec:\rxfxxrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbbtth.exec:\hbbtth.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpvpd.exec:\jpvpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfxllff.exec:\xfxllff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thbbnt.exec:\thbbnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dddvj.exec:\dddvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrrlll.exec:\lfrrlll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrxlfll.exec:\xrxlfll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnthtt.exec:\tnthtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpdpp.exec:\jpdpp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxlfxlx.exec:\fxlfxlx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jppdp.exec:\jppdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfllrfl.exec:\xfllrfl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxrlxlx.exec:\lxrlxlx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvjdp.exec:\jvjdp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxlrrfr.exec:\fxlrrfr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhbntn.exec:\bhbntn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjddd.exec:\jjddd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjppj.exec:\vjppj.exe23⤵
- Executes dropped EXE
-
\??\c:\nbbnnb.exec:\nbbnnb.exe24⤵
- Executes dropped EXE
-
\??\c:\thbbnb.exec:\thbbnb.exe25⤵
- Executes dropped EXE
-
\??\c:\frlxfrx.exec:\frlxfrx.exe26⤵
- Executes dropped EXE
-
\??\c:\hhbnbh.exec:\hhbnbh.exe27⤵
- Executes dropped EXE
-
\??\c:\vvddd.exec:\vvddd.exe28⤵
- Executes dropped EXE
-
\??\c:\rlflrxf.exec:\rlflrxf.exe29⤵
- Executes dropped EXE
-
\??\c:\tntnnn.exec:\tntnnn.exe30⤵
- Executes dropped EXE
-
\??\c:\jdjdj.exec:\jdjdj.exe31⤵
- Executes dropped EXE
-
\??\c:\dvdjp.exec:\dvdjp.exe32⤵
- Executes dropped EXE
-
\??\c:\xffxxlf.exec:\xffxxlf.exe33⤵
- Executes dropped EXE
-
\??\c:\bnnhbb.exec:\bnnhbb.exe34⤵
- Executes dropped EXE
-
\??\c:\pddpp.exec:\pddpp.exe35⤵
- Executes dropped EXE
-
\??\c:\jdddp.exec:\jdddp.exe36⤵
- Executes dropped EXE
-
\??\c:\xlfxrfr.exec:\xlfxrfr.exe37⤵
- Executes dropped EXE
-
\??\c:\tbbbth.exec:\tbbbth.exe38⤵
- Executes dropped EXE
-
\??\c:\bbnhbb.exec:\bbnhbb.exe39⤵
- Executes dropped EXE
-
\??\c:\vvpjp.exec:\vvpjp.exe40⤵
- Executes dropped EXE
-
\??\c:\xffxllx.exec:\xffxllx.exe41⤵
- Executes dropped EXE
-
\??\c:\htbbbh.exec:\htbbbh.exe42⤵
- Executes dropped EXE
-
\??\c:\lfffxxx.exec:\lfffxxx.exe43⤵
- Executes dropped EXE
-
\??\c:\nbbbbb.exec:\nbbbbb.exe44⤵
- Executes dropped EXE
-
\??\c:\bbbtbb.exec:\bbbtbb.exe45⤵
- Executes dropped EXE
-
\??\c:\vdjdv.exec:\vdjdv.exe46⤵
- Executes dropped EXE
-
\??\c:\lxfxlxx.exec:\lxfxlxx.exe47⤵
- Executes dropped EXE
-
\??\c:\nhbntt.exec:\nhbntt.exe48⤵
- Executes dropped EXE
-
\??\c:\dpvvd.exec:\dpvvd.exe49⤵
- Executes dropped EXE
-
\??\c:\rfxffxx.exec:\rfxffxx.exe50⤵
- Executes dropped EXE
-
\??\c:\ttbbbt.exec:\ttbbbt.exe51⤵
- Executes dropped EXE
-
\??\c:\nbnnhh.exec:\nbnnhh.exe52⤵
- Executes dropped EXE
-
\??\c:\lrlfxrf.exec:\lrlfxrf.exe53⤵
- Executes dropped EXE
-
\??\c:\bbbntn.exec:\bbbntn.exe54⤵
- Executes dropped EXE
-
\??\c:\3pvpp.exec:\3pvpp.exe55⤵
- Executes dropped EXE
-
\??\c:\ddpdj.exec:\ddpdj.exe56⤵
- Executes dropped EXE
-
\??\c:\lrrfxxx.exec:\lrrfxxx.exe57⤵
- Executes dropped EXE
-
\??\c:\btbbhh.exec:\btbbhh.exe58⤵
- Executes dropped EXE
-
\??\c:\thbtnt.exec:\thbtnt.exe59⤵
- Executes dropped EXE
-
\??\c:\vjpjp.exec:\vjpjp.exe60⤵
- Executes dropped EXE
-
\??\c:\ddddd.exec:\ddddd.exe61⤵
- Executes dropped EXE
-
\??\c:\rffxxxx.exec:\rffxxxx.exe62⤵
- Executes dropped EXE
-
\??\c:\hhbnnb.exec:\hhbnnb.exe63⤵
- Executes dropped EXE
-
\??\c:\jpvpv.exec:\jpvpv.exe64⤵
- Executes dropped EXE
-
\??\c:\pvddv.exec:\pvddv.exe65⤵
- Executes dropped EXE
-
\??\c:\xrxxxxx.exec:\xrxxxxx.exe66⤵
-
\??\c:\nhhtht.exec:\nhhtht.exe67⤵
-
\??\c:\nbbntt.exec:\nbbntt.exe68⤵
-
\??\c:\9jdvj.exec:\9jdvj.exe69⤵
-
\??\c:\vpvvv.exec:\vpvvv.exe70⤵
-
\??\c:\lflrrrl.exec:\lflrrrl.exe71⤵
-
\??\c:\5hnnhb.exec:\5hnnhb.exe72⤵
-
\??\c:\7thhhh.exec:\7thhhh.exe73⤵
-
\??\c:\ppvvp.exec:\ppvvp.exe74⤵
-
\??\c:\xxxfxrf.exec:\xxxfxrf.exe75⤵
-
\??\c:\rrrfrfx.exec:\rrrfrfx.exe76⤵
-
\??\c:\bhbtbt.exec:\bhbtbt.exe77⤵
-
\??\c:\7pddp.exec:\7pddp.exe78⤵
-
\??\c:\jpdjp.exec:\jpdjp.exe79⤵
-
\??\c:\5rlxlfr.exec:\5rlxlfr.exe80⤵
-
\??\c:\hbhbbt.exec:\hbhbbt.exe81⤵
-
\??\c:\bhhbnn.exec:\bhhbnn.exe82⤵
-
\??\c:\xflxrrx.exec:\xflxrrx.exe83⤵
-
\??\c:\ntnttn.exec:\ntnttn.exe84⤵
-
\??\c:\pjpvd.exec:\pjpvd.exe85⤵
-
\??\c:\rrxxrrr.exec:\rrxxrrr.exe86⤵
-
\??\c:\hnhhbb.exec:\hnhhbb.exe87⤵
-
\??\c:\pjddd.exec:\pjddd.exe88⤵
-
\??\c:\vvppp.exec:\vvppp.exe89⤵
-
\??\c:\lllllll.exec:\lllllll.exe90⤵
-
\??\c:\tntttb.exec:\tntttb.exe91⤵
-
\??\c:\bnttnn.exec:\bnttnn.exe92⤵
-
\??\c:\ppvpp.exec:\ppvpp.exe93⤵
-
\??\c:\xxrrrxx.exec:\xxrrrxx.exe94⤵
-
\??\c:\rrllxxr.exec:\rrllxxr.exe95⤵
-
\??\c:\bnbhht.exec:\bnbhht.exe96⤵
-
\??\c:\vdjjd.exec:\vdjjd.exe97⤵
-
\??\c:\pjppj.exec:\pjppj.exe98⤵
-
\??\c:\xrrrrrr.exec:\xrrrrrr.exe99⤵
-
\??\c:\xxxfrxr.exec:\xxxfrxr.exe100⤵
-
\??\c:\tbnnnn.exec:\tbnnnn.exe101⤵
-
\??\c:\vjdvv.exec:\vjdvv.exe102⤵
-
\??\c:\pjppd.exec:\pjppd.exe103⤵
-
\??\c:\rlflxxl.exec:\rlflxxl.exe104⤵
-
\??\c:\bhbnbn.exec:\bhbnbn.exe105⤵
-
\??\c:\bntnnh.exec:\bntnnh.exe106⤵
-
\??\c:\pvdpd.exec:\pvdpd.exe107⤵
-
\??\c:\rrxxfxl.exec:\rrxxfxl.exe108⤵
-
\??\c:\xrrrxrf.exec:\xrrrxrf.exe109⤵
-
\??\c:\nhhtnh.exec:\nhhtnh.exe110⤵
-
\??\c:\dddpj.exec:\dddpj.exe111⤵
-
\??\c:\vjpdv.exec:\vjpdv.exe112⤵
-
\??\c:\rxlxffr.exec:\rxlxffr.exe113⤵
-
\??\c:\ffrxxff.exec:\ffrxxff.exe114⤵
-
\??\c:\bhbbbh.exec:\bhbbbh.exe115⤵
-
\??\c:\nnnthh.exec:\nnnthh.exe116⤵
-
\??\c:\ppppv.exec:\ppppv.exe117⤵
-
\??\c:\pjvvv.exec:\pjvvv.exe118⤵
-
\??\c:\xrfxrrl.exec:\xrfxrrl.exe119⤵
-
\??\c:\3rrffff.exec:\3rrffff.exe120⤵
-
\??\c:\7hhtnb.exec:\7hhtnb.exe121⤵
-
\??\c:\btbhtb.exec:\btbhtb.exe122⤵
-
\??\c:\ppvvv.exec:\ppvvv.exe123⤵
-
\??\c:\rfrrrxx.exec:\rfrrrxx.exe124⤵
-
\??\c:\xfrxrrr.exec:\xfrxrrr.exe125⤵
-
\??\c:\nhnnnt.exec:\nhnnnt.exe126⤵
-
\??\c:\bbtthn.exec:\bbtthn.exe127⤵
-
\??\c:\1vvvv.exec:\1vvvv.exe128⤵
-
\??\c:\jdjdd.exec:\jdjdd.exe129⤵
-
\??\c:\xxfxrlf.exec:\xxfxrlf.exe130⤵
-
\??\c:\rrfllfl.exec:\rrfllfl.exe131⤵
-
\??\c:\hbhhhh.exec:\hbhhhh.exe132⤵
-
\??\c:\bbnhhh.exec:\bbnhhh.exe133⤵
-
\??\c:\vvpvj.exec:\vvpvj.exe134⤵
-
\??\c:\flfxrlx.exec:\flfxrlx.exe135⤵
-
\??\c:\xlfxrlf.exec:\xlfxrlf.exe136⤵
-
\??\c:\nhtttt.exec:\nhtttt.exe137⤵
-
\??\c:\tnnhhn.exec:\tnnhhn.exe138⤵
-
\??\c:\vvvvd.exec:\vvvvd.exe139⤵
-
\??\c:\1vdvp.exec:\1vdvp.exe140⤵
-
\??\c:\xfrlfrf.exec:\xfrlfrf.exe141⤵
-
\??\c:\3tthhb.exec:\3tthhb.exe142⤵
-
\??\c:\hbbhbh.exec:\hbbhbh.exe143⤵
-
\??\c:\7lfffff.exec:\7lfffff.exe144⤵
-
\??\c:\5thbnn.exec:\5thbnn.exe145⤵
-
\??\c:\hhbnbn.exec:\hhbnbn.exe146⤵
-
\??\c:\djjpj.exec:\djjpj.exe147⤵
-
\??\c:\jjddj.exec:\jjddj.exe148⤵
-
\??\c:\xxxfxll.exec:\xxxfxll.exe149⤵
-
\??\c:\nnhtbt.exec:\nnhtbt.exe150⤵
-
\??\c:\httttb.exec:\httttb.exe151⤵
-
\??\c:\jvvjd.exec:\jvvjd.exe152⤵
-
\??\c:\rrrxxxx.exec:\rrrxxxx.exe153⤵
-
\??\c:\7llllrr.exec:\7llllrr.exe154⤵
-
\??\c:\ttntnt.exec:\ttntnt.exe155⤵
-
\??\c:\hhntbh.exec:\hhntbh.exe156⤵
-
\??\c:\9jjdd.exec:\9jjdd.exe157⤵
-
\??\c:\dpddd.exec:\dpddd.exe158⤵
-
\??\c:\rrxrlfl.exec:\rrxrlfl.exe159⤵
-
\??\c:\bnhnhb.exec:\bnhnhb.exe160⤵
-
\??\c:\bhhhbh.exec:\bhhhbh.exe161⤵
-
\??\c:\7jjjp.exec:\7jjjp.exe162⤵
-
\??\c:\5ddpj.exec:\5ddpj.exe163⤵
-
\??\c:\lfrfrfr.exec:\lfrfrfr.exe164⤵
-
\??\c:\ffxlxrf.exec:\ffxlxrf.exe165⤵
-
\??\c:\nbtbhb.exec:\nbtbhb.exe166⤵
-
\??\c:\jpddp.exec:\jpddp.exe167⤵
-
\??\c:\jvjdv.exec:\jvjdv.exe168⤵
-
\??\c:\rfrflxl.exec:\rfrflxl.exe169⤵
-
\??\c:\xlffrrl.exec:\xlffrrl.exe170⤵
-
\??\c:\5tbtnn.exec:\5tbtnn.exe171⤵
-
\??\c:\nthbhb.exec:\nthbhb.exe172⤵
-
\??\c:\vpvdp.exec:\vpvdp.exe173⤵
-
\??\c:\dvddd.exec:\dvddd.exe174⤵
-
\??\c:\llrrlfx.exec:\llrrlfx.exe175⤵
-
\??\c:\bhbbhh.exec:\bhbbhh.exe176⤵
-
\??\c:\hbtbnh.exec:\hbtbnh.exe177⤵
-
\??\c:\1jjjj.exec:\1jjjj.exe178⤵
-
\??\c:\lxrlrrf.exec:\lxrlrrf.exe179⤵
-
\??\c:\rlxrrxx.exec:\rlxrrxx.exe180⤵
-
\??\c:\nbbbnn.exec:\nbbbnn.exe181⤵
-
\??\c:\pppdp.exec:\pppdp.exe182⤵
-
\??\c:\jddvp.exec:\jddvp.exe183⤵
-
\??\c:\5flxllf.exec:\5flxllf.exe184⤵
-
\??\c:\3rlfrlx.exec:\3rlfrlx.exe185⤵
-
\??\c:\bnnbnh.exec:\bnnbnh.exe186⤵
-
\??\c:\dvpdj.exec:\dvpdj.exe187⤵
-
\??\c:\pjpjj.exec:\pjpjj.exe188⤵
-
\??\c:\xlflrrf.exec:\xlflrrf.exe189⤵
-
\??\c:\frfxxxx.exec:\frfxxxx.exe190⤵
-
\??\c:\tnhbbh.exec:\tnhbbh.exe191⤵
-
\??\c:\vvddp.exec:\vvddp.exe192⤵
-
\??\c:\pvjpj.exec:\pvjpj.exe193⤵
-
\??\c:\xfrxxlx.exec:\xfrxxlx.exe194⤵
-
\??\c:\hbbhnh.exec:\hbbhnh.exe195⤵
-
\??\c:\nbtbhn.exec:\nbtbhn.exe196⤵
-
\??\c:\dvvdp.exec:\dvvdp.exe197⤵
-
\??\c:\lflffxx.exec:\lflffxx.exe198⤵
-
\??\c:\rrfxxxx.exec:\rrfxxxx.exe199⤵
-
\??\c:\bbtbtn.exec:\bbtbtn.exe200⤵
-
\??\c:\jpppv.exec:\jpppv.exe201⤵
-
\??\c:\vjddd.exec:\vjddd.exe202⤵
-
\??\c:\lfxxlrx.exec:\lfxxlrx.exe203⤵
-
\??\c:\lfxllxf.exec:\lfxllxf.exe204⤵
-
\??\c:\tbtbbn.exec:\tbtbbn.exe205⤵
-
\??\c:\djpvv.exec:\djpvv.exe206⤵
-
\??\c:\dvdvv.exec:\dvdvv.exe207⤵
-
\??\c:\lrxrrfr.exec:\lrxrrfr.exe208⤵
-
\??\c:\flxxflr.exec:\flxxflr.exe209⤵
-
\??\c:\nntnbh.exec:\nntnbh.exe210⤵
-
\??\c:\djjdv.exec:\djjdv.exe211⤵
-
\??\c:\ppvdd.exec:\ppvdd.exe212⤵
-
\??\c:\xrfxfff.exec:\xrfxfff.exe213⤵
-
\??\c:\rxxxxrl.exec:\rxxxxrl.exe214⤵
-
\??\c:\1bbtnh.exec:\1bbtnh.exe215⤵
-
\??\c:\jjdpd.exec:\jjdpd.exe216⤵
-
\??\c:\djddp.exec:\djddp.exe217⤵
-
\??\c:\fxrffxf.exec:\fxrffxf.exe218⤵
-
\??\c:\lflllff.exec:\lflllff.exe219⤵
-
\??\c:\hbhhbb.exec:\hbhhbb.exe220⤵
-
\??\c:\nhnhtb.exec:\nhnhtb.exe221⤵
-
\??\c:\pvddj.exec:\pvddj.exe222⤵
-
\??\c:\rlxxllf.exec:\rlxxllf.exe223⤵
-
\??\c:\rlxxffl.exec:\rlxxffl.exe224⤵
-
\??\c:\nnnbbn.exec:\nnnbbn.exe225⤵
-
\??\c:\tbntbh.exec:\tbntbh.exe226⤵
-
\??\c:\pjvvv.exec:\pjvvv.exe227⤵
-
\??\c:\ddvdj.exec:\ddvdj.exe228⤵
-
\??\c:\rrfxlrl.exec:\rrfxlrl.exe229⤵
-
\??\c:\rlfrxrx.exec:\rlfrxrx.exe230⤵
-
\??\c:\nhnhbb.exec:\nhnhbb.exe231⤵
-
\??\c:\3pjjj.exec:\3pjjj.exe232⤵
-
\??\c:\9ddvv.exec:\9ddvv.exe233⤵
-
\??\c:\fxllrff.exec:\fxllrff.exe234⤵
-
\??\c:\tnbnhn.exec:\tnbnhn.exe235⤵
-
\??\c:\7bhbbb.exec:\7bhbbb.exe236⤵
-
\??\c:\ddppd.exec:\ddppd.exe237⤵
-
\??\c:\vvdvj.exec:\vvdvj.exe238⤵
-
\??\c:\lxlfrrf.exec:\lxlfrrf.exe239⤵
-
\??\c:\9tbbhn.exec:\9tbbhn.exe240⤵
-
\??\c:\vjvjv.exec:\vjvjv.exe241⤵