Analysis
-
max time kernel
58s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 23:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe
-
Size
213KB
-
MD5
8b2200fc4011363d4c702945f4731970
-
SHA1
7959795a4000946d033829a8290e23980792e94a
-
SHA256
24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276
-
SHA512
82f9fd5b6f00625b805e1268b8791cda2c7fbef1f8ac5f97c63e94f9f29904867a8cef200ad7e84987c4ebbfa0243cde23031e5818efe78f943bc933eeb69ca7
-
SSDEEP
3072:mwZFBG7Gt5LQpL17tCAZbpQvKgMYbKXonUmeWxgFCg/0aDaBRghz:msFY7c5LuBUKbGw/SxhScUDaU
Malware Config
Signatures
-
Detect Blackmoon payload 60 IoCs
Processes:
resource yara_rule behavioral2/memory/4792-6-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/5112-11-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2128-17-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2788-23-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1412-26-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2064-30-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2448-35-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3828-42-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4348-53-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1828-60-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1748-65-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1584-72-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4068-78-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3964-86-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/404-95-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1400-92-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1632-107-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3416-114-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4860-124-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3784-131-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1152-132-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/636-150-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/968-163-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2644-169-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2144-174-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2480-187-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4388-193-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3948-200-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1920-205-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1552-206-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/5108-217-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4916-222-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4936-231-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/5060-235-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4120-240-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4836-244-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3076-252-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1812-259-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3116-265-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3568-263-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2800-271-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1536-274-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3172-281-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4596-279-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3324-292-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2016-297-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2636-305-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/5028-306-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1432-314-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/316-319-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1152-323-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3560-327-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4144-332-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1792-344-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/400-349-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4568-356-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/1252-364-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/4128-371-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/2064-388-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon behavioral2/memory/3152-393-0x0000000000400000-0x0000000000442000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3pdvd.exelxllrrr.exejpvvv.exenhntbn.exevjjjd.exebthhnt.exeppdpv.exeppvjd.exeffxrfxr.exentnhbt.exelflxrlx.exebhbbhh.exebhtbnn.exepdjpv.exedpjjp.exehhtbbn.exetnnhbb.exehtnnbh.exefxfxxrr.exenhnnhn.exevjpjv.exepjvvd.exehhnnhb.exepdvjd.exevpjdv.exexflxxfr.exeflrrxff.exellfxlxr.exefxlrlll.exe3vvvv.exetthtth.exepvdjv.exejjjvj.exethnnbn.exeddvjp.exexfxlrlr.exehntthn.exerlrxrrl.exerrffffx.exerffxxxr.exexlflxrl.exe7llrxfx.exejdjjp.exejvjjp.exedvjdd.exe3dppj.exexflfrrl.exedjddd.exenbnhhh.exerxxrfrl.exeddvjp.exelrxlxrf.exexrlfxxr.exefrxfxxf.exehbbhtb.exefllxfrr.exetthttn.exeddjpp.exehhhthb.exelxxlxrf.exepvdjj.exevjjjj.exennbbtn.exehhntnt.exepid process 5112 3pdvd.exe 2128 lxllrrr.exe 1412 jpvvv.exe 2788 nhntbn.exe 2064 vjjjd.exe 2448 bthhnt.exe 3828 ppdpv.exe 4348 ppvjd.exe 1828 ffxrfxr.exe 1748 ntnhbt.exe 1584 lflxrlx.exe 4068 bhbbhh.exe 3964 bhtbnn.exe 404 pdjpv.exe 1400 dpjjp.exe 1632 hhtbbn.exe 3416 tnnhbb.exe 3832 htnnbh.exe 4860 fxfxxrr.exe 3784 nhnnhn.exe 1152 vjpjv.exe 1608 pjvvd.exe 636 hhnnhb.exe 3756 pdvjd.exe 968 vpjdv.exe 2644 xflxxfr.exe 2144 flrrxff.exe 3436 llfxlxr.exe 2480 fxlrlll.exe 4388 3vvvv.exe 3948 tthtth.exe 1920 pvdjv.exe 1552 jjjvj.exe 4236 thnnbn.exe 5108 ddvjp.exe 4916 xfxlrlr.exe 4544 hntthn.exe 4936 rlrxrrl.exe 5060 rrffffx.exe 4120 rffxxxr.exe 4836 xlflxrl.exe 1640 7llrxfx.exe 3076 jdjjp.exe 2100 jvjjp.exe 1812 dvjdd.exe 3116 3dppj.exe 3568 xflfrrl.exe 2800 djddd.exe 1536 nbnhhh.exe 4596 rxxrfrl.exe 3172 ddvjp.exe 2724 lrxlxrf.exe 3324 xrlfxxr.exe 2016 frxfxxf.exe 4868 hbbhtb.exe 2636 fllxfrr.exe 5028 tthttn.exe 1432 ddjpp.exe 316 hhhthb.exe 1152 lxxlxrf.exe 3560 pvdjj.exe 4144 vjjjj.exe 5024 nnbbtn.exe 3492 hhntnt.exe -
Processes:
resource yara_rule behavioral2/memory/4792-6-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/5112-11-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2128-17-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2788-23-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1412-26-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2064-30-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2448-35-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3828-42-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4348-53-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1828-60-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1748-65-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1584-72-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4068-73-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4068-78-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3964-86-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/404-95-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1400-92-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1632-107-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3416-114-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4860-119-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4860-124-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3784-131-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1152-132-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/636-144-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3756-151-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/636-150-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/968-163-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2644-169-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2144-174-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2480-187-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4388-193-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3948-200-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1920-205-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1552-206-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/5108-217-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4544-220-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4916-222-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4936-231-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/5060-235-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4120-240-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4836-244-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3076-252-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1812-259-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3116-265-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3568-263-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2800-271-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1536-274-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3172-281-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4596-279-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2724-284-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2016-293-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3324-292-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2016-297-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4868-298-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2636-302-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2636-305-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1432-310-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/5028-306-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1432-314-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/316-319-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1152-323-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/3560-327-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4144-332-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/1792-339-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe3pdvd.exelxllrrr.exejpvvv.exenhntbn.exevjjjd.exebthhnt.exeppdpv.exeppvjd.exeffxrfxr.exentnhbt.exelflxrlx.exebhbbhh.exebhtbnn.exepdjpv.exedpjjp.exehhtbbn.exetnnhbb.exehtnnbh.exefxfxxrr.exenhnnhn.exevjpjv.exedescription pid process target process PID 4792 wrote to memory of 5112 4792 24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe 3pdvd.exe PID 4792 wrote to memory of 5112 4792 24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe 3pdvd.exe PID 4792 wrote to memory of 5112 4792 24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe 3pdvd.exe PID 5112 wrote to memory of 2128 5112 3pdvd.exe lxllrrr.exe PID 5112 wrote to memory of 2128 5112 3pdvd.exe lxllrrr.exe PID 5112 wrote to memory of 2128 5112 3pdvd.exe lxllrrr.exe PID 2128 wrote to memory of 1412 2128 lxllrrr.exe jpvvv.exe PID 2128 wrote to memory of 1412 2128 lxllrrr.exe jpvvv.exe PID 2128 wrote to memory of 1412 2128 lxllrrr.exe jpvvv.exe PID 1412 wrote to memory of 2788 1412 jpvvv.exe nhntbn.exe PID 1412 wrote to memory of 2788 1412 jpvvv.exe nhntbn.exe PID 1412 wrote to memory of 2788 1412 jpvvv.exe nhntbn.exe PID 2788 wrote to memory of 2064 2788 nhntbn.exe hbbbbt.exe PID 2788 wrote to memory of 2064 2788 nhntbn.exe hbbbbt.exe PID 2788 wrote to memory of 2064 2788 nhntbn.exe hbbbbt.exe PID 2064 wrote to memory of 2448 2064 vjjjd.exe bthhnt.exe PID 2064 wrote to memory of 2448 2064 vjjjd.exe bthhnt.exe PID 2064 wrote to memory of 2448 2064 vjjjd.exe bthhnt.exe PID 2448 wrote to memory of 3828 2448 bthhnt.exe ppdpv.exe PID 2448 wrote to memory of 3828 2448 bthhnt.exe ppdpv.exe PID 2448 wrote to memory of 3828 2448 bthhnt.exe ppdpv.exe PID 3828 wrote to memory of 4348 3828 ppdpv.exe ppvjd.exe PID 3828 wrote to memory of 4348 3828 ppdpv.exe ppvjd.exe PID 3828 wrote to memory of 4348 3828 ppdpv.exe ppvjd.exe PID 4348 wrote to memory of 1828 4348 ppvjd.exe ffxrfxr.exe PID 4348 wrote to memory of 1828 4348 ppvjd.exe ffxrfxr.exe PID 4348 wrote to memory of 1828 4348 ppvjd.exe ffxrfxr.exe PID 1828 wrote to memory of 1748 1828 ffxrfxr.exe tnhhtb.exe PID 1828 wrote to memory of 1748 1828 ffxrfxr.exe tnhhtb.exe PID 1828 wrote to memory of 1748 1828 ffxrfxr.exe tnhhtb.exe PID 1748 wrote to memory of 1584 1748 ntnhbt.exe lflxrlx.exe PID 1748 wrote to memory of 1584 1748 ntnhbt.exe lflxrlx.exe PID 1748 wrote to memory of 1584 1748 ntnhbt.exe lflxrlx.exe PID 1584 wrote to memory of 4068 1584 lflxrlx.exe flxlfrl.exe PID 1584 wrote to memory of 4068 1584 lflxrlx.exe flxlfrl.exe PID 1584 wrote to memory of 4068 1584 lflxrlx.exe flxlfrl.exe PID 4068 wrote to memory of 3964 4068 bhbbhh.exe vvddp.exe PID 4068 wrote to memory of 3964 4068 bhbbhh.exe vvddp.exe PID 4068 wrote to memory of 3964 4068 bhbbhh.exe vvddp.exe PID 3964 wrote to memory of 404 3964 bhtbnn.exe dpvjj.exe PID 3964 wrote to memory of 404 3964 bhtbnn.exe dpvjj.exe PID 3964 wrote to memory of 404 3964 bhtbnn.exe dpvjj.exe PID 404 wrote to memory of 1400 404 pdjpv.exe hthhhb.exe PID 404 wrote to memory of 1400 404 pdjpv.exe hthhhb.exe PID 404 wrote to memory of 1400 404 pdjpv.exe hthhhb.exe PID 1400 wrote to memory of 1632 1400 dpjjp.exe fxllrlr.exe PID 1400 wrote to memory of 1632 1400 dpjjp.exe fxllrlr.exe PID 1400 wrote to memory of 1632 1400 dpjjp.exe fxllrlr.exe PID 1632 wrote to memory of 3416 1632 hhtbbn.exe tbtbht.exe PID 1632 wrote to memory of 3416 1632 hhtbbn.exe tbtbht.exe PID 1632 wrote to memory of 3416 1632 hhtbbn.exe tbtbht.exe PID 3416 wrote to memory of 3832 3416 tnnhbb.exe htnnbh.exe PID 3416 wrote to memory of 3832 3416 tnnhbb.exe htnnbh.exe PID 3416 wrote to memory of 3832 3416 tnnhbb.exe htnnbh.exe PID 3832 wrote to memory of 4860 3832 htnnbh.exe nbnbnb.exe PID 3832 wrote to memory of 4860 3832 htnnbh.exe nbnbnb.exe PID 3832 wrote to memory of 4860 3832 htnnbh.exe nbnbnb.exe PID 4860 wrote to memory of 3784 4860 fxfxxrr.exe nhnnhn.exe PID 4860 wrote to memory of 3784 4860 fxfxxrr.exe nhnnhn.exe PID 4860 wrote to memory of 3784 4860 fxfxxrr.exe nhnnhn.exe PID 3784 wrote to memory of 1152 3784 nhnnhn.exe nbtnnn.exe PID 3784 wrote to memory of 1152 3784 nhnnhn.exe nbtnnn.exe PID 3784 wrote to memory of 1152 3784 nhnnhn.exe nbtnnn.exe PID 1152 wrote to memory of 1608 1152 vjpjv.exe pjvvd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\24c14db11c563a6715feb41d0f82d62ac135f8c34628dd7baa2b6a3d6f912276_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\3pdvd.exec:\3pdvd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxllrrr.exec:\lxllrrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpvvv.exec:\jpvvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhntbn.exec:\nhntbn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjjjd.exec:\vjjjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bthhnt.exec:\bthhnt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppdpv.exec:\ppdpv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppvjd.exec:\ppvjd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffxrfxr.exec:\ffxrfxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntnhbt.exec:\ntnhbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lflxrlx.exec:\lflxrlx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhbbhh.exec:\bhbbhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhtbnn.exec:\bhtbnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdjpv.exec:\pdjpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpjjp.exec:\dpjjp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhtbbn.exec:\hhtbbn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnnhbb.exec:\tnnhbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\htnnbh.exec:\htnnbh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxfxxrr.exec:\fxfxxrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhnnhn.exec:\nhnnhn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjpjv.exec:\vjpjv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjvvd.exec:\pjvvd.exe23⤵
- Executes dropped EXE
-
\??\c:\hhnnhb.exec:\hhnnhb.exe24⤵
- Executes dropped EXE
-
\??\c:\pdvjd.exec:\pdvjd.exe25⤵
- Executes dropped EXE
-
\??\c:\vpjdv.exec:\vpjdv.exe26⤵
- Executes dropped EXE
-
\??\c:\xflxxfr.exec:\xflxxfr.exe27⤵
- Executes dropped EXE
-
\??\c:\flrrxff.exec:\flrrxff.exe28⤵
- Executes dropped EXE
-
\??\c:\llfxlxr.exec:\llfxlxr.exe29⤵
- Executes dropped EXE
-
\??\c:\fxlrlll.exec:\fxlrlll.exe30⤵
- Executes dropped EXE
-
\??\c:\3vvvv.exec:\3vvvv.exe31⤵
- Executes dropped EXE
-
\??\c:\tthtth.exec:\tthtth.exe32⤵
- Executes dropped EXE
-
\??\c:\pvdjv.exec:\pvdjv.exe33⤵
- Executes dropped EXE
-
\??\c:\jjjvj.exec:\jjjvj.exe34⤵
- Executes dropped EXE
-
\??\c:\thnnbn.exec:\thnnbn.exe35⤵
- Executes dropped EXE
-
\??\c:\ddvjp.exec:\ddvjp.exe36⤵
- Executes dropped EXE
-
\??\c:\xfxlrlr.exec:\xfxlrlr.exe37⤵
- Executes dropped EXE
-
\??\c:\hntthn.exec:\hntthn.exe38⤵
- Executes dropped EXE
-
\??\c:\rlrxrrl.exec:\rlrxrrl.exe39⤵
- Executes dropped EXE
-
\??\c:\rrffffx.exec:\rrffffx.exe40⤵
- Executes dropped EXE
-
\??\c:\rffxxxr.exec:\rffxxxr.exe41⤵
- Executes dropped EXE
-
\??\c:\xlflxrl.exec:\xlflxrl.exe42⤵
- Executes dropped EXE
-
\??\c:\7llrxfx.exec:\7llrxfx.exe43⤵
- Executes dropped EXE
-
\??\c:\jdjjp.exec:\jdjjp.exe44⤵
- Executes dropped EXE
-
\??\c:\jvjjp.exec:\jvjjp.exe45⤵
- Executes dropped EXE
-
\??\c:\dvjdd.exec:\dvjdd.exe46⤵
- Executes dropped EXE
-
\??\c:\3dppj.exec:\3dppj.exe47⤵
- Executes dropped EXE
-
\??\c:\xflfrrl.exec:\xflfrrl.exe48⤵
- Executes dropped EXE
-
\??\c:\djddd.exec:\djddd.exe49⤵
- Executes dropped EXE
-
\??\c:\nbnhhh.exec:\nbnhhh.exe50⤵
- Executes dropped EXE
-
\??\c:\rxxrfrl.exec:\rxxrfrl.exe51⤵
- Executes dropped EXE
-
\??\c:\ddvjp.exec:\ddvjp.exe52⤵
- Executes dropped EXE
-
\??\c:\lrxlxrf.exec:\lrxlxrf.exe53⤵
- Executes dropped EXE
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe54⤵
- Executes dropped EXE
-
\??\c:\frxfxxf.exec:\frxfxxf.exe55⤵
- Executes dropped EXE
-
\??\c:\hbbhtb.exec:\hbbhtb.exe56⤵
- Executes dropped EXE
-
\??\c:\fllxfrr.exec:\fllxfrr.exe57⤵
- Executes dropped EXE
-
\??\c:\tthttn.exec:\tthttn.exe58⤵
- Executes dropped EXE
-
\??\c:\ddjpp.exec:\ddjpp.exe59⤵
- Executes dropped EXE
-
\??\c:\hhhthb.exec:\hhhthb.exe60⤵
- Executes dropped EXE
-
\??\c:\lxxlxrf.exec:\lxxlxrf.exe61⤵
- Executes dropped EXE
-
\??\c:\pvdjj.exec:\pvdjj.exe62⤵
- Executes dropped EXE
-
\??\c:\vjjjj.exec:\vjjjj.exe63⤵
- Executes dropped EXE
-
\??\c:\nnbbtn.exec:\nnbbtn.exe64⤵
- Executes dropped EXE
-
\??\c:\hhntnt.exec:\hhntnt.exe65⤵
- Executes dropped EXE
-
\??\c:\nntnhb.exec:\nntnhb.exe66⤵
-
\??\c:\lrlfrrf.exec:\lrlfrrf.exe67⤵
-
\??\c:\bhtnnb.exec:\bhtnnb.exe68⤵
-
\??\c:\thhhbb.exec:\thhhbb.exe69⤵
-
\??\c:\hbhhnt.exec:\hbhhnt.exe70⤵
-
\??\c:\dpdvd.exec:\dpdvd.exe71⤵
-
\??\c:\pppjd.exec:\pppjd.exe72⤵
-
\??\c:\htnnbb.exec:\htnnbb.exe73⤵
-
\??\c:\rrxrfxr.exec:\rrxrfxr.exe74⤵
-
\??\c:\nbtthn.exec:\nbtthn.exe75⤵
-
\??\c:\llxxrxl.exec:\llxxrxl.exe76⤵
-
\??\c:\hbbbbt.exec:\hbbbbt.exe77⤵
-
\??\c:\pvdpj.exec:\pvdpj.exe78⤵
-
\??\c:\bthnbb.exec:\bthnbb.exe79⤵
-
\??\c:\dpjvd.exec:\dpjvd.exe80⤵
-
\??\c:\xfxfllx.exec:\xfxfllx.exe81⤵
-
\??\c:\5bnnhh.exec:\5bnnhh.exe82⤵
-
\??\c:\jpjvj.exec:\jpjvj.exe83⤵
-
\??\c:\xrfffxl.exec:\xrfffxl.exe84⤵
-
\??\c:\nntbhb.exec:\nntbhb.exe85⤵
-
\??\c:\vdjdd.exec:\vdjdd.exe86⤵
-
\??\c:\rrlxllr.exec:\rrlxllr.exe87⤵
-
\??\c:\bntbhh.exec:\bntbhh.exe88⤵
-
\??\c:\vjdvv.exec:\vjdvv.exe89⤵
-
\??\c:\nhtttt.exec:\nhtttt.exe90⤵
-
\??\c:\dvddd.exec:\dvddd.exe91⤵
-
\??\c:\rxllfrr.exec:\rxllfrr.exe92⤵
-
\??\c:\hnnhbt.exec:\hnnhbt.exe93⤵
-
\??\c:\pvvpd.exec:\pvvpd.exe94⤵
-
\??\c:\lfrxllx.exec:\lfrxllx.exe95⤵
-
\??\c:\nthhtb.exec:\nthhtb.exe96⤵
-
\??\c:\jjjpj.exec:\jjjpj.exe97⤵
-
\??\c:\xffxllx.exec:\xffxllx.exe98⤵
-
\??\c:\3nthbb.exec:\3nthbb.exe99⤵
-
\??\c:\dvdpd.exec:\dvdpd.exe100⤵
-
\??\c:\xflfrxl.exec:\xflfrxl.exe101⤵
-
\??\c:\hnnbtt.exec:\hnnbtt.exe102⤵
-
\??\c:\dvvjp.exec:\dvvjp.exe103⤵
-
\??\c:\nbtnhb.exec:\nbtnhb.exe104⤵
-
\??\c:\djdvp.exec:\djdvp.exe105⤵
-
\??\c:\jjjvj.exec:\jjjvj.exe106⤵
-
\??\c:\lxlxxrl.exec:\lxlxxrl.exe107⤵
-
\??\c:\hhtbnh.exec:\hhtbnh.exe108⤵
-
\??\c:\jpvdv.exec:\jpvdv.exe109⤵
-
\??\c:\hnntnh.exec:\hnntnh.exe110⤵
-
\??\c:\xrrlrxr.exec:\xrrlrxr.exe111⤵
-
\??\c:\bttnnn.exec:\bttnnn.exe112⤵
-
\??\c:\djjpd.exec:\djjpd.exe113⤵
-
\??\c:\jjvvv.exec:\jjvvv.exe114⤵
-
\??\c:\xlrlxfl.exec:\xlrlxfl.exe115⤵
-
\??\c:\jjpdj.exec:\jjpdj.exe116⤵
-
\??\c:\xrxflxl.exec:\xrxflxl.exe117⤵
-
\??\c:\tnhhtb.exec:\tnhhtb.exe118⤵
-
\??\c:\ppvvj.exec:\ppvvj.exe119⤵
-
\??\c:\fxllrxl.exec:\fxllrxl.exe120⤵
-
\??\c:\dpjpv.exec:\dpjpv.exe121⤵
-
\??\c:\rxxxrlf.exec:\rxxxrlf.exe122⤵
-
\??\c:\7htnht.exec:\7htnht.exe123⤵
-
\??\c:\pvvvv.exec:\pvvvv.exe124⤵
-
\??\c:\fxlffff.exec:\fxlffff.exe125⤵
-
\??\c:\ffrrfrf.exec:\ffrrfrf.exe126⤵
-
\??\c:\hbtntn.exec:\hbtntn.exe127⤵
-
\??\c:\ffffffl.exec:\ffffffl.exe128⤵
-
\??\c:\vppvd.exec:\vppvd.exe129⤵
-
\??\c:\jjvvp.exec:\jjvvp.exe130⤵
-
\??\c:\vvvvd.exec:\vvvvd.exe131⤵
-
\??\c:\5btttb.exec:\5btttb.exe132⤵
-
\??\c:\pvjdd.exec:\pvjdd.exe133⤵
-
\??\c:\frrflxl.exec:\frrflxl.exe134⤵
-
\??\c:\vdvjv.exec:\vdvjv.exe135⤵
-
\??\c:\xllllrr.exec:\xllllrr.exe136⤵
-
\??\c:\hbnbht.exec:\hbnbht.exe137⤵
-
\??\c:\rxfrrlf.exec:\rxfrrlf.exe138⤵
-
\??\c:\bnbtnb.exec:\bnbtnb.exe139⤵
-
\??\c:\jjpjj.exec:\jjpjj.exe140⤵
-
\??\c:\frlxlxx.exec:\frlxlxx.exe141⤵
-
\??\c:\frrrlfx.exec:\frrrlfx.exe142⤵
-
\??\c:\nhnhth.exec:\nhnhth.exe143⤵
-
\??\c:\xllxfxx.exec:\xllxfxx.exe144⤵
-
\??\c:\ntthtb.exec:\ntthtb.exe145⤵
-
\??\c:\vjppp.exec:\vjppp.exe146⤵
-
\??\c:\pjdjd.exec:\pjdjd.exe147⤵
-
\??\c:\9frxlrf.exec:\9frxlrf.exe148⤵
-
\??\c:\btbbtb.exec:\btbbtb.exe149⤵
-
\??\c:\ddvjv.exec:\ddvjv.exe150⤵
-
\??\c:\xlrxrxr.exec:\xlrxrxr.exe151⤵
-
\??\c:\ntnnhb.exec:\ntnnhb.exe152⤵
-
\??\c:\pdvpp.exec:\pdvpp.exe153⤵
-
\??\c:\ffxxllf.exec:\ffxxllf.exe154⤵
-
\??\c:\lxrflxf.exec:\lxrflxf.exe155⤵
-
\??\c:\pjjjp.exec:\pjjjp.exe156⤵
-
\??\c:\rffrxxx.exec:\rffrxxx.exe157⤵
-
\??\c:\vvvvv.exec:\vvvvv.exe158⤵
-
\??\c:\lfxllrf.exec:\lfxllrf.exe159⤵
-
\??\c:\jppjd.exec:\jppjd.exe160⤵
-
\??\c:\pppdv.exec:\pppdv.exe161⤵
-
\??\c:\fxxflrx.exec:\fxxflrx.exe162⤵
-
\??\c:\vdvdv.exec:\vdvdv.exe163⤵
-
\??\c:\ffrxfxr.exec:\ffrxfxr.exe164⤵
-
\??\c:\ttnhnn.exec:\ttnhnn.exe165⤵
-
\??\c:\rrfxfrl.exec:\rrfxfrl.exe166⤵
-
\??\c:\htthbb.exec:\htthbb.exe167⤵
-
\??\c:\rxlxlxf.exec:\rxlxlxf.exe168⤵
-
\??\c:\nnbhbn.exec:\nnbhbn.exe169⤵
-
\??\c:\ffxrfxl.exec:\ffxrfxl.exe170⤵
-
\??\c:\jjjdj.exec:\jjjdj.exe171⤵
-
\??\c:\rxrllrr.exec:\rxrllrr.exe172⤵
-
\??\c:\bnnbhh.exec:\bnnbhh.exe173⤵
-
\??\c:\xflflll.exec:\xflflll.exe174⤵
-
\??\c:\bhhbnn.exec:\bhhbnn.exe175⤵
-
\??\c:\xrllffr.exec:\xrllffr.exe176⤵
-
\??\c:\5htthh.exec:\5htthh.exe177⤵
-
\??\c:\vjdjv.exec:\vjdjv.exe178⤵
-
\??\c:\htbhhb.exec:\htbhhb.exe179⤵
-
\??\c:\lfllxlx.exec:\lfllxlx.exe180⤵
-
\??\c:\pvdpv.exec:\pvdpv.exe181⤵
-
\??\c:\flrflfr.exec:\flrflfr.exe182⤵
-
\??\c:\vvppp.exec:\vvppp.exe183⤵
-
\??\c:\thbtnh.exec:\thbtnh.exe184⤵
-
\??\c:\pvdjp.exec:\pvdjp.exe185⤵
-
\??\c:\pppvp.exec:\pppvp.exe186⤵
-
\??\c:\bnhbhb.exec:\bnhbhb.exe187⤵
-
\??\c:\1vjjj.exec:\1vjjj.exe188⤵
-
\??\c:\hhhtnh.exec:\hhhtnh.exe189⤵
-
\??\c:\xlrrxxl.exec:\xlrrxxl.exe190⤵
-
\??\c:\pjjvv.exec:\pjjvv.exe191⤵
-
\??\c:\flfrfrr.exec:\flfrfrr.exe192⤵
-
\??\c:\nhbhtn.exec:\nhbhtn.exe193⤵
-
\??\c:\xlflflf.exec:\xlflflf.exe194⤵
-
\??\c:\vjdvd.exec:\vjdvd.exe195⤵
-
\??\c:\bnnhtt.exec:\bnnhtt.exe196⤵
-
\??\c:\rffrflx.exec:\rffrflx.exe197⤵
-
\??\c:\ddppj.exec:\ddppj.exe198⤵
-
\??\c:\llxfxxx.exec:\llxfxxx.exe199⤵
-
\??\c:\jjvpp.exec:\jjvpp.exe200⤵
-
\??\c:\dvpvp.exec:\dvpvp.exe201⤵
-
\??\c:\fxffffx.exec:\fxffffx.exe202⤵
-
\??\c:\hbbtbn.exec:\hbbtbn.exe203⤵
-
\??\c:\jpdjv.exec:\jpdjv.exe204⤵
-
\??\c:\nbttnn.exec:\nbttnn.exe205⤵
-
\??\c:\xrlfxrf.exec:\xrlfxrf.exe206⤵
-
\??\c:\rlllffl.exec:\rlllffl.exe207⤵
-
\??\c:\ppvpv.exec:\ppvpv.exe208⤵
-
\??\c:\hbnnth.exec:\hbnnth.exe209⤵
-
\??\c:\lfrxfrr.exec:\lfrxfrr.exe210⤵
-
\??\c:\ppdjj.exec:\ppdjj.exe211⤵
-
\??\c:\ntntnn.exec:\ntntnn.exe212⤵
-
\??\c:\vvvdd.exec:\vvvdd.exe213⤵
-
\??\c:\tttnhb.exec:\tttnhb.exe214⤵
-
\??\c:\jvjpv.exec:\jvjpv.exe215⤵
-
\??\c:\frflrxl.exec:\frflrxl.exe216⤵
-
\??\c:\xrflrlr.exec:\xrflrlr.exe217⤵
-
\??\c:\jpvvp.exec:\jpvvp.exe218⤵
-
\??\c:\vjjpp.exec:\vjjpp.exe219⤵
-
\??\c:\bhnbht.exec:\bhnbht.exe220⤵
-
\??\c:\jjvvv.exec:\jjvvv.exe221⤵
-
\??\c:\rllfrrr.exec:\rllfrrr.exe222⤵
-
\??\c:\djpjp.exec:\djpjp.exe223⤵
-
\??\c:\jdddp.exec:\jdddp.exe224⤵
-
\??\c:\ffrlxfr.exec:\ffrlxfr.exe225⤵
-
\??\c:\jpjpd.exec:\jpjpd.exe226⤵
-
\??\c:\thhttt.exec:\thhttt.exe227⤵
-
\??\c:\ntbhtn.exec:\ntbhtn.exe228⤵
-
\??\c:\hnhhnn.exec:\hnhhnn.exe229⤵
-
\??\c:\bhhtth.exec:\bhhtth.exe230⤵
-
\??\c:\flxlfrl.exec:\flxlfrl.exe231⤵
-
\??\c:\nbhhtb.exec:\nbhhtb.exe232⤵
-
\??\c:\rxxxxfr.exec:\rxxxxfr.exe233⤵
-
\??\c:\nbhbhn.exec:\nbhbhn.exe234⤵
-
\??\c:\lrllxlx.exec:\lrllxlx.exe235⤵
-
\??\c:\jvpvv.exec:\jvpvv.exe236⤵
-
\??\c:\tbhttn.exec:\tbhttn.exe237⤵
-
\??\c:\3rfxllr.exec:\3rfxllr.exe238⤵
-
\??\c:\htthbb.exec:\htthbb.exe239⤵
-
\??\c:\frfrflr.exec:\frfrflr.exe240⤵
-
\??\c:\bbtthn.exec:\bbtthn.exe241⤵