Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 12:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe
-
Size
276KB
-
MD5
fb9119025acc290ea00c9b00d7cf8a30
-
SHA1
06ec4575cb0af3883cefc51f839917db33ccc4f1
-
SHA256
53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55
-
SHA512
1c1c46fb56d3d87714153db33ae4c1e01a831f8b24d012dfe62b7ffb29cd8e3a862aa0ff198d0e04f9917743651223376f3cdeab09689489426a52278aba952b
-
SSDEEP
3072:8hOm2sI93UufdC67cimD5t251UrRE9TTFf/n:8cm7ImGddXmNt251UriZFf/n
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3616-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2364-56-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3468-86-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3900-131-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4400-149-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4556-202-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3564-262-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2584-272-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/64-277-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2752-296-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2464-300-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2752-299-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4496-394-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1308-429-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4456-460-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4028-532-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4408-630-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2072-658-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1996-705-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4704-756-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4448-813-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1672-794-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4488-766-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1448-594-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4784-550-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1560-543-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1176-508-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3264-488-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2364-478-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2536-474-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1320-390-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4584-380-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4916-362-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4784-352-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3308-322-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5060-311-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5060-307-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3552-292-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3116-288-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3616-281-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/876-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/624-256-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4900-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3288-233-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4964-227-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3320-199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4976-184-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1544-172-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4792-159-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2236-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2404-119-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2952-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/464-107-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3176-100-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/408-91-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3092-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5004-73-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1960-65-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3596-44-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5112-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4344-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3896-24-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/876-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3564-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3jpdp.exepjjpp.exefllllll.exebntttb.exejdvpj.exe9lxxxxx.exelxllllx.exehbnhbb.exe1fxxxfx.exenbbhbb.exebnnbnt.exefffffff.exelrrfrlx.exetbhhbb.exeddjjj.exelrflfll.exe7lllflf.exe1ntnhh.exedpvvd.exeppjjv.exefxfffff.exebbnttb.exeddjdd.exevjpjj.exeffrfllx.exe3htnhh.exevvjjv.exe5llfrlf.exentnnnt.exebbhbhh.exe5djdp.exedvdvp.exellxrxrx.exetnnhnh.exe7dppv.exe1xrrrrr.exefxfxxxx.exehtbttt.exe1nttnt.exeppdvj.exefffllrx.exexxffxll.exennhhtt.exennttth.exeddpvj.exefxrllfx.exerfrxfrx.exenbbttn.exethbbtt.exe5djdv.exepjjdv.exe5lrllll.exenhnhhh.exe7nbtht.exevpvvd.exevvjjd.exexrllffx.exenhnhnn.exennnhbb.exe5ppjj.exedvvpp.exexxxrllf.exenhbbnb.exennnhhh.exepid process 3564 3jpdp.exe 876 pjjpp.exe 3896 fllllll.exe 4344 bntttb.exe 5112 jdvpj.exe 3596 9lxxxxx.exe 3616 lxllllx.exe 4780 hbnhbb.exe 2364 1fxxxfx.exe 1960 nbbhbb.exe 5004 bnnbnt.exe 3092 fffffff.exe 1240 lrrfrlx.exe 3468 tbhhbb.exe 408 ddjjj.exe 3176 lrflfll.exe 464 7lllflf.exe 2952 1ntnhh.exe 2404 dpvvd.exe 432 ppjjv.exe 3900 fxfffff.exe 1572 bbnttb.exe 2236 ddjdd.exe 4400 vjpjj.exe 2024 ffrfllx.exe 4792 3htnhh.exe 4088 vvjjv.exe 1544 5llfrlf.exe 2008 ntnnnt.exe 3716 bbhbhh.exe 4976 5djdp.exe 4584 dvdvp.exe 1324 llxrxrx.exe 3320 tnnhnh.exe 4556 7dppv.exe 640 1xrrrrr.exe 3396 fxfxxxx.exe 2292 htbttt.exe 2140 1nttnt.exe 3028 ppdvj.exe 4844 fffllrx.exe 3508 xxffxll.exe 4964 nnhhtt.exe 3288 nnttth.exe 3992 ddpvj.exe 2336 fxrllfx.exe 3060 rfrxfrx.exe 4900 nbbttn.exe 1988 thbbtt.exe 4564 5djdv.exe 624 pjjdv.exe 1424 5lrllll.exe 3564 nhnhhh.exe 876 7nbtht.exe 2584 vpvvd.exe 1928 vvjjd.exe 64 xrllffx.exe 3616 nhnhnn.exe 3116 nnnhbb.exe 3140 5ppjj.exe 3552 dvvpp.exe 2752 xxxrllf.exe 2464 nhbbnb.exe 3580 nnnhhh.exe -
Processes:
resource yara_rule behavioral2/memory/3596-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3616-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2364-56-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3468-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/464-102-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3900-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3900-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4400-149-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4556-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1988-246-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/876-263-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3564-262-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2584-272-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/64-277-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2752-296-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2464-300-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2752-299-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3308-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-348-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2568-376-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4496-394-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1308-429-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4456-460-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-532-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4244-614-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4408-630-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2072-658-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/792-680-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1996-705-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1676-712-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3820-749-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4704-756-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4448-813-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-794-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4488-766-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4548-742-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2236-722-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4924-607-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1448-594-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-572-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-550-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1560-543-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4400-539-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-528-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/432-524-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1176-508-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3264-488-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2364-478-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2536-474-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3012-467-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4904-402-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2976-398-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1320-390-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4584-380-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4012-369-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4916-362-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1516-323-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3308-322-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5060-311-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5060-307-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3552-292-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3116-288-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3616-281-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe3jpdp.exepjjpp.exefllllll.exebntttb.exejdvpj.exe9lxxxxx.exelxllllx.exehbnhbb.exe1fxxxfx.exenbbhbb.exebnnbnt.exefffffff.exelrrfrlx.exetbhhbb.exeddjjj.exelrflfll.exe7lllflf.exe1ntnhh.exedpvvd.exeppjjv.exefxfffff.exedescription pid process target process PID 440 wrote to memory of 3564 440 53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe 3jpdp.exe PID 440 wrote to memory of 3564 440 53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe 3jpdp.exe PID 440 wrote to memory of 3564 440 53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe 3jpdp.exe PID 3564 wrote to memory of 876 3564 3jpdp.exe pjjpp.exe PID 3564 wrote to memory of 876 3564 3jpdp.exe pjjpp.exe PID 3564 wrote to memory of 876 3564 3jpdp.exe pjjpp.exe PID 876 wrote to memory of 3896 876 pjjpp.exe fllllll.exe PID 876 wrote to memory of 3896 876 pjjpp.exe fllllll.exe PID 876 wrote to memory of 3896 876 pjjpp.exe fllllll.exe PID 3896 wrote to memory of 4344 3896 fllllll.exe bntttb.exe PID 3896 wrote to memory of 4344 3896 fllllll.exe bntttb.exe PID 3896 wrote to memory of 4344 3896 fllllll.exe bntttb.exe PID 4344 wrote to memory of 5112 4344 bntttb.exe jdvpj.exe PID 4344 wrote to memory of 5112 4344 bntttb.exe jdvpj.exe PID 4344 wrote to memory of 5112 4344 bntttb.exe jdvpj.exe PID 5112 wrote to memory of 3596 5112 jdvpj.exe 9lxxxxx.exe PID 5112 wrote to memory of 3596 5112 jdvpj.exe 9lxxxxx.exe PID 5112 wrote to memory of 3596 5112 jdvpj.exe 9lxxxxx.exe PID 3596 wrote to memory of 3616 3596 9lxxxxx.exe lxllllx.exe PID 3596 wrote to memory of 3616 3596 9lxxxxx.exe lxllllx.exe PID 3596 wrote to memory of 3616 3596 9lxxxxx.exe lxllllx.exe PID 3616 wrote to memory of 4780 3616 lxllllx.exe 7tbtbb.exe PID 3616 wrote to memory of 4780 3616 lxllllx.exe 7tbtbb.exe PID 3616 wrote to memory of 4780 3616 lxllllx.exe 7tbtbb.exe PID 4780 wrote to memory of 2364 4780 hbnhbb.exe 1fxxxfx.exe PID 4780 wrote to memory of 2364 4780 hbnhbb.exe 1fxxxfx.exe PID 4780 wrote to memory of 2364 4780 hbnhbb.exe 1fxxxfx.exe PID 2364 wrote to memory of 1960 2364 1fxxxfx.exe nbbhbb.exe PID 2364 wrote to memory of 1960 2364 1fxxxfx.exe nbbhbb.exe PID 2364 wrote to memory of 1960 2364 1fxxxfx.exe nbbhbb.exe PID 1960 wrote to memory of 5004 1960 nbbhbb.exe bnnbnt.exe PID 1960 wrote to memory of 5004 1960 nbbhbb.exe bnnbnt.exe PID 1960 wrote to memory of 5004 1960 nbbhbb.exe bnnbnt.exe PID 5004 wrote to memory of 3092 5004 bnnbnt.exe fffffff.exe PID 5004 wrote to memory of 3092 5004 bnnbnt.exe fffffff.exe PID 5004 wrote to memory of 3092 5004 bnnbnt.exe fffffff.exe PID 3092 wrote to memory of 1240 3092 fffffff.exe lrrfrlx.exe PID 3092 wrote to memory of 1240 3092 fffffff.exe lrrfrlx.exe PID 3092 wrote to memory of 1240 3092 fffffff.exe lrrfrlx.exe PID 1240 wrote to memory of 3468 1240 lrrfrlx.exe tbhhbb.exe PID 1240 wrote to memory of 3468 1240 lrrfrlx.exe tbhhbb.exe PID 1240 wrote to memory of 3468 1240 lrrfrlx.exe tbhhbb.exe PID 3468 wrote to memory of 408 3468 tbhhbb.exe ddjjj.exe PID 3468 wrote to memory of 408 3468 tbhhbb.exe ddjjj.exe PID 3468 wrote to memory of 408 3468 tbhhbb.exe ddjjj.exe PID 408 wrote to memory of 3176 408 ddjjj.exe lrflfll.exe PID 408 wrote to memory of 3176 408 ddjjj.exe lrflfll.exe PID 408 wrote to memory of 3176 408 ddjjj.exe lrflfll.exe PID 3176 wrote to memory of 464 3176 lrflfll.exe 7lllflf.exe PID 3176 wrote to memory of 464 3176 lrflfll.exe 7lllflf.exe PID 3176 wrote to memory of 464 3176 lrflfll.exe 7lllflf.exe PID 464 wrote to memory of 2952 464 7lllflf.exe 1ntnhh.exe PID 464 wrote to memory of 2952 464 7lllflf.exe 1ntnhh.exe PID 464 wrote to memory of 2952 464 7lllflf.exe 1ntnhh.exe PID 2952 wrote to memory of 2404 2952 1ntnhh.exe dpvvd.exe PID 2952 wrote to memory of 2404 2952 1ntnhh.exe dpvvd.exe PID 2952 wrote to memory of 2404 2952 1ntnhh.exe dpvvd.exe PID 2404 wrote to memory of 432 2404 dpvvd.exe ppjjv.exe PID 2404 wrote to memory of 432 2404 dpvvd.exe ppjjv.exe PID 2404 wrote to memory of 432 2404 dpvvd.exe ppjjv.exe PID 432 wrote to memory of 3900 432 ppjjv.exe fxfffff.exe PID 432 wrote to memory of 3900 432 ppjjv.exe fxfffff.exe PID 432 wrote to memory of 3900 432 ppjjv.exe fxfffff.exe PID 3900 wrote to memory of 1572 3900 fxfffff.exe
Processes
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv ElXyO+sGhUOB0KXeFxNQ7w.01⤵
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\53b89ee31e95bc541586d24ad433b007cd162ed42dbe11831879f81e2cf6eb55_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\3jpdp.exec:\3jpdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjpp.exec:\pjjpp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fllllll.exec:\fllllll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bntttb.exec:\bntttb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvpj.exec:\jdvpj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9lxxxxx.exec:\9lxxxxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxllllx.exec:\lxllllx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbnhbb.exec:\hbnhbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1fxxxfx.exec:\1fxxxfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbbhbb.exec:\nbbhbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnbnt.exec:\bnnbnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fffffff.exec:\fffffff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrrfrlx.exec:\lrrfrlx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbhhbb.exec:\tbhhbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddjjj.exec:\ddjjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrflfll.exec:\lrflfll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7lllflf.exec:\7lllflf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1ntnhh.exec:\1ntnhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpvvd.exec:\dpvvd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppjjv.exec:\ppjjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxfffff.exec:\fxfffff.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbnttb.exec:\bbnttb.exe23⤵
- Executes dropped EXE
-
\??\c:\ddjdd.exec:\ddjdd.exe24⤵
- Executes dropped EXE
-
\??\c:\vjpjj.exec:\vjpjj.exe25⤵
- Executes dropped EXE
-
\??\c:\ffrfllx.exec:\ffrfllx.exe26⤵
- Executes dropped EXE
-
\??\c:\3htnhh.exec:\3htnhh.exe27⤵
- Executes dropped EXE
-
\??\c:\vvjjv.exec:\vvjjv.exe28⤵
- Executes dropped EXE
-
\??\c:\5llfrlf.exec:\5llfrlf.exe29⤵
- Executes dropped EXE
-
\??\c:\ntnnnt.exec:\ntnnnt.exe30⤵
- Executes dropped EXE
-
\??\c:\bbhbhh.exec:\bbhbhh.exe31⤵
- Executes dropped EXE
-
\??\c:\5djdp.exec:\5djdp.exe32⤵
- Executes dropped EXE
-
\??\c:\dvdvp.exec:\dvdvp.exe33⤵
- Executes dropped EXE
-
\??\c:\llxrxrx.exec:\llxrxrx.exe34⤵
- Executes dropped EXE
-
\??\c:\tnnhnh.exec:\tnnhnh.exe35⤵
- Executes dropped EXE
-
\??\c:\7dppv.exec:\7dppv.exe36⤵
- Executes dropped EXE
-
\??\c:\1xrrrrr.exec:\1xrrrrr.exe37⤵
- Executes dropped EXE
-
\??\c:\fxfxxxx.exec:\fxfxxxx.exe38⤵
- Executes dropped EXE
-
\??\c:\htbttt.exec:\htbttt.exe39⤵
- Executes dropped EXE
-
\??\c:\1nttnt.exec:\1nttnt.exe40⤵
- Executes dropped EXE
-
\??\c:\ppdvj.exec:\ppdvj.exe41⤵
- Executes dropped EXE
-
\??\c:\fffllrx.exec:\fffllrx.exe42⤵
- Executes dropped EXE
-
\??\c:\xxffxll.exec:\xxffxll.exe43⤵
- Executes dropped EXE
-
\??\c:\nnhhtt.exec:\nnhhtt.exe44⤵
- Executes dropped EXE
-
\??\c:\nnttth.exec:\nnttth.exe45⤵
- Executes dropped EXE
-
\??\c:\ddpvj.exec:\ddpvj.exe46⤵
- Executes dropped EXE
-
\??\c:\fxrllfx.exec:\fxrllfx.exe47⤵
- Executes dropped EXE
-
\??\c:\rfrxfrx.exec:\rfrxfrx.exe48⤵
- Executes dropped EXE
-
\??\c:\nbbttn.exec:\nbbttn.exe49⤵
- Executes dropped EXE
-
\??\c:\thbbtt.exec:\thbbtt.exe50⤵
- Executes dropped EXE
-
\??\c:\5djdv.exec:\5djdv.exe51⤵
- Executes dropped EXE
-
\??\c:\pjjdv.exec:\pjjdv.exe52⤵
- Executes dropped EXE
-
\??\c:\5lrllll.exec:\5lrllll.exe53⤵
- Executes dropped EXE
-
\??\c:\nhnhhh.exec:\nhnhhh.exe54⤵
- Executes dropped EXE
-
\??\c:\7nbtht.exec:\7nbtht.exe55⤵
- Executes dropped EXE
-
\??\c:\vpvvd.exec:\vpvvd.exe56⤵
- Executes dropped EXE
-
\??\c:\vvjjd.exec:\vvjjd.exe57⤵
- Executes dropped EXE
-
\??\c:\xrllffx.exec:\xrllffx.exe58⤵
- Executes dropped EXE
-
\??\c:\nhnhnn.exec:\nhnhnn.exe59⤵
- Executes dropped EXE
-
\??\c:\nnnhbb.exec:\nnnhbb.exe60⤵
- Executes dropped EXE
-
\??\c:\5ppjj.exec:\5ppjj.exe61⤵
- Executes dropped EXE
-
\??\c:\dvvpp.exec:\dvvpp.exe62⤵
- Executes dropped EXE
-
\??\c:\xxxrllf.exec:\xxxrllf.exe63⤵
- Executes dropped EXE
-
\??\c:\nhbbnb.exec:\nhbbnb.exe64⤵
- Executes dropped EXE
-
\??\c:\nnnhhh.exec:\nnnhhh.exe65⤵
- Executes dropped EXE
-
\??\c:\tnttnt.exec:\tnttnt.exe66⤵
-
\??\c:\hbbthb.exec:\hbbthb.exe67⤵
-
\??\c:\ddpjv.exec:\ddpjv.exe68⤵
-
\??\c:\5rxxrrr.exec:\5rxxrrr.exe69⤵
-
\??\c:\btnhbb.exec:\btnhbb.exe70⤵
-
\??\c:\jvjjd.exec:\jvjjd.exe71⤵
-
\??\c:\jjppv.exec:\jjppv.exe72⤵
-
\??\c:\frrrlrr.exec:\frrrlrr.exe73⤵
-
\??\c:\7fxlxrr.exec:\7fxlxrr.exe74⤵
-
\??\c:\pddvp.exec:\pddvp.exe75⤵
-
\??\c:\djppp.exec:\djppp.exe76⤵
-
\??\c:\frflfff.exec:\frflfff.exe77⤵
-
\??\c:\bbhbbb.exec:\bbhbbb.exe78⤵
-
\??\c:\thnnnt.exec:\thnnnt.exe79⤵
-
\??\c:\jjjvv.exec:\jjjvv.exe80⤵
-
\??\c:\dpppp.exec:\dpppp.exe81⤵
-
\??\c:\xrrlllf.exec:\xrrlllf.exe82⤵
-
\??\c:\tnhhhn.exec:\tnhhhn.exe83⤵
-
\??\c:\3htnhn.exec:\3htnhn.exe84⤵
-
\??\c:\7jddd.exec:\7jddd.exe85⤵
-
\??\c:\dppdv.exec:\dppdv.exe86⤵
-
\??\c:\rllrfff.exec:\rllrfff.exe87⤵
-
\??\c:\frfrxrf.exec:\frfrxrf.exe88⤵
-
\??\c:\hhttbb.exec:\hhttbb.exe89⤵
-
\??\c:\7pvvp.exec:\7pvvp.exe90⤵
-
\??\c:\3dvpj.exec:\3dvpj.exe91⤵
-
\??\c:\7xlxlxx.exec:\7xlxlxx.exe92⤵
-
\??\c:\bbtnnh.exec:\bbtnnh.exe93⤵
-
\??\c:\jdvvd.exec:\jdvvd.exe94⤵
-
\??\c:\dpdjv.exec:\dpdjv.exe95⤵
-
\??\c:\frxrrrl.exec:\frxrrrl.exe96⤵
-
\??\c:\tttnhn.exec:\tttnhn.exe97⤵
-
\??\c:\7bttnn.exec:\7bttnn.exe98⤵
-
\??\c:\ddpjj.exec:\ddpjj.exe99⤵
-
\??\c:\rxfxflr.exec:\rxfxflr.exe100⤵
-
\??\c:\rxflrxf.exec:\rxflrxf.exe101⤵
-
\??\c:\bhnnhb.exec:\bhnnhb.exe102⤵
-
\??\c:\ddjjj.exec:\ddjjj.exe103⤵
-
\??\c:\jpvvj.exec:\jpvvj.exe104⤵
-
\??\c:\fllxrfx.exec:\fllxrfx.exe105⤵
-
\??\c:\rrfllrx.exec:\rrfllrx.exe106⤵
-
\??\c:\nbbbtn.exec:\nbbbtn.exe107⤵
-
\??\c:\djvvp.exec:\djvvp.exe108⤵
-
\??\c:\jddjd.exec:\jddjd.exe109⤵
-
\??\c:\xxxrrrr.exec:\xxxrrrr.exe110⤵
-
\??\c:\frfxlfr.exec:\frfxlfr.exe111⤵
-
\??\c:\9ntnnt.exec:\9ntnnt.exe112⤵
-
\??\c:\5jppd.exec:\5jppd.exe113⤵
-
\??\c:\7vvdv.exec:\7vvdv.exe114⤵
-
\??\c:\ffrfrfr.exec:\ffrfrfr.exe115⤵
-
\??\c:\5tbtbb.exec:\5tbtbb.exe116⤵
-
\??\c:\ttbtbt.exec:\ttbtbt.exe117⤵
-
\??\c:\djpjj.exec:\djpjj.exe118⤵
-
\??\c:\dvjvd.exec:\dvjvd.exe119⤵
-
\??\c:\xffxrrl.exec:\xffxrrl.exe120⤵
-
\??\c:\hbbbtt.exec:\hbbbtt.exe121⤵
-
\??\c:\3hnnnt.exec:\3hnnnt.exe122⤵
-
\??\c:\jvvpj.exec:\jvvpj.exe123⤵
-
\??\c:\pvjdj.exec:\pvjdj.exe124⤵
-
\??\c:\llxrrrl.exec:\llxrrrl.exe125⤵
-
\??\c:\fxxxrlf.exec:\fxxxrlf.exe126⤵
-
\??\c:\bttnbt.exec:\bttnbt.exe127⤵
-
\??\c:\bbbnhh.exec:\bbbnhh.exe128⤵
-
\??\c:\pvpjj.exec:\pvpjj.exe129⤵
-
\??\c:\dvpvv.exec:\dvpvv.exe130⤵
-
\??\c:\llrrxxx.exec:\llrrxxx.exe131⤵
-
\??\c:\1btnhh.exec:\1btnhh.exe132⤵
-
\??\c:\bhhhtb.exec:\bhhhtb.exe133⤵
-
\??\c:\9vpjj.exec:\9vpjj.exe134⤵
-
\??\c:\vvdvd.exec:\vvdvd.exe135⤵
-
\??\c:\xrlxlxr.exec:\xrlxlxr.exe136⤵
-
\??\c:\ffrfxrl.exec:\ffrfxrl.exe137⤵
-
\??\c:\hnnbtn.exec:\hnnbtn.exe138⤵
-
\??\c:\1htntt.exec:\1htntt.exe139⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe140⤵
-
\??\c:\rlrrrll.exec:\rlrrrll.exe141⤵
-
\??\c:\llflflr.exec:\llflflr.exe142⤵
-
\??\c:\nbnhbb.exec:\nbnhbb.exe143⤵
-
\??\c:\5bbtnh.exec:\5bbtnh.exe144⤵
-
\??\c:\pdvvj.exec:\pdvvj.exe145⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe146⤵
-
\??\c:\7xrlxxr.exec:\7xrlxxr.exe147⤵
-
\??\c:\lllfxlf.exec:\lllfxlf.exe148⤵
-
\??\c:\thhhbb.exec:\thhhbb.exe149⤵
-
\??\c:\9hnhbb.exec:\9hnhbb.exe150⤵
-
\??\c:\djvpj.exec:\djvpj.exe151⤵
-
\??\c:\vdpjd.exec:\vdpjd.exe152⤵
-
\??\c:\3frxrlf.exec:\3frxrlf.exe153⤵
-
\??\c:\xxfxrrl.exec:\xxfxrrl.exe154⤵
-
\??\c:\nbbttt.exec:\nbbttt.exe155⤵
-
\??\c:\hbthbb.exec:\hbthbb.exe156⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe157⤵
-
\??\c:\frrrfxx.exec:\frrrfxx.exe158⤵
-
\??\c:\ffxfrxx.exec:\ffxfrxx.exe159⤵
-
\??\c:\tbthtn.exec:\tbthtn.exe160⤵
-
\??\c:\nhhbbt.exec:\nhhbbt.exe161⤵
-
\??\c:\bbthnh.exec:\bbthnh.exe162⤵
-
\??\c:\fllrxff.exec:\fllrxff.exe163⤵
-
\??\c:\ttbnhb.exec:\ttbnhb.exe164⤵
-
\??\c:\1pvpv.exec:\1pvpv.exe165⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe166⤵
-
\??\c:\5djdp.exec:\5djdp.exe167⤵
-
\??\c:\xfrxflx.exec:\xfrxflx.exe168⤵
-
\??\c:\xxxxxlf.exec:\xxxxxlf.exe169⤵
-
\??\c:\nnthtn.exec:\nnthtn.exe170⤵
-
\??\c:\ddddd.exec:\ddddd.exe171⤵
-
\??\c:\vpjdd.exec:\vpjdd.exe172⤵
-
\??\c:\xrrfrrf.exec:\xrrfrrf.exe173⤵
-
\??\c:\1rfrrfr.exec:\1rfrrfr.exe174⤵
-
\??\c:\hnbhhh.exec:\hnbhhh.exe175⤵
-
\??\c:\tbntbt.exec:\tbntbt.exe176⤵
-
\??\c:\pjvdp.exec:\pjvdp.exe177⤵
-
\??\c:\xflfrlx.exec:\xflfrlx.exe178⤵
-
\??\c:\xffllfx.exec:\xffllfx.exe179⤵
-
\??\c:\9ntnnh.exec:\9ntnnh.exe180⤵
-
\??\c:\tnbtnh.exec:\tnbtnh.exe181⤵
-
\??\c:\pvvjj.exec:\pvvjj.exe182⤵
-
\??\c:\3pjjv.exec:\3pjjv.exe183⤵
-
\??\c:\xrlrxlr.exec:\xrlrxlr.exe184⤵
-
\??\c:\xxrxfxl.exec:\xxrxfxl.exe185⤵
-
\??\c:\bhnntt.exec:\bhnntt.exe186⤵
-
\??\c:\tnnnhb.exec:\tnnnhb.exe187⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe188⤵
-
\??\c:\fflfrrl.exec:\fflfrrl.exe189⤵
-
\??\c:\xlrxllf.exec:\xlrxllf.exe190⤵
-
\??\c:\lffxlfx.exec:\lffxlfx.exe191⤵
-
\??\c:\hbthbb.exec:\hbthbb.exe192⤵
-
\??\c:\bnnhbt.exec:\bnnhbt.exe193⤵
-
\??\c:\vdpjd.exec:\vdpjd.exe194⤵
-
\??\c:\jdjdd.exec:\jdjdd.exe195⤵
-
\??\c:\3lffrxr.exec:\3lffrxr.exe196⤵
-
\??\c:\xrxfxxx.exec:\xrxfxxx.exe197⤵
-
\??\c:\tbtbhb.exec:\tbtbhb.exe198⤵
-
\??\c:\jvppv.exec:\jvppv.exe199⤵
-
\??\c:\dpppj.exec:\dpppj.exe200⤵
-
\??\c:\xrrllrr.exec:\xrrllrr.exe201⤵
-
\??\c:\nnnbtt.exec:\nnnbtt.exe202⤵
-
\??\c:\htbnbn.exec:\htbnbn.exe203⤵
-
\??\c:\jjddv.exec:\jjddv.exe204⤵
-
\??\c:\xxlffxr.exec:\xxlffxr.exe205⤵
-
\??\c:\lrffxxr.exec:\lrffxxr.exe206⤵
-
\??\c:\7hnhbt.exec:\7hnhbt.exe207⤵
-
\??\c:\bnhnbb.exec:\bnhnbb.exe208⤵
-
\??\c:\vjpjj.exec:\vjpjj.exe209⤵
-
\??\c:\vdjvv.exec:\vdjvv.exe210⤵
-
\??\c:\rlfrlxf.exec:\rlfrlxf.exe211⤵
-
\??\c:\llrrxxr.exec:\llrrxxr.exe212⤵
-
\??\c:\hntnhb.exec:\hntnhb.exe213⤵
-
\??\c:\pjdvj.exec:\pjdvj.exe214⤵
-
\??\c:\dpjdd.exec:\dpjdd.exe215⤵
-
\??\c:\3rrlffx.exec:\3rrlffx.exe216⤵
-
\??\c:\xlrlfxl.exec:\xlrlfxl.exe217⤵
-
\??\c:\flffrrl.exec:\flffrrl.exe218⤵
-
\??\c:\nthhbb.exec:\nthhbb.exe219⤵
-
\??\c:\bhnnhh.exec:\bhnnhh.exe220⤵
-
\??\c:\pvdvd.exec:\pvdvd.exe221⤵
-
\??\c:\vpdvv.exec:\vpdvv.exe222⤵
-
\??\c:\5xxfrlr.exec:\5xxfrlr.exe223⤵
-
\??\c:\1bhbbb.exec:\1bhbbb.exe224⤵
-
\??\c:\tntnbb.exec:\tntnbb.exe225⤵
-
\??\c:\jjjjj.exec:\jjjjj.exe226⤵
-
\??\c:\jjdvj.exec:\jjdvj.exe227⤵
-
\??\c:\rfffrrr.exec:\rfffrrr.exe228⤵
-
\??\c:\fxlfrrf.exec:\fxlfrrf.exe229⤵
-
\??\c:\hbtnnn.exec:\hbtnnn.exe230⤵
-
\??\c:\bhbttt.exec:\bhbttt.exe231⤵
-
\??\c:\pjvvj.exec:\pjvvj.exe232⤵
-
\??\c:\jpvpp.exec:\jpvpp.exe233⤵
-
\??\c:\xrlflrx.exec:\xrlflrx.exe234⤵
-
\??\c:\fxrxfrx.exec:\fxrxfrx.exe235⤵
-
\??\c:\nhnnhn.exec:\nhnnhn.exe236⤵
-
\??\c:\hbhnhh.exec:\hbhnhh.exe237⤵
-
\??\c:\3vpvv.exec:\3vpvv.exe238⤵
-
\??\c:\pjppd.exec:\pjppd.exe239⤵
-
\??\c:\llllllr.exec:\llllllr.exe240⤵
-
\??\c:\7llfxxr.exec:\7llfxxr.exe241⤵