Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 14:17
Behavioral task
behavioral1
Sample
57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe
-
Size
164KB
-
MD5
48980abad55cb02a25a723a4344d25e0
-
SHA1
1468663d38d9db614f08dbaae273fb4ea9acfa5e
-
SHA256
57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e
-
SHA512
d7b3030bf00bdb8c4138d3641b944230e81f8f90f78c5d909d6f4f65b1de4f8573f5b16612bb3f8c2a966c95b5dbf9cb1fd31abf60de74ecee5af9b49c93c8cb
-
SSDEEP
3072:xhOmTsF93UYfwC6GIout0fmCiiiXAQ5lpBoGYwNNhu0CzhKPJFk:xcm4FmowdHoSgWrXF5lpKGYV0wh6Je
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4464-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2064-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2748-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/704-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2856-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1756-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4248-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1568-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4484-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1964-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4284-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4504-64-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2392-69-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2984-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1648-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2516-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3748-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/452-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2648-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3204-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3504-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4884-120-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4744-129-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1384-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-149-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2188-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4868-165-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4372-170-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3488-177-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1516-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2088-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3772-185-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4064-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4696-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2468-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3784-258-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1264-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4952-279-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4652-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3828-298-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4052-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4436-322-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4464-323-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3480-337-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2492-346-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5112-355-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5056-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3148-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2184-380-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/632-383-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2772-418-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/312-438-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/756-446-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2392-484-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/936-501-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3864-534-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2364-558-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4620-704-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2908-725-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2248-764-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/532-797-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jdvpp.exebtbttn.exettnbtb.exevvpjd.exexllllxl.exe3tbbhh.exetntnnn.exedjpdd.exerflfxxr.exe9bnhbh.exevjjvd.exelfllxxf.exenhtthb.exedvvvd.exerlfxrrl.exettbbtt.exevvdvv.exejjppj.exe1xfrrxf.exenhhnht.exedddvv.exerrlffff.exebbntbh.exehbntnn.exejjpjj.exebbhbtt.exedvvpp.exevdpvp.exetnnhhh.exevpjdp.exerllfxxx.exellrlffx.exe7bhbbb.exejppjd.exeppvdj.exerrxrlll.exerrxxfxr.exehtbhbb.exevvvpp.exejddvp.exeffxrrrl.exelxlrlll.exetbhnnh.exedjvdv.exellfxxxr.exe5ntnnb.exebtttnn.exevpdvp.exellflrxf.exebthtnn.exevpddj.exelflxrxr.exerxxxrrr.exe1hbtnn.exehbhhhh.exevdvvp.exevvpjd.exerlxrrrr.exerrlxxll.exehtbtnh.exetbhnbb.exevjjpp.exexllfxxr.exefxxxxxx.exepid process 2064 jdvpp.exe 2748 btbttn.exe 704 ttnbtb.exe 2856 vvpjd.exe 1756 xllllxl.exe 4248 3tbbhh.exe 1568 tntnnn.exe 3132 djpdd.exe 4484 rflfxxr.exe 1964 9bnhbh.exe 4284 vjjvd.exe 4504 lfllxxf.exe 2392 nhtthb.exe 2984 dvvvd.exe 1648 rlfxrrl.exe 2516 ttbbtt.exe 1316 vvdvv.exe 3748 jjppj.exe 452 1xfrrxf.exe 2648 nhhnht.exe 3204 dddvv.exe 3504 rrlffff.exe 4884 bbntbh.exe 4728 hbntnn.exe 4744 jjpjj.exe 1512 bbhbtt.exe 1384 dvvpp.exe 3656 vdpvp.exe 2700 tnnhhh.exe 1624 vpjdp.exe 2800 rllfxxx.exe 1144 llrlffx.exe 2188 7bhbbb.exe 4868 jppjd.exe 4164 ppvdj.exe 4372 rrxrlll.exe 2156 rrxxfxr.exe 3488 htbhbb.exe 1516 vvvpp.exe 3772 jddvp.exe 2088 ffxrrrl.exe 3444 lxlrlll.exe 876 tbhnnh.exe 3468 djvdv.exe 3348 llfxxxr.exe 1656 5ntnnb.exe 2364 btttnn.exe 4064 vpdvp.exe 5040 llflrxf.exe 4696 bthtnn.exe 4380 vpddj.exe 1400 lflxrxr.exe 2688 rxxxrrr.exe 3996 1hbtnn.exe 2468 hbhhhh.exe 1044 vdvvp.exe 3132 vvpjd.exe 5012 rlxrrrr.exe 1964 rrlxxll.exe 2596 htbtnh.exe 516 tbhnbb.exe 3516 vjjpp.exe 3708 xllfxxr.exe 4320 fxxxxxx.exe -
Processes:
resource yara_rule behavioral2/memory/4464-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4464-4-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdvpp.exe upx C:\btbttn.exe upx behavioral2/memory/2064-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2748-12-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ttnbtb.exe upx behavioral2/memory/2748-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/704-18-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vvpjd.exe upx behavioral2/memory/2856-23-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xllllxl.exe upx C:\3tbbhh.exe upx behavioral2/memory/1756-29-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4248-33-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tntnnn.exe upx behavioral2/memory/1568-37-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\djpdd.exe upx behavioral2/memory/3132-43-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rflfxxr.exe upx behavioral2/memory/4484-47-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9bnhbh.exe upx C:\vjjvd.exe upx behavioral2/memory/1964-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4284-57-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4284-61-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfllxxf.exe upx behavioral2/memory/4504-64-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhtthb.exe upx behavioral2/memory/2392-69-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvvvd.exe upx C:\rlfxrrl.exe upx behavioral2/memory/2984-76-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ttbbtt.exe upx behavioral2/memory/1648-82-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2516-84-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jjppj.exe upx \??\c:\vvdvv.exe upx C:\1xfrrxf.exe upx behavioral2/memory/3748-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/452-98-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhhnht.exe upx behavioral2/memory/2648-102-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dddvv.exe upx behavioral2/memory/3204-107-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rrlffff.exe upx behavioral2/memory/3504-113-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bbntbh.exe upx behavioral2/memory/4884-120-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbntnn.exe upx C:\jjpjj.exe upx C:\bbhbtt.exe upx behavioral2/memory/4744-129-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvvpp.exe upx behavioral2/memory/1384-136-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vdpvp.exe upx C:\tnnhhh.exe upx behavioral2/memory/2700-144-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpjdp.exe upx behavioral2/memory/2700-149-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rllfxxx.exe upx C:\llrlffx.exe upx behavioral2/memory/1144-158-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2188-163-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exejdvpp.exebtbttn.exettnbtb.exevvpjd.exexllllxl.exe3tbbhh.exetntnnn.exedjpdd.exerflfxxr.exe9bnhbh.exevjjvd.exelfllxxf.exenhtthb.exedvvvd.exerlfxrrl.exettbbtt.exevvdvv.exejjppj.exe1xfrrxf.exenhhnht.exedddvv.exedescription pid process target process PID 4464 wrote to memory of 2064 4464 57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe jdvpp.exe PID 4464 wrote to memory of 2064 4464 57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe jdvpp.exe PID 4464 wrote to memory of 2064 4464 57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe jdvpp.exe PID 2064 wrote to memory of 2748 2064 jdvpp.exe btbttn.exe PID 2064 wrote to memory of 2748 2064 jdvpp.exe btbttn.exe PID 2064 wrote to memory of 2748 2064 jdvpp.exe btbttn.exe PID 2748 wrote to memory of 704 2748 btbttn.exe ttnbtb.exe PID 2748 wrote to memory of 704 2748 btbttn.exe ttnbtb.exe PID 2748 wrote to memory of 704 2748 btbttn.exe ttnbtb.exe PID 704 wrote to memory of 2856 704 ttnbtb.exe vvpjd.exe PID 704 wrote to memory of 2856 704 ttnbtb.exe vvpjd.exe PID 704 wrote to memory of 2856 704 ttnbtb.exe vvpjd.exe PID 2856 wrote to memory of 1756 2856 vvpjd.exe xllllxl.exe PID 2856 wrote to memory of 1756 2856 vvpjd.exe xllllxl.exe PID 2856 wrote to memory of 1756 2856 vvpjd.exe xllllxl.exe PID 1756 wrote to memory of 4248 1756 xllllxl.exe 3tbbhh.exe PID 1756 wrote to memory of 4248 1756 xllllxl.exe 3tbbhh.exe PID 1756 wrote to memory of 4248 1756 xllllxl.exe 3tbbhh.exe PID 4248 wrote to memory of 1568 4248 3tbbhh.exe tntnnn.exe PID 4248 wrote to memory of 1568 4248 3tbbhh.exe tntnnn.exe PID 4248 wrote to memory of 1568 4248 3tbbhh.exe tntnnn.exe PID 1568 wrote to memory of 3132 1568 tntnnn.exe djpdd.exe PID 1568 wrote to memory of 3132 1568 tntnnn.exe djpdd.exe PID 1568 wrote to memory of 3132 1568 tntnnn.exe djpdd.exe PID 3132 wrote to memory of 4484 3132 djpdd.exe rflfxxr.exe PID 3132 wrote to memory of 4484 3132 djpdd.exe rflfxxr.exe PID 3132 wrote to memory of 4484 3132 djpdd.exe rflfxxr.exe PID 4484 wrote to memory of 1964 4484 rflfxxr.exe 9bnhbh.exe PID 4484 wrote to memory of 1964 4484 rflfxxr.exe 9bnhbh.exe PID 4484 wrote to memory of 1964 4484 rflfxxr.exe 9bnhbh.exe PID 1964 wrote to memory of 4284 1964 9bnhbh.exe vjjvd.exe PID 1964 wrote to memory of 4284 1964 9bnhbh.exe vjjvd.exe PID 1964 wrote to memory of 4284 1964 9bnhbh.exe vjjvd.exe PID 4284 wrote to memory of 4504 4284 vjjvd.exe lfllxxf.exe PID 4284 wrote to memory of 4504 4284 vjjvd.exe lfllxxf.exe PID 4284 wrote to memory of 4504 4284 vjjvd.exe lfllxxf.exe PID 4504 wrote to memory of 2392 4504 lfllxxf.exe nhtthb.exe PID 4504 wrote to memory of 2392 4504 lfllxxf.exe nhtthb.exe PID 4504 wrote to memory of 2392 4504 lfllxxf.exe nhtthb.exe PID 2392 wrote to memory of 2984 2392 nhtthb.exe dvvvd.exe PID 2392 wrote to memory of 2984 2392 nhtthb.exe dvvvd.exe PID 2392 wrote to memory of 2984 2392 nhtthb.exe dvvvd.exe PID 2984 wrote to memory of 1648 2984 dvvvd.exe rlfxrrl.exe PID 2984 wrote to memory of 1648 2984 dvvvd.exe rlfxrrl.exe PID 2984 wrote to memory of 1648 2984 dvvvd.exe rlfxrrl.exe PID 1648 wrote to memory of 2516 1648 rlfxrrl.exe ttbbtt.exe PID 1648 wrote to memory of 2516 1648 rlfxrrl.exe ttbbtt.exe PID 1648 wrote to memory of 2516 1648 rlfxrrl.exe ttbbtt.exe PID 2516 wrote to memory of 1316 2516 ttbbtt.exe vvdvv.exe PID 2516 wrote to memory of 1316 2516 ttbbtt.exe vvdvv.exe PID 2516 wrote to memory of 1316 2516 ttbbtt.exe vvdvv.exe PID 1316 wrote to memory of 3748 1316 vvdvv.exe jjppj.exe PID 1316 wrote to memory of 3748 1316 vvdvv.exe jjppj.exe PID 1316 wrote to memory of 3748 1316 vvdvv.exe jjppj.exe PID 3748 wrote to memory of 452 3748 jjppj.exe 1xfrrxf.exe PID 3748 wrote to memory of 452 3748 jjppj.exe 1xfrrxf.exe PID 3748 wrote to memory of 452 3748 jjppj.exe 1xfrrxf.exe PID 452 wrote to memory of 2648 452 1xfrrxf.exe nhhnht.exe PID 452 wrote to memory of 2648 452 1xfrrxf.exe nhhnht.exe PID 452 wrote to memory of 2648 452 1xfrrxf.exe nhhnht.exe PID 2648 wrote to memory of 3204 2648 nhhnht.exe dddvv.exe PID 2648 wrote to memory of 3204 2648 nhhnht.exe dddvv.exe PID 2648 wrote to memory of 3204 2648 nhhnht.exe dddvv.exe PID 3204 wrote to memory of 3504 3204 dddvv.exe rrlffff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\57d8a826b9abf3ffce55ceccc115cee834d43b0a2286975d0685526a7cf8465e_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvpp.exec:\jdvpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btbttn.exec:\btbttn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttnbtb.exec:\ttnbtb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvpjd.exec:\vvpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xllllxl.exec:\xllllxl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3tbbhh.exec:\3tbbhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tntnnn.exec:\tntnnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djpdd.exec:\djpdd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rflfxxr.exec:\rflfxxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9bnhbh.exec:\9bnhbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjjvd.exec:\vjjvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfllxxf.exec:\lfllxxf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtthb.exec:\nhtthb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvvvd.exec:\dvvvd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlfxrrl.exec:\rlfxrrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbbtt.exec:\ttbbtt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvdvv.exec:\vvdvv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjppj.exec:\jjppj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1xfrrxf.exec:\1xfrrxf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhhnht.exec:\nhhnht.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dddvv.exec:\dddvv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrlffff.exec:\rrlffff.exe23⤵
- Executes dropped EXE
-
\??\c:\bbntbh.exec:\bbntbh.exe24⤵
- Executes dropped EXE
-
\??\c:\hbntnn.exec:\hbntnn.exe25⤵
- Executes dropped EXE
-
\??\c:\jjpjj.exec:\jjpjj.exe26⤵
- Executes dropped EXE
-
\??\c:\bbhbtt.exec:\bbhbtt.exe27⤵
- Executes dropped EXE
-
\??\c:\dvvpp.exec:\dvvpp.exe28⤵
- Executes dropped EXE
-
\??\c:\vdpvp.exec:\vdpvp.exe29⤵
- Executes dropped EXE
-
\??\c:\tnnhhh.exec:\tnnhhh.exe30⤵
- Executes dropped EXE
-
\??\c:\vpjdp.exec:\vpjdp.exe31⤵
- Executes dropped EXE
-
\??\c:\rllfxxx.exec:\rllfxxx.exe32⤵
- Executes dropped EXE
-
\??\c:\llrlffx.exec:\llrlffx.exe33⤵
- Executes dropped EXE
-
\??\c:\7bhbbb.exec:\7bhbbb.exe34⤵
- Executes dropped EXE
-
\??\c:\jppjd.exec:\jppjd.exe35⤵
- Executes dropped EXE
-
\??\c:\ppvdj.exec:\ppvdj.exe36⤵
- Executes dropped EXE
-
\??\c:\rrxrlll.exec:\rrxrlll.exe37⤵
- Executes dropped EXE
-
\??\c:\rrxxfxr.exec:\rrxxfxr.exe38⤵
- Executes dropped EXE
-
\??\c:\htbhbb.exec:\htbhbb.exe39⤵
- Executes dropped EXE
-
\??\c:\vvvpp.exec:\vvvpp.exe40⤵
- Executes dropped EXE
-
\??\c:\jddvp.exec:\jddvp.exe41⤵
- Executes dropped EXE
-
\??\c:\ffxrrrl.exec:\ffxrrrl.exe42⤵
- Executes dropped EXE
-
\??\c:\lxlrlll.exec:\lxlrlll.exe43⤵
- Executes dropped EXE
-
\??\c:\tbhnnh.exec:\tbhnnh.exe44⤵
- Executes dropped EXE
-
\??\c:\djvdv.exec:\djvdv.exe45⤵
- Executes dropped EXE
-
\??\c:\llfxxxr.exec:\llfxxxr.exe46⤵
- Executes dropped EXE
-
\??\c:\5ntnnb.exec:\5ntnnb.exe47⤵
- Executes dropped EXE
-
\??\c:\btttnn.exec:\btttnn.exe48⤵
- Executes dropped EXE
-
\??\c:\vpdvp.exec:\vpdvp.exe49⤵
- Executes dropped EXE
-
\??\c:\llflrxf.exec:\llflrxf.exe50⤵
- Executes dropped EXE
-
\??\c:\bthtnn.exec:\bthtnn.exe51⤵
- Executes dropped EXE
-
\??\c:\vpddj.exec:\vpddj.exe52⤵
- Executes dropped EXE
-
\??\c:\lflxrxr.exec:\lflxrxr.exe53⤵
- Executes dropped EXE
-
\??\c:\rxxxrrr.exec:\rxxxrrr.exe54⤵
- Executes dropped EXE
-
\??\c:\1hbtnn.exec:\1hbtnn.exe55⤵
- Executes dropped EXE
-
\??\c:\hbhhhh.exec:\hbhhhh.exe56⤵
- Executes dropped EXE
-
\??\c:\vdvvp.exec:\vdvvp.exe57⤵
- Executes dropped EXE
-
\??\c:\vvpjd.exec:\vvpjd.exe58⤵
- Executes dropped EXE
-
\??\c:\rlxrrrr.exec:\rlxrrrr.exe59⤵
- Executes dropped EXE
-
\??\c:\rrlxxll.exec:\rrlxxll.exe60⤵
- Executes dropped EXE
-
\??\c:\htbtnh.exec:\htbtnh.exe61⤵
- Executes dropped EXE
-
\??\c:\tbhnbb.exec:\tbhnbb.exe62⤵
- Executes dropped EXE
-
\??\c:\vjjpp.exec:\vjjpp.exe63⤵
- Executes dropped EXE
-
\??\c:\xllfxxr.exec:\xllfxxr.exe64⤵
- Executes dropped EXE
-
\??\c:\fxxxxxx.exec:\fxxxxxx.exe65⤵
- Executes dropped EXE
-
\??\c:\btttth.exec:\btttth.exe66⤵
-
\??\c:\ttbbtt.exec:\ttbbtt.exe67⤵
-
\??\c:\ppddp.exec:\ppddp.exe68⤵
-
\??\c:\jvjjd.exec:\jvjjd.exe69⤵
-
\??\c:\xrxxffl.exec:\xrxxffl.exe70⤵
-
\??\c:\pvddd.exec:\pvddd.exe71⤵
-
\??\c:\vpvpd.exec:\vpvpd.exe72⤵
-
\??\c:\rfrrxxf.exec:\rfrrxxf.exe73⤵
-
\??\c:\5bbbbb.exec:\5bbbbb.exe74⤵
-
\??\c:\hhhbbb.exec:\hhhbbb.exe75⤵
-
\??\c:\jpvdd.exec:\jpvdd.exe76⤵
-
\??\c:\vppjd.exec:\vppjd.exe77⤵
-
\??\c:\fxlfrrr.exec:\fxlfrrr.exe78⤵
-
\??\c:\nttnbt.exec:\nttnbt.exe79⤵
-
\??\c:\nhbnbt.exec:\nhbnbt.exe80⤵
-
\??\c:\jddjv.exec:\jddjv.exe81⤵
-
\??\c:\1xflrfx.exec:\1xflrfx.exe82⤵
-
\??\c:\rllxxxx.exec:\rllxxxx.exe83⤵
-
\??\c:\bntttb.exec:\bntttb.exe84⤵
-
\??\c:\hbbbbh.exec:\hbbbbh.exe85⤵
-
\??\c:\dvpjd.exec:\dvpjd.exe86⤵
-
\??\c:\fxxrrrr.exec:\fxxrrrr.exe87⤵
-
\??\c:\frfllll.exec:\frfllll.exe88⤵
-
\??\c:\3hnhbb.exec:\3hnhbb.exe89⤵
-
\??\c:\ttnhhh.exec:\ttnhhh.exe90⤵
-
\??\c:\9pjjv.exec:\9pjjv.exe91⤵
-
\??\c:\lfrlrrx.exec:\lfrlrrx.exe92⤵
-
\??\c:\xxrrffx.exec:\xxrrffx.exe93⤵
-
\??\c:\7bbtnt.exec:\7bbtnt.exe94⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe95⤵
-
\??\c:\jddjv.exec:\jddjv.exe96⤵
-
\??\c:\fllfxxr.exec:\fllfxxr.exe97⤵
-
\??\c:\rlrlrrr.exec:\rlrlrrr.exe98⤵
-
\??\c:\bhhbtt.exec:\bhhbtt.exe99⤵
-
\??\c:\btbttt.exec:\btbttt.exe100⤵
-
\??\c:\dvpjv.exec:\dvpjv.exe101⤵
-
\??\c:\rllfrrl.exec:\rllfrrl.exe102⤵
-
\??\c:\fxxrllf.exec:\fxxrllf.exe103⤵
-
\??\c:\tnhbbh.exec:\tnhbbh.exe104⤵
-
\??\c:\hbhntt.exec:\hbhntt.exe105⤵
-
\??\c:\vvpvv.exec:\vvpvv.exe106⤵
-
\??\c:\jpvvp.exec:\jpvvp.exe107⤵
-
\??\c:\rllfxff.exec:\rllfxff.exe108⤵
-
\??\c:\xxxrrrr.exec:\xxxrrrr.exe109⤵
-
\??\c:\hhtnnn.exec:\hhtnnn.exe110⤵
-
\??\c:\pdvpv.exec:\pdvpv.exe111⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe112⤵
-
\??\c:\lllxrxl.exec:\lllxrxl.exe113⤵
-
\??\c:\hhhhbt.exec:\hhhhbt.exe114⤵
-
\??\c:\btbtbb.exec:\btbtbb.exe115⤵
-
\??\c:\vpppj.exec:\vpppj.exe116⤵
-
\??\c:\llllfff.exec:\llllfff.exe117⤵
-
\??\c:\lxlrxxl.exec:\lxlrxxl.exe118⤵
-
\??\c:\thhhnh.exec:\thhhnh.exe119⤵
-
\??\c:\xflxrrf.exec:\xflxrrf.exe120⤵
-
\??\c:\nhhbhb.exec:\nhhbhb.exe121⤵
-
\??\c:\djddp.exec:\djddp.exe122⤵
-
\??\c:\vjvvv.exec:\vjvvv.exe123⤵
-
\??\c:\llxxlrr.exec:\llxxlrr.exe124⤵
-
\??\c:\nbnnnt.exec:\nbnnnt.exe125⤵
-
\??\c:\tnhbhb.exec:\tnhbhb.exe126⤵
-
\??\c:\jvvdv.exec:\jvvdv.exe127⤵
-
\??\c:\3llfxxr.exec:\3llfxxr.exe128⤵
-
\??\c:\hbbbtt.exec:\hbbbtt.exe129⤵
-
\??\c:\pdvpj.exec:\pdvpj.exe130⤵
-
\??\c:\jddpp.exec:\jddpp.exe131⤵
-
\??\c:\rrxllll.exec:\rrxllll.exe132⤵
-
\??\c:\rffxrrl.exec:\rffxrrl.exe133⤵
-
\??\c:\bhnhbt.exec:\bhnhbt.exe134⤵
-
\??\c:\hbtnhh.exec:\hbtnhh.exe135⤵
-
\??\c:\jdjjd.exec:\jdjjd.exe136⤵
-
\??\c:\ppddd.exec:\ppddd.exe137⤵
-
\??\c:\frlrxxl.exec:\frlrxxl.exe138⤵
-
\??\c:\5fllrxf.exec:\5fllrxf.exe139⤵
-
\??\c:\5btntt.exec:\5btntt.exe140⤵
-
\??\c:\hnbttt.exec:\hnbttt.exe141⤵
-
\??\c:\1pddv.exec:\1pddv.exe142⤵
-
\??\c:\dvppp.exec:\dvppp.exe143⤵
-
\??\c:\xxllffx.exec:\xxllffx.exe144⤵
-
\??\c:\rflfxxx.exec:\rflfxxx.exe145⤵
-
\??\c:\hhtbtt.exec:\hhtbtt.exe146⤵
-
\??\c:\nnntnn.exec:\nnntnn.exe147⤵
-
\??\c:\pjppp.exec:\pjppp.exe148⤵
-
\??\c:\7vpjj.exec:\7vpjj.exe149⤵
-
\??\c:\rlffxxx.exec:\rlffxxx.exe150⤵
-
\??\c:\lrxfrfx.exec:\lrxfrfx.exe151⤵
-
\??\c:\tbbttt.exec:\tbbttt.exe152⤵
-
\??\c:\nthhth.exec:\nthhth.exe153⤵
-
\??\c:\dvvvv.exec:\dvvvv.exe154⤵
-
\??\c:\rffrllf.exec:\rffrllf.exe155⤵
-
\??\c:\ffffllr.exec:\ffffllr.exe156⤵
-
\??\c:\1hbbtn.exec:\1hbbtn.exe157⤵
-
\??\c:\tbhttn.exec:\tbhttn.exe158⤵
-
\??\c:\pdjvj.exec:\pdjvj.exe159⤵
-
\??\c:\rlrlllf.exec:\rlrlllf.exe160⤵
-
\??\c:\ffffxff.exec:\ffffxff.exe161⤵
-
\??\c:\nnbntt.exec:\nnbntt.exe162⤵
-
\??\c:\vdppj.exec:\vdppj.exe163⤵
-
\??\c:\rfrxrrr.exec:\rfrxrrr.exe164⤵
-
\??\c:\rrffxff.exec:\rrffxff.exe165⤵
-
\??\c:\ntnbht.exec:\ntnbht.exe166⤵
-
\??\c:\jvdjv.exec:\jvdjv.exe167⤵
-
\??\c:\ddjvp.exec:\ddjvp.exe168⤵
-
\??\c:\llrrxxl.exec:\llrrxxl.exe169⤵
-
\??\c:\3llfxfx.exec:\3llfxfx.exe170⤵
-
\??\c:\bhhnhh.exec:\bhhnhh.exe171⤵
-
\??\c:\ttbthh.exec:\ttbthh.exe172⤵
-
\??\c:\vjdvp.exec:\vjdvp.exe173⤵
-
\??\c:\djjjd.exec:\djjjd.exe174⤵
-
\??\c:\rfllllf.exec:\rfllllf.exe175⤵
-
\??\c:\bthhhh.exec:\bthhhh.exe176⤵
-
\??\c:\bnnhbn.exec:\bnnhbn.exe177⤵
-
\??\c:\5djdd.exec:\5djdd.exe178⤵
-
\??\c:\vdpvj.exec:\vdpvj.exe179⤵
-
\??\c:\lfxflxl.exec:\lfxflxl.exe180⤵
-
\??\c:\xffrlfr.exec:\xffrlfr.exe181⤵
-
\??\c:\5bhbtt.exec:\5bhbtt.exe182⤵
-
\??\c:\tnnhhb.exec:\tnnhhb.exe183⤵
-
\??\c:\dddvp.exec:\dddvp.exe184⤵
-
\??\c:\pddvp.exec:\pddvp.exe185⤵
-
\??\c:\3lrlxfx.exec:\3lrlxfx.exe186⤵
-
\??\c:\rlrrllf.exec:\rlrrllf.exe187⤵
-
\??\c:\7bbbtb.exec:\7bbbtb.exe188⤵
-
\??\c:\ntbtnn.exec:\ntbtnn.exe189⤵
-
\??\c:\vdvpv.exec:\vdvpv.exe190⤵
-
\??\c:\fxfxrlr.exec:\fxfxrlr.exe191⤵
-
\??\c:\xlllffx.exec:\xlllffx.exe192⤵
-
\??\c:\tnnbht.exec:\tnnbht.exe193⤵
-
\??\c:\ddvdj.exec:\ddvdj.exe194⤵
-
\??\c:\rxffxxx.exec:\rxffxxx.exe195⤵
-
\??\c:\fxrrllf.exec:\fxrrllf.exe196⤵
-
\??\c:\nhnhbb.exec:\nhnhbb.exe197⤵
-
\??\c:\btntnn.exec:\btntnn.exe198⤵
-
\??\c:\vvdvp.exec:\vvdvp.exe199⤵
-
\??\c:\lfrflfr.exec:\lfrflfr.exe200⤵
-
\??\c:\lxxrrrl.exec:\lxxrrrl.exe201⤵
-
\??\c:\rxxxrxx.exec:\rxxxrxx.exe202⤵
-
\??\c:\hbbhhh.exec:\hbbhhh.exe203⤵
-
\??\c:\dvvdd.exec:\dvvdd.exe204⤵
-
\??\c:\jdvvd.exec:\jdvvd.exe205⤵
-
\??\c:\5xllflf.exec:\5xllflf.exe206⤵
-
\??\c:\xlxrrrl.exec:\xlxrrrl.exe207⤵
-
\??\c:\tnnhbn.exec:\tnnhbn.exe208⤵
-
\??\c:\jpvpp.exec:\jpvpp.exe209⤵
-
\??\c:\fxffxxx.exec:\fxffxxx.exe210⤵
-
\??\c:\3xrlfxx.exec:\3xrlfxx.exe211⤵
-
\??\c:\btttnt.exec:\btttnt.exe212⤵
-
\??\c:\vvjjv.exec:\vvjjv.exe213⤵
-
\??\c:\jjppp.exec:\jjppp.exe214⤵
-
\??\c:\fxrrlrr.exec:\fxrrlrr.exe215⤵
-
\??\c:\9rxxxlf.exec:\9rxxxlf.exe216⤵
-
\??\c:\xrrlllf.exec:\xrrlllf.exe217⤵
-
\??\c:\tbhhbh.exec:\tbhhbh.exe218⤵
-
\??\c:\vpvvv.exec:\vpvvv.exe219⤵
-
\??\c:\frxxxfx.exec:\frxxxfx.exe220⤵
-
\??\c:\ffxrrff.exec:\ffxrrff.exe221⤵
-
\??\c:\bthbht.exec:\bthbht.exe222⤵
-
\??\c:\bntntt.exec:\bntntt.exe223⤵
-
\??\c:\vdjjd.exec:\vdjjd.exe224⤵
-
\??\c:\3vvpj.exec:\3vvpj.exe225⤵
-
\??\c:\7xxrrxr.exec:\7xxrrxr.exe226⤵
-
\??\c:\xrxrllf.exec:\xrxrllf.exe227⤵
-
\??\c:\hbbhhb.exec:\hbbhhb.exe228⤵
-
\??\c:\ntbtnn.exec:\ntbtnn.exe229⤵
-
\??\c:\7jvvp.exec:\7jvvp.exe230⤵
-
\??\c:\ddvjp.exec:\ddvjp.exe231⤵
-
\??\c:\5rllfxx.exec:\5rllfxx.exe232⤵
-
\??\c:\bhthnt.exec:\bhthnt.exe233⤵
-
\??\c:\3hhnnb.exec:\3hhnnb.exe234⤵
-
\??\c:\dpvvp.exec:\dpvvp.exe235⤵
-
\??\c:\dpjpv.exec:\dpjpv.exe236⤵
-
\??\c:\9ffxxxx.exec:\9ffxxxx.exe237⤵
-
\??\c:\lxrflfx.exec:\lxrflfx.exe238⤵
-
\??\c:\nhtnbb.exec:\nhtnbb.exe239⤵
-
\??\c:\nhnnbb.exec:\nhnnbb.exe240⤵
-
\??\c:\jvvvv.exec:\jvvvv.exe241⤵