Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 14:38
Behavioral task
behavioral1
Sample
d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exe
-
Size
339KB
-
MD5
d9196075f94f9fa1fb31be240033d6b0
-
SHA1
3f6adaf1578e91d98ac6436058e5c535367a861d
-
SHA256
e16b43add7bc1da43dc560fe009ad52eb43ae1a77cee89f14e919af310c8ddf5
-
SHA512
ed0c1be936ed39192d798b30980bbba61dcc6189fbc52adce91a8170e5c2bee3e1f4bf138ccb71dbd3d1aa1a802b3d0e3a0a831a27bbef188ef828b433439f1c
-
SSDEEP
3072:9hOmTsF93UYfwC6GIoutz5yLpcgDE4JBHNgu5ex1B2OkEv0KvmhNiP:9cm4FmowdHoS4BtguSPKyHP
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1628-0-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1628-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1776-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4804-20-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1316-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1888-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2724-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2516-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1796-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5012-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4976-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2512-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/376-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3868-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2300-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3728-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4524-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3224-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2020-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/676-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1908-130-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2444-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1056-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4456-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2012-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1112-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4144-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3652-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3280-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3512-236-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3380-249-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1788-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4948-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3496-270-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2880-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3384-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1760-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3292-289-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4880-291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3756-297-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/764-301-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2944-302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4416-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2084-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4800-326-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1952-330-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2624-362-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2408-378-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1000-386-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5084-405-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4348-415-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2304-425-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5012-436-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3384-444-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1916-463-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/8-486-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3496-581-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1016-637-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1068-644-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3212-667-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3500-718-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1000-783-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/880-850-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2168-1297-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
hnbttn.exerrllxxl.exehbnthh.exejjpjd.exe7dpjd.exexlrllfl.exenhtntt.exehbnnnn.exepdvvp.exellxrlfx.exerlffxxr.exethnnhh.exe5bnnnt.exepjpjj.exebnthbb.exedpvdj.exe3btnht.exepdjdv.exehbttnn.exerfrfxxx.exe9rxrfrr.exedjppp.exehtnhhh.exe1vpjp.exetbntnn.exejppjd.exerffffff.exenntnnn.exepdddv.exeflxxxxx.exeppdvd.exe3llfffx.exehtbbbb.exejdppj.exevppjp.exefrfxllr.exennbnhh.exehbhhnn.exejvdvp.exefxxrrll.exexxfxrll.exebthhnn.exevjpjd.exeddpvj.exelrffxxx.exethhnhb.exedpdvd.exexfrlfxx.exe1llfxrl.exepvvdd.exepppjd.exeffrlfff.exebthbhb.exevdjdp.exedpdpp.exelfxfxrr.exenhbttn.exehbnnhn.exejdddv.exehbbtnn.exetntnbt.exerfrlfff.exerrxxrlf.exevpjdd.exepid process 1776 hnbttn.exe 4804 rrllxxl.exe 3868 hbnthh.exe 1316 jjpjd.exe 1888 7dpjd.exe 2724 xlrllfl.exe 2516 nhtntt.exe 1796 hbnnnn.exe 2512 pdvvp.exe 4976 llxrlfx.exe 5012 rlffxxr.exe 4464 thnnhh.exe 376 5bnnnt.exe 2708 pjpjj.exe 2300 bnthbb.exe 3728 dpvdj.exe 4524 3btnht.exe 3224 pdjdv.exe 2020 hbttnn.exe 676 rfrfxxx.exe 1908 9rxrfrr.exe 3240 djppp.exe 872 htnhhh.exe 2444 1vpjp.exe 3880 tbntnn.exe 3808 jppjd.exe 3472 rffffff.exe 1056 nntnnn.exe 2136 pdddv.exe 4456 flxxxxx.exe 2184 ppdvd.exe 2012 3llfffx.exe 3484 htbbbb.exe 4196 jdppj.exe 1180 vppjp.exe 1112 frfxllr.exe 3952 nnbnhh.exe 4144 hbhhnn.exe 3784 jvdvp.exe 4408 fxxrrll.exe 3432 xxfxrll.exe 2028 bthhnn.exe 3652 vjpjd.exe 1664 ddpvj.exe 3280 lrffxxx.exe 3512 thhnhb.exe 1888 dpdvd.exe 980 xfrlfxx.exe 1704 1llfxrl.exe 3380 pvvdd.exe 4716 pppjd.exe 3448 ffrlfff.exe 3832 bthbhb.exe 1788 vdjdp.exe 2580 dpdpp.exe 4948 lfxfxrr.exe 3496 nhbttn.exe 2880 hbnnhn.exe 3384 jdddv.exe 1760 hbbtnn.exe 3292 tntnbt.exe 4880 rfrlfff.exe 3756 rrxxrlf.exe 764 vpjdd.exe -
Processes:
resource yara_rule behavioral2/memory/1628-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hnbttn.exe upx behavioral2/memory/1628-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1776-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1776-12-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rrllxxl.exe upx C:\hbnthh.exe upx behavioral2/memory/4804-20-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1316-25-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\7dpjd.exe upx behavioral2/memory/1888-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2724-37-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nhtntt.exe upx behavioral2/memory/2516-44-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1796-49-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pdvvp.exe upx \??\c:\llxrlfx.exe upx \??\c:\rlffxxr.exe upx behavioral2/memory/5012-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4976-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2512-61-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hbnnnn.exe upx \??\c:\thnnhh.exe upx \??\c:\xlrllfl.exe upx C:\5bnnnt.exe upx behavioral2/memory/376-77-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pjpjj.exe upx behavioral2/memory/376-84-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jjpjd.exe upx behavioral2/memory/3868-18-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bnthbb.exe upx C:\dpvdj.exe upx behavioral2/memory/2300-94-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3btnht.exe upx behavioral2/memory/4524-102-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3728-100-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pdjdv.exe upx behavioral2/memory/4524-106-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbttnn.exe upx behavioral2/memory/3224-112-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rfrfxxx.exe upx behavioral2/memory/2020-118-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/676-121-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9rxrfrr.exe upx behavioral2/memory/1908-130-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\djppp.exe upx C:\htnhhh.exe upx C:\1vpjp.exe upx behavioral2/memory/2444-142-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tbntnn.exe upx behavioral2/memory/2444-148-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jppjd.exe upx C:\rffffff.exe upx behavioral2/memory/1056-163-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nntnnn.exe upx \??\c:\pdddv.exe upx C:\flxxxxx.exe upx C:\ppdvd.exe upx behavioral2/memory/4456-181-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3llfffx.exe upx behavioral2/memory/2012-187-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1112-200-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4144-207-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3652-225-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exehnbttn.exerrllxxl.exehbnthh.exejjpjd.exe7dpjd.exexlrllfl.exenhtntt.exehbnnnn.exepdvvp.exellxrlfx.exerlffxxr.exethnnhh.exe5bnnnt.exepjpjj.exebnthbb.exedpvdj.exe3btnht.exepdjdv.exehbttnn.exerfrfxxx.exe9rxrfrr.exedescription pid process target process PID 1628 wrote to memory of 1776 1628 d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exe hnbttn.exe PID 1628 wrote to memory of 1776 1628 d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exe hnbttn.exe PID 1628 wrote to memory of 1776 1628 d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exe hnbttn.exe PID 1776 wrote to memory of 4804 1776 hnbttn.exe rrllxxl.exe PID 1776 wrote to memory of 4804 1776 hnbttn.exe rrllxxl.exe PID 1776 wrote to memory of 4804 1776 hnbttn.exe rrllxxl.exe PID 4804 wrote to memory of 3868 4804 rrllxxl.exe hbnthh.exe PID 4804 wrote to memory of 3868 4804 rrllxxl.exe hbnthh.exe PID 4804 wrote to memory of 3868 4804 rrllxxl.exe hbnthh.exe PID 3868 wrote to memory of 1316 3868 hbnthh.exe jjpjd.exe PID 3868 wrote to memory of 1316 3868 hbnthh.exe jjpjd.exe PID 3868 wrote to memory of 1316 3868 hbnthh.exe jjpjd.exe PID 1316 wrote to memory of 1888 1316 jjpjd.exe 7dpjd.exe PID 1316 wrote to memory of 1888 1316 jjpjd.exe 7dpjd.exe PID 1316 wrote to memory of 1888 1316 jjpjd.exe 7dpjd.exe PID 1888 wrote to memory of 2724 1888 7dpjd.exe xlrllfl.exe PID 1888 wrote to memory of 2724 1888 7dpjd.exe xlrllfl.exe PID 1888 wrote to memory of 2724 1888 7dpjd.exe xlrllfl.exe PID 2724 wrote to memory of 2516 2724 xlrllfl.exe nhtntt.exe PID 2724 wrote to memory of 2516 2724 xlrllfl.exe nhtntt.exe PID 2724 wrote to memory of 2516 2724 xlrllfl.exe nhtntt.exe PID 2516 wrote to memory of 1796 2516 nhtntt.exe hbnnnn.exe PID 2516 wrote to memory of 1796 2516 nhtntt.exe hbnnnn.exe PID 2516 wrote to memory of 1796 2516 nhtntt.exe hbnnnn.exe PID 1796 wrote to memory of 2512 1796 hbnnnn.exe pdvvp.exe PID 1796 wrote to memory of 2512 1796 hbnnnn.exe pdvvp.exe PID 1796 wrote to memory of 2512 1796 hbnnnn.exe pdvvp.exe PID 2512 wrote to memory of 4976 2512 pdvvp.exe llxrlfx.exe PID 2512 wrote to memory of 4976 2512 pdvvp.exe llxrlfx.exe PID 2512 wrote to memory of 4976 2512 pdvvp.exe llxrlfx.exe PID 4976 wrote to memory of 5012 4976 llxrlfx.exe rlffxxr.exe PID 4976 wrote to memory of 5012 4976 llxrlfx.exe rlffxxr.exe PID 4976 wrote to memory of 5012 4976 llxrlfx.exe rlffxxr.exe PID 5012 wrote to memory of 4464 5012 rlffxxr.exe thnnhh.exe PID 5012 wrote to memory of 4464 5012 rlffxxr.exe thnnhh.exe PID 5012 wrote to memory of 4464 5012 rlffxxr.exe thnnhh.exe PID 4464 wrote to memory of 376 4464 thnnhh.exe 5bnnnt.exe PID 4464 wrote to memory of 376 4464 thnnhh.exe 5bnnnt.exe PID 4464 wrote to memory of 376 4464 thnnhh.exe 5bnnnt.exe PID 376 wrote to memory of 2708 376 5bnnnt.exe pjpjj.exe PID 376 wrote to memory of 2708 376 5bnnnt.exe pjpjj.exe PID 376 wrote to memory of 2708 376 5bnnnt.exe pjpjj.exe PID 2708 wrote to memory of 2300 2708 pjpjj.exe bnthbb.exe PID 2708 wrote to memory of 2300 2708 pjpjj.exe bnthbb.exe PID 2708 wrote to memory of 2300 2708 pjpjj.exe bnthbb.exe PID 2300 wrote to memory of 3728 2300 bnthbb.exe dpvdj.exe PID 2300 wrote to memory of 3728 2300 bnthbb.exe dpvdj.exe PID 2300 wrote to memory of 3728 2300 bnthbb.exe dpvdj.exe PID 3728 wrote to memory of 4524 3728 dpvdj.exe 3btnht.exe PID 3728 wrote to memory of 4524 3728 dpvdj.exe 3btnht.exe PID 3728 wrote to memory of 4524 3728 dpvdj.exe 3btnht.exe PID 4524 wrote to memory of 3224 4524 3btnht.exe pdjdv.exe PID 4524 wrote to memory of 3224 4524 3btnht.exe pdjdv.exe PID 4524 wrote to memory of 3224 4524 3btnht.exe pdjdv.exe PID 3224 wrote to memory of 2020 3224 pdjdv.exe hbttnn.exe PID 3224 wrote to memory of 2020 3224 pdjdv.exe hbttnn.exe PID 3224 wrote to memory of 2020 3224 pdjdv.exe hbttnn.exe PID 2020 wrote to memory of 676 2020 hbttnn.exe rfrfxxx.exe PID 2020 wrote to memory of 676 2020 hbttnn.exe rfrfxxx.exe PID 2020 wrote to memory of 676 2020 hbttnn.exe rfrfxxx.exe PID 676 wrote to memory of 1908 676 rfrfxxx.exe 9rxrfrr.exe PID 676 wrote to memory of 1908 676 rfrfxxx.exe 9rxrfrr.exe PID 676 wrote to memory of 1908 676 rfrfxxx.exe 9rxrfrr.exe PID 1908 wrote to memory of 3240 1908 9rxrfrr.exe djppp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d9196075f94f9fa1fb31be240033d6b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\hnbttn.exec:\hnbttn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
\??\c:\rrllxxl.exec:\rrllxxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\hbnthh.exec:\hbnthh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\jjpjd.exec:\jjpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
\??\c:\7dpjd.exec:\7dpjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
\??\c:\xlrllfl.exec:\xlrllfl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\nhtntt.exec:\nhtntt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\hbnnnn.exec:\hbnnnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\pdvvp.exec:\pdvvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\llxrlfx.exec:\llxrlfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
\??\c:\rlffxxr.exec:\rlffxxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\thnnhh.exec:\thnnhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\5bnnnt.exec:\5bnnnt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
\??\c:\pjpjj.exec:\pjpjj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\bnthbb.exec:\bnthbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\dpvdj.exec:\dpvdj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\3btnht.exec:\3btnht.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\pdjdv.exec:\pdjdv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
\??\c:\hbttnn.exec:\hbttnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\rfrfxxx.exec:\rfrfxxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
\??\c:\9rxrfrr.exec:\9rxrfrr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\djppp.exec:\djppp.exe23⤵
- Executes dropped EXE
PID:3240 -
\??\c:\htnhhh.exec:\htnhhh.exe24⤵
- Executes dropped EXE
PID:872 -
\??\c:\1vpjp.exec:\1vpjp.exe25⤵
- Executes dropped EXE
PID:2444 -
\??\c:\tbntnn.exec:\tbntnn.exe26⤵
- Executes dropped EXE
PID:3880 -
\??\c:\jppjd.exec:\jppjd.exe27⤵
- Executes dropped EXE
PID:3808 -
\??\c:\rffffff.exec:\rffffff.exe28⤵
- Executes dropped EXE
PID:3472 -
\??\c:\nntnnn.exec:\nntnnn.exe29⤵
- Executes dropped EXE
PID:1056 -
\??\c:\pdddv.exec:\pdddv.exe30⤵
- Executes dropped EXE
PID:2136 -
\??\c:\flxxxxx.exec:\flxxxxx.exe31⤵
- Executes dropped EXE
PID:4456 -
\??\c:\ppdvd.exec:\ppdvd.exe32⤵
- Executes dropped EXE
PID:2184 -
\??\c:\3llfffx.exec:\3llfffx.exe33⤵
- Executes dropped EXE
PID:2012 -
\??\c:\htbbbb.exec:\htbbbb.exe34⤵
- Executes dropped EXE
PID:3484 -
\??\c:\jdppj.exec:\jdppj.exe35⤵
- Executes dropped EXE
PID:4196 -
\??\c:\vppjp.exec:\vppjp.exe36⤵
- Executes dropped EXE
PID:1180 -
\??\c:\frfxllr.exec:\frfxllr.exe37⤵
- Executes dropped EXE
PID:1112 -
\??\c:\nnbnhh.exec:\nnbnhh.exe38⤵
- Executes dropped EXE
PID:3952 -
\??\c:\hbhhnn.exec:\hbhhnn.exe39⤵
- Executes dropped EXE
PID:4144 -
\??\c:\jvdvp.exec:\jvdvp.exe40⤵
- Executes dropped EXE
PID:3784 -
\??\c:\fxxrrll.exec:\fxxrrll.exe41⤵
- Executes dropped EXE
PID:4408 -
\??\c:\xxfxrll.exec:\xxfxrll.exe42⤵
- Executes dropped EXE
PID:3432 -
\??\c:\bthhnn.exec:\bthhnn.exe43⤵
- Executes dropped EXE
PID:2028 -
\??\c:\vjpjd.exec:\vjpjd.exe44⤵
- Executes dropped EXE
PID:3652 -
\??\c:\ddpvj.exec:\ddpvj.exe45⤵
- Executes dropped EXE
PID:1664 -
\??\c:\lrffxxx.exec:\lrffxxx.exe46⤵
- Executes dropped EXE
PID:3280 -
\??\c:\thhnhb.exec:\thhnhb.exe47⤵
- Executes dropped EXE
PID:3512 -
\??\c:\dpdvd.exec:\dpdvd.exe48⤵
- Executes dropped EXE
PID:1888 -
\??\c:\xfrlfxx.exec:\xfrlfxx.exe49⤵
- Executes dropped EXE
PID:980 -
\??\c:\1llfxrl.exec:\1llfxrl.exe50⤵
- Executes dropped EXE
PID:1704 -
\??\c:\pvvdd.exec:\pvvdd.exe51⤵
- Executes dropped EXE
PID:3380 -
\??\c:\pppjd.exec:\pppjd.exe52⤵
- Executes dropped EXE
PID:4716 -
\??\c:\ffrlfff.exec:\ffrlfff.exe53⤵
- Executes dropped EXE
PID:3448 -
\??\c:\bthbhb.exec:\bthbhb.exe54⤵
- Executes dropped EXE
PID:3832 -
\??\c:\vdjdp.exec:\vdjdp.exe55⤵
- Executes dropped EXE
PID:1788 -
\??\c:\dpdpp.exec:\dpdpp.exe56⤵
- Executes dropped EXE
PID:2580 -
\??\c:\lfxfxrr.exec:\lfxfxrr.exe57⤵
- Executes dropped EXE
PID:4948 -
\??\c:\nhbttn.exec:\nhbttn.exe58⤵
- Executes dropped EXE
PID:3496 -
\??\c:\hbnnhn.exec:\hbnnhn.exe59⤵
- Executes dropped EXE
PID:2880 -
\??\c:\jdddv.exec:\jdddv.exe60⤵
- Executes dropped EXE
PID:3384 -
\??\c:\hbbtnn.exec:\hbbtnn.exe61⤵
- Executes dropped EXE
PID:1760 -
\??\c:\tntnbt.exec:\tntnbt.exe62⤵
- Executes dropped EXE
PID:3292 -
\??\c:\rfrlfff.exec:\rfrlfff.exe63⤵
- Executes dropped EXE
PID:4880 -
\??\c:\rrxxrlf.exec:\rrxxrlf.exe64⤵
- Executes dropped EXE
PID:3756 -
\??\c:\vpjdd.exec:\vpjdd.exe65⤵
- Executes dropped EXE
PID:764 -
\??\c:\xxllxrr.exec:\xxllxrr.exe66⤵PID:2944
-
\??\c:\hhthhn.exec:\hhthhn.exe67⤵PID:4416
-
\??\c:\djpjd.exec:\djpjd.exe68⤵PID:2152
-
\??\c:\9jjdv.exec:\9jjdv.exe69⤵PID:2084
-
\??\c:\frfxrxx.exec:\frfxrxx.exe70⤵PID:1908
-
\??\c:\bbbtnn.exec:\bbbtnn.exe71⤵PID:1856
-
\??\c:\pjpvd.exec:\pjpvd.exe72⤵PID:4800
-
\??\c:\rlfrfrf.exec:\rlfrfrf.exe73⤵PID:1952
-
\??\c:\htnnnn.exec:\htnnnn.exe74⤵PID:1896
-
\??\c:\pdjpj.exec:\pdjpj.exe75⤵PID:4784
-
\??\c:\lxlxlfx.exec:\lxlxlfx.exe76⤵PID:2280
-
\??\c:\xllfffx.exec:\xllfffx.exe77⤵PID:4616
-
\??\c:\nbhbbb.exec:\nbhbbb.exe78⤵PID:3988
-
\??\c:\7pdpd.exec:\7pdpd.exe79⤵PID:2860
-
\??\c:\dvdvv.exec:\dvdvv.exe80⤵PID:220
-
\??\c:\rrllxxx.exec:\rrllxxx.exe81⤵PID:1016
-
\??\c:\tntntn.exec:\tntntn.exe82⤵PID:2176
-
\??\c:\jddpv.exec:\jddpv.exe83⤵PID:2624
-
\??\c:\xlfrlfr.exec:\xlfrlfr.exe84⤵PID:1452
-
\??\c:\bntntn.exec:\bntntn.exe85⤵PID:4412
-
\??\c:\jvpdd.exec:\jvpdd.exe86⤵PID:4196
-
\??\c:\llxlfxl.exec:\llxlfxl.exe87⤵PID:1312
-
\??\c:\7rfxrlf.exec:\7rfxrlf.exe88⤵PID:2408
-
\??\c:\bhhhhb.exec:\bhhhhb.exe89⤵PID:2884
-
\??\c:\jppdv.exec:\jppdv.exe90⤵PID:3712
-
\??\c:\5xrrlll.exec:\5xrrlll.exe91⤵PID:1000
-
\??\c:\7hnbth.exec:\7hnbth.exe92⤵PID:2928
-
\??\c:\5nhbnh.exec:\5nhbnh.exe93⤵PID:4608
-
\??\c:\3dvpd.exec:\3dvpd.exe94⤵PID:4936
-
\??\c:\frrrlfx.exec:\frrrlfx.exe95⤵PID:1752
-
\??\c:\1fxrfxr.exec:\1fxrfxr.exe96⤵PID:3516
-
\??\c:\tttnnn.exec:\tttnnn.exe97⤵PID:5084
-
\??\c:\1ddvp.exec:\1ddvp.exe98⤵PID:4704
-
\??\c:\rxfxllf.exec:\rxfxllf.exe99⤵PID:1696
-
\??\c:\ttnhth.exec:\ttnhth.exe100⤵PID:4348
-
\??\c:\vjjdv.exec:\vjjdv.exe101⤵PID:1880
-
\??\c:\dpdvv.exec:\dpdvv.exe102⤵PID:2168
-
\??\c:\rlllffx.exec:\rlllffx.exe103⤵PID:2304
-
\??\c:\tnnhtt.exec:\tnnhtt.exe104⤵PID:3448
-
\??\c:\3hhbnt.exec:\3hhbnt.exe105⤵PID:3624
-
\??\c:\pjjdp.exec:\pjjdp.exe106⤵PID:5012
-
\??\c:\lrlxrlf.exec:\lrlxrlf.exe107⤵PID:3496
-
\??\c:\hbbnhh.exec:\hbbnhh.exe108⤵PID:2384
-
\??\c:\7tbnhb.exec:\7tbnhb.exe109⤵PID:3384
-
\??\c:\dvjdj.exec:\dvjdj.exe110⤵PID:2300
-
\??\c:\vvvvp.exec:\vvvvp.exe111⤵PID:3500
-
\??\c:\xxxlxxr.exec:\xxxlxxr.exe112⤵PID:208
-
\??\c:\flrrfll.exec:\flrrfll.exe113⤵PID:1876
-
\??\c:\tnhhtt.exec:\tnhhtt.exe114⤵PID:676
-
\??\c:\btttnn.exec:\btttnn.exe115⤵PID:1916
-
\??\c:\9jdpj.exec:\9jdpj.exe116⤵PID:1636
-
\??\c:\9llfrlf.exec:\9llfrlf.exe117⤵PID:4652
-
\??\c:\ffllfxr.exec:\ffllfxr.exe118⤵PID:4800
-
\??\c:\tnhbtn.exec:\tnhbtn.exe119⤵PID:3388
-
\??\c:\5vvvv.exec:\5vvvv.exe120⤵PID:3440
-
\??\c:\xllffxx.exec:\xllffxx.exe121⤵PID:8
-
\??\c:\tthhtt.exec:\tthhtt.exe122⤵PID:1120
-
\??\c:\9jvjj.exec:\9jvjj.exe123⤵PID:1196
-
\??\c:\rfxrffx.exec:\rfxrffx.exe124⤵PID:1056
-
\??\c:\djjdv.exec:\djjdv.exe125⤵PID:2212
-
\??\c:\9jpjp.exec:\9jpjp.exe126⤵PID:2136
-
\??\c:\hbbtnn.exec:\hbbtnn.exe127⤵PID:4456
-
\??\c:\9bbnbb.exec:\9bbnbb.exe128⤵PID:2012
-
\??\c:\5pvjd.exec:\5pvjd.exe129⤵PID:916
-
\??\c:\9flfffl.exec:\9flfffl.exe130⤵PID:1244
-
\??\c:\7bhhhh.exec:\7bhhhh.exe131⤵PID:628
-
\??\c:\thhbbb.exec:\thhbbb.exe132⤵PID:4996
-
\??\c:\jdjpv.exec:\jdjpv.exe133⤵PID:4532
-
\??\c:\9frfxxr.exec:\9frfxxr.exe134⤵PID:2140
-
\??\c:\bthhbn.exec:\bthhbn.exe135⤵PID:3656
-
\??\c:\htbbtn.exec:\htbbtn.exe136⤵PID:4440
-
\??\c:\dvdvd.exec:\dvdvd.exe137⤵PID:4452
-
\??\c:\rlxrlll.exec:\rlxrlll.exe138⤵PID:1800
-
\??\c:\xxffxxf.exec:\xxffxxf.exe139⤵PID:4804
-
\??\c:\tthbtt.exec:\tthbtt.exe140⤵PID:1812
-
\??\c:\pppjd.exec:\pppjd.exe141⤵PID:744
-
\??\c:\9vvvd.exec:\9vvvd.exe142⤵PID:2288
-
\??\c:\rlxlllf.exec:\rlxlllf.exe143⤵PID:3084
-
\??\c:\hnhbnt.exec:\hnhbnt.exe144⤵PID:2516
-
\??\c:\5jpdv.exec:\5jpdv.exe145⤵PID:980
-
\??\c:\pddvp.exec:\pddvp.exe146⤵PID:4636
-
\??\c:\7lfxrrr.exec:\7lfxrrr.exe147⤵PID:4716
-
\??\c:\thhbtt.exec:\thhbtt.exe148⤵PID:3448
-
\??\c:\htnhbt.exec:\htnhbt.exe149⤵PID:3624
-
\??\c:\jpvpj.exec:\jpvpj.exe150⤵PID:2760
-
\??\c:\xrfxrrl.exec:\xrfxrrl.exe151⤵PID:3496
-
\??\c:\7hhbhh.exec:\7hhbhh.exe152⤵PID:1760
-
\??\c:\vjjdj.exec:\vjjdj.exe153⤵PID:2848
-
\??\c:\1jdjd.exec:\1jdjd.exe154⤵PID:4308
-
\??\c:\lflfxrl.exec:\lflfxrl.exe155⤵PID:216
-
\??\c:\nbnhtn.exec:\nbnhtn.exe156⤵PID:3256
-
\??\c:\ddpjj.exec:\ddpjj.exe157⤵PID:2152
-
\??\c:\frfxrrr.exec:\frfxrrr.exe158⤵PID:1756
-
\??\c:\rrrrllf.exec:\rrrrllf.exe159⤵PID:1908
-
\??\c:\hbnhnn.exec:\hbnhnn.exe160⤵PID:4892
-
\??\c:\bhthtn.exec:\bhthtn.exe161⤵PID:2772
-
\??\c:\djpjj.exec:\djpjj.exe162⤵PID:3972
-
\??\c:\xfrlxxr.exec:\xfrlxxr.exe163⤵PID:2032
-
\??\c:\3nhhbb.exec:\3nhhbb.exe164⤵PID:3528
-
\??\c:\pvdvv.exec:\pvdvv.exe165⤵PID:1368
-
\??\c:\7xfxxxr.exec:\7xfxxxr.exe166⤵PID:3472
-
\??\c:\fxlrxrx.exec:\fxlrxrx.exe167⤵PID:1064
-
\??\c:\nhtnhb.exec:\nhtnhb.exe168⤵PID:1364
-
\??\c:\1jddv.exec:\1jddv.exe169⤵PID:1016
-
\??\c:\xllfrrl.exec:\xllfrrl.exe170⤵PID:2176
-
\??\c:\bbnnnn.exec:\bbnnnn.exe171⤵PID:1068
-
\??\c:\tnnhbb.exec:\tnnhbb.exe172⤵PID:808
-
\??\c:\jpvpp.exec:\jpvpp.exe173⤵PID:4656
-
\??\c:\3fxlxxr.exec:\3fxlxxr.exe174⤵PID:4184
-
\??\c:\tthbnh.exec:\tthbnh.exe175⤵PID:2560
-
\??\c:\3dvpp.exec:\3dvpp.exe176⤵PID:3952
-
\??\c:\pvvpj.exec:\pvvpj.exe177⤵PID:2564
-
\??\c:\xflfxrr.exec:\xflfxrr.exe178⤵PID:3784
-
\??\c:\3lrfxrl.exec:\3lrfxrl.exe179⤵PID:3212
-
\??\c:\thhnhn.exec:\thhnhn.exe180⤵PID:2028
-
\??\c:\pppjd.exec:\pppjd.exe181⤵PID:4280
-
\??\c:\rlxrrrr.exec:\rlxrrrr.exe182⤵PID:2764
-
\??\c:\9thhhb.exec:\9thhhb.exe183⤵PID:1432
-
\??\c:\9vdpp.exec:\9vdpp.exe184⤵PID:2724
-
\??\c:\1jpjp.exec:\1jpjp.exe185⤵PID:4884
-
\??\c:\5xrlflf.exec:\5xrlflf.exe186⤵PID:4348
-
\??\c:\3rxllfx.exec:\3rxllfx.exe187⤵PID:1796
-
\??\c:\thhhtb.exec:\thhhtb.exe188⤵PID:3596
-
\??\c:\9dppj.exec:\9dppj.exe189⤵PID:4080
-
\??\c:\5ppjv.exec:\5ppjv.exe190⤵PID:1096
-
\??\c:\llrfxrl.exec:\llrfxrl.exe191⤵PID:2792
-
\??\c:\htbbtn.exec:\htbbtn.exe192⤵PID:3496
-
\??\c:\1tnhbb.exec:\1tnhbb.exe193⤵PID:1448
-
\??\c:\pvvvv.exec:\pvvvv.exe194⤵PID:2300
-
\??\c:\lrrlxff.exec:\lrrlxff.exe195⤵PID:3500
-
\??\c:\xlrlfxr.exec:\xlrlfxr.exe196⤵PID:216
-
\??\c:\hhthth.exec:\hhthth.exe197⤵PID:3636
-
\??\c:\vpdvd.exec:\vpdvd.exe198⤵PID:4424
-
\??\c:\pjpdv.exec:\pjpdv.exe199⤵PID:4504
-
\??\c:\fxlllrr.exec:\fxlllrr.exe200⤵PID:4892
-
\??\c:\5fffxxr.exec:\5fffxxr.exe201⤵PID:1952
-
\??\c:\1hnntt.exec:\1hnntt.exe202⤵PID:4784
-
\??\c:\9thnbt.exec:\9thnbt.exe203⤵PID:2280
-
\??\c:\dvvvp.exec:\dvvvp.exe204⤵PID:4676
-
\??\c:\1jdvp.exec:\1jdvp.exe205⤵PID:1368
-
\??\c:\lffrrll.exec:\lffrrll.exe206⤵PID:3328
-
\??\c:\nbhbtt.exec:\nbhbtt.exe207⤵PID:1632
-
\??\c:\vdjjv.exec:\vdjjv.exe208⤵PID:1956
-
\??\c:\vjvjp.exec:\vjvjp.exe209⤵PID:4980
-
\??\c:\fxfxrrf.exec:\fxfxrrf.exe210⤵PID:1068
-
\??\c:\btttnh.exec:\btttnh.exe211⤵PID:2076
-
\??\c:\bntnnn.exec:\bntnnn.exe212⤵PID:3580
-
\??\c:\3pjjd.exec:\3pjjd.exe213⤵PID:3856
-
\??\c:\pddpd.exec:\pddpd.exe214⤵PID:1656
-
\??\c:\flrlfxr.exec:\flrlfxr.exe215⤵PID:1220
-
\??\c:\bnbttn.exec:\bnbttn.exe216⤵PID:1000
-
\??\c:\dpdvj.exec:\dpdvj.exe217⤵PID:1776
-
\??\c:\ppvvj.exec:\ppvvj.exe218⤵PID:3212
-
\??\c:\rlrfflf.exec:\rlrfflf.exe219⤵PID:2028
-
\??\c:\lrlfxrl.exec:\lrlfxrl.exe220⤵PID:4280
-
\??\c:\jvvvp.exec:\jvvvp.exe221⤵PID:4704
-
\??\c:\pvvpj.exec:\pvvpj.exe222⤵PID:5052
-
\??\c:\xxxlllf.exec:\xxxlllf.exe223⤵PID:3592
-
\??\c:\nhtnhb.exec:\nhtnhb.exe224⤵PID:4028
-
\??\c:\bbttnh.exec:\bbttnh.exe225⤵PID:2276
-
\??\c:\pvjvp.exec:\pvjvp.exe226⤵PID:4716
-
\??\c:\xrrlllf.exec:\xrrlllf.exe227⤵PID:2156
-
\??\c:\rrxxrrl.exec:\rrxxrrl.exe228⤵PID:2384
-
\??\c:\bttnhh.exec:\bttnhh.exe229⤵PID:1084
-
\??\c:\ppddv.exec:\ppddv.exe230⤵PID:1760
-
\??\c:\pvvpj.exec:\pvvpj.exe231⤵PID:3564
-
\??\c:\9xrrlll.exec:\9xrrlll.exe232⤵PID:1448
-
\??\c:\bbbbbh.exec:\bbbbbh.exe233⤵PID:3468
-
\??\c:\jdpjd.exec:\jdpjd.exe234⤵PID:1916
-
\??\c:\pjvpd.exec:\pjvpd.exe235⤵PID:4988
-
\??\c:\lrxxfff.exec:\lrxxfff.exe236⤵PID:3240
-
\??\c:\9hhtnh.exec:\9hhtnh.exe237⤵PID:880
-
\??\c:\jpvpv.exec:\jpvpv.exe238⤵PID:4800
-
\??\c:\3djdp.exec:\3djdp.exe239⤵PID:4892
-
\??\c:\xfrlfxr.exec:\xfrlfxr.exe240⤵PID:1952
-
\??\c:\hnhhbh.exec:\hnhhbh.exe241⤵PID:4784
-
\??\c:\1hbttb.exec:\1hbttb.exe242⤵PID:2280