Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 22:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exe
-
Size
92KB
-
MD5
4f5778f2e51e8200e8b6985289bf7dd0
-
SHA1
f4e7b5c0d4d1e6efb51dddb23844f575c96d800c
-
SHA256
57217b70b8f28cb03b8940935b8b208c53131a4df6166bec13d2e3f1dcdbf4b2
-
SHA512
e7b4ca7b2deb486ebd2ecbbc008b43b1bba6b294c5196ffd33d9850ec8ca9fe54d318136819bd9aaf9dba3be846953da5861f09cdd773b12f1a19333ae16de37
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIQIDyviFxx2hCtgIMLP9rBZaRBm:ymb3NkkiQ3mdBjFIVLd2hWZGreRCUlbO
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/1004-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4344-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1100-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/960-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2748-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1948-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2264-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1036-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4164-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4540-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3232-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2820-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1556-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2636-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2364-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1056-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3036-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/404-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
hbbbtt.exebbtnhh.exevpjdp.exexlffffx.exentbnnt.exejvdpd.exexfxrrrr.exehnbttn.exevdjpp.exennttbh.exellxrfrf.exehnnbtn.exevvpjj.exepdjvd.exefrrrrrr.exepppvd.exelxffrrr.exetthhnt.exehhntbt.exerxrlllf.exebthbbt.exenbnhnn.exedjpvd.exebbnhbh.exevdppp.exelxxxxrr.exerxrrlfx.exenhbbtt.exevdddv.exerxlxxrl.exetbhhnn.exevdvpd.exejdppd.exe1lrrllf.exehhhnhb.exepvdvv.exe1rrlrrl.exethbtnh.exentbtbb.exepjddj.exelrffffx.exelffffff.exe9ntbbb.exedpjdj.exevdjpd.exerfllrlx.exehbnhth.exenbhbtt.exedjpdp.exefflfxxr.exebhhttt.exettbtht.exedjddv.exe1llfrfl.exetnhbtt.exeddpjj.exefrffrlf.exerlrrffx.exe9ttnhh.exepjppp.exe9jjjd.exelfrlrxf.exebhhhtb.exevvvjj.exepid process 4344 hbbbtt.exe 1100 bbtnhh.exe 960 vpjdp.exe 4560 xlffffx.exe 2748 ntbnnt.exe 1948 jvdpd.exe 4464 xfxrrrr.exe 2264 hnbttn.exe 1036 vdjpp.exe 2892 nnttbh.exe 4164 llxrfrf.exe 4160 hnnbtn.exe 4540 vvpjj.exe 3232 pdjvd.exe 632 frrrrrr.exe 4940 pppvd.exe 2820 lxffrrr.exe 4048 tthhnt.exe 1556 hhntbt.exe 3796 rxrlllf.exe 4676 bthbbt.exe 2636 nbnhnn.exe 2364 djpvd.exe 2628 bbnhbh.exe 4748 vdppp.exe 2424 lxxxxrr.exe 3836 rxrrlfx.exe 1056 nhbbtt.exe 3036 vdddv.exe 404 rxlxxrl.exe 3476 tbhhnn.exe 1044 vdvpd.exe 4684 jdppd.exe 2540 1lrrllf.exe 228 hhhnhb.exe 2616 pvdvv.exe 2904 1rrlrrl.exe 2712 thbtnh.exe 3448 ntbtbb.exe 5096 pjddj.exe 4844 lrffffx.exe 448 lffffff.exe 1360 9ntbbb.exe 388 dpjdj.exe 3028 vdjpd.exe 4052 rfllrlx.exe 3660 hbnhth.exe 1052 nbhbtt.exe 4356 djpdp.exe 4584 fflfxxr.exe 2220 bhhttt.exe 4060 ttbtht.exe 4164 djddv.exe 208 1llfrfl.exe 4104 tnhbtt.exe 3284 ddpjj.exe 1524 frffrlf.exe 4288 rlrrffx.exe 5088 9ttnhh.exe 2524 pjppp.exe 904 9jjjd.exe 4904 lfrlrxf.exe 1624 bhhhtb.exe 964 vvvjj.exe -
Processes:
resource yara_rule behavioral2/memory/1004-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1100-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/960-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2748-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1948-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1948-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2264-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2264-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1036-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1036-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1036-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4164-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4540-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3232-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2820-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1556-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2636-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2364-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1056-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3036-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/404-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exehbbbtt.exebbtnhh.exevpjdp.exexlffffx.exentbnnt.exejvdpd.exexfxrrrr.exehnbttn.exevdjpp.exennttbh.exellxrfrf.exehnnbtn.exevvpjj.exepdjvd.exefrrrrrr.exepppvd.exelxffrrr.exetthhnt.exehhntbt.exerxrlllf.exebthbbt.exedescription pid process target process PID 1004 wrote to memory of 4344 1004 4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exe hbbbtt.exe PID 1004 wrote to memory of 4344 1004 4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exe hbbbtt.exe PID 1004 wrote to memory of 4344 1004 4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exe hbbbtt.exe PID 4344 wrote to memory of 1100 4344 hbbbtt.exe bbtnhh.exe PID 4344 wrote to memory of 1100 4344 hbbbtt.exe bbtnhh.exe PID 4344 wrote to memory of 1100 4344 hbbbtt.exe bbtnhh.exe PID 1100 wrote to memory of 960 1100 bbtnhh.exe vpjdp.exe PID 1100 wrote to memory of 960 1100 bbtnhh.exe vpjdp.exe PID 1100 wrote to memory of 960 1100 bbtnhh.exe vpjdp.exe PID 960 wrote to memory of 4560 960 vpjdp.exe xlffffx.exe PID 960 wrote to memory of 4560 960 vpjdp.exe xlffffx.exe PID 960 wrote to memory of 4560 960 vpjdp.exe xlffffx.exe PID 4560 wrote to memory of 2748 4560 xlffffx.exe ntbnnt.exe PID 4560 wrote to memory of 2748 4560 xlffffx.exe ntbnnt.exe PID 4560 wrote to memory of 2748 4560 xlffffx.exe ntbnnt.exe PID 2748 wrote to memory of 1948 2748 ntbnnt.exe jvdpd.exe PID 2748 wrote to memory of 1948 2748 ntbnnt.exe jvdpd.exe PID 2748 wrote to memory of 1948 2748 ntbnnt.exe jvdpd.exe PID 1948 wrote to memory of 4464 1948 jvdpd.exe xfxrrrr.exe PID 1948 wrote to memory of 4464 1948 jvdpd.exe xfxrrrr.exe PID 1948 wrote to memory of 4464 1948 jvdpd.exe xfxrrrr.exe PID 4464 wrote to memory of 2264 4464 xfxrrrr.exe hnbttn.exe PID 4464 wrote to memory of 2264 4464 xfxrrrr.exe hnbttn.exe PID 4464 wrote to memory of 2264 4464 xfxrrrr.exe hnbttn.exe PID 2264 wrote to memory of 1036 2264 hnbttn.exe vdjpp.exe PID 2264 wrote to memory of 1036 2264 hnbttn.exe vdjpp.exe PID 2264 wrote to memory of 1036 2264 hnbttn.exe vdjpp.exe PID 1036 wrote to memory of 2892 1036 vdjpp.exe nnttbh.exe PID 1036 wrote to memory of 2892 1036 vdjpp.exe nnttbh.exe PID 1036 wrote to memory of 2892 1036 vdjpp.exe nnttbh.exe PID 2892 wrote to memory of 4164 2892 nnttbh.exe llxrfrf.exe PID 2892 wrote to memory of 4164 2892 nnttbh.exe llxrfrf.exe PID 2892 wrote to memory of 4164 2892 nnttbh.exe llxrfrf.exe PID 4164 wrote to memory of 4160 4164 llxrfrf.exe hnnbtn.exe PID 4164 wrote to memory of 4160 4164 llxrfrf.exe hnnbtn.exe PID 4164 wrote to memory of 4160 4164 llxrfrf.exe hnnbtn.exe PID 4160 wrote to memory of 4540 4160 hnnbtn.exe vvpjj.exe PID 4160 wrote to memory of 4540 4160 hnnbtn.exe vvpjj.exe PID 4160 wrote to memory of 4540 4160 hnnbtn.exe vvpjj.exe PID 4540 wrote to memory of 3232 4540 vvpjj.exe pdjvd.exe PID 4540 wrote to memory of 3232 4540 vvpjj.exe pdjvd.exe PID 4540 wrote to memory of 3232 4540 vvpjj.exe pdjvd.exe PID 3232 wrote to memory of 632 3232 pdjvd.exe frrrrrr.exe PID 3232 wrote to memory of 632 3232 pdjvd.exe frrrrrr.exe PID 3232 wrote to memory of 632 3232 pdjvd.exe frrrrrr.exe PID 632 wrote to memory of 4940 632 frrrrrr.exe pppvd.exe PID 632 wrote to memory of 4940 632 frrrrrr.exe pppvd.exe PID 632 wrote to memory of 4940 632 frrrrrr.exe pppvd.exe PID 4940 wrote to memory of 2820 4940 pppvd.exe lxffrrr.exe PID 4940 wrote to memory of 2820 4940 pppvd.exe lxffrrr.exe PID 4940 wrote to memory of 2820 4940 pppvd.exe lxffrrr.exe PID 2820 wrote to memory of 4048 2820 lxffrrr.exe tthhnt.exe PID 2820 wrote to memory of 4048 2820 lxffrrr.exe tthhnt.exe PID 2820 wrote to memory of 4048 2820 lxffrrr.exe tthhnt.exe PID 4048 wrote to memory of 1556 4048 tthhnt.exe hhntbt.exe PID 4048 wrote to memory of 1556 4048 tthhnt.exe hhntbt.exe PID 4048 wrote to memory of 1556 4048 tthhnt.exe hhntbt.exe PID 1556 wrote to memory of 3796 1556 hhntbt.exe rxrlllf.exe PID 1556 wrote to memory of 3796 1556 hhntbt.exe rxrlllf.exe PID 1556 wrote to memory of 3796 1556 hhntbt.exe rxrlllf.exe PID 3796 wrote to memory of 4676 3796 rxrlllf.exe bthbbt.exe PID 3796 wrote to memory of 4676 3796 rxrlllf.exe bthbbt.exe PID 3796 wrote to memory of 4676 3796 rxrlllf.exe bthbbt.exe PID 4676 wrote to memory of 2636 4676 bthbbt.exe nbnhnn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4f5778f2e51e8200e8b6985289bf7dd0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\hbbbtt.exec:\hbbbtt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
\??\c:\bbtnhh.exec:\bbtnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
\??\c:\vpjdp.exec:\vpjdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\xlffffx.exec:\xlffffx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
\??\c:\ntbnnt.exec:\ntbnnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\jvdpd.exec:\jvdpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\xfxrrrr.exec:\xfxrrrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\hnbttn.exec:\hnbttn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\vdjpp.exec:\vdjpp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
\??\c:\nnttbh.exec:\nnttbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\llxrfrf.exec:\llxrfrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\hnnbtn.exec:\hnnbtn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\vvpjj.exec:\vvpjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
\??\c:\pdjvd.exec:\pdjvd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
\??\c:\frrrrrr.exec:\frrrrrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\pppvd.exec:\pppvd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\lxffrrr.exec:\lxffrrr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\tthhnt.exec:\tthhnt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4048 -
\??\c:\hhntbt.exec:\hhntbt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\rxrlllf.exec:\rxrlllf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
\??\c:\bthbbt.exec:\bthbbt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\nbnhnn.exec:\nbnhnn.exe23⤵
- Executes dropped EXE
PID:2636 -
\??\c:\djpvd.exec:\djpvd.exe24⤵
- Executes dropped EXE
PID:2364 -
\??\c:\bbnhbh.exec:\bbnhbh.exe25⤵
- Executes dropped EXE
PID:2628 -
\??\c:\vdppp.exec:\vdppp.exe26⤵
- Executes dropped EXE
PID:4748 -
\??\c:\lxxxxrr.exec:\lxxxxrr.exe27⤵
- Executes dropped EXE
PID:2424 -
\??\c:\rxrrlfx.exec:\rxrrlfx.exe28⤵
- Executes dropped EXE
PID:3836 -
\??\c:\nhbbtt.exec:\nhbbtt.exe29⤵
- Executes dropped EXE
PID:1056 -
\??\c:\vdddv.exec:\vdddv.exe30⤵
- Executes dropped EXE
PID:3036 -
\??\c:\rxlxxrl.exec:\rxlxxrl.exe31⤵
- Executes dropped EXE
PID:404 -
\??\c:\tbhhnn.exec:\tbhhnn.exe32⤵
- Executes dropped EXE
PID:3476 -
\??\c:\vdvpd.exec:\vdvpd.exe33⤵
- Executes dropped EXE
PID:1044 -
\??\c:\jdppd.exec:\jdppd.exe34⤵
- Executes dropped EXE
PID:4684 -
\??\c:\1lrrllf.exec:\1lrrllf.exe35⤵
- Executes dropped EXE
PID:2540 -
\??\c:\hhhnhb.exec:\hhhnhb.exe36⤵
- Executes dropped EXE
PID:228 -
\??\c:\pvdvv.exec:\pvdvv.exe37⤵
- Executes dropped EXE
PID:2616 -
\??\c:\rrrfrxf.exec:\rrrfrxf.exe38⤵PID:4404
-
\??\c:\1rrlrrl.exec:\1rrlrrl.exe39⤵
- Executes dropped EXE
PID:2904 -
\??\c:\thbtnh.exec:\thbtnh.exe40⤵
- Executes dropped EXE
PID:2712 -
\??\c:\ntbtbb.exec:\ntbtbb.exe41⤵
- Executes dropped EXE
PID:3448 -
\??\c:\pjddj.exec:\pjddj.exe42⤵
- Executes dropped EXE
PID:5096 -
\??\c:\lrffffx.exec:\lrffffx.exe43⤵
- Executes dropped EXE
PID:4844 -
\??\c:\lffffff.exec:\lffffff.exe44⤵
- Executes dropped EXE
PID:448 -
\??\c:\9ntbbb.exec:\9ntbbb.exe45⤵
- Executes dropped EXE
PID:1360 -
\??\c:\dpjdj.exec:\dpjdj.exe46⤵
- Executes dropped EXE
PID:388 -
\??\c:\vdjpd.exec:\vdjpd.exe47⤵
- Executes dropped EXE
PID:3028 -
\??\c:\rfllrlx.exec:\rfllrlx.exe48⤵
- Executes dropped EXE
PID:4052 -
\??\c:\hbnhth.exec:\hbnhth.exe49⤵
- Executes dropped EXE
PID:3660 -
\??\c:\nbhbtt.exec:\nbhbtt.exe50⤵
- Executes dropped EXE
PID:1052 -
\??\c:\djpdp.exec:\djpdp.exe51⤵
- Executes dropped EXE
PID:4356 -
\??\c:\fflfxxr.exec:\fflfxxr.exe52⤵
- Executes dropped EXE
PID:4584 -
\??\c:\bhhttt.exec:\bhhttt.exe53⤵
- Executes dropped EXE
PID:2220 -
\??\c:\ttbtht.exec:\ttbtht.exe54⤵
- Executes dropped EXE
PID:4060 -
\??\c:\djddv.exec:\djddv.exe55⤵
- Executes dropped EXE
PID:4164 -
\??\c:\1llfrfl.exec:\1llfrfl.exe56⤵
- Executes dropped EXE
PID:208 -
\??\c:\tnhbtt.exec:\tnhbtt.exe57⤵
- Executes dropped EXE
PID:4104 -
\??\c:\ddpjj.exec:\ddpjj.exe58⤵
- Executes dropped EXE
PID:3284 -
\??\c:\frffrlf.exec:\frffrlf.exe59⤵
- Executes dropped EXE
PID:1524 -
\??\c:\rlrrffx.exec:\rlrrffx.exe60⤵
- Executes dropped EXE
PID:4288 -
\??\c:\9ttnhh.exec:\9ttnhh.exe61⤵
- Executes dropped EXE
PID:5088 -
\??\c:\pjppp.exec:\pjppp.exe62⤵
- Executes dropped EXE
PID:2524 -
\??\c:\9jjjd.exec:\9jjjd.exe63⤵
- Executes dropped EXE
PID:904 -
\??\c:\lfrlrxf.exec:\lfrlrxf.exe64⤵
- Executes dropped EXE
PID:4904 -
\??\c:\bhhhtb.exec:\bhhhtb.exe65⤵
- Executes dropped EXE
PID:1624 -
\??\c:\vvvjj.exec:\vvvjj.exe66⤵
- Executes dropped EXE
PID:964 -
\??\c:\fxllrxr.exec:\fxllrxr.exe67⤵PID:4252
-
\??\c:\tnbbbb.exec:\tnbbbb.exe68⤵PID:4636
-
\??\c:\rrrxfrx.exec:\rrrxfrx.exe69⤵PID:1356
-
\??\c:\rlxxflr.exec:\rlxxflr.exe70⤵PID:1388
-
\??\c:\nnnhnh.exec:\nnnhnh.exe71⤵PID:2364
-
\??\c:\tbhhbt.exec:\tbhhbt.exe72⤵PID:1528
-
\??\c:\pjppv.exec:\pjppv.exe73⤵PID:3160
-
\??\c:\vdpvp.exec:\vdpvp.exe74⤵PID:4564
-
\??\c:\rlrrfff.exec:\rlrrfff.exe75⤵PID:3744
-
\??\c:\9hhttt.exec:\9hhttt.exe76⤵PID:3356
-
\??\c:\tbbbtt.exec:\tbbbtt.exe77⤵PID:1888
-
\??\c:\jjvdd.exec:\jjvdd.exe78⤵PID:672
-
\??\c:\xrllfxf.exec:\xrllfxf.exe79⤵PID:3636
-
\??\c:\lfrrrrr.exec:\lfrrrrr.exe80⤵PID:4380
-
\??\c:\tntnbn.exec:\tntnbn.exe81⤵PID:3768
-
\??\c:\bbnnnt.exec:\bbnnnt.exe82⤵PID:1172
-
\??\c:\dpppv.exec:\dpppv.exe83⤵PID:1240
-
\??\c:\vdvvp.exec:\vdvvp.exe84⤵PID:1500
-
\??\c:\lffxrll.exec:\lffxrll.exe85⤵PID:1004
-
\??\c:\nhhttt.exec:\nhhttt.exe86⤵PID:2904
-
\??\c:\7hnhhh.exec:\7hnhhh.exe87⤵PID:932
-
\??\c:\vdjdj.exec:\vdjdj.exe88⤵PID:1612
-
\??\c:\rlxrrrr.exec:\rlxrrrr.exe89⤵PID:408
-
\??\c:\hbhhhh.exec:\hbhhhh.exe90⤵PID:3732
-
\??\c:\jjvvp.exec:\jjvvp.exe91⤵PID:4560
-
\??\c:\ffffxxr.exec:\ffffxxr.exe92⤵PID:3092
-
\??\c:\xrxxxff.exec:\xrxxxff.exe93⤵PID:3568
-
\??\c:\nhnnhn.exec:\nhnnhn.exe94⤵PID:2204
-
\??\c:\ttbbtt.exec:\ttbbtt.exe95⤵PID:1660
-
\??\c:\dvdvv.exec:\dvdvv.exe96⤵PID:1932
-
\??\c:\ppvvj.exec:\ppvvj.exe97⤵PID:1208
-
\??\c:\xrllrrf.exec:\xrllrrf.exe98⤵PID:4308
-
\??\c:\5xflffr.exec:\5xflffr.exe99⤵PID:4640
-
\??\c:\ttthbn.exec:\ttthbn.exe100⤵PID:3200
-
\??\c:\ntbntn.exec:\ntbntn.exe101⤵PID:4980
-
\??\c:\dvppp.exec:\dvppp.exe102⤵PID:1548
-
\??\c:\3rffxlr.exec:\3rffxlr.exe103⤵PID:3052
-
\??\c:\5hnnbb.exec:\5hnnbb.exe104⤵PID:1524
-
\??\c:\tnttnn.exec:\tnttnn.exe105⤵PID:1912
-
\??\c:\pdjjd.exec:\pdjjd.exe106⤵PID:3620
-
\??\c:\llrxflf.exec:\llrxflf.exe107⤵PID:5100
-
\??\c:\rxlllll.exec:\rxlllll.exe108⤵PID:1556
-
\??\c:\ntnnnb.exec:\ntnnnb.exe109⤵PID:1048
-
\??\c:\vjjdv.exec:\vjjdv.exe110⤵PID:1552
-
\??\c:\lxfxlxr.exec:\lxfxlxr.exe111⤵PID:656
-
\??\c:\rrffxrl.exec:\rrffxrl.exe112⤵PID:820
-
\??\c:\hntttt.exec:\hntttt.exe113⤵PID:436
-
\??\c:\jpvvp.exec:\jpvvp.exe114⤵PID:2420
-
\??\c:\ddjdd.exec:\ddjdd.exe115⤵PID:2000
-
\??\c:\rffrrrl.exec:\rffrrrl.exe116⤵PID:4556
-
\??\c:\nthhnb.exec:\nthhnb.exe117⤵PID:2424
-
\??\c:\thhhhh.exec:\thhhhh.exe118⤵PID:3952
-
\??\c:\pjjjd.exec:\pjjjd.exe119⤵PID:4040
-
\??\c:\llrrlll.exec:\llrrlll.exe120⤵PID:1568
-
\??\c:\ffxxxxx.exec:\ffxxxxx.exe121⤵PID:4596
-
\??\c:\9nbbtt.exec:\9nbbtt.exe122⤵PID:404
-
\??\c:\pvpdp.exec:\pvpdp.exe123⤵PID:1148
-
\??\c:\pdpjv.exec:\pdpjv.exe124⤵PID:3556
-
\??\c:\1xxxxll.exec:\1xxxxll.exe125⤵PID:2016
-
\??\c:\xlrrlll.exec:\xlrrlll.exe126⤵PID:2540
-
\??\c:\ttnhhb.exec:\ttnhhb.exe127⤵PID:228
-
\??\c:\djppj.exec:\djppj.exe128⤵PID:2484
-
\??\c:\7jddv.exec:\7jddv.exe129⤵PID:1996
-
\??\c:\rllfxxx.exec:\rllfxxx.exe130⤵PID:4344
-
\??\c:\fxrxxxx.exec:\fxrxxxx.exe131⤵PID:960
-
\??\c:\ffxrrll.exec:\ffxrrll.exe132⤵PID:2976
-
\??\c:\hbttnn.exec:\hbttnn.exe133⤵PID:3172
-
\??\c:\nbbbtb.exec:\nbbbtb.exe134⤵PID:3104
-
\??\c:\vjpjv.exec:\vjpjv.exe135⤵PID:1360
-
\??\c:\vjpvp.exec:\vjpvp.exe136⤵PID:1948
-
\??\c:\rlxlfff.exec:\rlxlfff.exe137⤵PID:3092
-
\??\c:\lrrllrr.exec:\lrrllrr.exe138⤵PID:3568
-
\??\c:\hbbtnt.exec:\hbbtnt.exe139⤵PID:3424
-
\??\c:\nnhbbt.exec:\nnhbbt.exe140⤵PID:1036
-
\??\c:\vpdvp.exec:\vpdvp.exe141⤵PID:1932
-
\??\c:\lfffffl.exec:\lfffffl.exe142⤵PID:756
-
\??\c:\fflflrx.exec:\fflflrx.exe143⤵PID:4640
-
\??\c:\vjvpp.exec:\vjvpp.exe144⤵PID:4164
-
\??\c:\jvppj.exec:\jvppj.exe145⤵PID:1480
-
\??\c:\rxrxrll.exec:\rxrxrll.exe146⤵PID:3432
-
\??\c:\flxfrlx.exec:\flxfrlx.exe147⤵PID:4288
-
\??\c:\hbbbtt.exec:\hbbbtt.exe148⤵PID:1912
-
\??\c:\5jvvp.exec:\5jvvp.exe149⤵PID:512
-
\??\c:\lxlrfrr.exec:\lxlrfrr.exe150⤵PID:1556
-
\??\c:\tnhhnn.exec:\tnhhnn.exe151⤵PID:1432
-
\??\c:\tttnhh.exec:\tttnhh.exe152⤵PID:4636
-
\??\c:\vvppj.exec:\vvppj.exe153⤵PID:3792
-
\??\c:\dvpjj.exec:\dvpjj.exe154⤵PID:4880
-
\??\c:\xxfrfrl.exec:\xxfrfrl.exe155⤵PID:2404
-
\??\c:\xrrrlll.exec:\xrrrlll.exe156⤵PID:3804
-
\??\c:\tbbbbb.exec:\tbbbbb.exe157⤵PID:4628
-
\??\c:\nnbtbb.exec:\nnbtbb.exe158⤵PID:3356
-
\??\c:\dvdjj.exec:\dvdjj.exe159⤵PID:3644
-
\??\c:\ddppv.exec:\ddppv.exe160⤵PID:672
-
\??\c:\xflfllf.exec:\xflfllf.exe161⤵PID:2224
-
\??\c:\bttttt.exec:\bttttt.exe162⤵PID:5112
-
\??\c:\thtnnt.exec:\thtnnt.exe163⤵PID:2340
-
\??\c:\jdddd.exec:\jdddd.exe164⤵PID:1776
-
\??\c:\ppjdv.exec:\ppjdv.exe165⤵PID:2528
-
\??\c:\rlffxff.exec:\rlffxff.exe166⤵PID:212
-
\??\c:\3xfxrrr.exec:\3xfxrrr.exe167⤵PID:3448
-
\??\c:\bbbhht.exec:\bbbhht.exe168⤵PID:3140
-
\??\c:\ppppj.exec:\ppppj.exe169⤵PID:5068
-
\??\c:\5jpjp.exec:\5jpjp.exe170⤵PID:2544
-
\??\c:\ppvpj.exec:\ppvpj.exe171⤵PID:2976
-
\??\c:\llrxxfx.exec:\llrxxfx.exe172⤵PID:3732
-
\??\c:\bhhhhh.exec:\bhhhhh.exe173⤵PID:184
-
\??\c:\thnhnn.exec:\thnhnn.exe174⤵PID:3012
-
\??\c:\vvjpp.exec:\vvjpp.exe175⤵PID:5044
-
\??\c:\1pppj.exec:\1pppj.exe176⤵PID:1940
-
\??\c:\fffxlll.exec:\fffxlll.exe177⤵PID:3660
-
\??\c:\rlrlffx.exec:\rlrlffx.exe178⤵PID:2548
-
\??\c:\nnnthh.exec:\nnnthh.exe179⤵PID:2188
-
\??\c:\5nnhbh.exec:\5nnhbh.exe180⤵PID:1340
-
\??\c:\1jdvv.exec:\1jdvv.exe181⤵PID:3560
-
\??\c:\jdvvp.exec:\jdvvp.exe182⤵PID:1968
-
\??\c:\5lllxll.exec:\5lllxll.exe183⤵PID:1208
-
\??\c:\xxxxrlx.exec:\xxxxrlx.exe184⤵PID:4104
-
\??\c:\ttttnt.exec:\ttttnt.exe185⤵PID:2416
-
\??\c:\btbbnt.exec:\btbbnt.exe186⤵PID:624
-
\??\c:\dpppp.exec:\dpppp.exe187⤵PID:4940
-
\??\c:\vvvpj.exec:\vvvpj.exe188⤵PID:1524
-
\??\c:\xlfrfxf.exec:\xlfrfxf.exe189⤵PID:2352
-
\??\c:\tbhbtt.exec:\tbhbtt.exe190⤵PID:4904
-
\??\c:\jjjpd.exec:\jjjpd.exe191⤵PID:1556
-
\??\c:\rrxrffr.exec:\rrxrffr.exe192⤵PID:1952
-
\??\c:\hbtnhh.exec:\hbtnhh.exe193⤵PID:5008
-
\??\c:\vvdvv.exec:\vvdvv.exe194⤵PID:4604
-
\??\c:\xxlfxfx.exec:\xxlfxfx.exe195⤵PID:3032
-
\??\c:\nnhhhh.exec:\nnhhhh.exe196⤵PID:2404
-
\??\c:\jvdvp.exec:\jvdvp.exe197⤵PID:3804
-
\??\c:\ppjjj.exec:\ppjjj.exe198⤵PID:4628
-
\??\c:\fxlfffl.exec:\fxlfffl.exe199⤵PID:4864
-
\??\c:\frfffll.exec:\frfffll.exe200⤵PID:3476
-
\??\c:\ttbbbb.exec:\ttbbbb.exe201⤵PID:3636
-
\??\c:\hbnnnn.exec:\hbnnnn.exe202⤵PID:2224
-
\??\c:\dvdvp.exec:\dvdvp.exe203⤵PID:3332
-
\??\c:\dvdjd.exec:\dvdjd.exe204⤵PID:4440
-
\??\c:\lfrlfff.exec:\lfrlfff.exe205⤵PID:1324
-
\??\c:\5fllffx.exec:\5fllffx.exe206⤵PID:4996
-
\??\c:\5bbbtt.exec:\5bbbtt.exe207⤵PID:212
-
\??\c:\nbbhbb.exec:\nbbhbb.exe208⤵PID:932
-
\??\c:\3vvvj.exec:\3vvvj.exe209⤵PID:2872
-
\??\c:\3pvvj.exec:\3pvvj.exe210⤵PID:2616
-
\??\c:\frrfrxl.exec:\frrfrxl.exe211⤵PID:3080
-
\??\c:\hhbtnt.exec:\hhbtnt.exe212⤵PID:1332
-
\??\c:\dpjdp.exec:\dpjdp.exe213⤵PID:116
-
\??\c:\jpjjj.exec:\jpjjj.exe214⤵PID:4516
-
\??\c:\rxxrfff.exec:\rxxrfff.exe215⤵PID:5028
-
\??\c:\vpdvd.exec:\vpdvd.exe216⤵PID:1412
-
\??\c:\3fllxfx.exec:\3fllxfx.exe217⤵PID:4052
-
\??\c:\7tttbb.exec:\7tttbb.exe218⤵PID:1684
-
\??\c:\vjvvd.exec:\vjvvd.exe219⤵PID:3568
-
\??\c:\vpjdd.exec:\vpjdd.exe220⤵PID:1440
-
\??\c:\lrlfxxr.exec:\lrlfxxr.exe221⤵PID:3604
-
\??\c:\3vvpp.exec:\3vvpp.exe222⤵PID:3560
-
\??\c:\lffxrrl.exec:\lffxrrl.exe223⤵PID:948
-
\??\c:\bnnhbn.exec:\bnnhbn.exe224⤵PID:3200
-
\??\c:\ffrllfx.exec:\ffrllfx.exe225⤵PID:856
-
\??\c:\ttnntt.exec:\ttnntt.exe226⤵PID:1428
-
\??\c:\pvjdd.exec:\pvjdd.exe227⤵PID:1168
-
\??\c:\pjvdd.exec:\pjvdd.exe228⤵PID:3620
-
\??\c:\rffllxf.exec:\rffllxf.exe229⤵PID:1624
-
\??\c:\rlrrrxf.exec:\rlrrrxf.exe230⤵PID:4136
-
\??\c:\bbhnbn.exec:\bbhnbn.exe231⤵PID:4904
-
\??\c:\pjpvj.exec:\pjpvj.exe232⤵PID:1840
-
\??\c:\5flfxxr.exec:\5flfxxr.exe233⤵PID:4252
-
\??\c:\bhtbth.exec:\bhtbth.exe234⤵PID:3160
-
\??\c:\1jjdv.exec:\1jjdv.exe235⤵PID:4216
-
\??\c:\rlffxxr.exec:\rlffxxr.exe236⤵PID:3744
-
\??\c:\nhhhhh.exec:\nhhhhh.exe237⤵PID:4476
-
\??\c:\pdppp.exec:\pdppp.exe238⤵PID:3640
-
\??\c:\flfxflx.exec:\flfxflx.exe239⤵PID:1320
-
\??\c:\xflllrr.exec:\xflllrr.exe240⤵PID:2888
-
\??\c:\3nhtnn.exec:\3nhtnn.exe241⤵PID:1148
-
\??\c:\vjvvp.exec:\vjvvp.exe242⤵PID:1080