Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exe
-
Size
83KB
-
MD5
aaf060dff37c9a7d6f83d6c40c40b7e0
-
SHA1
16355dbc3d842e99cc93eb0a9ecbac51073352c4
-
SHA256
d584d78b811f0fb073202659f7487222275daa294123738baaaea20134fc3ed7
-
SHA512
966e3ab8f0b36e49ecfa65fd85bfb7b119dd441ff96c6bbb38ae089d4289deef258570562152c10a4986a62ffc83027541170a44380041edb09bf9de83a7a0ef
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73yqKH/KjvHo+WdNI:ymb3NkkiQ3mdBjFo73yX+vI+qm
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/2392-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1644-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1644-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4564-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4684-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2832-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2644-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2092-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2096-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3012-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1836-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3008-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3876-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1576-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2716-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1332-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/956-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4372-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3060-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2656-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4116-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pvpvp.exebbtnhh.exebtthbb.exexflfrrr.exehtnnhn.exevjjjv.exexfrlffx.exentnnhn.exejdpvj.exedvdvv.exe7hhbbb.exeppppd.exelxfxrrx.exefllxrxx.exe3tbhbb.exe5vdvp.exe5ffxllf.exehtbhnt.exeddvpv.exe9flfxxx.exe5ffxrff.exe7ttttt.exejddvj.exelfxxxxr.exehhnnhb.exe9thbtt.exepvpjj.exexrfxrrx.exefxffffl.exettttnn.exevjvdv.exejjddd.exeffrrrrr.exerrrrrrr.exerrxxrrr.exehbnntt.exennttbb.exe3djdv.exelxxrfff.exefxlxfxf.exetbnhhh.exe1pvvj.exejvpjd.exe7xxfrxr.exetbhhhh.exethnhtt.exevdvpj.exevddvp.exerxxllrl.exenbtbtn.exepvpjv.exe5jjpj.exennnhtt.exehbhbtt.exevvvvv.exefxlfllr.exefxfxxxx.exe5tttnh.exehtnbtt.exejdddv.exepjpjj.exe1rxrlll.exe1thbth.exebbbthn.exepid process 1648 pvpvp.exe 1644 bbtnhh.exe 4564 btthbb.exe 4684 xflfrrr.exe 2832 htnnhn.exe 4968 vjjjv.exe 2644 xfrlffx.exe 2788 ntnnhn.exe 2092 jdpvj.exe 2096 dvdvv.exe 3012 7hhbbb.exe 1836 ppppd.exe 3008 lxfxrrx.exe 3876 fllxrxx.exe 1576 3tbhbb.exe 4688 5vdvp.exe 2716 5ffxllf.exe 1104 htbhnt.exe 1332 ddvpv.exe 956 9flfxxx.exe 3260 5ffxrff.exe 4372 7ttttt.exe 4592 jddvj.exe 3436 lfxxxxr.exe 3724 hhnnhb.exe 1908 9thbtt.exe 3060 pvpjj.exe 2656 xrfxrrx.exe 4116 fxffffl.exe 2388 ttttnn.exe 4892 vjvdv.exe 1372 jjddd.exe 624 ffrrrrr.exe 4788 rrrrrrr.exe 208 rrxxrrr.exe 4376 hbnntt.exe 4572 nnttbb.exe 3872 3djdv.exe 3412 lxxrfff.exe 992 fxlxfxf.exe 724 tbnhhh.exe 4564 1pvvj.exe 3124 jvpjd.exe 2764 7xxfrxr.exe 4968 tbhhhh.exe 2064 thnhtt.exe 4428 vdvpj.exe 3856 vddvp.exe 2044 rxxllrl.exe 1688 nbtbtn.exe 2532 pvpjv.exe 832 5jjpj.exe 1844 nnnhtt.exe 900 hbhbtt.exe 1492 vvvvv.exe 3088 fxlfllr.exe 4796 fxfxxxx.exe 4356 5tttnh.exe 2928 htnbtt.exe 2504 jdddv.exe 4100 pjpjj.exe 1332 1rxrlll.exe 3936 1thbth.exe 3288 bbbthn.exe -
Processes:
resource yara_rule behavioral2/memory/2392-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1644-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4564-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4684-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2644-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2092-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3012-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1836-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3008-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3876-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1576-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2716-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1332-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/956-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4372-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3060-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2656-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4116-193-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exepvpvp.exebbtnhh.exebtthbb.exexflfrrr.exehtnnhn.exevjjjv.exexfrlffx.exentnnhn.exejdpvj.exedvdvv.exe7hhbbb.exeppppd.exelxfxrrx.exefllxrxx.exe3tbhbb.exe5vdvp.exe5ffxllf.exehtbhnt.exeddvpv.exe9flfxxx.exe5ffxrff.exedescription pid process target process PID 2392 wrote to memory of 1648 2392 aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exe pvpvp.exe PID 2392 wrote to memory of 1648 2392 aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exe pvpvp.exe PID 2392 wrote to memory of 1648 2392 aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exe pvpvp.exe PID 1648 wrote to memory of 1644 1648 pvpvp.exe bbtnhh.exe PID 1648 wrote to memory of 1644 1648 pvpvp.exe bbtnhh.exe PID 1648 wrote to memory of 1644 1648 pvpvp.exe bbtnhh.exe PID 1644 wrote to memory of 4564 1644 bbtnhh.exe btthbb.exe PID 1644 wrote to memory of 4564 1644 bbtnhh.exe btthbb.exe PID 1644 wrote to memory of 4564 1644 bbtnhh.exe btthbb.exe PID 4564 wrote to memory of 4684 4564 btthbb.exe xflfrrr.exe PID 4564 wrote to memory of 4684 4564 btthbb.exe xflfrrr.exe PID 4564 wrote to memory of 4684 4564 btthbb.exe xflfrrr.exe PID 4684 wrote to memory of 2832 4684 xflfrrr.exe htnnhn.exe PID 4684 wrote to memory of 2832 4684 xflfrrr.exe htnnhn.exe PID 4684 wrote to memory of 2832 4684 xflfrrr.exe htnnhn.exe PID 2832 wrote to memory of 4968 2832 htnnhn.exe vjjjv.exe PID 2832 wrote to memory of 4968 2832 htnnhn.exe vjjjv.exe PID 2832 wrote to memory of 4968 2832 htnnhn.exe vjjjv.exe PID 4968 wrote to memory of 2644 4968 vjjjv.exe xfrlffx.exe PID 4968 wrote to memory of 2644 4968 vjjjv.exe xfrlffx.exe PID 4968 wrote to memory of 2644 4968 vjjjv.exe xfrlffx.exe PID 2644 wrote to memory of 2788 2644 xfrlffx.exe ntnnhn.exe PID 2644 wrote to memory of 2788 2644 xfrlffx.exe ntnnhn.exe PID 2644 wrote to memory of 2788 2644 xfrlffx.exe ntnnhn.exe PID 2788 wrote to memory of 2092 2788 ntnnhn.exe jdpvj.exe PID 2788 wrote to memory of 2092 2788 ntnnhn.exe jdpvj.exe PID 2788 wrote to memory of 2092 2788 ntnnhn.exe jdpvj.exe PID 2092 wrote to memory of 2096 2092 jdpvj.exe dvdvv.exe PID 2092 wrote to memory of 2096 2092 jdpvj.exe dvdvv.exe PID 2092 wrote to memory of 2096 2092 jdpvj.exe dvdvv.exe PID 2096 wrote to memory of 3012 2096 dvdvv.exe 7hhbbb.exe PID 2096 wrote to memory of 3012 2096 dvdvv.exe 7hhbbb.exe PID 2096 wrote to memory of 3012 2096 dvdvv.exe 7hhbbb.exe PID 3012 wrote to memory of 1836 3012 7hhbbb.exe ppppd.exe PID 3012 wrote to memory of 1836 3012 7hhbbb.exe ppppd.exe PID 3012 wrote to memory of 1836 3012 7hhbbb.exe ppppd.exe PID 1836 wrote to memory of 3008 1836 ppppd.exe lxfxrrx.exe PID 1836 wrote to memory of 3008 1836 ppppd.exe lxfxrrx.exe PID 1836 wrote to memory of 3008 1836 ppppd.exe lxfxrrx.exe PID 3008 wrote to memory of 3876 3008 lxfxrrx.exe fllxrxx.exe PID 3008 wrote to memory of 3876 3008 lxfxrrx.exe fllxrxx.exe PID 3008 wrote to memory of 3876 3008 lxfxrrx.exe fllxrxx.exe PID 3876 wrote to memory of 1576 3876 fllxrxx.exe 3tbhbb.exe PID 3876 wrote to memory of 1576 3876 fllxrxx.exe 3tbhbb.exe PID 3876 wrote to memory of 1576 3876 fllxrxx.exe 3tbhbb.exe PID 1576 wrote to memory of 4688 1576 3tbhbb.exe 5vdvp.exe PID 1576 wrote to memory of 4688 1576 3tbhbb.exe 5vdvp.exe PID 1576 wrote to memory of 4688 1576 3tbhbb.exe 5vdvp.exe PID 4688 wrote to memory of 2716 4688 5vdvp.exe 5ffxllf.exe PID 4688 wrote to memory of 2716 4688 5vdvp.exe 5ffxllf.exe PID 4688 wrote to memory of 2716 4688 5vdvp.exe 5ffxllf.exe PID 2716 wrote to memory of 1104 2716 5ffxllf.exe htbhnt.exe PID 2716 wrote to memory of 1104 2716 5ffxllf.exe htbhnt.exe PID 2716 wrote to memory of 1104 2716 5ffxllf.exe htbhnt.exe PID 1104 wrote to memory of 1332 1104 htbhnt.exe ddvpv.exe PID 1104 wrote to memory of 1332 1104 htbhnt.exe ddvpv.exe PID 1104 wrote to memory of 1332 1104 htbhnt.exe ddvpv.exe PID 1332 wrote to memory of 956 1332 ddvpv.exe 9flfxxx.exe PID 1332 wrote to memory of 956 1332 ddvpv.exe 9flfxxx.exe PID 1332 wrote to memory of 956 1332 ddvpv.exe 9flfxxx.exe PID 956 wrote to memory of 3260 956 9flfxxx.exe 5ffxrff.exe PID 956 wrote to memory of 3260 956 9flfxxx.exe 5ffxrff.exe PID 956 wrote to memory of 3260 956 9flfxxx.exe 5ffxrff.exe PID 3260 wrote to memory of 4372 3260 5ffxrff.exe 7ttttt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\aaf060dff37c9a7d6f83d6c40c40b7e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\pvpvp.exec:\pvpvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\bbtnhh.exec:\bbtnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\btthbb.exec:\btthbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
\??\c:\xflfrrr.exec:\xflfrrr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
\??\c:\htnnhn.exec:\htnnhn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\vjjjv.exec:\vjjjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\xfrlffx.exec:\xfrlffx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\ntnnhn.exec:\ntnnhn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\jdpvj.exec:\jdpvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\dvdvv.exec:\dvdvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\7hhbbb.exec:\7hhbbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\ppppd.exec:\ppppd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
\??\c:\lxfxrrx.exec:\lxfxrrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\fllxrxx.exec:\fllxrxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
\??\c:\3tbhbb.exec:\3tbhbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\5vdvp.exec:\5vdvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\5ffxllf.exec:\5ffxllf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\htbhnt.exec:\htbhnt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\ddvpv.exec:\ddvpv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\9flfxxx.exec:\9flfxxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:956 -
\??\c:\5ffxrff.exec:\5ffxrff.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
\??\c:\7ttttt.exec:\7ttttt.exe23⤵
- Executes dropped EXE
PID:4372 -
\??\c:\jddvj.exec:\jddvj.exe24⤵
- Executes dropped EXE
PID:4592 -
\??\c:\lfxxxxr.exec:\lfxxxxr.exe25⤵
- Executes dropped EXE
PID:3436 -
\??\c:\hhnnhb.exec:\hhnnhb.exe26⤵
- Executes dropped EXE
PID:3724 -
\??\c:\9thbtt.exec:\9thbtt.exe27⤵
- Executes dropped EXE
PID:1908 -
\??\c:\pvpjj.exec:\pvpjj.exe28⤵
- Executes dropped EXE
PID:3060 -
\??\c:\xrfxrrx.exec:\xrfxrrx.exe29⤵
- Executes dropped EXE
PID:2656 -
\??\c:\fxffffl.exec:\fxffffl.exe30⤵
- Executes dropped EXE
PID:4116 -
\??\c:\ttttnn.exec:\ttttnn.exe31⤵
- Executes dropped EXE
PID:2388 -
\??\c:\vjvdv.exec:\vjvdv.exe32⤵
- Executes dropped EXE
PID:4892 -
\??\c:\jjddd.exec:\jjddd.exe33⤵
- Executes dropped EXE
PID:1372 -
\??\c:\ffrrrrr.exec:\ffrrrrr.exe34⤵
- Executes dropped EXE
PID:624 -
\??\c:\rrrrrrr.exec:\rrrrrrr.exe35⤵
- Executes dropped EXE
PID:4788 -
\??\c:\rrxxrrr.exec:\rrxxrrr.exe36⤵
- Executes dropped EXE
PID:208 -
\??\c:\hbnntt.exec:\hbnntt.exe37⤵
- Executes dropped EXE
PID:4376 -
\??\c:\nnttbb.exec:\nnttbb.exe38⤵
- Executes dropped EXE
PID:4572 -
\??\c:\3djdv.exec:\3djdv.exe39⤵
- Executes dropped EXE
PID:3872 -
\??\c:\lxxrfff.exec:\lxxrfff.exe40⤵
- Executes dropped EXE
PID:3412 -
\??\c:\fxlxfxf.exec:\fxlxfxf.exe41⤵
- Executes dropped EXE
PID:992 -
\??\c:\tbnhhh.exec:\tbnhhh.exe42⤵
- Executes dropped EXE
PID:724 -
\??\c:\1pvvj.exec:\1pvvj.exe43⤵
- Executes dropped EXE
PID:4564 -
\??\c:\jvpjd.exec:\jvpjd.exe44⤵
- Executes dropped EXE
PID:3124 -
\??\c:\7xxfrxr.exec:\7xxfrxr.exe45⤵
- Executes dropped EXE
PID:2764 -
\??\c:\tbhhhh.exec:\tbhhhh.exe46⤵
- Executes dropped EXE
PID:4968 -
\??\c:\thnhtt.exec:\thnhtt.exe47⤵
- Executes dropped EXE
PID:2064 -
\??\c:\vdvpj.exec:\vdvpj.exe48⤵
- Executes dropped EXE
PID:4428 -
\??\c:\vddvp.exec:\vddvp.exe49⤵
- Executes dropped EXE
PID:3856 -
\??\c:\rxxllrl.exec:\rxxllrl.exe50⤵
- Executes dropped EXE
PID:2044 -
\??\c:\nbtbtn.exec:\nbtbtn.exe51⤵
- Executes dropped EXE
PID:1688 -
\??\c:\pvpjv.exec:\pvpjv.exe52⤵
- Executes dropped EXE
PID:2532 -
\??\c:\5jjpj.exec:\5jjpj.exe53⤵
- Executes dropped EXE
PID:832 -
\??\c:\nnnhtt.exec:\nnnhtt.exe54⤵
- Executes dropped EXE
PID:1844 -
\??\c:\hbhbtt.exec:\hbhbtt.exe55⤵
- Executes dropped EXE
PID:900 -
\??\c:\vvvvv.exec:\vvvvv.exe56⤵
- Executes dropped EXE
PID:1492 -
\??\c:\fxlfllr.exec:\fxlfllr.exe57⤵
- Executes dropped EXE
PID:3088 -
\??\c:\fxfxxxx.exec:\fxfxxxx.exe58⤵
- Executes dropped EXE
PID:4796 -
\??\c:\5tttnh.exec:\5tttnh.exe59⤵
- Executes dropped EXE
PID:4356 -
\??\c:\htnbtt.exec:\htnbtt.exe60⤵
- Executes dropped EXE
PID:2928 -
\??\c:\jdddv.exec:\jdddv.exe61⤵
- Executes dropped EXE
PID:2504 -
\??\c:\pjpjj.exec:\pjpjj.exe62⤵
- Executes dropped EXE
PID:4100 -
\??\c:\1rxrlll.exec:\1rxrlll.exe63⤵
- Executes dropped EXE
PID:1332 -
\??\c:\1thbth.exec:\1thbth.exe64⤵
- Executes dropped EXE
PID:3936 -
\??\c:\bbbthn.exec:\bbbthn.exe65⤵
- Executes dropped EXE
PID:3288 -
\??\c:\pvjjv.exec:\pvjjv.exe66⤵PID:1616
-
\??\c:\xlrrrrr.exec:\xlrrrrr.exe67⤵PID:3100
-
\??\c:\lffxrrl.exec:\lffxrrl.exe68⤵PID:4316
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe69⤵PID:588
-
\??\c:\thnhhn.exec:\thnhhn.exe70⤵PID:4332
-
\??\c:\vjjjv.exec:\vjjjv.exe71⤵PID:1824
-
\??\c:\djppj.exec:\djppj.exe72⤵PID:3592
-
\??\c:\7fxxllf.exec:\7fxxllf.exe73⤵PID:3456
-
\??\c:\nbhbtt.exec:\nbhbtt.exe74⤵PID:3056
-
\??\c:\djpjj.exec:\djpjj.exe75⤵PID:4576
-
\??\c:\jdddp.exec:\jdddp.exe76⤵PID:1068
-
\??\c:\btbtnh.exec:\btbtnh.exe77⤵PID:2400
-
\??\c:\htttnh.exec:\htttnh.exe78⤵PID:2640
-
\??\c:\djddd.exec:\djddd.exe79⤵PID:2388
-
\??\c:\lfflxxx.exec:\lfflxxx.exe80⤵PID:5072
-
\??\c:\fxxrrrr.exec:\fxxrrrr.exe81⤵PID:4184
-
\??\c:\tnnhbb.exec:\tnnhbb.exe82⤵PID:224
-
\??\c:\hbtttt.exec:\hbtttt.exe83⤵PID:3512
-
\??\c:\1djjp.exec:\1djjp.exe84⤵PID:228
-
\??\c:\vppjd.exec:\vppjd.exe85⤵PID:4376
-
\??\c:\lrrrlff.exec:\lrrrlff.exe86⤵PID:3564
-
\??\c:\7thnhh.exec:\7thnhh.exe87⤵PID:1876
-
\??\c:\hnttnh.exec:\hnttnh.exe88⤵PID:3816
-
\??\c:\pjjdv.exec:\pjjdv.exe89⤵PID:2172
-
\??\c:\vjvvj.exec:\vjvvj.exe90⤵PID:408
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe91⤵PID:2428
-
\??\c:\xxxrllf.exec:\xxxrllf.exe92⤵PID:3688
-
\??\c:\hbtttt.exec:\hbtttt.exe93⤵PID:5088
-
\??\c:\nntbbh.exec:\nntbbh.exe94⤵PID:2764
-
\??\c:\jjjdv.exec:\jjjdv.exe95⤵PID:4940
-
\??\c:\llrlfff.exec:\llrlfff.exe96⤵PID:4636
-
\??\c:\fxrlxxx.exec:\fxrlxxx.exe97⤵PID:4580
-
\??\c:\1bhbhn.exec:\1bhbhn.exe98⤵PID:2152
-
\??\c:\thnhhh.exec:\thnhhh.exe99⤵PID:2020
-
\??\c:\jvjdj.exec:\jvjdj.exe100⤵PID:2532
-
\??\c:\lfffxrl.exec:\lfffxrl.exe101⤵PID:4024
-
\??\c:\fxxxrxr.exec:\fxxxrxr.exe102⤵PID:1844
-
\??\c:\bbtntb.exec:\bbtntb.exe103⤵PID:3876
-
\??\c:\hbntnn.exec:\hbntnn.exe104⤵PID:1492
-
\??\c:\djjdv.exec:\djjdv.exe105⤵PID:1964
-
\??\c:\lxffxff.exec:\lxffxff.exe106⤵PID:2528
-
\??\c:\frxxrrr.exec:\frxxrrr.exe107⤵PID:4356
-
\??\c:\bttnhh.exec:\bttnhh.exe108⤵PID:3628
-
\??\c:\pdjjd.exec:\pdjjd.exe109⤵PID:640
-
\??\c:\vdjjd.exec:\vdjjd.exe110⤵PID:1584
-
\??\c:\bbhhhb.exec:\bbhhhb.exe111⤵PID:1708
-
\??\c:\9bbbtt.exec:\9bbbtt.exe112⤵PID:1236
-
\??\c:\jjppv.exec:\jjppv.exe113⤵PID:1804
-
\??\c:\ffrrrxr.exec:\ffrrrxr.exe114⤵PID:3396
-
\??\c:\5lfffff.exec:\5lfffff.exe115⤵PID:4372
-
\??\c:\hbhhhb.exec:\hbhhhb.exe116⤵PID:1956
-
\??\c:\5btnbh.exec:\5btnbh.exe117⤵PID:588
-
\??\c:\jvddp.exec:\jvddp.exe118⤵PID:4332
-
\??\c:\5rxxlll.exec:\5rxxlll.exe119⤵PID:1824
-
\??\c:\rlfxrlf.exec:\rlfxrlf.exe120⤵PID:3464
-
\??\c:\3bhbbb.exec:\3bhbbb.exe121⤵PID:4248
-
\??\c:\vdppj.exec:\vdppj.exe122⤵PID:4128
-
\??\c:\dpvdp.exec:\dpvdp.exe123⤵PID:4576
-
\??\c:\1ffxrrl.exec:\1ffxrrl.exe124⤵PID:1068
-
\??\c:\hhbttn.exec:\hhbttn.exe125⤵PID:2400
-
\??\c:\btbbbb.exec:\btbbbb.exe126⤵PID:2640
-
\??\c:\jjddd.exec:\jjddd.exe127⤵PID:4464
-
\??\c:\1vvpv.exec:\1vvpv.exe128⤵PID:800
-
\??\c:\lffxrlr.exec:\lffxrlr.exe129⤵PID:4184
-
\??\c:\tbbhbb.exec:\tbbhbb.exe130⤵PID:224
-
\??\c:\nthhtb.exec:\nthhtb.exe131⤵PID:3512
-
\??\c:\pdpjj.exec:\pdpjj.exe132⤵PID:4832
-
\??\c:\3ffrllf.exec:\3ffrllf.exe133⤵PID:3564
-
\??\c:\1lrrxfr.exec:\1lrrxfr.exe134⤵PID:3168
-
\??\c:\hnbttt.exec:\hnbttt.exe135⤵PID:5056
-
\??\c:\thhtnn.exec:\thhtnn.exe136⤵PID:724
-
\??\c:\ddvpd.exec:\ddvpd.exe137⤵PID:4536
-
\??\c:\vdjdv.exec:\vdjdv.exe138⤵PID:3920
-
\??\c:\5flfxxr.exec:\5flfxxr.exe139⤵PID:4588
-
\??\c:\rrfxrrr.exec:\rrfxrrr.exe140⤵PID:1952
-
\??\c:\hbbtnn.exec:\hbbtnn.exe141⤵PID:4580
-
\??\c:\hhhbtt.exec:\hhhbtt.exe142⤵PID:4288
-
\??\c:\htbbtt.exec:\htbbtt.exe143⤵PID:3996
-
\??\c:\5ppvj.exec:\5ppvj.exe144⤵PID:4024
-
\??\c:\rlrflff.exec:\rlrflff.exe145⤵PID:1844
-
\??\c:\rllxffl.exec:\rllxffl.exe146⤵PID:3088
-
\??\c:\3bnttt.exec:\3bnttt.exe147⤵PID:4688
-
\??\c:\jdjdp.exec:\jdjdp.exe148⤵PID:3528
-
\??\c:\bthhbb.exec:\bthhbb.exe149⤵PID:1624
-
\??\c:\1jjdv.exec:\1jjdv.exe150⤵PID:2628
-
\??\c:\7jjdp.exec:\7jjdp.exe151⤵PID:376
-
\??\c:\hhhtbb.exec:\hhhtbb.exe152⤵PID:2908
-
\??\c:\btbhbn.exec:\btbhbn.exe153⤵PID:4304
-
\??\c:\jvdvp.exec:\jvdvp.exe154⤵PID:5084
-
\??\c:\dpdpd.exec:\dpdpd.exe155⤵PID:4672
-
\??\c:\xfxxrll.exec:\xfxxrll.exe156⤵PID:4312
-
\??\c:\xxfxxfx.exec:\xxfxxfx.exe157⤵PID:820
-
\??\c:\hbnhbb.exec:\hbnhbb.exe158⤵PID:1780
-
\??\c:\dvppj.exec:\dvppj.exe159⤵PID:4408
-
\??\c:\rlfxrlx.exec:\rlfxrlx.exe160⤵PID:1956
-
\??\c:\lxrrlfx.exec:\lxrrlfx.exe161⤵PID:2576
-
\??\c:\1nhhbb.exec:\1nhhbb.exe162⤵PID:3436
-
\??\c:\dppjj.exec:\dppjj.exe163⤵PID:1908
-
\??\c:\vppjv.exec:\vppjv.exe164⤵PID:4816
-
\??\c:\rrfrfrr.exec:\rrfrfrr.exe165⤵PID:3056
-
\??\c:\btttnn.exec:\btttnn.exe166⤵PID:3848
-
\??\c:\hhhbbb.exec:\hhhbbb.exe167⤵PID:4164
-
\??\c:\7vjvv.exec:\7vjvv.exe168⤵PID:2372
-
\??\c:\llxlrlx.exec:\llxlrlx.exe169⤵PID:3828
-
\??\c:\fffffrl.exec:\fffffrl.exe170⤵PID:4892
-
\??\c:\9htnhh.exec:\9htnhh.exe171⤵PID:2124
-
\??\c:\tnbbtt.exec:\tnbbtt.exe172⤵PID:1372
-
\??\c:\ddpjv.exec:\ddpjv.exe173⤵PID:3896
-
\??\c:\vjdvj.exec:\vjdvj.exe174⤵PID:4360
-
\??\c:\xllffff.exec:\xllffff.exe175⤵PID:2944
-
\??\c:\3btttn.exec:\3btttn.exe176⤵PID:2392
-
\??\c:\hhbnhn.exec:\hhbnhn.exe177⤵PID:4112
-
\??\c:\ddddp.exec:\ddddp.exe178⤵PID:3168
-
\??\c:\3llfxxr.exec:\3llfxxr.exe179⤵PID:4960
-
\??\c:\lflxrff.exec:\lflxrff.exe180⤵PID:2832
-
\??\c:\nbhhhb.exec:\nbhhhb.exe181⤵PID:4536
-
\??\c:\dpvpj.exec:\dpvpj.exe182⤵PID:3920
-
\??\c:\vvvpj.exec:\vvvpj.exe183⤵PID:3704
-
\??\c:\lxlfrrr.exec:\lxlfrrr.exe184⤵PID:4088
-
\??\c:\nnhhbb.exec:\nnhhbb.exe185⤵PID:2020
-
\??\c:\hbbbtt.exec:\hbbbtt.exe186⤵PID:384
-
\??\c:\vvppd.exec:\vvppd.exe187⤵PID:3040
-
\??\c:\rffxllf.exec:\rffxllf.exe188⤵PID:4024
-
\??\c:\7fxxxxx.exec:\7fxxxxx.exe189⤵PID:2712
-
\??\c:\btttnn.exec:\btttnn.exe190⤵PID:3088
-
\??\c:\5bbhnn.exec:\5bbhnn.exe191⤵PID:2528
-
\??\c:\djpjd.exec:\djpjd.exe192⤵PID:2620
-
\??\c:\pvpvp.exec:\pvpvp.exe193⤵PID:4544
-
\??\c:\xrrlxxr.exec:\xrrlxxr.exe194⤵PID:3520
-
\??\c:\3hbbht.exec:\3hbbht.exe195⤵PID:1052
-
\??\c:\htbhhh.exec:\htbhhh.exe196⤵PID:956
-
\??\c:\jdvpp.exec:\jdvpp.exe197⤵PID:1584
-
\??\c:\rfrrlll.exec:\rfrrlll.exe198⤵PID:1708
-
\??\c:\rfxxxxl.exec:\rfxxxxl.exe199⤵PID:3128
-
\??\c:\5hhhhh.exec:\5hhhhh.exe200⤵PID:3100
-
\??\c:\vdvpd.exec:\vdvpd.exe201⤵PID:3396
-
\??\c:\pdjvp.exec:\pdjvp.exe202⤵PID:4140
-
\??\c:\fxfrrrf.exec:\fxfrrrf.exe203⤵PID:3600
-
\??\c:\ttttnn.exec:\ttttnn.exe204⤵PID:588
-
\??\c:\bthnnn.exec:\bthnnn.exe205⤵PID:392
-
\??\c:\pjppv.exec:\pjppv.exe206⤵PID:1824
-
\??\c:\pvdvp.exec:\pvdvp.exe207⤵PID:2728
-
\??\c:\rlrlxxf.exec:\rlrlxxf.exe208⤵PID:4248
-
\??\c:\hnbtnn.exec:\hnbtnn.exe209⤵PID:1620
-
\??\c:\bhnhbb.exec:\bhnhbb.exe210⤵PID:3848
-
\??\c:\jdvvp.exec:\jdvvp.exe211⤵PID:2432
-
\??\c:\vpvpj.exec:\vpvpj.exe212⤵PID:2964
-
\??\c:\rllfxxr.exec:\rllfxxr.exe213⤵PID:2640
-
\??\c:\tbttht.exec:\tbttht.exe214⤵PID:3536
-
\??\c:\ddpjj.exec:\ddpjj.exe215⤵PID:116
-
\??\c:\jvddv.exec:\jvddv.exe216⤵PID:4364
-
\??\c:\fxfxrll.exec:\fxfxrll.exe217⤵PID:224
-
\??\c:\tttnhh.exec:\tttnhh.exe218⤵PID:4260
-
\??\c:\hbbtnn.exec:\hbbtnn.exe219⤵PID:3872
-
\??\c:\vpdpj.exec:\vpdpj.exe220⤵PID:4624
-
\??\c:\pjvjv.exec:\pjvjv.exe221⤵PID:536
-
\??\c:\lfllfff.exec:\lfllfff.exe222⤵PID:3124
-
\??\c:\nbttnn.exec:\nbttnn.exe223⤵PID:440
-
\??\c:\ntntnn.exec:\ntntnn.exe224⤵PID:2784
-
\??\c:\pdpvp.exec:\pdpvp.exe225⤵PID:2520
-
\??\c:\llrxrxx.exec:\llrxrxx.exe226⤵PID:2764
-
\??\c:\rxfxrrl.exec:\rxfxrrl.exe227⤵PID:4772
-
\??\c:\bthhbb.exec:\bthhbb.exe228⤵PID:3476
-
\??\c:\bbbbhh.exec:\bbbbhh.exe229⤵PID:1308
-
\??\c:\djjvp.exec:\djjvp.exe230⤵PID:748
-
\??\c:\djpjv.exec:\djpjv.exe231⤵PID:3876
-
\??\c:\lffxlrr.exec:\lffxlrr.exe232⤵PID:4856
-
\??\c:\3bhhbb.exec:\3bhhbb.exe233⤵PID:2168
-
\??\c:\bntnhh.exec:\bntnhh.exe234⤵PID:3088
-
\??\c:\jpddd.exec:\jpddd.exe235⤵PID:4356
-
\??\c:\vvvpd.exec:\vvvpd.exe236⤵PID:2620
-
\??\c:\1xrrlrr.exec:\1xrrlrr.exe237⤵PID:3716
-
\??\c:\3thbhn.exec:\3thbhn.exe238⤵PID:532
-
\??\c:\dppjd.exec:\dppjd.exe239⤵PID:1052
-
\??\c:\7ddvp.exec:\7ddvp.exe240⤵PID:3508
-
\??\c:\vvjjj.exec:\vvjjj.exe241⤵PID:1584
-
\??\c:\rffxllf.exec:\rffxllf.exe242⤵PID:1928