Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 22:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exe
-
Size
719KB
-
MD5
4dce753c3bc37944bbdff043a611e6e0
-
SHA1
40ac0011da0d99d6c4aa57ae1f09cda34cefab06
-
SHA256
a0cea831f8dd38b76db6cdee84d54aaf35470f6bdc782b55f968d1bb0519a476
-
SHA512
bb55956c51636fc12a05714a5162734a284800d3f930850cb35b9a8e12dda85e66634b894caed39211681c0432e77782b64407c92a9f0eaeeb0ed7d2f092c606
-
SSDEEP
12288:n3C9yMo+S0L9xRnoq7H9xqYL5oeEF5rna9sUxg7udOxPJVSjYg8lcmJ1MZxEkTs2:SgD4bhoqLDqYLS7w4C
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
Processes:
resource yara_rule behavioral2/memory/1588-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2628-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1588-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2832-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/636-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1552-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3112-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3800-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3492-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4624-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3668-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3612-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2764-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/516-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2320-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4836-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2024-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4724-82-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4724-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1680-75-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1680-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2792-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3056-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4600-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1992-41-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1992-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3496-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/228-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tnbbtt.exe5rllrfl.exentbhtn.exedjjdp.exelfrrxxf.exenhbhbn.exevvppp.exexxfffxf.exe3vjdp.exerrllffx.exehtbhht.exeddjpj.exerrlllfl.exenbhnnb.exelrrxrrx.exetbnbnn.exejjdvv.exebnhbbn.exevjvdj.exefflrlrx.exevvdvv.exepdjdp.exethhnht.exebttttt.exeffllxlr.exenhnbth.exeddjjd.exexllfffl.exettttht.exeppvvd.exeffrrffr.exeflrxxrx.exennnttb.exedjdpd.exelffrrlf.exepjjdp.exejdvvp.exefrlfllx.exethnhbb.exejdjpj.exe3xxrllf.exe3hbtnn.exe3djdp.exe1xrllrl.exebtbtnn.exeddvpj.exellxxxxf.exepdvdv.exexrllflx.exetntttn.exevjjdv.exexrxrrrr.exettbbhh.exedvdvp.exefrlfxxx.exebhnhbh.exejjddv.exexxfxxxx.exe3htnnn.exeddvpj.exexxffxll.exetbhhbh.exepjvpd.exefxllllf.exepid process 2628 tnbbtt.exe 2832 5rllrfl.exe 228 ntbhtn.exe 3496 djjdp.exe 1992 lfrrxxf.exe 4600 nhbhbn.exe 2792 vvppp.exe 3056 xxfffxf.exe 1680 3vjdp.exe 4724 rrllffx.exe 2024 htbhht.exe 4900 ddjpj.exe 636 rrlllfl.exe 4836 nbhnnb.exe 2320 lrrxrrx.exe 516 tbnbnn.exe 2764 jjdvv.exe 4612 bnhbbn.exe 3612 vjvdj.exe 3668 fflrlrx.exe 3744 vvdvv.exe 4624 pdjdp.exe 3492 thhnht.exe 3800 bttttt.exe 2944 ffllxlr.exe 5064 nhnbth.exe 3112 ddjjd.exe 2476 xllfffl.exe 1552 ttttht.exe 2136 ppvvd.exe 872 ffrrffr.exe 4180 flrxxrx.exe 2852 nnnttb.exe 2704 djdpd.exe 4424 lffrrlf.exe 3976 pjjdp.exe 1028 jdvvp.exe 2548 frlfllx.exe 2824 thnhbb.exe 2864 jdjpj.exe 2724 3xxrllf.exe 2988 3hbtnn.exe 3656 3djdp.exe 1572 1xrllrl.exe 4232 btbtnn.exe 2304 ddvpj.exe 2656 llxxxxf.exe 3104 pdvdv.exe 752 xrllflx.exe 4428 tntttn.exe 3380 vjjdv.exe 2232 xrxrrrr.exe 3840 ttbbhh.exe 1528 dvdvp.exe 4560 frlfxxx.exe 4520 bhnhbh.exe 1976 jjddv.exe 4772 xxfxxxx.exe 2300 3htnnn.exe 2264 ddvpj.exe 2924 xxffxll.exe 4724 tbhhbh.exe 4040 pjvpd.exe 4628 fxllllf.exe -
Processes:
resource yara_rule behavioral2/memory/1588-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2628-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1588-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/636-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1552-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3112-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3800-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3492-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4624-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3668-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3612-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2764-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/516-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2320-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4724-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1680-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2792-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3056-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1992-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3496-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-27-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exetnbbtt.exe5rllrfl.exentbhtn.exedjjdp.exelfrrxxf.exenhbhbn.exevvppp.exexxfffxf.exe3vjdp.exerrllffx.exehtbhht.exeddjpj.exerrlllfl.exenbhnnb.exelrrxrrx.exetbnbnn.exejjdvv.exebnhbbn.exevjvdj.exefflrlrx.exevvdvv.exedescription pid process target process PID 1588 wrote to memory of 2628 1588 4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exe tnbbtt.exe PID 1588 wrote to memory of 2628 1588 4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exe tnbbtt.exe PID 1588 wrote to memory of 2628 1588 4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exe tnbbtt.exe PID 2628 wrote to memory of 2832 2628 tnbbtt.exe 5rllrfl.exe PID 2628 wrote to memory of 2832 2628 tnbbtt.exe 5rllrfl.exe PID 2628 wrote to memory of 2832 2628 tnbbtt.exe 5rllrfl.exe PID 2832 wrote to memory of 228 2832 5rllrfl.exe ntbhtn.exe PID 2832 wrote to memory of 228 2832 5rllrfl.exe ntbhtn.exe PID 2832 wrote to memory of 228 2832 5rllrfl.exe ntbhtn.exe PID 228 wrote to memory of 3496 228 ntbhtn.exe djjdp.exe PID 228 wrote to memory of 3496 228 ntbhtn.exe djjdp.exe PID 228 wrote to memory of 3496 228 ntbhtn.exe djjdp.exe PID 3496 wrote to memory of 1992 3496 djjdp.exe lfrrxxf.exe PID 3496 wrote to memory of 1992 3496 djjdp.exe lfrrxxf.exe PID 3496 wrote to memory of 1992 3496 djjdp.exe lfrrxxf.exe PID 1992 wrote to memory of 4600 1992 lfrrxxf.exe nhbhbn.exe PID 1992 wrote to memory of 4600 1992 lfrrxxf.exe nhbhbn.exe PID 1992 wrote to memory of 4600 1992 lfrrxxf.exe nhbhbn.exe PID 4600 wrote to memory of 2792 4600 nhbhbn.exe vvppp.exe PID 4600 wrote to memory of 2792 4600 nhbhbn.exe vvppp.exe PID 4600 wrote to memory of 2792 4600 nhbhbn.exe vvppp.exe PID 2792 wrote to memory of 3056 2792 vvppp.exe xxfffxf.exe PID 2792 wrote to memory of 3056 2792 vvppp.exe xxfffxf.exe PID 2792 wrote to memory of 3056 2792 vvppp.exe xxfffxf.exe PID 3056 wrote to memory of 1680 3056 xxfffxf.exe 3vjdp.exe PID 3056 wrote to memory of 1680 3056 xxfffxf.exe 3vjdp.exe PID 3056 wrote to memory of 1680 3056 xxfffxf.exe 3vjdp.exe PID 1680 wrote to memory of 4724 1680 3vjdp.exe rrllffx.exe PID 1680 wrote to memory of 4724 1680 3vjdp.exe rrllffx.exe PID 1680 wrote to memory of 4724 1680 3vjdp.exe rrllffx.exe PID 4724 wrote to memory of 2024 4724 rrllffx.exe htbhht.exe PID 4724 wrote to memory of 2024 4724 rrllffx.exe htbhht.exe PID 4724 wrote to memory of 2024 4724 rrllffx.exe htbhht.exe PID 2024 wrote to memory of 4900 2024 htbhht.exe ddjpj.exe PID 2024 wrote to memory of 4900 2024 htbhht.exe ddjpj.exe PID 2024 wrote to memory of 4900 2024 htbhht.exe ddjpj.exe PID 4900 wrote to memory of 636 4900 ddjpj.exe rrlllfl.exe PID 4900 wrote to memory of 636 4900 ddjpj.exe rrlllfl.exe PID 4900 wrote to memory of 636 4900 ddjpj.exe rrlllfl.exe PID 636 wrote to memory of 4836 636 rrlllfl.exe nbhnnb.exe PID 636 wrote to memory of 4836 636 rrlllfl.exe nbhnnb.exe PID 636 wrote to memory of 4836 636 rrlllfl.exe nbhnnb.exe PID 4836 wrote to memory of 2320 4836 nbhnnb.exe lrrxrrx.exe PID 4836 wrote to memory of 2320 4836 nbhnnb.exe lrrxrrx.exe PID 4836 wrote to memory of 2320 4836 nbhnnb.exe lrrxrrx.exe PID 2320 wrote to memory of 516 2320 lrrxrrx.exe tbnbnn.exe PID 2320 wrote to memory of 516 2320 lrrxrrx.exe tbnbnn.exe PID 2320 wrote to memory of 516 2320 lrrxrrx.exe tbnbnn.exe PID 516 wrote to memory of 2764 516 tbnbnn.exe jjdvv.exe PID 516 wrote to memory of 2764 516 tbnbnn.exe jjdvv.exe PID 516 wrote to memory of 2764 516 tbnbnn.exe jjdvv.exe PID 2764 wrote to memory of 4612 2764 jjdvv.exe bnhbbn.exe PID 2764 wrote to memory of 4612 2764 jjdvv.exe bnhbbn.exe PID 2764 wrote to memory of 4612 2764 jjdvv.exe bnhbbn.exe PID 4612 wrote to memory of 3612 4612 bnhbbn.exe vjvdj.exe PID 4612 wrote to memory of 3612 4612 bnhbbn.exe vjvdj.exe PID 4612 wrote to memory of 3612 4612 bnhbbn.exe vjvdj.exe PID 3612 wrote to memory of 3668 3612 vjvdj.exe fflrlrx.exe PID 3612 wrote to memory of 3668 3612 vjvdj.exe fflrlrx.exe PID 3612 wrote to memory of 3668 3612 vjvdj.exe fflrlrx.exe PID 3668 wrote to memory of 3744 3668 fflrlrx.exe vvdvv.exe PID 3668 wrote to memory of 3744 3668 fflrlrx.exe vvdvv.exe PID 3668 wrote to memory of 3744 3668 fflrlrx.exe vvdvv.exe PID 3744 wrote to memory of 4624 3744 vvdvv.exe pdjdp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4dce753c3bc37944bbdff043a611e6e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\tnbbtt.exec:\tnbbtt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\5rllrfl.exec:\5rllrfl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\ntbhtn.exec:\ntbhtn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
\??\c:\djjdp.exec:\djjdp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3496 -
\??\c:\lfrrxxf.exec:\lfrrxxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\nhbhbn.exec:\nhbhbn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\vvppp.exec:\vvppp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\xxfffxf.exec:\xxfffxf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\3vjdp.exec:\3vjdp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\rrllffx.exec:\rrllffx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
\??\c:\htbhht.exec:\htbhht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\ddjpj.exec:\ddjpj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\rrlllfl.exec:\rrlllfl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
\??\c:\nbhnnb.exec:\nbhnnb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\lrrxrrx.exec:\lrrxrrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\tbnbnn.exec:\tbnbnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:516 -
\??\c:\jjdvv.exec:\jjdvv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\bnhbbn.exec:\bnhbbn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\vjvdj.exec:\vjvdj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\fflrlrx.exec:\fflrlrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
\??\c:\vvdvv.exec:\vvdvv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
\??\c:\pdjdp.exec:\pdjdp.exe23⤵
- Executes dropped EXE
PID:4624 -
\??\c:\thhnht.exec:\thhnht.exe24⤵
- Executes dropped EXE
PID:3492 -
\??\c:\bttttt.exec:\bttttt.exe25⤵
- Executes dropped EXE
PID:3800 -
\??\c:\ffllxlr.exec:\ffllxlr.exe26⤵
- Executes dropped EXE
PID:2944 -
\??\c:\nhnbth.exec:\nhnbth.exe27⤵
- Executes dropped EXE
PID:5064 -
\??\c:\ddjjd.exec:\ddjjd.exe28⤵
- Executes dropped EXE
PID:3112 -
\??\c:\xllfffl.exec:\xllfffl.exe29⤵
- Executes dropped EXE
PID:2476 -
\??\c:\ttttht.exec:\ttttht.exe30⤵
- Executes dropped EXE
PID:1552 -
\??\c:\ppvvd.exec:\ppvvd.exe31⤵
- Executes dropped EXE
PID:2136 -
\??\c:\ffrrffr.exec:\ffrrffr.exe32⤵
- Executes dropped EXE
PID:872 -
\??\c:\flrxxrx.exec:\flrxxrx.exe33⤵
- Executes dropped EXE
PID:4180 -
\??\c:\nnnttb.exec:\nnnttb.exe34⤵
- Executes dropped EXE
PID:2852 -
\??\c:\djdpd.exec:\djdpd.exe35⤵
- Executes dropped EXE
PID:2704 -
\??\c:\lffrrlf.exec:\lffrrlf.exe36⤵
- Executes dropped EXE
PID:4424 -
\??\c:\pjjdp.exec:\pjjdp.exe37⤵
- Executes dropped EXE
PID:3976 -
\??\c:\jdvvp.exec:\jdvvp.exe38⤵
- Executes dropped EXE
PID:1028 -
\??\c:\frlfllx.exec:\frlfllx.exe39⤵
- Executes dropped EXE
PID:2548 -
\??\c:\thnhbb.exec:\thnhbb.exe40⤵
- Executes dropped EXE
PID:2824 -
\??\c:\jdjpj.exec:\jdjpj.exe41⤵
- Executes dropped EXE
PID:2864 -
\??\c:\3xxrllf.exec:\3xxrllf.exe42⤵
- Executes dropped EXE
PID:2724 -
\??\c:\3hbtnn.exec:\3hbtnn.exe43⤵
- Executes dropped EXE
PID:2988 -
\??\c:\3djdp.exec:\3djdp.exe44⤵
- Executes dropped EXE
PID:3656 -
\??\c:\1xrllrl.exec:\1xrllrl.exe45⤵
- Executes dropped EXE
PID:1572 -
\??\c:\btbtnn.exec:\btbtnn.exe46⤵
- Executes dropped EXE
PID:4232 -
\??\c:\ddvpj.exec:\ddvpj.exe47⤵
- Executes dropped EXE
PID:2304 -
\??\c:\llxxxxf.exec:\llxxxxf.exe48⤵
- Executes dropped EXE
PID:2656 -
\??\c:\nnntth.exec:\nnntth.exe49⤵PID:4476
-
\??\c:\pdvdv.exec:\pdvdv.exe50⤵
- Executes dropped EXE
PID:3104 -
\??\c:\xrllflx.exec:\xrllflx.exe51⤵
- Executes dropped EXE
PID:752 -
\??\c:\tntttn.exec:\tntttn.exe52⤵
- Executes dropped EXE
PID:4428 -
\??\c:\vjjdv.exec:\vjjdv.exe53⤵
- Executes dropped EXE
PID:3380 -
\??\c:\xrxrrrr.exec:\xrxrrrr.exe54⤵
- Executes dropped EXE
PID:2232 -
\??\c:\ttbbhh.exec:\ttbbhh.exe55⤵
- Executes dropped EXE
PID:3840 -
\??\c:\dvdvp.exec:\dvdvp.exe56⤵
- Executes dropped EXE
PID:1528 -
\??\c:\frlfxxx.exec:\frlfxxx.exe57⤵
- Executes dropped EXE
PID:4560 -
\??\c:\bhnhbh.exec:\bhnhbh.exe58⤵
- Executes dropped EXE
PID:4520 -
\??\c:\jjddv.exec:\jjddv.exe59⤵
- Executes dropped EXE
PID:1976 -
\??\c:\xxfxxxx.exec:\xxfxxxx.exe60⤵
- Executes dropped EXE
PID:4772 -
\??\c:\3htnnn.exec:\3htnnn.exe61⤵
- Executes dropped EXE
PID:2300 -
\??\c:\ddvpj.exec:\ddvpj.exe62⤵
- Executes dropped EXE
PID:2264 -
\??\c:\xxffxll.exec:\xxffxll.exe63⤵
- Executes dropped EXE
PID:2924 -
\??\c:\tbhhbh.exec:\tbhhbh.exe64⤵
- Executes dropped EXE
PID:4724 -
\??\c:\pjvpd.exec:\pjvpd.exe65⤵
- Executes dropped EXE
PID:4040 -
\??\c:\fxllllf.exec:\fxllllf.exe66⤵
- Executes dropped EXE
PID:4628 -
\??\c:\thbtnn.exec:\thbtnn.exe67⤵PID:1724
-
\??\c:\jpvjv.exec:\jpvjv.exe68⤵PID:3384
-
\??\c:\lxlfxxx.exec:\lxlfxxx.exe69⤵PID:832
-
\??\c:\bthbhh.exec:\bthbhh.exe70⤵PID:4376
-
\??\c:\pjvvp.exec:\pjvvp.exe71⤵PID:2976
-
\??\c:\rlrlffx.exec:\rlrlffx.exe72⤵PID:1676
-
\??\c:\tbnnnn.exec:\tbnnnn.exe73⤵PID:1592
-
\??\c:\jjjdv.exec:\jjjdv.exe74⤵PID:3052
-
\??\c:\xlrxrrl.exec:\xlrxrrl.exe75⤵PID:2984
-
\??\c:\nnnnhb.exec:\nnnnhb.exe76⤵PID:3800
-
\??\c:\djvpv.exec:\djvpv.exe77⤵PID:3572
-
\??\c:\fxllflf.exec:\fxllflf.exe78⤵PID:556
-
\??\c:\bhnnnn.exec:\bhnnnn.exe79⤵PID:2316
-
\??\c:\1jppj.exec:\1jppj.exe80⤵PID:3416
-
\??\c:\btbbnn.exec:\btbbnn.exe81⤵PID:1960
-
\??\c:\jjjjd.exec:\jjjjd.exe82⤵PID:4336
-
\??\c:\lxxrfff.exec:\lxxrfff.exe83⤵PID:3284
-
\??\c:\dvvpj.exec:\dvvpj.exe84⤵PID:4480
-
\??\c:\rfrlfff.exec:\rfrlfff.exe85⤵PID:900
-
\??\c:\bnhtbh.exec:\bnhtbh.exe86⤵PID:2688
-
\??\c:\fllffll.exec:\fllffll.exe87⤵PID:3912
-
\??\c:\hbbtnn.exec:\hbbtnn.exe88⤵PID:2824
-
\??\c:\pddvp.exec:\pddvp.exe89⤵PID:552
-
\??\c:\xxlfrrf.exec:\xxlfrrf.exe90⤵PID:564
-
\??\c:\btnntt.exec:\btnntt.exe91⤵PID:2436
-
\??\c:\pdppp.exec:\pdppp.exe92⤵PID:392
-
\??\c:\lxlllff.exec:\lxlllff.exe93⤵PID:4452
-
\??\c:\jdjpp.exec:\jdjpp.exe94⤵PID:2304
-
\??\c:\xlllrxr.exec:\xlllrxr.exe95⤵PID:4488
-
\??\c:\7nntnn.exec:\7nntnn.exe96⤵PID:3432
-
\??\c:\ddppv.exec:\ddppv.exe97⤵PID:2848
-
\??\c:\5lllfff.exec:\5lllfff.exe98⤵PID:4428
-
\??\c:\tnnnnn.exec:\tnnnnn.exe99⤵PID:4392
-
\??\c:\vjppp.exec:\vjppp.exe100⤵PID:1224
-
\??\c:\fxffffx.exec:\fxffffx.exe101⤵PID:2624
-
\??\c:\xxfxrll.exec:\xxfxrll.exe102⤵PID:4560
-
\??\c:\5hnntb.exec:\5hnntb.exe103⤵PID:2800
-
\??\c:\1fflxff.exec:\1fflxff.exe104⤵PID:3232
-
\??\c:\bnhttn.exec:\bnhttn.exe105⤵PID:228
-
\??\c:\vjdvj.exec:\vjdvj.exe106⤵PID:4472
-
\??\c:\lxflrrr.exec:\lxflrrr.exe107⤵PID:1432
-
\??\c:\jjvpd.exec:\jjvpd.exe108⤵PID:4948
-
\??\c:\1flflfr.exec:\1flflfr.exe109⤵PID:2024
-
\??\c:\tnhnnt.exec:\tnhnnt.exe110⤵PID:3624
-
\??\c:\jdjjv.exec:\jdjjv.exe111⤵PID:4836
-
\??\c:\nthbbt.exec:\nthbbt.exe112⤵PID:3780
-
\??\c:\dvppv.exec:\dvppv.exe113⤵PID:1556
-
\??\c:\xlfxrrl.exec:\xlfxrrl.exe114⤵PID:696
-
\??\c:\ttnnhh.exec:\ttnnhh.exe115⤵PID:656
-
\??\c:\lrrlflf.exec:\lrrlflf.exe116⤵PID:4544
-
\??\c:\nnhhhh.exec:\nnhhhh.exe117⤵PID:3008
-
\??\c:\vdjjp.exec:\vdjjp.exe118⤵PID:3052
-
\??\c:\xffxxrl.exec:\xffxxrl.exe119⤵PID:1212
-
\??\c:\7tbhbb.exec:\7tbhbb.exe120⤵PID:4184
-
\??\c:\vvjdp.exec:\vvjdp.exe121⤵PID:2384
-
\??\c:\7bttnt.exec:\7bttnt.exe122⤵PID:1984
-
\??\c:\jppjd.exec:\jppjd.exe123⤵PID:5032
-
\??\c:\tttttn.exec:\tttttn.exe124⤵PID:3056
-
\??\c:\jdpvj.exec:\jdpvj.exe125⤵PID:4648
-
\??\c:\llxrxxr.exec:\llxrxxr.exe126⤵PID:2680
-
\??\c:\pjvvp.exec:\pjvvp.exe127⤵PID:3436
-
\??\c:\ffrlffx.exec:\ffrlffx.exe128⤵PID:3416
-
\??\c:\5btnnn.exec:\5btnnn.exe129⤵PID:4264
-
\??\c:\dvvjd.exec:\dvvjd.exe130⤵PID:1920
-
\??\c:\1xffxxr.exec:\1xffxxr.exe131⤵PID:4444
-
\??\c:\ttnbtt.exec:\ttnbtt.exe132⤵PID:2540
-
\??\c:\3pppj.exec:\3pppj.exe133⤵PID:2688
-
\??\c:\llrrrrf.exec:\llrrrrf.exe134⤵PID:1996
-
\??\c:\nbbbtt.exec:\nbbbtt.exe135⤵PID:612
-
\??\c:\xlxxffx.exec:\xlxxffx.exe136⤵PID:1304
-
\??\c:\hbnhnh.exec:\hbnhnh.exe137⤵PID:1420
-
\??\c:\pjvpj.exec:\pjvpj.exe138⤵PID:3656
-
\??\c:\xffxllx.exec:\xffxllx.exe139⤵PID:2972
-
\??\c:\bhhbth.exec:\bhhbth.exe140⤵PID:5004
-
\??\c:\pjvpp.exec:\pjvpp.exe141⤵PID:2692
-
\??\c:\fxrrrll.exec:\fxrrrll.exe142⤵PID:4920
-
\??\c:\tnnnhb.exec:\tnnnhb.exe143⤵PID:752
-
\??\c:\vdjdp.exec:\vdjdp.exe144⤵PID:4616
-
\??\c:\xxrrlxl.exec:\xxrrlxl.exe145⤵PID:4392
-
\??\c:\hhbtnh.exec:\hhbtnh.exe146⤵PID:3060
-
\??\c:\dvvvp.exec:\dvvvp.exe147⤵PID:2624
-
\??\c:\3rfxffl.exec:\3rfxffl.exe148⤵PID:4560
-
\??\c:\hnthtt.exec:\hnthtt.exe149⤵PID:4992
-
\??\c:\vpvpj.exec:\vpvpj.exe150⤵PID:228
-
\??\c:\lrxlffx.exec:\lrxlffx.exe151⤵PID:1432
-
\??\c:\tnnbbn.exec:\tnnbbn.exe152⤵PID:3608
-
\??\c:\vjvvp.exec:\vjvvp.exe153⤵PID:636
-
\??\c:\fxrrlfr.exec:\fxrrlfr.exe154⤵PID:1724
-
\??\c:\bttnnb.exec:\bttnnb.exe155⤵PID:2340
-
\??\c:\dvdvv.exec:\dvdvv.exe156⤵PID:696
-
\??\c:\lxrllll.exec:\lxrllll.exe157⤵PID:3644
-
\??\c:\bhnntb.exec:\bhnntb.exe158⤵PID:4624
-
\??\c:\djdjv.exec:\djdjv.exe159⤵PID:3148
-
\??\c:\lxxrlll.exec:\lxxrlll.exe160⤵PID:4304
-
\??\c:\rlrlllf.exec:\rlrlllf.exe161⤵PID:4432
-
\??\c:\5nnnth.exec:\5nnnth.exe162⤵PID:4964
-
\??\c:\dpvjp.exec:\dpvjp.exe163⤵PID:3448
-
\??\c:\lxfxxlx.exec:\lxfxxlx.exe164⤵PID:2044
-
\??\c:\pdvpd.exec:\pdvpd.exe165⤵PID:556
-
\??\c:\tbhnnn.exec:\tbhnnn.exe166⤵PID:1720
-
\??\c:\pdpvv.exec:\pdpvv.exe167⤵PID:860
-
\??\c:\tnhbnn.exec:\tnhbnn.exe168⤵PID:1312
-
\??\c:\tbttbb.exec:\tbttbb.exe169⤵PID:456
-
\??\c:\7vdjj.exec:\7vdjj.exe170⤵PID:4732
-
\??\c:\fxffflr.exec:\fxffflr.exe171⤵PID:2704
-
\??\c:\httbhb.exec:\httbhb.exe172⤵PID:5084
-
\??\c:\vjjjj.exec:\vjjjj.exe173⤵PID:2892
-
\??\c:\pvppv.exec:\pvppv.exe174⤵PID:4596
-
\??\c:\1rlllrr.exec:\1rlllrr.exe175⤵PID:3992
-
\??\c:\bnhtnh.exec:\bnhtnh.exe176⤵PID:1532
-
\??\c:\pdjdd.exec:\pdjdd.exe177⤵PID:916
-
\??\c:\bhthnb.exec:\bhthnb.exe178⤵PID:4668
-
\??\c:\hbbnnn.exec:\hbbnnn.exe179⤵PID:2948
-
\??\c:\rfflflr.exec:\rfflflr.exe180⤵PID:2972
-
\??\c:\bhhbtb.exec:\bhhbtb.exe181⤵PID:5004
-
\??\c:\vjjdd.exec:\vjjdd.exe182⤵PID:2692
-
\??\c:\xxfllrr.exec:\xxfllrr.exe183⤵PID:764
-
\??\c:\nthntb.exec:\nthntb.exe184⤵PID:4844
-
\??\c:\vvpjj.exec:\vvpjj.exe185⤵PID:1992
-
\??\c:\xlrrlxx.exec:\xlrrlxx.exe186⤵PID:4516
-
\??\c:\tbtbhb.exec:\tbtbhb.exe187⤵PID:3552
-
\??\c:\jpjpv.exec:\jpjpv.exe188⤵PID:3712
-
\??\c:\lfllffl.exec:\lfllffl.exe189⤵PID:828
-
\??\c:\thbbbh.exec:\thbbbh.exe190⤵PID:3376
-
\??\c:\pdjdv.exec:\pdjdv.exe191⤵PID:4112
-
\??\c:\5lxrffx.exec:\5lxrffx.exe192⤵PID:1436
-
\??\c:\hhbbtb.exec:\hhbbtb.exe193⤵PID:2400
-
\??\c:\dvdvv.exec:\dvdvv.exe194⤵PID:2084
-
\??\c:\pppdd.exec:\pppdd.exe195⤵PID:4108
-
\??\c:\xfxxxxf.exec:\xfxxxxf.exe196⤵PID:5108
-
\??\c:\hnbbbh.exec:\hnbbbh.exe197⤵PID:1480
-
\??\c:\ddpvj.exec:\ddpvj.exe198⤵PID:3148
-
\??\c:\xlrrrxx.exec:\xlrrrxx.exe199⤵PID:3872
-
\??\c:\tnbhhn.exec:\tnbhhn.exe200⤵PID:4432
-
\??\c:\jddpd.exec:\jddpd.exe201⤵PID:4964
-
\??\c:\rrrlfxr.exec:\rrrlfxr.exe202⤵PID:3448
-
\??\c:\hhnttb.exec:\hhnttb.exe203⤵PID:2044
-
\??\c:\dpvvd.exec:\dpvvd.exe204⤵PID:3920
-
\??\c:\lllllff.exec:\lllllff.exe205⤵PID:4288
-
\??\c:\hbthbt.exec:\hbthbt.exe206⤵PID:4348
-
\??\c:\ddvjd.exec:\ddvjd.exe207⤵PID:3416
-
\??\c:\xxxrrrl.exec:\xxxrrrl.exe208⤵PID:4732
-
\??\c:\ddjpj.exec:\ddjpj.exe209⤵PID:2236
-
\??\c:\xrfffxf.exec:\xrfffxf.exe210⤵PID:4176
-
\??\c:\9hbtnt.exec:\9hbtnt.exe211⤵PID:2724
-
\??\c:\lflxlfl.exec:\lflxlfl.exe212⤵PID:2988
-
\??\c:\bhbbbt.exec:\bhbbbt.exe213⤵PID:4764
-
\??\c:\jjppp.exec:\jjppp.exe214⤵PID:1420
-
\??\c:\flxrllr.exec:\flxrllr.exe215⤵PID:3656
-
\??\c:\bbhnnn.exec:\bbhnnn.exe216⤵PID:408
-
\??\c:\dpvpp.exec:\dpvpp.exe217⤵PID:884
-
\??\c:\rfrlfff.exec:\rfrlfff.exe218⤵PID:4916
-
\??\c:\bbtbth.exec:\bbtbth.exe219⤵PID:2848
-
\??\c:\vdvvv.exec:\vdvvv.exe220⤵PID:4324
-
\??\c:\xlllfxf.exec:\xlllfxf.exe221⤵PID:1224
-
\??\c:\pdjjv.exec:\pdjjv.exe222⤵PID:4400
-
\??\c:\fxxrfff.exec:\fxxrfff.exe223⤵PID:4772
-
\??\c:\bnttbn.exec:\bnttbn.exe224⤵PID:2832
-
\??\c:\vvvdj.exec:\vvvdj.exe225⤵PID:4992
-
\??\c:\lxlrlff.exec:\lxlrlff.exe226⤵PID:4752
-
\??\c:\tbtbbb.exec:\tbtbbb.exe227⤵PID:1168
-
\??\c:\jdjjj.exec:\jdjjj.exe228⤵PID:2016
-
\??\c:\nhttbb.exec:\nhttbb.exe229⤵PID:968
-
\??\c:\dvpvj.exec:\dvpvj.exe230⤵PID:1624
-
\??\c:\hnhbtb.exec:\hnhbtb.exe231⤵PID:4960
-
\??\c:\jvvpd.exec:\jvvpd.exe232⤵PID:4904
-
\??\c:\rxrlllf.exec:\rxrlllf.exe233⤵PID:4384
-
\??\c:\tnbtnh.exec:\tnbtnh.exe234⤵PID:2384
-
\??\c:\pjpdj.exec:\pjpdj.exe235⤵PID:4464
-
\??\c:\rfrrrxf.exec:\rfrrrxf.exe236⤵PID:1848
-
\??\c:\tnbbbh.exec:\tnbbbh.exe237⤵PID:4308
-
\??\c:\jpdjp.exec:\jpdjp.exe238⤵PID:516
-
\??\c:\lfxrfll.exec:\lfxrfll.exe239⤵PID:4652
-
\??\c:\nthhhh.exec:\nthhhh.exe240⤵PID:4288
-
\??\c:\pvdvv.exec:\pvdvv.exe241⤵PID:4264
-
\??\c:\lllfffl.exec:\lllfffl.exe242⤵PID:4200