Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 17:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe
-
Size
68KB
-
MD5
fe1fbbbe4e0c7ef27a5d56549951b620
-
SHA1
6aee3837f2657e1244b41f8af16aaabfa20611f9
-
SHA256
3d015c64345a0eec3c29d3e2f3227190c93d10e0c1618e94ea93f4abc08a4e11
-
SHA512
26f7606dbbf1cb109b3f7e532274a44597708a6280c79fe95e19155ff9285bf514bc4625e31f9a3097cf212ec4812003574656240f7630c145a28f88b2cc72d7
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfv7+afCD+QsQbLx:ymb3NkkiQ3mdBjFIfvTfCD+Hq
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2108-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/820-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/820-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3016-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-42-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2612-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1252-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1996-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1912-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2056-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/884-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2936-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/896-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3pjdp.exefxlxffl.exelfrxlrf.exe7jvdj.exe5lxrxrx.exe5tnnnn.exedpppp.exelxffxrx.exebtnnhn.exejddpp.exevvdvp.exe3xllrrx.exexxlrxfl.exentthhb.exepdpjj.exepjvpv.exelfflrlx.exetnbhnt.exenhthnt.exevpjjp.exelfrxffl.exefxffllr.exe9tntbh.exenbnnbh.exe5pjpv.exelfrxlrl.exefrllxrr.exetntttt.exepjvjp.exevjddd.exexrflffl.exe1ttbnh.exetnbhhb.exetbntnh.exevjpjj.exedpdvv.exerfrlrrf.exexlfffxx.exe7thnnh.exenbnbhh.exevjpjj.exepjjdd.exe9xlllrr.exerflfffl.exenhtbbn.exetnbbhn.exejdjjv.exedpjjv.exe7pppp.exexrfxxxx.exerlxrxxf.exe5nbhtn.exe9thntt.exevvjjd.exe7xlfllx.exexlrllrx.exebthnth.exebtnntb.exepjvvd.exejdpjd.exe3lrllfx.exerlxrrlr.exetthnnn.exe7hbbhh.exepid process 820 3pjdp.exe 3016 fxlxffl.exe 2612 lfrxlrf.exe 2956 7jvdj.exe 2668 5lxrxrx.exe 1252 5tnnnn.exe 2500 dpppp.exe 1916 lxffxrx.exe 2392 btnnhn.exe 2896 jddpp.exe 2892 vvdvp.exe 2492 3xllrrx.exe 756 xxlrxfl.exe 1996 ntthhb.exe 1912 pdpjj.exe 2760 pjvpv.exe 2856 lfflrlx.exe 2076 tnbhnt.exe 2056 nhthnt.exe 2692 vpjjp.exe 2604 lfrxffl.exe 884 fxffllr.exe 1644 9tntbh.exe 3028 nbnnbh.exe 996 5pjpv.exe 2936 lfrxlrl.exe 896 frllxrr.exe 1836 tntttt.exe 2144 pjvjp.exe 844 vjddd.exe 872 xrflffl.exe 2108 1ttbnh.exe 1752 tnbhhb.exe 2720 tbntnh.exe 2656 vjpjj.exe 2336 dpdvv.exe 2708 rfrlrrf.exe 2712 xlfffxx.exe 2776 7thnnh.exe 2764 nbnbhh.exe 2672 vjpjj.exe 2504 pjjdd.exe 2584 9xlllrr.exe 2572 rflfffl.exe 2044 nhtbbn.exe 2844 tnbbhn.exe 2608 jdjjv.exe 2908 dpjjv.exe 1684 7pppp.exe 2396 xrfxxxx.exe 608 rlxrxxf.exe 1920 5nbhtn.exe 3000 9thntt.exe 1760 vvjjd.exe 1756 7xlfllx.exe 1720 xlrllrx.exe 1652 bthnth.exe 1988 btnntb.exe 2972 pjvvd.exe 1400 jdpjd.exe 2088 3lrllfx.exe 1472 rlxrrlr.exe 572 tthnnn.exe 1644 7hbbhh.exe -
Processes:
resource yara_rule behavioral1/memory/2108-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/820-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1252-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1252-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1252-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1252-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1916-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1996-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1912-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-209-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/884-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/896-271-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe3pjdp.exefxlxffl.exelfrxlrf.exe7jvdj.exe5lxrxrx.exe5tnnnn.exedpppp.exelxffxrx.exebtnnhn.exejddpp.exevvdvp.exe3xllrrx.exexxlrxfl.exentthhb.exepdpjj.exedescription pid process target process PID 2108 wrote to memory of 820 2108 fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe 3pjdp.exe PID 2108 wrote to memory of 820 2108 fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe 3pjdp.exe PID 2108 wrote to memory of 820 2108 fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe 3pjdp.exe PID 2108 wrote to memory of 820 2108 fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe 3pjdp.exe PID 820 wrote to memory of 3016 820 3pjdp.exe fxlxffl.exe PID 820 wrote to memory of 3016 820 3pjdp.exe fxlxffl.exe PID 820 wrote to memory of 3016 820 3pjdp.exe fxlxffl.exe PID 820 wrote to memory of 3016 820 3pjdp.exe fxlxffl.exe PID 3016 wrote to memory of 2612 3016 fxlxffl.exe lfrxlrf.exe PID 3016 wrote to memory of 2612 3016 fxlxffl.exe lfrxlrf.exe PID 3016 wrote to memory of 2612 3016 fxlxffl.exe lfrxlrf.exe PID 3016 wrote to memory of 2612 3016 fxlxffl.exe lfrxlrf.exe PID 2612 wrote to memory of 2956 2612 lfrxlrf.exe 7jvdj.exe PID 2612 wrote to memory of 2956 2612 lfrxlrf.exe 7jvdj.exe PID 2612 wrote to memory of 2956 2612 lfrxlrf.exe 7jvdj.exe PID 2612 wrote to memory of 2956 2612 lfrxlrf.exe 7jvdj.exe PID 2956 wrote to memory of 2668 2956 7jvdj.exe 5lxrxrx.exe PID 2956 wrote to memory of 2668 2956 7jvdj.exe 5lxrxrx.exe PID 2956 wrote to memory of 2668 2956 7jvdj.exe 5lxrxrx.exe PID 2956 wrote to memory of 2668 2956 7jvdj.exe 5lxrxrx.exe PID 2668 wrote to memory of 1252 2668 5lxrxrx.exe 5tnnnn.exe PID 2668 wrote to memory of 1252 2668 5lxrxrx.exe 5tnnnn.exe PID 2668 wrote to memory of 1252 2668 5lxrxrx.exe 5tnnnn.exe PID 2668 wrote to memory of 1252 2668 5lxrxrx.exe 5tnnnn.exe PID 1252 wrote to memory of 2500 1252 5tnnnn.exe dpppp.exe PID 1252 wrote to memory of 2500 1252 5tnnnn.exe dpppp.exe PID 1252 wrote to memory of 2500 1252 5tnnnn.exe dpppp.exe PID 1252 wrote to memory of 2500 1252 5tnnnn.exe dpppp.exe PID 2500 wrote to memory of 1916 2500 dpppp.exe lxffxrx.exe PID 2500 wrote to memory of 1916 2500 dpppp.exe lxffxrx.exe PID 2500 wrote to memory of 1916 2500 dpppp.exe lxffxrx.exe PID 2500 wrote to memory of 1916 2500 dpppp.exe lxffxrx.exe PID 1916 wrote to memory of 2392 1916 lxffxrx.exe btnnhn.exe PID 1916 wrote to memory of 2392 1916 lxffxrx.exe btnnhn.exe PID 1916 wrote to memory of 2392 1916 lxffxrx.exe btnnhn.exe PID 1916 wrote to memory of 2392 1916 lxffxrx.exe btnnhn.exe PID 2392 wrote to memory of 2896 2392 btnnhn.exe jddpp.exe PID 2392 wrote to memory of 2896 2392 btnnhn.exe jddpp.exe PID 2392 wrote to memory of 2896 2392 btnnhn.exe jddpp.exe PID 2392 wrote to memory of 2896 2392 btnnhn.exe jddpp.exe PID 2896 wrote to memory of 2892 2896 jddpp.exe vvdvp.exe PID 2896 wrote to memory of 2892 2896 jddpp.exe vvdvp.exe PID 2896 wrote to memory of 2892 2896 jddpp.exe vvdvp.exe PID 2896 wrote to memory of 2892 2896 jddpp.exe vvdvp.exe PID 2892 wrote to memory of 2492 2892 vvdvp.exe 3xllrrx.exe PID 2892 wrote to memory of 2492 2892 vvdvp.exe 3xllrrx.exe PID 2892 wrote to memory of 2492 2892 vvdvp.exe 3xllrrx.exe PID 2892 wrote to memory of 2492 2892 vvdvp.exe 3xllrrx.exe PID 2492 wrote to memory of 756 2492 3xllrrx.exe xxlrxfl.exe PID 2492 wrote to memory of 756 2492 3xllrrx.exe xxlrxfl.exe PID 2492 wrote to memory of 756 2492 3xllrrx.exe xxlrxfl.exe PID 2492 wrote to memory of 756 2492 3xllrrx.exe xxlrxfl.exe PID 756 wrote to memory of 1996 756 xxlrxfl.exe ntthhb.exe PID 756 wrote to memory of 1996 756 xxlrxfl.exe ntthhb.exe PID 756 wrote to memory of 1996 756 xxlrxfl.exe ntthhb.exe PID 756 wrote to memory of 1996 756 xxlrxfl.exe ntthhb.exe PID 1996 wrote to memory of 1912 1996 ntthhb.exe pdpjj.exe PID 1996 wrote to memory of 1912 1996 ntthhb.exe pdpjj.exe PID 1996 wrote to memory of 1912 1996 ntthhb.exe pdpjj.exe PID 1996 wrote to memory of 1912 1996 ntthhb.exe pdpjj.exe PID 1912 wrote to memory of 2760 1912 pdpjj.exe pjvpv.exe PID 1912 wrote to memory of 2760 1912 pdpjj.exe pjvpv.exe PID 1912 wrote to memory of 2760 1912 pdpjj.exe pjvpv.exe PID 1912 wrote to memory of 2760 1912 pdpjj.exe pjvpv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\fe1fbbbe4e0c7ef27a5d56549951b620_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\3pjdp.exec:\3pjdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
\??\c:\fxlxffl.exec:\fxlxffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\lfrxlrf.exec:\lfrxlrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\7jvdj.exec:\7jvdj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\5lxrxrx.exec:\5lxrxrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\5tnnnn.exec:\5tnnnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\dpppp.exec:\dpppp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\lxffxrx.exec:\lxffxrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\btnnhn.exec:\btnnhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\jddpp.exec:\jddpp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\vvdvp.exec:\vvdvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\3xllrrx.exec:\3xllrrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\xxlrxfl.exec:\xxlrxfl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
\??\c:\ntthhb.exec:\ntthhb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\pdpjj.exec:\pdpjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\pjvpv.exec:\pjvpv.exe17⤵
- Executes dropped EXE
PID:2760 -
\??\c:\lfflrlx.exec:\lfflrlx.exe18⤵
- Executes dropped EXE
PID:2856 -
\??\c:\tnbhnt.exec:\tnbhnt.exe19⤵
- Executes dropped EXE
PID:2076 -
\??\c:\nhthnt.exec:\nhthnt.exe20⤵
- Executes dropped EXE
PID:2056 -
\??\c:\vpjjp.exec:\vpjjp.exe21⤵
- Executes dropped EXE
PID:2692 -
\??\c:\lfrxffl.exec:\lfrxffl.exe22⤵
- Executes dropped EXE
PID:2604 -
\??\c:\fxffllr.exec:\fxffllr.exe23⤵
- Executes dropped EXE
PID:884 -
\??\c:\9tntbh.exec:\9tntbh.exe24⤵
- Executes dropped EXE
PID:1644 -
\??\c:\nbnnbh.exec:\nbnnbh.exe25⤵
- Executes dropped EXE
PID:3028 -
\??\c:\5pjpv.exec:\5pjpv.exe26⤵
- Executes dropped EXE
PID:996 -
\??\c:\lfrxlrl.exec:\lfrxlrl.exe27⤵
- Executes dropped EXE
PID:2936 -
\??\c:\frllxrr.exec:\frllxrr.exe28⤵
- Executes dropped EXE
PID:896 -
\??\c:\tntttt.exec:\tntttt.exe29⤵
- Executes dropped EXE
PID:1836 -
\??\c:\pjvjp.exec:\pjvjp.exe30⤵
- Executes dropped EXE
PID:2144 -
\??\c:\vjddd.exec:\vjddd.exe31⤵
- Executes dropped EXE
PID:844 -
\??\c:\xrflffl.exec:\xrflffl.exe32⤵
- Executes dropped EXE
PID:872 -
\??\c:\1ttbnh.exec:\1ttbnh.exe33⤵
- Executes dropped EXE
PID:2108 -
\??\c:\tnbhhb.exec:\tnbhhb.exe34⤵
- Executes dropped EXE
PID:1752 -
\??\c:\tbntnh.exec:\tbntnh.exe35⤵
- Executes dropped EXE
PID:2720 -
\??\c:\vjpjj.exec:\vjpjj.exe36⤵
- Executes dropped EXE
PID:2656 -
\??\c:\dpdvv.exec:\dpdvv.exe37⤵
- Executes dropped EXE
PID:2336 -
\??\c:\rfrlrrf.exec:\rfrlrrf.exe38⤵
- Executes dropped EXE
PID:2708 -
\??\c:\xlfffxx.exec:\xlfffxx.exe39⤵
- Executes dropped EXE
PID:2712 -
\??\c:\7thnnh.exec:\7thnnh.exe40⤵
- Executes dropped EXE
PID:2776 -
\??\c:\nbnbhh.exec:\nbnbhh.exe41⤵
- Executes dropped EXE
PID:2764 -
\??\c:\vjpjj.exec:\vjpjj.exe42⤵
- Executes dropped EXE
PID:2672 -
\??\c:\pjjdd.exec:\pjjdd.exe43⤵
- Executes dropped EXE
PID:2504 -
\??\c:\9xlllrr.exec:\9xlllrr.exe44⤵
- Executes dropped EXE
PID:2584 -
\??\c:\rflfffl.exec:\rflfffl.exe45⤵
- Executes dropped EXE
PID:2572 -
\??\c:\nhtbbn.exec:\nhtbbn.exe46⤵
- Executes dropped EXE
PID:2044 -
\??\c:\tnbbhn.exec:\tnbbhn.exe47⤵
- Executes dropped EXE
PID:2844 -
\??\c:\jdjjv.exec:\jdjjv.exe48⤵
- Executes dropped EXE
PID:2608 -
\??\c:\dpjjv.exec:\dpjjv.exe49⤵
- Executes dropped EXE
PID:2908 -
\??\c:\7pppp.exec:\7pppp.exe50⤵
- Executes dropped EXE
PID:1684 -
\??\c:\xrfxxxx.exec:\xrfxxxx.exe51⤵
- Executes dropped EXE
PID:2396 -
\??\c:\rlxrxxf.exec:\rlxrxxf.exe52⤵
- Executes dropped EXE
PID:608 -
\??\c:\5nbhtn.exec:\5nbhtn.exe53⤵
- Executes dropped EXE
PID:1920 -
\??\c:\9thntt.exec:\9thntt.exe54⤵
- Executes dropped EXE
PID:3000 -
\??\c:\vvjjd.exec:\vvjjd.exe55⤵
- Executes dropped EXE
PID:1760 -
\??\c:\7xlfllx.exec:\7xlfllx.exe56⤵
- Executes dropped EXE
PID:1756 -
\??\c:\xlrllrx.exec:\xlrllrx.exe57⤵
- Executes dropped EXE
PID:1720 -
\??\c:\bthnth.exec:\bthnth.exe58⤵
- Executes dropped EXE
PID:1652 -
\??\c:\btnntb.exec:\btnntb.exe59⤵
- Executes dropped EXE
PID:1988 -
\??\c:\pjvvd.exec:\pjvvd.exe60⤵
- Executes dropped EXE
PID:2972 -
\??\c:\jdpjd.exec:\jdpjd.exe61⤵
- Executes dropped EXE
PID:1400 -
\??\c:\3lrllfx.exec:\3lrllfx.exe62⤵
- Executes dropped EXE
PID:2088 -
\??\c:\rlxrrlr.exec:\rlxrrlr.exe63⤵
- Executes dropped EXE
PID:1472 -
\??\c:\tthnnn.exec:\tthnnn.exe64⤵
- Executes dropped EXE
PID:572 -
\??\c:\7hbbhh.exec:\7hbbhh.exe65⤵
- Executes dropped EXE
PID:1644 -
\??\c:\dpjpv.exec:\dpjpv.exe66⤵PID:2464
-
\??\c:\jddvd.exec:\jddvd.exe67⤵PID:1948
-
\??\c:\rlrrxxx.exec:\rlrrxxx.exe68⤵PID:2864
-
\??\c:\5rrlrrf.exec:\5rrlrrf.exe69⤵PID:928
-
\??\c:\nnhhnh.exec:\nnhhnh.exe70⤵PID:2436
-
\??\c:\3hbntb.exec:\3hbntb.exe71⤵PID:1836
-
\??\c:\vpdjj.exec:\vpdjj.exe72⤵PID:2988
-
\??\c:\jdvvd.exec:\jdvvd.exe73⤵PID:2176
-
\??\c:\fxffflr.exec:\fxffflr.exe74⤵PID:1736
-
\??\c:\3rlflfl.exec:\3rlflfl.exe75⤵PID:1744
-
\??\c:\nhbhht.exec:\nhbhht.exe76⤵PID:2108
-
\??\c:\hbbhtt.exec:\hbbhtt.exe77⤵PID:2248
-
\??\c:\dvjpv.exec:\dvjpv.exe78⤵PID:2720
-
\??\c:\9dddv.exec:\9dddv.exe79⤵PID:2636
-
\??\c:\fxlrllr.exec:\fxlrllr.exe80⤵PID:2336
-
\??\c:\fxrxxxl.exec:\fxrxxxl.exe81⤵PID:2752
-
\??\c:\thbbhb.exec:\thbbhb.exe82⤵PID:2712
-
\??\c:\1bbbhh.exec:\1bbbhh.exe83⤵PID:2776
-
\??\c:\thtttt.exec:\thtttt.exe84⤵PID:2560
-
\??\c:\dvjpd.exec:\dvjpd.exe85⤵PID:2524
-
\??\c:\9pjjv.exec:\9pjjv.exe86⤵PID:2504
-
\??\c:\lrfxxrf.exec:\lrfxxrf.exe87⤵PID:3056
-
\??\c:\xrflxxf.exec:\xrflxxf.exe88⤵PID:2572
-
\??\c:\nnbhth.exec:\nnbhth.exe89⤵PID:2888
-
\??\c:\htnttt.exec:\htnttt.exe90⤵PID:2844
-
\??\c:\vjvjv.exec:\vjvjv.exe91⤵PID:2900
-
\??\c:\pdpjj.exec:\pdpjj.exe92⤵PID:2160
-
\??\c:\1flrlfl.exec:\1flrlfl.exe93⤵PID:2492
-
\??\c:\frfffxx.exec:\frfffxx.exe94⤵PID:2396
-
\??\c:\fxrrxll.exec:\fxrrxll.exe95⤵PID:1940
-
\??\c:\5ttbtt.exec:\5ttbtt.exe96⤵PID:2768
-
\??\c:\bthbhb.exec:\bthbhb.exe97⤵PID:2756
-
\??\c:\pjvdp.exec:\pjvdp.exe98⤵PID:1760
-
\??\c:\dpvjj.exec:\dpvjj.exe99⤵PID:1756
-
\??\c:\ppjdd.exec:\ppjdd.exe100⤵PID:1720
-
\??\c:\3lxrrlx.exec:\3lxrrlx.exe101⤵PID:1652
-
\??\c:\xrxfllr.exec:\xrxfllr.exe102⤵PID:1988
-
\??\c:\nbhnnt.exec:\nbhnnt.exe103⤵PID:2972
-
\??\c:\tntnnh.exec:\tntnnh.exe104⤵PID:1400
-
\??\c:\nhnbhn.exec:\nhnbhn.exe105⤵PID:576
-
\??\c:\pjppp.exec:\pjppp.exe106⤵PID:1472
-
\??\c:\dvdjj.exec:\dvdjj.exe107⤵PID:572
-
\??\c:\lxrllll.exec:\lxrllll.exe108⤵PID:1644
-
\??\c:\lfllrll.exec:\lfllrll.exe109⤵PID:2464
-
\??\c:\7bhhnh.exec:\7bhhnh.exe110⤵PID:1948
-
\??\c:\3htbhn.exec:\3htbhn.exe111⤵PID:2864
-
\??\c:\hthhhh.exec:\hthhhh.exe112⤵PID:928
-
\??\c:\vvjpp.exec:\vvjpp.exe113⤵PID:2264
-
\??\c:\vpddj.exec:\vpddj.exe114⤵PID:1836
-
\??\c:\7rlrxrx.exec:\7rlrxrx.exe115⤵PID:1816
-
\??\c:\xlxllff.exec:\xlxllff.exe116⤵PID:2176
-
\??\c:\tnbbhb.exec:\tnbbhb.exe117⤵PID:3008
-
\??\c:\bbntbb.exec:\bbntbb.exe118⤵PID:1704
-
\??\c:\bnhbbn.exec:\bnhbbn.exe119⤵PID:1752
-
\??\c:\pvdpp.exec:\pvdpp.exe120⤵PID:2152
-
\??\c:\pjddd.exec:\pjddd.exe121⤵PID:2656
-
\??\c:\xlfffff.exec:\xlfffff.exe122⤵PID:1608
-
\??\c:\1ffflll.exec:\1ffflll.exe123⤵PID:2708
-
\??\c:\9thhhh.exec:\9thhhh.exe124⤵PID:2732
-
\??\c:\nhhhbt.exec:\nhhhbt.exe125⤵PID:2624
-
\??\c:\5jvvp.exec:\5jvvp.exe126⤵PID:2620
-
\??\c:\vpjjv.exec:\vpjjv.exe127⤵PID:2672
-
\??\c:\7dpvd.exec:\7dpvd.exe128⤵PID:2520
-
\??\c:\7lflxxf.exec:\7lflxxf.exe129⤵PID:2584
-
\??\c:\frlfllr.exec:\frlfllr.exe130⤵PID:1404
-
\??\c:\hthhtn.exec:\hthhtn.exe131⤵PID:2044
-
\??\c:\5nbnnh.exec:\5nbnnh.exe132⤵PID:2836
-
\??\c:\dvdjj.exec:\dvdjj.exe133⤵PID:2608
-
\??\c:\pvpjd.exec:\pvpjd.exe134⤵PID:2908
-
\??\c:\rrfxfxf.exec:\rrfxfxf.exe135⤵PID:1532
-
\??\c:\fxlllrr.exec:\fxlllrr.exe136⤵PID:1072
-
\??\c:\7rxxfxf.exec:\7rxxfxf.exe137⤵PID:1796
-
\??\c:\3btbhb.exec:\3btbhb.exe138⤵PID:1920
-
\??\c:\9hbbhh.exec:\9hbbhh.exe139⤵PID:3000
-
\??\c:\3vddd.exec:\3vddd.exe140⤵PID:2800
-
\??\c:\dvdvp.exec:\dvdvp.exe141⤵PID:1044
-
\??\c:\llxrxrf.exec:\llxrxrf.exe142⤵PID:1448
-
\??\c:\frflxxf.exec:\frflxxf.exe143⤵PID:2372
-
\??\c:\nhtntt.exec:\nhtntt.exe144⤵PID:1528
-
\??\c:\nhhbbb.exec:\nhhbbb.exe145⤵PID:1988
-
\??\c:\7ntntn.exec:\7ntntn.exe146⤵PID:2692
-
\??\c:\jvjjv.exec:\jvjjv.exe147⤵PID:2088
-
\??\c:\vpddj.exec:\vpddj.exe148⤵PID:584
-
\??\c:\rfrrllr.exec:\rfrrllr.exe149⤵PID:1860
-
\??\c:\9frxfrf.exec:\9frxfrf.exe150⤵PID:1820
-
\??\c:\hbbbhn.exec:\hbbbhn.exe151⤵PID:2268
-
\??\c:\bnbhbb.exec:\bnbhbb.exe152⤵PID:1956
-
\??\c:\jdpvd.exec:\jdpvd.exe153⤵PID:1932
-
\??\c:\jvppj.exec:\jvppj.exe154⤵PID:2288
-
\??\c:\dpddd.exec:\dpddd.exe155⤵PID:2436
-
\??\c:\lffxfxf.exec:\lffxfxf.exe156⤵PID:324
-
\??\c:\lxrffxl.exec:\lxrffxl.exe157⤵PID:844
-
\??\c:\nhttbh.exec:\nhttbh.exe158⤵PID:2164
-
\??\c:\1nnhnn.exec:\1nnhnn.exe159⤵PID:1736
-
\??\c:\bnbbbt.exec:\bnbbbt.exe160⤵PID:3008
-
\??\c:\dvvpp.exec:\dvvpp.exe161⤵PID:2480
-
\??\c:\jdjpd.exec:\jdjpd.exe162⤵PID:2352
-
\??\c:\lflrrlr.exec:\lflrrlr.exe163⤵PID:1808
-
\??\c:\frxxfxl.exec:\frxxfxl.exe164⤵PID:2716
-
\??\c:\7bnnnh.exec:\7bnnnh.exe165⤵PID:2728
-
\??\c:\hbhntn.exec:\hbhntn.exe166⤵PID:2080
-
\??\c:\dpdjj.exec:\dpdjj.exe167⤵PID:2644
-
\??\c:\3pjdd.exec:\3pjdd.exe168⤵PID:2528
-
\??\c:\1xxxflf.exec:\1xxxflf.exe169⤵PID:2548
-
\??\c:\5xrlrrr.exec:\5xrlrrr.exe170⤵PID:2676
-
\??\c:\xrxfrxf.exec:\xrxfrxf.exe171⤵PID:2580
-
\??\c:\hthbhh.exec:\hthbhh.exe172⤵PID:2820
-
\??\c:\jdvvv.exec:\jdvvv.exe173⤵PID:1616
-
\??\c:\jvdjj.exec:\jvdjj.exe174⤵PID:2828
-
\??\c:\vjdvv.exec:\vjdvv.exe175⤵PID:2812
-
\??\c:\1frrlrf.exec:\1frrlrf.exe176⤵PID:2924
-
\??\c:\rlxrfxx.exec:\rlxrfxx.exe177⤵PID:1684
-
\??\c:\5thhnt.exec:\5thhnt.exe178⤵PID:1064
-
\??\c:\5tnnnt.exec:\5tnnnt.exe179⤵PID:1968
-
\??\c:\7vddj.exec:\7vddj.exe180⤵PID:1972
-
\??\c:\jdvpp.exec:\jdvpp.exe181⤵PID:2816
-
\??\c:\llfllff.exec:\llfllff.exe182⤵PID:2760
-
\??\c:\frxxffx.exec:\frxxffx.exe183⤵PID:308
-
\??\c:\xrxlrxf.exec:\xrxlrxf.exe184⤵PID:2544
-
\??\c:\1tbhhh.exec:\1tbhhh.exe185⤵PID:1992
-
\??\c:\1dpdj.exec:\1dpdj.exe186⤵PID:2964
-
\??\c:\vpjjv.exec:\vpjjv.exe187⤵PID:1528
-
\??\c:\jdvdj.exec:\jdvdj.exe188⤵PID:600
-
\??\c:\3llrxfl.exec:\3llrxfl.exe189⤵PID:2604
-
\??\c:\ffxfrrf.exec:\ffxfrrf.exe190⤵PID:1700
-
\??\c:\nnbhbb.exec:\nnbhbb.exe191⤵PID:1780
-
\??\c:\1nbbbb.exec:\1nbbbb.exe192⤵PID:2180
-
\??\c:\ppjjp.exec:\ppjjp.exe193⤵PID:2936
-
\??\c:\vjvpj.exec:\vjvpj.exe194⤵PID:788
-
\??\c:\lfxxlfl.exec:\lfxxlfl.exe195⤵PID:1032
-
\??\c:\xxlxrfx.exec:\xxlxrfx.exe196⤵PID:2976
-
\??\c:\btbbbh.exec:\btbbbh.exe197⤵PID:2472
-
\??\c:\hbbbht.exec:\hbbbht.exe198⤵PID:2320
-
\??\c:\dvppv.exec:\dvppv.exe199⤵PID:1352
-
\??\c:\ddpvd.exec:\ddpvd.exe200⤵PID:2120
-
\??\c:\frffrff.exec:\frffrff.exe201⤵PID:836
-
\??\c:\rfxxxxl.exec:\rfxxxxl.exe202⤵PID:2340
-
\??\c:\bttbnn.exec:\bttbnn.exe203⤵PID:3008
-
\??\c:\nbnhhb.exec:\nbnhhb.exe204⤵PID:2616
-
\??\c:\vpdpv.exec:\vpdpv.exe205⤵PID:2412
-
\??\c:\5vppv.exec:\5vppv.exe206⤵PID:2704
-
\??\c:\3ffxflx.exec:\3ffxflx.exe207⤵PID:2664
-
\??\c:\xrxfflx.exec:\xrxfflx.exe208⤵PID:2780
-
\??\c:\nhbnnt.exec:\nhbnnt.exe209⤵PID:2688
-
\??\c:\bthnbb.exec:\bthnbb.exe210⤵PID:2680
-
\??\c:\3dvvv.exec:\3dvvv.exe211⤵PID:1908
-
\??\c:\vpdjv.exec:\vpdjv.exe212⤵PID:2556
-
\??\c:\3vvjd.exec:\3vvjd.exe213⤵PID:3036
-
\??\c:\7fxrrrl.exec:\7fxrrrl.exe214⤵PID:2040
-
\??\c:\xxrfrrr.exec:\xxrfrrr.exe215⤵PID:2596
-
\??\c:\tnhntn.exec:\tnhntn.exe216⤵PID:2684
-
\??\c:\bbbbnn.exec:\bbbbnn.exe217⤵PID:2868
-
\??\c:\ppjvj.exec:\ppjvj.exe218⤵PID:1668
-
\??\c:\jvpvd.exec:\jvpvd.exe219⤵PID:2924
-
\??\c:\xfxfxfr.exec:\xfxfxfr.exe220⤵PID:1340
-
\??\c:\hbnntt.exec:\hbnntt.exe221⤵PID:1120
-
\??\c:\rrlxflf.exec:\rrlxflf.exe222⤵PID:1216
-
\??\c:\hbhhnt.exec:\hbhhnt.exe223⤵PID:1656
-
\??\c:\hhthtb.exec:\hhthtb.exe224⤵PID:3000
-
\??\c:\pdvpj.exec:\pdvpj.exe225⤵PID:1688
-
\??\c:\5fxfllx.exec:\5fxfllx.exe226⤵PID:1696
-
\??\c:\7lfrxxf.exec:\7lfrxxf.exe227⤵PID:1448
-
\??\c:\bnttnn.exec:\bnttnn.exe228⤵PID:2372
-
\??\c:\hbthbb.exec:\hbthbb.exe229⤵PID:2484
-
\??\c:\vjvvd.exec:\vjvvd.exe230⤵PID:536
-
\??\c:\pjvdj.exec:\pjvdj.exe231⤵PID:768
-
\??\c:\lfrfflr.exec:\lfrfflr.exe232⤵PID:1308
-
\??\c:\llxxrrx.exec:\llxxrrx.exe233⤵PID:584
-
\??\c:\nnbntb.exec:\nnbntb.exe234⤵PID:628
-
\??\c:\5bbhhh.exec:\5bbhhh.exe235⤵PID:2180
-
\??\c:\1pddd.exec:\1pddd.exe236⤵PID:3052
-
\??\c:\1pppd.exec:\1pppd.exe237⤵PID:1952
-
\??\c:\5rrxfxf.exec:\5rrxfxf.exe238⤵PID:2272
-
\??\c:\fxrrxff.exec:\fxrrxff.exe239⤵PID:1544
-
\??\c:\btnttt.exec:\btnttt.exe240⤵PID:2456
-
\??\c:\nhnttn.exec:\nhnttn.exe241⤵PID:1740
-
\??\c:\dvdpj.exec:\dvdpj.exe242⤵PID:2128