Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 17:20
Behavioral task
behavioral1
Sample
ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe
-
Size
75KB
-
MD5
ff86d0b17f550b2a583517a1974eb240
-
SHA1
3454c165e9bf13d4eed5ba0d38dbe73bd7485ede
-
SHA256
57eb67bb8ac091aa44125f887dce308898fa16a04cdab2e2f51be3fbaed3b027
-
SHA512
dc9e84a43b55da08893ee5941337c47ee8aee7725a3479bb3c6913ec49a9aafcff189349bd3af560ea0787a31d3251a2bd1326f71c3eb9a9a090699cb7456f8c
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8PbhnyLFWoFLAxZhMDzE8s:9hOmTsF93UYfwC6GIoutz5yLpOSDu
Malware Config
Signatures
-
Detect Blackmoon payload 40 IoCs
Processes:
resource yara_rule behavioral1/memory/1780-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2072-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2476-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2588-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2540-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1352-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2440-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2448-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2800-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1740-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1020-108-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/764-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1816-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2112-185-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2480-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1928-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/676-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/576-221-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2728-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2268-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1116-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1756-291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3060-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2532-329-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/1268-343-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-363-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2320-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1716-395-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1632-416-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1632-423-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1464-454-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/772-493-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1788-519-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1324-538-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2156-563-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2468-585-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1716-686-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2316-1291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2076-1361-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1532-1455-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
dpddp.exexrflfll.exetthntn.exevjjpv.exedvjpv.exerfxrxff.exehttbbb.exe3pjpv.exedvppd.exe7lfxflr.exetnbnnt.exehtnbbn.exedddpd.exe9vjdp.exefxlrffl.exe5rrfxlf.exehbttbn.exepjvdj.exedjjjj.exexrfxlrx.exexllxrlx.exebtnbnn.exe7nbbhh.exe9jdpd.exe9ffxlrf.exelflrlfx.exenhhbnt.exe7jdjp.exe5pvjp.exelxlrxrx.exexlrrrrr.exetnhhnb.exe9jdjp.exejvddj.exerrfxllr.exelxlxfff.exebntbtn.exe9nbbnh.exejjpjp.exe5vpjd.exe5llrrxl.exelxrflrx.exethnbhh.exennhbnb.exevjpvv.exedppvv.exe7xfxxlr.exe3lxfrxf.exethbttb.exenntbnt.exevpdvv.exejdppv.exexfrxxff.exelffxxfr.exennhtnb.exetthbtb.exejdpdv.exelfxfxfl.exe9xxrlrf.exetbbbnn.exehbnthn.exeppjjp.exedvpvv.exerllffrf.exepid process 1780 dpddp.exe 2476 xrflfll.exe 2588 tthntn.exe 2540 vjjpv.exe 1352 dvjpv.exe 2808 rfxrxff.exe 2440 httbbb.exe 2448 3pjpv.exe 2800 dvppd.exe 1740 7lfxflr.exe 1020 tnbnnt.exe 2632 htnbbn.exe 764 dddpd.exe 2304 9vjdp.exe 1828 fxlrffl.exe 1816 5rrfxlf.exe 2196 hbttbn.exe 2172 pjvdj.exe 1448 djjjj.exe 2112 xrfxlrx.exe 2480 xllxrlx.exe 1928 btnbnn.exe 676 7nbbhh.exe 576 9jdpd.exe 2728 9ffxlrf.exe 988 lflrlfx.exe 1288 nhhbnt.exe 1680 7jdjp.exe 636 5pvjp.exe 2268 lxlrxrx.exe 1116 xlrrrrr.exe 572 tnhhnb.exe 1756 9jdjp.exe 2020 jvddj.exe 2052 rrfxllr.exe 3060 lxlxfff.exe 1520 bntbtn.exe 2532 9nbbnh.exe 2528 jjpjp.exe 1268 5vpjd.exe 2640 5llrrxl.exe 2472 lxrflrx.exe 2664 thnbhh.exe 2612 nnhbnb.exe 2320 vjpvv.exe 876 dppvv.exe 360 7xfxxlr.exe 1716 3lxfrxf.exe 344 thbttb.exe 1020 nntbnt.exe 2312 vpdvv.exe 1632 jdppv.exe 1012 xfrxxff.exe 1724 lffxxfr.exe 1732 nnhtnb.exe 1888 tthbtb.exe 1464 jdpdv.exe 3016 lfxfxfl.exe 1604 9xxrlrf.exe 3024 tbbbnn.exe 2112 hbnthn.exe 2104 ppjjp.exe 1784 dvpvv.exe 772 rllffrf.exe -
Processes:
resource yara_rule \??\c:\dpddp.exe upx behavioral1/memory/1780-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2072-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xrflfll.exe upx behavioral1/memory/2476-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2476-23-0x00000000003C0000-0x00000000003E7000-memory.dmp upx C:\tthntn.exe upx \??\c:\vjjpv.exe upx behavioral1/memory/2588-36-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvjpv.exe upx behavioral1/memory/2540-41-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rfxrxff.exe upx behavioral1/memory/1352-55-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\httbbb.exe upx behavioral1/memory/2440-72-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\3pjpv.exe upx behavioral1/memory/2448-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2448-82-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvppd.exe upx behavioral1/memory/2800-91-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7lfxflr.exe upx behavioral1/memory/1740-93-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnbnnt.exe upx behavioral1/memory/1020-108-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\htnbbn.exe upx behavioral1/memory/2632-109-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dddpd.exe upx behavioral1/memory/764-119-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9vjdp.exe upx C:\fxlrffl.exe upx C:\5rrfxlf.exe upx behavioral1/memory/1816-145-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbttbn.exe upx \??\c:\pjvdj.exe upx C:\djjjj.exe upx behavioral1/memory/1448-169-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xrfxlrx.exe upx \??\c:\xllxrlx.exe upx behavioral1/memory/2112-185-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2480-190-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\btnbnn.exe upx behavioral1/memory/1928-204-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7nbbhh.exe upx behavioral1/memory/676-213-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9jdpd.exe upx behavioral1/memory/576-221-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9ffxlrf.exe upx behavioral1/memory/2728-224-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\lflrlfx.exe upx C:\nhhbnt.exe upx behavioral1/memory/1288-240-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7jdjp.exe upx C:\5pvjp.exe upx C:\lxlrxrx.exe upx behavioral1/memory/2268-266-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xlrrrrr.exe upx behavioral1/memory/1116-281-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tnhhnb.exe upx behavioral1/memory/1756-291-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3060-309-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3060-316-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1268-336-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1268-343-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2664-356-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exedpddp.exexrflfll.exetthntn.exevjjpv.exedvjpv.exerfxrxff.exehttbbb.exe3pjpv.exedvppd.exe7lfxflr.exetnbnnt.exehtnbbn.exedddpd.exe9vjdp.exefxlrffl.exedescription pid process target process PID 2072 wrote to memory of 1780 2072 ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe dpddp.exe PID 2072 wrote to memory of 1780 2072 ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe dpddp.exe PID 2072 wrote to memory of 1780 2072 ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe dpddp.exe PID 2072 wrote to memory of 1780 2072 ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe dpddp.exe PID 1780 wrote to memory of 2476 1780 dpddp.exe xrflfll.exe PID 1780 wrote to memory of 2476 1780 dpddp.exe xrflfll.exe PID 1780 wrote to memory of 2476 1780 dpddp.exe xrflfll.exe PID 1780 wrote to memory of 2476 1780 dpddp.exe xrflfll.exe PID 2476 wrote to memory of 2588 2476 xrflfll.exe tthntn.exe PID 2476 wrote to memory of 2588 2476 xrflfll.exe tthntn.exe PID 2476 wrote to memory of 2588 2476 xrflfll.exe tthntn.exe PID 2476 wrote to memory of 2588 2476 xrflfll.exe tthntn.exe PID 2588 wrote to memory of 2540 2588 tthntn.exe vjjpv.exe PID 2588 wrote to memory of 2540 2588 tthntn.exe vjjpv.exe PID 2588 wrote to memory of 2540 2588 tthntn.exe vjjpv.exe PID 2588 wrote to memory of 2540 2588 tthntn.exe vjjpv.exe PID 2540 wrote to memory of 1352 2540 vjjpv.exe dvjpv.exe PID 2540 wrote to memory of 1352 2540 vjjpv.exe dvjpv.exe PID 2540 wrote to memory of 1352 2540 vjjpv.exe dvjpv.exe PID 2540 wrote to memory of 1352 2540 vjjpv.exe dvjpv.exe PID 1352 wrote to memory of 2808 1352 dvjpv.exe rfxrxff.exe PID 1352 wrote to memory of 2808 1352 dvjpv.exe rfxrxff.exe PID 1352 wrote to memory of 2808 1352 dvjpv.exe rfxrxff.exe PID 1352 wrote to memory of 2808 1352 dvjpv.exe rfxrxff.exe PID 2808 wrote to memory of 2440 2808 rfxrxff.exe httbbb.exe PID 2808 wrote to memory of 2440 2808 rfxrxff.exe httbbb.exe PID 2808 wrote to memory of 2440 2808 rfxrxff.exe httbbb.exe PID 2808 wrote to memory of 2440 2808 rfxrxff.exe httbbb.exe PID 2440 wrote to memory of 2448 2440 httbbb.exe 3pjpv.exe PID 2440 wrote to memory of 2448 2440 httbbb.exe 3pjpv.exe PID 2440 wrote to memory of 2448 2440 httbbb.exe 3pjpv.exe PID 2440 wrote to memory of 2448 2440 httbbb.exe 3pjpv.exe PID 2448 wrote to memory of 2800 2448 3pjpv.exe dvppd.exe PID 2448 wrote to memory of 2800 2448 3pjpv.exe dvppd.exe PID 2448 wrote to memory of 2800 2448 3pjpv.exe dvppd.exe PID 2448 wrote to memory of 2800 2448 3pjpv.exe dvppd.exe PID 2800 wrote to memory of 1740 2800 dvppd.exe 7lfxflr.exe PID 2800 wrote to memory of 1740 2800 dvppd.exe 7lfxflr.exe PID 2800 wrote to memory of 1740 2800 dvppd.exe 7lfxflr.exe PID 2800 wrote to memory of 1740 2800 dvppd.exe 7lfxflr.exe PID 1740 wrote to memory of 1020 1740 7lfxflr.exe tnbnnt.exe PID 1740 wrote to memory of 1020 1740 7lfxflr.exe tnbnnt.exe PID 1740 wrote to memory of 1020 1740 7lfxflr.exe tnbnnt.exe PID 1740 wrote to memory of 1020 1740 7lfxflr.exe tnbnnt.exe PID 1020 wrote to memory of 2632 1020 tnbnnt.exe htnbbn.exe PID 1020 wrote to memory of 2632 1020 tnbnnt.exe htnbbn.exe PID 1020 wrote to memory of 2632 1020 tnbnnt.exe htnbbn.exe PID 1020 wrote to memory of 2632 1020 tnbnnt.exe htnbbn.exe PID 2632 wrote to memory of 764 2632 htnbbn.exe dddpd.exe PID 2632 wrote to memory of 764 2632 htnbbn.exe dddpd.exe PID 2632 wrote to memory of 764 2632 htnbbn.exe dddpd.exe PID 2632 wrote to memory of 764 2632 htnbbn.exe dddpd.exe PID 764 wrote to memory of 2304 764 dddpd.exe 9vjdp.exe PID 764 wrote to memory of 2304 764 dddpd.exe 9vjdp.exe PID 764 wrote to memory of 2304 764 dddpd.exe 9vjdp.exe PID 764 wrote to memory of 2304 764 dddpd.exe 9vjdp.exe PID 2304 wrote to memory of 1828 2304 9vjdp.exe fxlrffl.exe PID 2304 wrote to memory of 1828 2304 9vjdp.exe fxlrffl.exe PID 2304 wrote to memory of 1828 2304 9vjdp.exe fxlrffl.exe PID 2304 wrote to memory of 1828 2304 9vjdp.exe fxlrffl.exe PID 1828 wrote to memory of 1816 1828 fxlrffl.exe 5rrfxlf.exe PID 1828 wrote to memory of 1816 1828 fxlrffl.exe 5rrfxlf.exe PID 1828 wrote to memory of 1816 1828 fxlrffl.exe 5rrfxlf.exe PID 1828 wrote to memory of 1816 1828 fxlrffl.exe 5rrfxlf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ff86d0b17f550b2a583517a1974eb240_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\dpddp.exec:\dpddp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\xrflfll.exec:\xrflfll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\tthntn.exec:\tthntn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\vjjpv.exec:\vjjpv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\dvjpv.exec:\dvjpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\rfxrxff.exec:\rfxrxff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\httbbb.exec:\httbbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\3pjpv.exec:\3pjpv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\dvppd.exec:\dvppd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\7lfxflr.exec:\7lfxflr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\tnbnnt.exec:\tnbnnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
\??\c:\htnbbn.exec:\htnbbn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\dddpd.exec:\dddpd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\9vjdp.exec:\9vjdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\fxlrffl.exec:\fxlrffl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
\??\c:\5rrfxlf.exec:\5rrfxlf.exe17⤵
- Executes dropped EXE
PID:1816 -
\??\c:\hbttbn.exec:\hbttbn.exe18⤵
- Executes dropped EXE
PID:2196 -
\??\c:\pjvdj.exec:\pjvdj.exe19⤵
- Executes dropped EXE
PID:2172 -
\??\c:\djjjj.exec:\djjjj.exe20⤵
- Executes dropped EXE
PID:1448 -
\??\c:\xrfxlrx.exec:\xrfxlrx.exe21⤵
- Executes dropped EXE
PID:2112 -
\??\c:\xllxrlx.exec:\xllxrlx.exe22⤵
- Executes dropped EXE
PID:2480 -
\??\c:\btnbnn.exec:\btnbnn.exe23⤵
- Executes dropped EXE
PID:1928 -
\??\c:\7nbbhh.exec:\7nbbhh.exe24⤵
- Executes dropped EXE
PID:676 -
\??\c:\9jdpd.exec:\9jdpd.exe25⤵
- Executes dropped EXE
PID:576 -
\??\c:\9ffxlrf.exec:\9ffxlrf.exe26⤵
- Executes dropped EXE
PID:2728 -
\??\c:\lflrlfx.exec:\lflrlfx.exe27⤵
- Executes dropped EXE
PID:988 -
\??\c:\nhhbnt.exec:\nhhbnt.exe28⤵
- Executes dropped EXE
PID:1288 -
\??\c:\7jdjp.exec:\7jdjp.exe29⤵
- Executes dropped EXE
PID:1680 -
\??\c:\5pvjp.exec:\5pvjp.exe30⤵
- Executes dropped EXE
PID:636 -
\??\c:\lxlrxrx.exec:\lxlrxrx.exe31⤵
- Executes dropped EXE
PID:2268 -
\??\c:\xlrrrrr.exec:\xlrrrrr.exe32⤵
- Executes dropped EXE
PID:1116 -
\??\c:\tnhhnb.exec:\tnhhnb.exe33⤵
- Executes dropped EXE
PID:572 -
\??\c:\9jdjp.exec:\9jdjp.exe34⤵
- Executes dropped EXE
PID:1756 -
\??\c:\jvddj.exec:\jvddj.exe35⤵
- Executes dropped EXE
PID:2020 -
\??\c:\rrfxllr.exec:\rrfxllr.exe36⤵
- Executes dropped EXE
PID:2052 -
\??\c:\lxlxfff.exec:\lxlxfff.exe37⤵
- Executes dropped EXE
PID:3060 -
\??\c:\bntbtn.exec:\bntbtn.exe38⤵
- Executes dropped EXE
PID:1520 -
\??\c:\9nbbnh.exec:\9nbbnh.exe39⤵
- Executes dropped EXE
PID:2532 -
\??\c:\jjpjp.exec:\jjpjp.exe40⤵
- Executes dropped EXE
PID:2528 -
\??\c:\5vpjd.exec:\5vpjd.exe41⤵
- Executes dropped EXE
PID:1268 -
\??\c:\5llrrxl.exec:\5llrrxl.exe42⤵
- Executes dropped EXE
PID:2640 -
\??\c:\lxrflrx.exec:\lxrflrx.exe43⤵
- Executes dropped EXE
PID:2472 -
\??\c:\thnbhh.exec:\thnbhh.exe44⤵
- Executes dropped EXE
PID:2664 -
\??\c:\nnhbnb.exec:\nnhbnb.exe45⤵
- Executes dropped EXE
PID:2612 -
\??\c:\vjpvv.exec:\vjpvv.exe46⤵
- Executes dropped EXE
PID:2320 -
\??\c:\dppvv.exec:\dppvv.exe47⤵
- Executes dropped EXE
PID:876 -
\??\c:\7xfxxlr.exec:\7xfxxlr.exe48⤵
- Executes dropped EXE
PID:360 -
\??\c:\3lxfrxf.exec:\3lxfrxf.exe49⤵
- Executes dropped EXE
PID:1716 -
\??\c:\thbttb.exec:\thbttb.exe50⤵
- Executes dropped EXE
PID:344 -
\??\c:\nntbnt.exec:\nntbnt.exe51⤵
- Executes dropped EXE
PID:1020 -
\??\c:\vpdvv.exec:\vpdvv.exe52⤵
- Executes dropped EXE
PID:2312 -
\??\c:\jdppv.exec:\jdppv.exe53⤵
- Executes dropped EXE
PID:1632 -
\??\c:\xfrxxff.exec:\xfrxxff.exe54⤵
- Executes dropped EXE
PID:1012 -
\??\c:\lffxxfr.exec:\lffxxfr.exe55⤵
- Executes dropped EXE
PID:1724 -
\??\c:\nnhtnb.exec:\nnhtnb.exe56⤵
- Executes dropped EXE
PID:1732 -
\??\c:\tthbtb.exec:\tthbtb.exe57⤵
- Executes dropped EXE
PID:1888 -
\??\c:\jdpdv.exec:\jdpdv.exe58⤵
- Executes dropped EXE
PID:1464 -
\??\c:\lfxfxfl.exec:\lfxfxfl.exe59⤵
- Executes dropped EXE
PID:3016 -
\??\c:\9xxrlrf.exec:\9xxrlrf.exe60⤵
- Executes dropped EXE
PID:1604 -
\??\c:\tbbbnn.exec:\tbbbnn.exe61⤵
- Executes dropped EXE
PID:3024 -
\??\c:\hbnthn.exec:\hbnthn.exe62⤵
- Executes dropped EXE
PID:2112 -
\??\c:\ppjjp.exec:\ppjjp.exe63⤵
- Executes dropped EXE
PID:2104 -
\??\c:\dvpvv.exec:\dvpvv.exe64⤵
- Executes dropped EXE
PID:1784 -
\??\c:\rllffrf.exec:\rllffrf.exe65⤵
- Executes dropped EXE
PID:772 -
\??\c:\fxxrrxf.exec:\fxxrrxf.exe66⤵PID:676
-
\??\c:\xxlfllx.exec:\xxlfllx.exe67⤵PID:576
-
\??\c:\bbbttn.exec:\bbbttn.exe68⤵PID:868
-
\??\c:\lfrrxlx.exec:\lfrrxlx.exe69⤵PID:1788
-
\??\c:\1tnbbh.exec:\1tnbbh.exe70⤵PID:332
-
\??\c:\nnthbt.exec:\nnthbt.exe71⤵PID:1324
-
\??\c:\3vvpp.exec:\3vvpp.exe72⤵PID:924
-
\??\c:\vjppv.exec:\vjppv.exe73⤵PID:612
-
\??\c:\lfllllr.exec:\lfllllr.exe74⤵PID:2932
-
\??\c:\3lflrrr.exec:\3lflrrr.exe75⤵PID:2156
-
\??\c:\tttbtb.exec:\tttbtb.exe76⤵PID:1208
-
\??\c:\bthhhn.exec:\bthhhn.exe77⤵PID:2892
-
\??\c:\pppjd.exec:\pppjd.exe78⤵PID:2072
-
\??\c:\pdvdp.exec:\pdvdp.exe79⤵PID:2468
-
\??\c:\ffllxfr.exec:\ffllxfr.exe80⤵PID:2016
-
\??\c:\rrxflll.exec:\rrxflll.exe81⤵PID:2860
-
\??\c:\bntbht.exec:\bntbht.exe82⤵PID:1980
-
\??\c:\bnttbb.exec:\bnttbb.exe83⤵PID:3020
-
\??\c:\5vvjj.exec:\5vvjj.exe84⤵PID:2588
-
\??\c:\pppjv.exec:\pppjv.exe85⤵PID:2672
-
\??\c:\rllflrr.exec:\rllflrr.exe86⤵PID:2544
-
\??\c:\frrffff.exec:\frrffff.exe87⤵PID:2640
-
\??\c:\1btbhh.exec:\1btbhh.exe88⤵PID:2472
-
\??\c:\nbhhnh.exec:\nbhhnh.exe89⤵PID:2664
-
\??\c:\jddjv.exec:\jddjv.exe90⤵PID:2416
-
\??\c:\xffxlll.exec:\xffxlll.exe91⤵PID:2320
-
\??\c:\rxrlrff.exec:\rxrlrff.exe92⤵PID:2336
-
\??\c:\7bthnt.exec:\7bthnt.exe93⤵PID:360
-
\??\c:\btbhbb.exec:\btbhbb.exe94⤵PID:1716
-
\??\c:\dddjv.exec:\dddjv.exe95⤵PID:2140
-
\??\c:\pjpjd.exec:\pjpjd.exe96⤵PID:1584
-
\??\c:\jjjvj.exec:\jjjvj.exe97⤵PID:2692
-
\??\c:\rlrfllx.exec:\rlrfllx.exe98⤵PID:768
-
\??\c:\rlflxxr.exec:\rlflxxr.exe99⤵PID:1828
-
\??\c:\bnbhtt.exec:\bnbhtt.exe100⤵PID:1840
-
\??\c:\hbhhnn.exec:\hbhhnn.exe101⤵PID:1652
-
\??\c:\vvpjd.exec:\vvpjd.exe102⤵PID:1820
-
\??\c:\ppjpp.exec:\ppjpp.exe103⤵PID:1544
-
\??\c:\7xxrflx.exec:\7xxrflx.exe104⤵PID:1968
-
\??\c:\lllrllf.exec:\lllrllf.exe105⤵PID:1484
-
\??\c:\nhnntb.exec:\nhnntb.exe106⤵PID:2224
-
\??\c:\htbhbb.exec:\htbhbb.exe107⤵PID:628
-
\??\c:\vpvvv.exec:\vpvvv.exe108⤵PID:780
-
\??\c:\dpdjp.exec:\dpdjp.exe109⤵PID:2152
-
\??\c:\xlrrffl.exec:\xlrrffl.exe110⤵PID:2076
-
\??\c:\lflxlfr.exec:\lflxlfr.exe111⤵PID:1708
-
\??\c:\fxxxlrx.exec:\fxxxlrx.exe112⤵PID:564
-
\??\c:\nnhntb.exec:\nnhntb.exe113⤵PID:2452
-
\??\c:\nhbntt.exec:\nhbntt.exe114⤵PID:2916
-
\??\c:\pppdp.exec:\pppdp.exe115⤵PID:1700
-
\??\c:\dvjjp.exec:\dvjjp.exe116⤵PID:1324
-
\??\c:\fxxfffl.exec:\fxxfffl.exe117⤵PID:3032
-
\??\c:\5rxfxrf.exec:\5rxfxrf.exe118⤵PID:2952
-
\??\c:\3lxrrxl.exec:\3lxrrxl.exe119⤵PID:1244
-
\??\c:\ttntnn.exec:\ttntnn.exe120⤵PID:2740
-
\??\c:\ththth.exec:\ththth.exe121⤵PID:2928
-
\??\c:\7vjvd.exec:\7vjvd.exe122⤵PID:1760
-
\??\c:\vdvjp.exec:\vdvjp.exe123⤵PID:1428
-
\??\c:\5frrffr.exec:\5frrffr.exe124⤵PID:2696
-
\??\c:\1xrrlrf.exec:\1xrrlrf.exe125⤵PID:2468
-
\??\c:\9nnbnt.exec:\9nnbnt.exe126⤵PID:2524
-
\??\c:\hbhnnt.exec:\hbhnnt.exe127⤵PID:2028
-
\??\c:\ttnhth.exec:\ttnhth.exe128⤵PID:1640
-
\??\c:\vpjjj.exec:\vpjjj.exe129⤵PID:3020
-
\??\c:\dvpvj.exec:\dvpvj.exe130⤵PID:2844
-
\??\c:\xrrrrrx.exec:\xrrrrrx.exe131⤵PID:2500
-
\??\c:\fxrxflr.exec:\fxrxflr.exe132⤵PID:2520
-
\??\c:\tbtnhb.exec:\tbtnhb.exe133⤵PID:2096
-
\??\c:\ttntbh.exec:\ttntbh.exe134⤵PID:2440
-
\??\c:\pdvdd.exec:\pdvdd.exe135⤵PID:2980
-
\??\c:\3dvpv.exec:\3dvpv.exe136⤵PID:2496
-
\??\c:\rfrxrlr.exec:\rfrxrlr.exe137⤵PID:2436
-
\??\c:\xrxxffl.exec:\xrxxffl.exe138⤵PID:804
-
\??\c:\tnnnnn.exec:\tnnnnn.exe139⤵PID:2356
-
\??\c:\nhhhnh.exec:\nhhhnh.exe140⤵PID:2680
-
\??\c:\htbnnb.exec:\htbnnb.exe141⤵PID:2632
-
\??\c:\jvjjd.exec:\jvjjd.exe142⤵PID:1576
-
\??\c:\dvpvj.exec:\dvpvj.exe143⤵PID:240
-
\??\c:\fflfrxl.exec:\fflfrxl.exe144⤵PID:1632
-
\??\c:\1xxflxl.exec:\1xxflxl.exe145⤵PID:1212
-
\??\c:\5hnbnn.exec:\5hnbnn.exe146⤵PID:1816
-
\??\c:\bbbnbn.exec:\bbbnbn.exe147⤵PID:2300
-
\??\c:\7jddj.exec:\7jddj.exe148⤵PID:2196
-
\??\c:\djjpp.exec:\djjpp.exe149⤵PID:2228
-
\??\c:\pjdvv.exec:\pjdvv.exe150⤵PID:1552
-
\??\c:\xrxlrxf.exec:\xrxlrxf.exe151⤵PID:1604
-
\??\c:\rlfrlxr.exec:\rlfrlxr.exe152⤵PID:2368
-
\??\c:\bbbnnt.exec:\bbbnnt.exe153⤵PID:2364
-
\??\c:\nbnnhb.exec:\nbnnhb.exe154⤵PID:2248
-
\??\c:\7vvjj.exec:\7vvjj.exe155⤵PID:1408
-
\??\c:\9jddd.exec:\9jddd.exe156⤵PID:1404
-
\??\c:\vpddd.exec:\vpddd.exe157⤵PID:2076
-
\??\c:\rrlxfrf.exec:\rrlxfrf.exe158⤵PID:1872
-
\??\c:\rlxrxxl.exec:\rlxrxxl.exe159⤵PID:868
-
\??\c:\bbntbb.exec:\bbntbb.exe160⤵PID:1752
-
\??\c:\tbbbnh.exec:\tbbbnh.exe161⤵PID:332
-
\??\c:\9pjjp.exec:\9pjjp.exe162⤵PID:1668
-
\??\c:\lllrflr.exec:\lllrflr.exe163⤵PID:636
-
\??\c:\frxrxxx.exec:\frxrxxx.exe164⤵PID:3064
-
\??\c:\rrxlllr.exec:\rrxlllr.exe165⤵PID:984
-
\??\c:\1bthnh.exec:\1bthnh.exe166⤵PID:2000
-
\??\c:\bbtnnt.exec:\bbtnnt.exe167⤵PID:2740
-
\??\c:\jpvpp.exec:\jpvpp.exe168⤵PID:2884
-
\??\c:\jdppp.exec:\jdppp.exe169⤵PID:2032
-
\??\c:\xlflxfr.exec:\xlflxfr.exe170⤵PID:3040
-
\??\c:\3rffxlr.exec:\3rffxlr.exe171⤵PID:2696
-
\??\c:\nnnhth.exec:\nnnhth.exe172⤵PID:1528
-
\??\c:\nnhhhh.exec:\nnhhhh.exe173⤵PID:2644
-
\??\c:\jdppd.exec:\jdppd.exe174⤵PID:2532
-
\??\c:\pjvjd.exec:\pjvjd.exe175⤵PID:2636
-
\??\c:\9rffflr.exec:\9rffflr.exe176⤵PID:2628
-
\??\c:\rlrxfll.exec:\rlrxfll.exe177⤵PID:1352
-
\??\c:\lfrxlfl.exec:\lfrxlfl.exe178⤵PID:2164
-
\??\c:\nnbtnn.exec:\nnbtnn.exe179⤵PID:2432
-
\??\c:\jdpjj.exec:\jdpjj.exe180⤵PID:2612
-
\??\c:\ppdpd.exec:\ppdpd.exe181⤵PID:2448
-
\??\c:\rfrxfxx.exec:\rfrxfxx.exe182⤵PID:2232
-
\??\c:\3llfrxl.exec:\3llfrxl.exe183⤵PID:2792
-
\??\c:\5frfffl.exec:\5frfffl.exe184⤵PID:1504
-
\??\c:\hhtnth.exec:\hhtnth.exe185⤵PID:360
-
\??\c:\bnbhnn.exec:\bnbhnn.exe186⤵PID:1016
-
\??\c:\jpjpp.exec:\jpjpp.exe187⤵PID:2140
-
\??\c:\pdjpj.exec:\pdjpj.exe188⤵PID:764
-
\??\c:\fxxfrrf.exec:\fxxfrrf.exe189⤵PID:2692
-
\??\c:\rfxlflx.exec:\rfxlflx.exe190⤵PID:2292
-
\??\c:\hhbbhn.exec:\hhbbhn.exe191⤵PID:1648
-
\??\c:\htbhbn.exec:\htbhbn.exe192⤵PID:1800
-
\??\c:\9djpv.exec:\9djpv.exe193⤵PID:2316
-
\??\c:\pjpvv.exec:\pjpvv.exe194⤵PID:1580
-
\??\c:\rlrrfxr.exec:\rlrrfxr.exe195⤵PID:1952
-
\??\c:\lfxlxfr.exec:\lfxlxfr.exe196⤵PID:904
-
\??\c:\hbbthn.exec:\hbbthn.exe197⤵PID:3024
-
\??\c:\thbbhh.exec:\thbbhh.exe198⤵PID:2112
-
\??\c:\1ppdp.exec:\1ppdp.exe199⤵PID:2124
-
\??\c:\pdjdd.exec:\pdjdd.exe200⤵PID:1040
-
\??\c:\xrfllrf.exec:\xrfllrf.exe201⤵PID:1928
-
\??\c:\rlfxfxx.exec:\rlfxfxx.exe202⤵PID:1276
-
\??\c:\nhtntb.exec:\nhtntb.exe203⤵PID:2076
-
\??\c:\bnttbt.exec:\bnttbt.exe204⤵PID:1540
-
\??\c:\pjddp.exec:\pjddp.exe205⤵PID:2896
-
\??\c:\1dppd.exec:\1dppd.exe206⤵PID:1884
-
\??\c:\xrrlxlf.exec:\xrrlxlf.exe207⤵PID:2360
-
\??\c:\rfffxxl.exec:\rfffxxl.exe208⤵PID:1324
-
\??\c:\tnbhhh.exec:\tnbhhh.exe209⤵PID:664
-
\??\c:\bnttbt.exec:\bnttbt.exe210⤵PID:2044
-
\??\c:\ppjvp.exec:\ppjvp.exe211⤵PID:984
-
\??\c:\jdjpv.exec:\jdjpv.exe212⤵PID:3012
-
\??\c:\lfxlxrf.exec:\lfxlxrf.exe213⤵PID:2216
-
\??\c:\fllxrlf.exec:\fllxrlf.exe214⤵PID:2856
-
\??\c:\tnnnbb.exec:\tnnnbb.exe215⤵PID:1760
-
\??\c:\vjdjv.exec:\vjdjv.exe216⤵PID:2576
-
\??\c:\dvdvp.exec:\dvdvp.exe217⤵PID:2608
-
\??\c:\3lrxrxl.exec:\3lrxrxl.exe218⤵PID:1532
-
\??\c:\flfrlfx.exec:\flfrlfx.exe219⤵PID:1520
-
\??\c:\hhnhth.exec:\hhnhth.exe220⤵PID:2652
-
\??\c:\bhhnht.exec:\bhhnht.exe221⤵PID:2636
-
\??\c:\jjddv.exec:\jjddv.exe222⤵PID:2500
-
\??\c:\7jppp.exec:\7jppp.exe223⤵PID:2420
-
\??\c:\rflrfff.exec:\rflrfff.exe224⤵PID:2164
-
\??\c:\1flfffl.exec:\1flfffl.exe225⤵PID:2428
-
\??\c:\ttnbnh.exec:\ttnbnh.exe226⤵PID:2612
-
\??\c:\bthtbh.exec:\bthtbh.exe227⤵PID:2552
-
\??\c:\9pdjp.exec:\9pdjp.exe228⤵PID:2812
-
\??\c:\jvdjv.exec:\jvdjv.exe229⤵PID:2792
-
\??\c:\vdvjv.exec:\vdvjv.exe230⤵PID:1740
-
\??\c:\lxrlllx.exec:\lxrlllx.exe231⤵PID:360
-
\??\c:\xxrlxlr.exec:\xxrlxlr.exe232⤵PID:2308
-
\??\c:\hhthbt.exec:\hhthbt.exe233⤵PID:1220
-
\??\c:\hbbntb.exec:\hbbntb.exe234⤵PID:1624
-
\??\c:\jjjjv.exec:\jjjjv.exe235⤵PID:2692
-
\??\c:\dpvdj.exec:\dpvdj.exe236⤵PID:768
-
\??\c:\9ppjp.exec:\9ppjp.exe237⤵PID:1732
-
\??\c:\rrrlrlr.exec:\rrrlrlr.exe238⤵PID:1316
-
\??\c:\fxrrxlf.exec:\fxrrxlf.exe239⤵PID:1652
-
\??\c:\nnnntb.exec:\nnnntb.exe240⤵PID:1176
-
\??\c:\httbht.exec:\httbht.exe241⤵PID:2236
-
\??\c:\jjjvv.exec:\jjjvv.exe242⤵PID:2904