Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exe
-
Size
229KB
-
MD5
ac1e8317bfc175d0347bb3369617cb70
-
SHA1
83cf093de6c8827a72cf984503fded2f245ad2ab
-
SHA256
b317f5fa949015542e62c0b280bd1c0a8e9b51493c9976fefcbaeaee20dcafe6
-
SHA512
2bd86e54e8dd4363b6e755b7e6c2834323ac3bce9fb72c91433e0694a4723d0d75a77cf7b56a22436f2b6495ab38a3a001cf3d0c635f78b8361052226f15f164
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31z8mF7Cb:n3C9BRo7MlrWKo+lfFeb
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/4380-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4236-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1168-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1560-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4984-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3888-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2132-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/396-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/688-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3056-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4044-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1544-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2592-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3356-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2644-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4724-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5024-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3944-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2732-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3496-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1740-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5008-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/680-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jdpjp.exetnhhbt.exelffffff.exepjvvv.exedddvv.exexrrlfff.exetbhtnb.exethnbbb.exevjjdv.exe7xflfrl.exenbhbth.exerxxxrlr.exehntbbb.exefxffllr.exetbbtnt.exe9vdvv.exelxxrlfx.exethnnhn.exerrrlffx.exethbntb.exentbbth.exedjdpp.exelrffxlx.exeflfrflx.exe3ffxrll.exe5nbtnn.exerxrxlxl.exebttnnt.exebthtnn.exerrfrlxx.exenthbbt.exe5flfrrl.exehhbtnn.exejdvpj.exexxffllr.exerffxllf.exenbhbbt.exevvvjv.exefxrllff.exehntnnn.exedjppj.exedjvpj.exebnnnnn.exehbnnhh.exevppjd.exexxffrrl.exe3xrfxxr.exebntnnh.exedvvvp.exelfrrxxl.exetnnhhh.exejpddv.exetthbtt.exeddjpd.exerllrlrr.exe3bhhbh.exevdvvp.exedddvp.exexxlfxxr.exebnbbtb.exevvdvp.exexrxxrrl.exe9lrllrl.exehtttbb.exepid process 4236 jdpjp.exe 1168 tnhhbt.exe 1560 lffffff.exe 4984 pjvvv.exe 3344 dddvv.exe 3888 xrrlfff.exe 2132 tbhtnb.exe 2088 thnbbb.exe 1800 vjjdv.exe 396 7xflfrl.exe 688 nbhbth.exe 3056 rxxxrlr.exe 4044 hntbbb.exe 1544 fxffllr.exe 2592 tbbtnt.exe 3356 9vdvv.exe 3676 lxxrlfx.exe 2644 thnnhn.exe 1988 rrrlffx.exe 4724 thbntb.exe 5024 ntbbth.exe 4488 djdpp.exe 3944 lrffxlx.exe 2732 flfrflx.exe 1220 3ffxrll.exe 3496 5nbtnn.exe 1740 rxrxlxl.exe 5008 bttnnt.exe 4160 bthtnn.exe 680 rrfrlxx.exe 1648 nthbbt.exe 3300 5flfrrl.exe 1688 hhbtnn.exe 4424 jdvpj.exe 1040 xxffllr.exe 3632 rffxllf.exe 2496 nbhbbt.exe 3392 vvvjv.exe 4708 fxrllff.exe 3212 hntnnn.exe 3736 djppj.exe 756 djvpj.exe 2412 bnnnnn.exe 4680 hbnnhh.exe 452 vppjd.exe 4972 xxffrrl.exe 1336 3xrfxxr.exe 2088 bntnnh.exe 2780 dvvvp.exe 856 lfrrxxl.exe 4684 tnnhhh.exe 2708 jpddv.exe 3056 tthbtt.exe 2640 ddjpd.exe 3560 rllrlrr.exe 2480 3bhhbh.exe 4952 vdvvp.exe 1144 dddvp.exe 5116 xxlfxxr.exe 2192 bnbbtb.exe 2644 vvdvp.exe 644 xrxxrrl.exe 4588 9lrllrl.exe 2392 htttbb.exe -
Processes:
resource yara_rule behavioral2/memory/4380-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4236-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1168-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1168-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1168-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1560-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3888-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2132-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2132-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/396-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/688-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3056-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4044-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1544-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2592-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3356-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2644-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4724-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5024-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3944-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3496-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5008-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/680-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exejdpjp.exetnhhbt.exelffffff.exepjvvv.exedddvv.exexrrlfff.exetbhtnb.exethnbbb.exevjjdv.exe7xflfrl.exenbhbth.exerxxxrlr.exehntbbb.exefxffllr.exetbbtnt.exe9vdvv.exelxxrlfx.exethnnhn.exerrrlffx.exethbntb.exentbbth.exedescription pid process target process PID 4380 wrote to memory of 4236 4380 ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exe jdpjp.exe PID 4380 wrote to memory of 4236 4380 ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exe jdpjp.exe PID 4380 wrote to memory of 4236 4380 ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exe jdpjp.exe PID 4236 wrote to memory of 1168 4236 jdpjp.exe tnhhbt.exe PID 4236 wrote to memory of 1168 4236 jdpjp.exe tnhhbt.exe PID 4236 wrote to memory of 1168 4236 jdpjp.exe tnhhbt.exe PID 1168 wrote to memory of 1560 1168 tnhhbt.exe lffffff.exe PID 1168 wrote to memory of 1560 1168 tnhhbt.exe lffffff.exe PID 1168 wrote to memory of 1560 1168 tnhhbt.exe lffffff.exe PID 1560 wrote to memory of 4984 1560 lffffff.exe pjvvv.exe PID 1560 wrote to memory of 4984 1560 lffffff.exe pjvvv.exe PID 1560 wrote to memory of 4984 1560 lffffff.exe pjvvv.exe PID 4984 wrote to memory of 3344 4984 pjvvv.exe dddvv.exe PID 4984 wrote to memory of 3344 4984 pjvvv.exe dddvv.exe PID 4984 wrote to memory of 3344 4984 pjvvv.exe dddvv.exe PID 3344 wrote to memory of 3888 3344 dddvv.exe xrrlfff.exe PID 3344 wrote to memory of 3888 3344 dddvv.exe xrrlfff.exe PID 3344 wrote to memory of 3888 3344 dddvv.exe xrrlfff.exe PID 3888 wrote to memory of 2132 3888 xrrlfff.exe tbhtnb.exe PID 3888 wrote to memory of 2132 3888 xrrlfff.exe tbhtnb.exe PID 3888 wrote to memory of 2132 3888 xrrlfff.exe tbhtnb.exe PID 2132 wrote to memory of 2088 2132 tbhtnb.exe thnbbb.exe PID 2132 wrote to memory of 2088 2132 tbhtnb.exe thnbbb.exe PID 2132 wrote to memory of 2088 2132 tbhtnb.exe thnbbb.exe PID 2088 wrote to memory of 1800 2088 thnbbb.exe vjjdv.exe PID 2088 wrote to memory of 1800 2088 thnbbb.exe vjjdv.exe PID 2088 wrote to memory of 1800 2088 thnbbb.exe vjjdv.exe PID 1800 wrote to memory of 396 1800 vjjdv.exe 7xflfrl.exe PID 1800 wrote to memory of 396 1800 vjjdv.exe 7xflfrl.exe PID 1800 wrote to memory of 396 1800 vjjdv.exe 7xflfrl.exe PID 396 wrote to memory of 688 396 7xflfrl.exe nbhbth.exe PID 396 wrote to memory of 688 396 7xflfrl.exe nbhbth.exe PID 396 wrote to memory of 688 396 7xflfrl.exe nbhbth.exe PID 688 wrote to memory of 3056 688 nbhbth.exe rxxxrlr.exe PID 688 wrote to memory of 3056 688 nbhbth.exe rxxxrlr.exe PID 688 wrote to memory of 3056 688 nbhbth.exe rxxxrlr.exe PID 3056 wrote to memory of 4044 3056 rxxxrlr.exe hntbbb.exe PID 3056 wrote to memory of 4044 3056 rxxxrlr.exe hntbbb.exe PID 3056 wrote to memory of 4044 3056 rxxxrlr.exe hntbbb.exe PID 4044 wrote to memory of 1544 4044 hntbbb.exe fxffllr.exe PID 4044 wrote to memory of 1544 4044 hntbbb.exe fxffllr.exe PID 4044 wrote to memory of 1544 4044 hntbbb.exe fxffllr.exe PID 1544 wrote to memory of 2592 1544 fxffllr.exe tbbtnt.exe PID 1544 wrote to memory of 2592 1544 fxffllr.exe tbbtnt.exe PID 1544 wrote to memory of 2592 1544 fxffllr.exe tbbtnt.exe PID 2592 wrote to memory of 3356 2592 tbbtnt.exe 9vdvv.exe PID 2592 wrote to memory of 3356 2592 tbbtnt.exe 9vdvv.exe PID 2592 wrote to memory of 3356 2592 tbbtnt.exe 9vdvv.exe PID 3356 wrote to memory of 3676 3356 9vdvv.exe lxxrlfx.exe PID 3356 wrote to memory of 3676 3356 9vdvv.exe lxxrlfx.exe PID 3356 wrote to memory of 3676 3356 9vdvv.exe lxxrlfx.exe PID 3676 wrote to memory of 2644 3676 lxxrlfx.exe thnnhn.exe PID 3676 wrote to memory of 2644 3676 lxxrlfx.exe thnnhn.exe PID 3676 wrote to memory of 2644 3676 lxxrlfx.exe thnnhn.exe PID 2644 wrote to memory of 1988 2644 thnnhn.exe rrrlffx.exe PID 2644 wrote to memory of 1988 2644 thnnhn.exe rrrlffx.exe PID 2644 wrote to memory of 1988 2644 thnnhn.exe rrrlffx.exe PID 1988 wrote to memory of 4724 1988 rrrlffx.exe thbntb.exe PID 1988 wrote to memory of 4724 1988 rrrlffx.exe thbntb.exe PID 1988 wrote to memory of 4724 1988 rrrlffx.exe thbntb.exe PID 4724 wrote to memory of 5024 4724 thbntb.exe ntbbth.exe PID 4724 wrote to memory of 5024 4724 thbntb.exe ntbbth.exe PID 4724 wrote to memory of 5024 4724 thbntb.exe ntbbth.exe PID 5024 wrote to memory of 4488 5024 ntbbth.exe djdpp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ac1e8317bfc175d0347bb3369617cb70_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
\??\c:\jdpjp.exec:\jdpjp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\tnhhbt.exec:\tnhhbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\lffffff.exec:\lffffff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\pjvvv.exec:\pjvvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\dddvv.exec:\dddvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\xrrlfff.exec:\xrrlfff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
\??\c:\tbhtnb.exec:\tbhtnb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
\??\c:\thnbbb.exec:\thnbbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\vjjdv.exec:\vjjdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\7xflfrl.exec:\7xflfrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\nbhbth.exec:\nbhbth.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\rxxxrlr.exec:\rxxxrlr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\hntbbb.exec:\hntbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\fxffllr.exec:\fxffllr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\tbbtnt.exec:\tbbtnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\9vdvv.exec:\9vdvv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\thnnhn.exec:\thnnhn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\rrrlffx.exec:\rrrlffx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\thbntb.exec:\thbntb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
\??\c:\ntbbth.exec:\ntbbth.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\djdpp.exec:\djdpp.exe23⤵
- Executes dropped EXE
PID:4488 -
\??\c:\lrffxlx.exec:\lrffxlx.exe24⤵
- Executes dropped EXE
PID:3944 -
\??\c:\flfrflx.exec:\flfrflx.exe25⤵
- Executes dropped EXE
PID:2732 -
\??\c:\3ffxrll.exec:\3ffxrll.exe26⤵
- Executes dropped EXE
PID:1220 -
\??\c:\5nbtnn.exec:\5nbtnn.exe27⤵
- Executes dropped EXE
PID:3496 -
\??\c:\rxrxlxl.exec:\rxrxlxl.exe28⤵
- Executes dropped EXE
PID:1740 -
\??\c:\bttnnt.exec:\bttnnt.exe29⤵
- Executes dropped EXE
PID:5008 -
\??\c:\bthtnn.exec:\bthtnn.exe30⤵
- Executes dropped EXE
PID:4160 -
\??\c:\rrfrlxx.exec:\rrfrlxx.exe31⤵
- Executes dropped EXE
PID:680 -
\??\c:\nthbbt.exec:\nthbbt.exe32⤵
- Executes dropped EXE
PID:1648 -
\??\c:\5flfrrl.exec:\5flfrrl.exe33⤵
- Executes dropped EXE
PID:3300 -
\??\c:\hhbtnn.exec:\hhbtnn.exe34⤵
- Executes dropped EXE
PID:1688 -
\??\c:\jdvpj.exec:\jdvpj.exe35⤵
- Executes dropped EXE
PID:4424 -
\??\c:\xxffllr.exec:\xxffllr.exe36⤵
- Executes dropped EXE
PID:1040 -
\??\c:\rffxllf.exec:\rffxllf.exe37⤵
- Executes dropped EXE
PID:3632 -
\??\c:\nbhbbt.exec:\nbhbbt.exe38⤵
- Executes dropped EXE
PID:2496 -
\??\c:\vvvjv.exec:\vvvjv.exe39⤵
- Executes dropped EXE
PID:3392 -
\??\c:\fxrllff.exec:\fxrllff.exe40⤵
- Executes dropped EXE
PID:4708 -
\??\c:\hntnnn.exec:\hntnnn.exe41⤵
- Executes dropped EXE
PID:3212 -
\??\c:\djppj.exec:\djppj.exe42⤵
- Executes dropped EXE
PID:3736 -
\??\c:\djvpj.exec:\djvpj.exe43⤵
- Executes dropped EXE
PID:756 -
\??\c:\bnnnnn.exec:\bnnnnn.exe44⤵
- Executes dropped EXE
PID:2412 -
\??\c:\hbnnhh.exec:\hbnnhh.exe45⤵
- Executes dropped EXE
PID:4680 -
\??\c:\vppjd.exec:\vppjd.exe46⤵
- Executes dropped EXE
PID:452 -
\??\c:\xxffrrl.exec:\xxffrrl.exe47⤵
- Executes dropped EXE
PID:4972 -
\??\c:\3xrfxxr.exec:\3xrfxxr.exe48⤵
- Executes dropped EXE
PID:1336 -
\??\c:\bntnnh.exec:\bntnnh.exe49⤵
- Executes dropped EXE
PID:2088 -
\??\c:\dvvvp.exec:\dvvvp.exe50⤵
- Executes dropped EXE
PID:2780 -
\??\c:\lfrrxxl.exec:\lfrrxxl.exe51⤵
- Executes dropped EXE
PID:856 -
\??\c:\tnnhhh.exec:\tnnhhh.exe52⤵
- Executes dropped EXE
PID:4684 -
\??\c:\jpddv.exec:\jpddv.exe53⤵
- Executes dropped EXE
PID:2708 -
\??\c:\tthbtt.exec:\tthbtt.exe54⤵
- Executes dropped EXE
PID:3056 -
\??\c:\ddjpd.exec:\ddjpd.exe55⤵
- Executes dropped EXE
PID:2640 -
\??\c:\rllrlrr.exec:\rllrlrr.exe56⤵
- Executes dropped EXE
PID:3560 -
\??\c:\3bhhbh.exec:\3bhhbh.exe57⤵
- Executes dropped EXE
PID:2480 -
\??\c:\vdvvp.exec:\vdvvp.exe58⤵
- Executes dropped EXE
PID:4952 -
\??\c:\dddvp.exec:\dddvp.exe59⤵
- Executes dropped EXE
PID:1144 -
\??\c:\xxlfxxr.exec:\xxlfxxr.exe60⤵
- Executes dropped EXE
PID:5116 -
\??\c:\bnbbtb.exec:\bnbbtb.exe61⤵
- Executes dropped EXE
PID:2192 -
\??\c:\vvdvp.exec:\vvdvp.exe62⤵
- Executes dropped EXE
PID:2644 -
\??\c:\xrxxrrl.exec:\xrxxrrl.exe63⤵
- Executes dropped EXE
PID:644 -
\??\c:\9lrllrl.exec:\9lrllrl.exe64⤵
- Executes dropped EXE
PID:4588 -
\??\c:\htttbb.exec:\htttbb.exe65⤵
- Executes dropped EXE
PID:2392 -
\??\c:\pvpjp.exec:\pvpjp.exe66⤵PID:4872
-
\??\c:\rrxrfxr.exec:\rrxrfxr.exe67⤵PID:3772
-
\??\c:\httthb.exec:\httthb.exe68⤵PID:2208
-
\??\c:\thntnh.exec:\thntnh.exe69⤵PID:2732
-
\??\c:\jddvv.exec:\jddvv.exe70⤵PID:5072
-
\??\c:\7ffffff.exec:\7ffffff.exe71⤵PID:3496
-
\??\c:\btthbn.exec:\btthbn.exe72⤵PID:3312
-
\??\c:\3vvpj.exec:\3vvpj.exe73⤵PID:5108
-
\??\c:\xrxxxxf.exec:\xrxxxxf.exe74⤵PID:4468
-
\??\c:\xrxrlff.exec:\xrxrlff.exe75⤵PID:3172
-
\??\c:\thhtnb.exec:\thhtnb.exe76⤵PID:3528
-
\??\c:\vvvpp.exec:\vvvpp.exe77⤵PID:680
-
\??\c:\frfffxx.exec:\frfffxx.exe78⤵PID:4948
-
\??\c:\9flfxxr.exec:\9flfxxr.exe79⤵PID:2552
-
\??\c:\nbhbhb.exec:\nbhbhb.exe80⤵PID:4024
-
\??\c:\xxllxxf.exec:\xxllxxf.exe81⤵PID:4440
-
\??\c:\vvvvd.exec:\vvvvd.exe82⤵PID:3880
-
\??\c:\lxfxrrf.exec:\lxfxrrf.exe83⤵PID:3492
-
\??\c:\nhhhhh.exec:\nhhhhh.exe84⤵PID:4876
-
\??\c:\jpdpv.exec:\jpdpv.exe85⤵PID:4348
-
\??\c:\pjppp.exec:\pjppp.exe86⤵PID:1168
-
\??\c:\3lfrrxx.exec:\3lfrrxx.exe87⤵PID:440
-
\??\c:\ttbhnb.exec:\ttbhnb.exe88⤵PID:2280
-
\??\c:\5jjdj.exec:\5jjdj.exe89⤵PID:3344
-
\??\c:\lxxrllf.exec:\lxxrllf.exe90⤵PID:4912
-
\??\c:\flrxrrl.exec:\flrxrrl.exe91⤵PID:2140
-
\??\c:\bnhbbt.exec:\bnhbbt.exe92⤵PID:1948
-
\??\c:\tbbttb.exec:\tbbttb.exe93⤵PID:4268
-
\??\c:\pjppp.exec:\pjppp.exe94⤵PID:4692
-
\??\c:\flflxlf.exec:\flflxlf.exe95⤵PID:1984
-
\??\c:\flxlrfl.exec:\flxlrfl.exe96⤵PID:856
-
\??\c:\tthtbn.exec:\tthtbn.exe97⤵PID:2272
-
\??\c:\jjjvp.exec:\jjjvp.exe98⤵PID:1796
-
\??\c:\vjdjd.exec:\vjdjd.exe99⤵PID:3892
-
\??\c:\xrlfxxx.exec:\xrlfxxx.exe100⤵PID:4596
-
\??\c:\3tbhhb.exec:\3tbhhb.exe101⤵PID:3696
-
\??\c:\nhhhbb.exec:\nhhhbb.exe102⤵PID:5116
-
\??\c:\pppvv.exec:\pppvv.exe103⤵PID:4752
-
\??\c:\3xfxrrl.exec:\3xfxrrl.exe104⤵PID:1988
-
\??\c:\7flllrl.exec:\7flllrl.exe105⤵PID:1728
-
\??\c:\btthhn.exec:\btthhn.exe106⤵PID:2664
-
\??\c:\tnbhht.exec:\tnbhht.exe107⤵PID:3944
-
\??\c:\vpvjv.exec:\vpvjv.exe108⤵PID:2208
-
\??\c:\xxrxrxr.exec:\xxrxrxr.exe109⤵PID:1220
-
\??\c:\hhttbb.exec:\hhttbb.exe110⤵PID:2824
-
\??\c:\hbnhhn.exec:\hbnhhn.exe111⤵PID:3004
-
\??\c:\jvjdd.exec:\jvjdd.exe112⤵PID:4312
-
\??\c:\xxffffl.exec:\xxffffl.exe113⤵PID:2128
-
\??\c:\tttnht.exec:\tttnht.exe114⤵PID:2688
-
\??\c:\hhbtnn.exec:\hhbtnn.exe115⤵PID:340
-
\??\c:\ddvvp.exec:\ddvvp.exe116⤵PID:116
-
\??\c:\xxfrxfr.exec:\xxfrxfr.exe117⤵PID:1648
-
\??\c:\htbtnn.exec:\htbtnn.exe118⤵PID:4284
-
\??\c:\ppjdd.exec:\ppjdd.exe119⤵PID:4960
-
\??\c:\fxxxrxx.exec:\fxxxrxx.exe120⤵PID:3484
-
\??\c:\btnhbb.exec:\btnhbb.exe121⤵PID:2932
-
\??\c:\djjdv.exec:\djjdv.exe122⤵PID:4100
-
\??\c:\djpjd.exec:\djpjd.exe123⤵PID:2496
-
\??\c:\flfxlrr.exec:\flfxlrr.exe124⤵PID:3556
-
\??\c:\thnhhh.exec:\thnhhh.exe125⤵PID:428
-
\??\c:\hntnhb.exec:\hntnhb.exe126⤵PID:1012
-
\??\c:\vpdjj.exec:\vpdjj.exe127⤵PID:824
-
\??\c:\9rlfffx.exec:\9rlfffx.exe128⤵PID:2360
-
\??\c:\fffxxxx.exec:\fffxxxx.exe129⤵PID:3648
-
\??\c:\7nhtbb.exec:\7nhtbb.exe130⤵PID:1192
-
\??\c:\dppjd.exec:\dppjd.exe131⤵PID:2096
-
\??\c:\dpvpp.exec:\dpvpp.exe132⤵PID:868
-
\??\c:\bbhhbb.exec:\bbhhbb.exe133⤵PID:2780
-
\??\c:\tntntn.exec:\tntntn.exe134⤵PID:4736
-
\??\c:\vvjjv.exec:\vvjjv.exe135⤵PID:1828
-
\??\c:\lflrlrx.exec:\lflrlrx.exe136⤵PID:2708
-
\??\c:\htnnhh.exec:\htnnhh.exe137⤵PID:3056
-
\??\c:\pdpjd.exec:\pdpjd.exe138⤵PID:1440
-
\??\c:\jpvvv.exec:\jpvvv.exe139⤵PID:5040
-
\??\c:\9xlfxxx.exec:\9xlfxxx.exe140⤵PID:1424
-
\??\c:\bbnthb.exec:\bbnthb.exe141⤵PID:2192
-
\??\c:\9nbbbn.exec:\9nbbbn.exe142⤵PID:4752
-
\??\c:\pjpvv.exec:\pjpvv.exe143⤵PID:4472
-
\??\c:\vdpjd.exec:\vdpjd.exe144⤵PID:4732
-
\??\c:\xxrrlrr.exec:\xxrrlrr.exe145⤵PID:4872
-
\??\c:\1rxxrxx.exec:\1rxxrxx.exe146⤵PID:1936
-
\??\c:\bntbhb.exec:\bntbhb.exe147⤵PID:2208
-
\??\c:\7vjdv.exec:\7vjdv.exe148⤵PID:3496
-
\??\c:\pjpjd.exec:\pjpjd.exe149⤵PID:2788
-
\??\c:\lxlfrrl.exec:\lxlfrrl.exe150⤵PID:3992
-
\??\c:\flrlfxx.exec:\flrlfxx.exe151⤵PID:4312
-
\??\c:\bnnhbb.exec:\bnnhbb.exe152⤵PID:3172
-
\??\c:\pjpjd.exec:\pjpjd.exe153⤵PID:212
-
\??\c:\vddvv.exec:\vddvv.exe154⤵PID:3828
-
\??\c:\lfrlxxx.exec:\lfrlxxx.exe155⤵PID:4948
-
\??\c:\tnnhbt.exec:\tnnhbt.exe156⤵PID:1688
-
\??\c:\bbtnnn.exec:\bbtnnn.exe157⤵PID:1040
-
\??\c:\vvvjj.exec:\vvvjj.exe158⤵PID:2240
-
\??\c:\3jpjj.exec:\3jpjj.exe159⤵PID:1464
-
\??\c:\xxrrrrl.exec:\xxrrrrl.exe160⤵PID:4112
-
\??\c:\hbhbnb.exec:\hbhbnb.exe161⤵PID:2772
-
\??\c:\dvvpp.exec:\dvvpp.exe162⤵PID:2288
-
\??\c:\pdjvp.exec:\pdjvp.exe163⤵PID:1568
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe164⤵PID:3788
-
\??\c:\djvpp.exec:\djvpp.exe165⤵PID:2836
-
\??\c:\7jpjd.exec:\7jpjd.exe166⤵PID:2132
-
\??\c:\xrfxxxx.exec:\xrfxxxx.exe167⤵PID:512
-
\??\c:\bttbtt.exec:\bttbtt.exe168⤵PID:3924
-
\??\c:\nhtnhh.exec:\nhtnhh.exe169⤵PID:2728
-
\??\c:\pvdvv.exec:\pvdvv.exe170⤵PID:4228
-
\??\c:\jdjdv.exec:\jdjdv.exe171⤵PID:620
-
\??\c:\fxfxxxx.exec:\fxfxxxx.exe172⤵PID:532
-
\??\c:\bttnnt.exec:\bttnnt.exe173⤵PID:4936
-
\??\c:\9bbhht.exec:\9bbhht.exe174⤵PID:5016
-
\??\c:\dvdvv.exec:\dvdvv.exe175⤵PID:4176
-
\??\c:\jdvvv.exec:\jdvvv.exe176⤵PID:3500
-
\??\c:\3lrlrrx.exec:\3lrlrrx.exe177⤵PID:2372
-
\??\c:\xflfxrl.exec:\xflfxrl.exe178⤵PID:1988
-
\??\c:\ntnbtn.exec:\ntnbtn.exe179⤵PID:4628
-
\??\c:\jjppj.exec:\jjppj.exe180⤵PID:464
-
\??\c:\vdjdv.exec:\vdjdv.exe181⤵PID:1700
-
\??\c:\xffffff.exec:\xffffff.exe182⤵PID:5072
-
\??\c:\bhnhbb.exec:\bhnhbb.exe183⤵PID:4172
-
\??\c:\nbbttn.exec:\nbbttn.exe184⤵PID:3312
-
\??\c:\jdjvv.exec:\jdjvv.exe185⤵PID:1432
-
\??\c:\dpvvd.exec:\dpvvd.exe186⤵PID:3472
-
\??\c:\fxfxrlf.exec:\fxfxrlf.exe187⤵PID:5024
-
\??\c:\btbtnn.exec:\btbtnn.exe188⤵PID:4712
-
\??\c:\tnhhbb.exec:\tnhhbb.exe189⤵PID:4312
-
\??\c:\1vpjd.exec:\1vpjd.exe190⤵PID:3172
-
\??\c:\jdjjj.exec:\jdjjj.exe191⤵PID:212
-
\??\c:\fxrrfrr.exec:\fxrrfrr.exe192⤵PID:3828
-
\??\c:\hbbhbh.exec:\hbbhbh.exe193⤵PID:4948
-
\??\c:\btnthh.exec:\btnthh.exe194⤵PID:876
-
\??\c:\dppjj.exec:\dppjj.exe195⤵PID:4768
-
\??\c:\jjddd.exec:\jjddd.exe196⤵PID:4416
-
\??\c:\rlrrrxf.exec:\rlrrrxf.exe197⤵PID:468
-
\??\c:\nnbbhb.exec:\nnbbhb.exe198⤵PID:3140
-
\??\c:\9hhbbb.exec:\9hhbbb.exe199⤵PID:1468
-
\??\c:\pjjdd.exec:\pjjdd.exe200⤵PID:2288
-
\??\c:\rrrrlrr.exec:\rrrrlrr.exe201⤵PID:2360
-
\??\c:\flxrfxx.exec:\flxrfxx.exe202⤵PID:3788
-
\??\c:\thbbtt.exec:\thbbtt.exe203⤵PID:2836
-
\??\c:\pppjd.exec:\pppjd.exe204⤵PID:2092
-
\??\c:\dvppp.exec:\dvppp.exe205⤵PID:868
-
\??\c:\lrxxxxx.exec:\lrxxxxx.exe206⤵PID:804
-
\??\c:\lflflfl.exec:\lflflfl.exe207⤵PID:4192
-
\??\c:\httttt.exec:\httttt.exe208⤵PID:1828
-
\??\c:\vpvpp.exec:\vpvpp.exe209⤵PID:3560
-
\??\c:\jvvpd.exec:\jvvpd.exe210⤵PID:532
-
\??\c:\lflfxrr.exec:\lflfxrr.exe211⤵PID:4936
-
\??\c:\3flfxxx.exec:\3flfxxx.exe212⤵PID:640
-
\??\c:\hhnnnn.exec:\hhnnnn.exe213⤵PID:2340
-
\??\c:\vpvvp.exec:\vpvvp.exe214⤵PID:864
-
\??\c:\vvjdd.exec:\vvjdd.exe215⤵PID:2372
-
\??\c:\5xxrlll.exec:\5xxrlll.exe216⤵PID:1988
-
\??\c:\xrxllfl.exec:\xrxllfl.exe217⤵PID:3996
-
\??\c:\bnbbtb.exec:\bnbbtb.exe218⤵PID:464
-
\??\c:\pvvdv.exec:\pvvdv.exe219⤵PID:1936
-
\??\c:\lxxxrrr.exec:\lxxxrrr.exe220⤵PID:2544
-
\??\c:\tbnhhh.exec:\tbnhhh.exe221⤵PID:1184
-
\??\c:\rrlfrrx.exec:\rrlfrrx.exe222⤵PID:3312
-
\??\c:\vpvpd.exec:\vpvpd.exe223⤵PID:2228
-
\??\c:\jvppj.exec:\jvppj.exe224⤵PID:3472
-
\??\c:\lllfrrl.exec:\lllfrrl.exe225⤵PID:5024
-
\??\c:\nntbtb.exec:\nntbtb.exe226⤵PID:4712
-
\??\c:\ddjjd.exec:\ddjjd.exe227⤵PID:3336
-
\??\c:\jpjjd.exec:\jpjjd.exe228⤵PID:1428
-
\??\c:\lrlflxf.exec:\lrlflxf.exe229⤵PID:4900
-
\??\c:\ffxfllr.exec:\ffxfllr.exe230⤵PID:3828
-
\??\c:\tnhbbt.exec:\tnhbbt.exe231⤵PID:1040
-
\??\c:\vpppj.exec:\vpppj.exe232⤵PID:2472
-
\??\c:\xllfrrl.exec:\xllfrrl.exe233⤵PID:1648
-
\??\c:\hhhbth.exec:\hhhbth.exe234⤵PID:4984
-
\??\c:\nnhntn.exec:\nnhntn.exe235⤵PID:468
-
\??\c:\ddpjp.exec:\ddpjp.exe236⤵PID:916
-
\??\c:\djvpj.exec:\djvpj.exe237⤵PID:4432
-
\??\c:\xxffxxr.exec:\xxffxxr.exe238⤵PID:2288
-
\??\c:\nhbttn.exec:\nhbttn.exe239⤵PID:3648
-
\??\c:\vvjjj.exec:\vvjjj.exe240⤵PID:3788
-
\??\c:\9djdp.exec:\9djdp.exe241⤵PID:2836
-
\??\c:\lfffrlx.exec:\lfffrlx.exe242⤵PID:2092