Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe
-
Size
80KB
-
MD5
b81113e46cace4b5c006ce46ef2618d0
-
SHA1
803c1f679da1fa0d3f8389f9fc2a7f3d7add9519
-
SHA256
3a79969b89cf4c560a4a9d1937eb4ff7c904be80563a0ab526668e00d31f3ae4
-
SHA512
26a851e4f7361d5d84f326544845fc9743ab554b4cf2163f12d49ee11dce64b013724cdee1251d916892883462af2f5d75d6e0a41be3b2b08d1b9564c4285cf5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoLU1gxm1S3PQ7CnPRKiir5K:ymb3NkkiQ3mdBjFoLkmx/g8ZKzK
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1648-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2400-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/308-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2384-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/292-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2856-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1192-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1912-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2092-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1104-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1684-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/616-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/468-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2804-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-5470-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
lrlfffr.exenhbhth.exebnnttt.exe9rflxfr.exejvjdv.exejddjp.exehbnbtn.exedpdpp.exefxlrfxx.exenbhttn.exejjpvd.exe9vvpd.exe9rxxffl.exentbnnb.exeppjvj.exepjpvv.exeflxfrfl.exettbbnb.exevpdvv.exerrxxxll.exehbhnbb.exetbnnhh.exevvvvj.exexrrrfrr.exebbnbnb.exebbnbbb.exerxlrfrf.exellfrflf.exettnthn.exe7jjpj.exe7pjpd.exerrrlffx.exethtnhh.exe3nhnnn.exeppvpj.exe3fxxffx.exelllxfrx.exettnbnn.exebbtbnb.exejvdvv.exeffflxlf.exe9lrffxr.exenntbht.exe1nhhnh.exejdvvj.exe3xxlxll.exellxfrfr.exebbtbbh.exedvjpd.exe5pjvd.exexxfrlfl.exehhthbb.exehbttbb.exejvjvj.exejjjvj.exelxlllfx.exelfxxffr.exetnbnbb.exebnbbbt.exeddjpp.exe5jppp.exexrffrrx.exebthtnb.exe7thtbn.exepid process 1508 lrlfffr.exe 1648 nhbhth.exe 2724 bnnttt.exe 2664 9rflxfr.exe 2680 jvjdv.exe 2232 jddjp.exe 2564 hbnbtn.exe 2400 dpdpp.exe 308 fxlrfxx.exe 2984 nbhttn.exe 2384 jjpvd.exe 2828 9vvpd.exe 1188 9rxxffl.exe 816 ntbnnb.exe 292 ppjvj.exe 2856 pjpvv.exe 1688 flxfrfl.exe 1760 ttbbnb.exe 1192 vpdvv.exe 1912 rrxxxll.exe 2092 hbhnbb.exe 984 tbnnhh.exe 1104 vvvvj.exe 1684 xrrrfrr.exe 1088 bbnbnb.exe 616 bbnbbb.exe 2352 rxlrfrf.exe 572 llfrflf.exe 468 ttnthn.exe 2804 7jjpj.exe 1984 7pjpd.exe 2492 rrrlffx.exe 2628 thtnhh.exe 2648 3nhnnn.exe 2780 ppvpj.exe 2732 3fxxffx.exe 2528 lllxfrx.exe 2624 ttnbnn.exe 2544 bbtbnb.exe 2524 jvdvv.exe 2596 ffflxlf.exe 2372 9lrffxr.exe 1792 nntbht.exe 2820 1nhhnh.exe 308 jdvvj.exe 2984 3xxlxll.exe 892 llxfrfr.exe 2024 bbtbbh.exe 836 dvjpd.exe 2708 5pjvd.exe 764 xxfrlfl.exe 2508 hhthbb.exe 1660 hbttbb.exe 2072 jvjvj.exe 848 jjjvj.exe 2504 lxlllfx.exe 1192 lfxxffr.exe 2192 tnbnbb.exe 1232 bnbbbt.exe 708 ddjpp.exe 1860 5jppp.exe 3068 xrffrrx.exe 1140 bthtnb.exe 1608 7thtbn.exe -
Processes:
resource yara_rule behavioral1/memory/2228-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/308-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2384-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/292-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1192-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1912-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2092-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1104-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1684-243-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/616-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/468-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-296-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-5470-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exelrlfffr.exenhbhth.exebnnttt.exe9rflxfr.exejvjdv.exejddjp.exehbnbtn.exedpdpp.exefxlrfxx.exenbhttn.exejjpvd.exe9vvpd.exe9rxxffl.exentbnnb.exeppjvj.exedescription pid process target process PID 2228 wrote to memory of 1508 2228 b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe lrlfffr.exe PID 2228 wrote to memory of 1508 2228 b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe lrlfffr.exe PID 2228 wrote to memory of 1508 2228 b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe lrlfffr.exe PID 2228 wrote to memory of 1508 2228 b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe lrlfffr.exe PID 1508 wrote to memory of 1648 1508 lrlfffr.exe nhbhth.exe PID 1508 wrote to memory of 1648 1508 lrlfffr.exe nhbhth.exe PID 1508 wrote to memory of 1648 1508 lrlfffr.exe nhbhth.exe PID 1508 wrote to memory of 1648 1508 lrlfffr.exe nhbhth.exe PID 1648 wrote to memory of 2724 1648 nhbhth.exe bnnttt.exe PID 1648 wrote to memory of 2724 1648 nhbhth.exe bnnttt.exe PID 1648 wrote to memory of 2724 1648 nhbhth.exe bnnttt.exe PID 1648 wrote to memory of 2724 1648 nhbhth.exe bnnttt.exe PID 2724 wrote to memory of 2664 2724 bnnttt.exe 9rflxfr.exe PID 2724 wrote to memory of 2664 2724 bnnttt.exe 9rflxfr.exe PID 2724 wrote to memory of 2664 2724 bnnttt.exe 9rflxfr.exe PID 2724 wrote to memory of 2664 2724 bnnttt.exe 9rflxfr.exe PID 2664 wrote to memory of 2680 2664 9rflxfr.exe jvjdv.exe PID 2664 wrote to memory of 2680 2664 9rflxfr.exe jvjdv.exe PID 2664 wrote to memory of 2680 2664 9rflxfr.exe jvjdv.exe PID 2664 wrote to memory of 2680 2664 9rflxfr.exe jvjdv.exe PID 2680 wrote to memory of 2232 2680 jvjdv.exe jddjp.exe PID 2680 wrote to memory of 2232 2680 jvjdv.exe jddjp.exe PID 2680 wrote to memory of 2232 2680 jvjdv.exe jddjp.exe PID 2680 wrote to memory of 2232 2680 jvjdv.exe jddjp.exe PID 2232 wrote to memory of 2564 2232 jddjp.exe hbnbtn.exe PID 2232 wrote to memory of 2564 2232 jddjp.exe hbnbtn.exe PID 2232 wrote to memory of 2564 2232 jddjp.exe hbnbtn.exe PID 2232 wrote to memory of 2564 2232 jddjp.exe hbnbtn.exe PID 2564 wrote to memory of 2400 2564 hbnbtn.exe dpdpp.exe PID 2564 wrote to memory of 2400 2564 hbnbtn.exe dpdpp.exe PID 2564 wrote to memory of 2400 2564 hbnbtn.exe dpdpp.exe PID 2564 wrote to memory of 2400 2564 hbnbtn.exe dpdpp.exe PID 2400 wrote to memory of 308 2400 dpdpp.exe fxlrfxx.exe PID 2400 wrote to memory of 308 2400 dpdpp.exe fxlrfxx.exe PID 2400 wrote to memory of 308 2400 dpdpp.exe fxlrfxx.exe PID 2400 wrote to memory of 308 2400 dpdpp.exe fxlrfxx.exe PID 308 wrote to memory of 2984 308 fxlrfxx.exe nbhttn.exe PID 308 wrote to memory of 2984 308 fxlrfxx.exe nbhttn.exe PID 308 wrote to memory of 2984 308 fxlrfxx.exe nbhttn.exe PID 308 wrote to memory of 2984 308 fxlrfxx.exe nbhttn.exe PID 2984 wrote to memory of 2384 2984 nbhttn.exe jjpvd.exe PID 2984 wrote to memory of 2384 2984 nbhttn.exe jjpvd.exe PID 2984 wrote to memory of 2384 2984 nbhttn.exe jjpvd.exe PID 2984 wrote to memory of 2384 2984 nbhttn.exe jjpvd.exe PID 2384 wrote to memory of 2828 2384 jjpvd.exe 9vvpd.exe PID 2384 wrote to memory of 2828 2384 jjpvd.exe 9vvpd.exe PID 2384 wrote to memory of 2828 2384 jjpvd.exe 9vvpd.exe PID 2384 wrote to memory of 2828 2384 jjpvd.exe 9vvpd.exe PID 2828 wrote to memory of 1188 2828 9vvpd.exe 9rxxffl.exe PID 2828 wrote to memory of 1188 2828 9vvpd.exe 9rxxffl.exe PID 2828 wrote to memory of 1188 2828 9vvpd.exe 9rxxffl.exe PID 2828 wrote to memory of 1188 2828 9vvpd.exe 9rxxffl.exe PID 1188 wrote to memory of 816 1188 9rxxffl.exe ntbnnb.exe PID 1188 wrote to memory of 816 1188 9rxxffl.exe ntbnnb.exe PID 1188 wrote to memory of 816 1188 9rxxffl.exe ntbnnb.exe PID 1188 wrote to memory of 816 1188 9rxxffl.exe ntbnnb.exe PID 816 wrote to memory of 292 816 ntbnnb.exe ppjvj.exe PID 816 wrote to memory of 292 816 ntbnnb.exe ppjvj.exe PID 816 wrote to memory of 292 816 ntbnnb.exe ppjvj.exe PID 816 wrote to memory of 292 816 ntbnnb.exe ppjvj.exe PID 292 wrote to memory of 2856 292 ppjvj.exe pjpvv.exe PID 292 wrote to memory of 2856 292 ppjvj.exe pjpvv.exe PID 292 wrote to memory of 2856 292 ppjvj.exe pjpvv.exe PID 292 wrote to memory of 2856 292 ppjvj.exe pjpvv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\lrlfffr.exec:\lrlfffr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\nhbhth.exec:\nhbhth.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\bnnttt.exec:\bnnttt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\9rflxfr.exec:\9rflxfr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\jvjdv.exec:\jvjdv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\jddjp.exec:\jddjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\hbnbtn.exec:\hbnbtn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\dpdpp.exec:\dpdpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\fxlrfxx.exec:\fxlrfxx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:308 -
\??\c:\nbhttn.exec:\nbhttn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\jjpvd.exec:\jjpvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\9vvpd.exec:\9vvpd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\9rxxffl.exec:\9rxxffl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
\??\c:\ntbnnb.exec:\ntbnnb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:816 -
\??\c:\ppjvj.exec:\ppjvj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:292 -
\??\c:\pjpvv.exec:\pjpvv.exe17⤵
- Executes dropped EXE
PID:2856 -
\??\c:\flxfrfl.exec:\flxfrfl.exe18⤵
- Executes dropped EXE
PID:1688 -
\??\c:\ttbbnb.exec:\ttbbnb.exe19⤵
- Executes dropped EXE
PID:1760 -
\??\c:\vpdvv.exec:\vpdvv.exe20⤵
- Executes dropped EXE
PID:1192 -
\??\c:\rrxxxll.exec:\rrxxxll.exe21⤵
- Executes dropped EXE
PID:1912 -
\??\c:\hbhnbb.exec:\hbhnbb.exe22⤵
- Executes dropped EXE
PID:2092 -
\??\c:\tbnnhh.exec:\tbnnhh.exe23⤵
- Executes dropped EXE
PID:984 -
\??\c:\vvvvj.exec:\vvvvj.exe24⤵
- Executes dropped EXE
PID:1104 -
\??\c:\xrrrfrr.exec:\xrrrfrr.exe25⤵
- Executes dropped EXE
PID:1684 -
\??\c:\bbnbnb.exec:\bbnbnb.exe26⤵
- Executes dropped EXE
PID:1088 -
\??\c:\bbnbbb.exec:\bbnbbb.exe27⤵
- Executes dropped EXE
PID:616 -
\??\c:\rxlrfrf.exec:\rxlrfrf.exe28⤵
- Executes dropped EXE
PID:2352 -
\??\c:\llfrflf.exec:\llfrflf.exe29⤵
- Executes dropped EXE
PID:572 -
\??\c:\ttnthn.exec:\ttnthn.exe30⤵
- Executes dropped EXE
PID:468 -
\??\c:\7jjpj.exec:\7jjpj.exe31⤵
- Executes dropped EXE
PID:2804 -
\??\c:\7pjpd.exec:\7pjpd.exe32⤵
- Executes dropped EXE
PID:1984 -
\??\c:\rrrlffx.exec:\rrrlffx.exe33⤵
- Executes dropped EXE
PID:2492 -
\??\c:\thtnhh.exec:\thtnhh.exe34⤵
- Executes dropped EXE
PID:2628 -
\??\c:\3nhnnn.exec:\3nhnnn.exe35⤵
- Executes dropped EXE
PID:2648 -
\??\c:\ppvpj.exec:\ppvpj.exe36⤵
- Executes dropped EXE
PID:2780 -
\??\c:\3fxxffx.exec:\3fxxffx.exe37⤵
- Executes dropped EXE
PID:2732 -
\??\c:\lllxfrx.exec:\lllxfrx.exe38⤵
- Executes dropped EXE
PID:2528 -
\??\c:\ttnbnn.exec:\ttnbnn.exe39⤵
- Executes dropped EXE
PID:2624 -
\??\c:\bbtbnb.exec:\bbtbnb.exe40⤵
- Executes dropped EXE
PID:2544 -
\??\c:\jvdvv.exec:\jvdvv.exe41⤵
- Executes dropped EXE
PID:2524 -
\??\c:\ffflxlf.exec:\ffflxlf.exe42⤵
- Executes dropped EXE
PID:2596 -
\??\c:\9lrffxr.exec:\9lrffxr.exe43⤵
- Executes dropped EXE
PID:2372 -
\??\c:\nntbht.exec:\nntbht.exe44⤵
- Executes dropped EXE
PID:1792 -
\??\c:\1nhhnh.exec:\1nhhnh.exe45⤵
- Executes dropped EXE
PID:2820 -
\??\c:\jdvvj.exec:\jdvvj.exe46⤵
- Executes dropped EXE
PID:308 -
\??\c:\3xxlxll.exec:\3xxlxll.exe47⤵
- Executes dropped EXE
PID:2984 -
\??\c:\llxfrfr.exec:\llxfrfr.exe48⤵
- Executes dropped EXE
PID:892 -
\??\c:\bbtbbh.exec:\bbtbbh.exe49⤵
- Executes dropped EXE
PID:2024 -
\??\c:\dvjpd.exec:\dvjpd.exe50⤵
- Executes dropped EXE
PID:836 -
\??\c:\5pjvd.exec:\5pjvd.exe51⤵
- Executes dropped EXE
PID:2708 -
\??\c:\xxfrlfl.exec:\xxfrlfl.exe52⤵
- Executes dropped EXE
PID:764 -
\??\c:\hhthbb.exec:\hhthbb.exe53⤵
- Executes dropped EXE
PID:2508 -
\??\c:\hbttbb.exec:\hbttbb.exe54⤵
- Executes dropped EXE
PID:1660 -
\??\c:\jvjvj.exec:\jvjvj.exe55⤵
- Executes dropped EXE
PID:2072 -
\??\c:\jjjvj.exec:\jjjvj.exe56⤵
- Executes dropped EXE
PID:848 -
\??\c:\lxlllfx.exec:\lxlllfx.exe57⤵
- Executes dropped EXE
PID:2504 -
\??\c:\lfxxffr.exec:\lfxxffr.exe58⤵
- Executes dropped EXE
PID:1192 -
\??\c:\tnbnbb.exec:\tnbnbb.exe59⤵
- Executes dropped EXE
PID:2192 -
\??\c:\bnbbbt.exec:\bnbbbt.exe60⤵
- Executes dropped EXE
PID:1232 -
\??\c:\ddjpp.exec:\ddjpp.exe61⤵
- Executes dropped EXE
PID:708 -
\??\c:\5jppp.exec:\5jppp.exe62⤵
- Executes dropped EXE
PID:1860 -
\??\c:\xrffrrx.exec:\xrffrrx.exe63⤵
- Executes dropped EXE
PID:3068 -
\??\c:\bthtnb.exec:\bthtnb.exe64⤵
- Executes dropped EXE
PID:1140 -
\??\c:\7thtbn.exec:\7thtbn.exe65⤵
- Executes dropped EXE
PID:1608 -
\??\c:\ddvdp.exec:\ddvdp.exe66⤵PID:1036
-
\??\c:\vdpdd.exec:\vdpdd.exe67⤵PID:2124
-
\??\c:\rrrrlrr.exec:\rrrrlrr.exe68⤵PID:2120
-
\??\c:\hnhhtn.exec:\hnhhtn.exe69⤵PID:1740
-
\??\c:\tbthnb.exec:\tbthnb.exe70⤵PID:880
-
\??\c:\5vvpp.exec:\5vvpp.exe71⤵PID:2956
-
\??\c:\pjvpp.exec:\pjvpp.exe72⤵PID:2228
-
\??\c:\xxrlxxl.exec:\xxrlxxl.exe73⤵PID:1984
-
\??\c:\rrlxlrx.exec:\rrlxlrx.exe74⤵PID:1560
-
\??\c:\bbtbtb.exec:\bbtbtb.exe75⤵PID:2488
-
\??\c:\3hhthn.exec:\3hhthn.exe76⤵PID:1648
-
\??\c:\9jvjv.exec:\9jvjv.exe77⤵PID:2720
-
\??\c:\9dvjd.exec:\9dvjd.exe78⤵PID:2784
-
\??\c:\5xrrxfr.exec:\5xrrxfr.exe79⤵PID:1544
-
\??\c:\9lflrxl.exec:\9lflrxl.exe80⤵PID:3060
-
\??\c:\bthntt.exec:\bthntt.exe81⤵PID:1316
-
\??\c:\nntntt.exec:\nntntt.exe82⤵PID:2232
-
\??\c:\5jjvv.exec:\5jjvv.exe83⤵PID:2572
-
\??\c:\vppvv.exec:\vppvv.exe84⤵PID:2536
-
\??\c:\lffrffx.exec:\lffrffx.exe85⤵PID:2400
-
\??\c:\ffxrflx.exec:\ffxrflx.exe86⤵PID:2980
-
\??\c:\hhbttb.exec:\hhbttb.exe87⤵PID:2172
-
\??\c:\jjdpp.exec:\jjdpp.exe88⤵PID:1604
-
\??\c:\5vpvp.exec:\5vpvp.exe89⤵PID:1048
-
\??\c:\xfrxflx.exec:\xfrxflx.exe90⤵PID:2176
-
\??\c:\5rlxlxf.exec:\5rlxlxf.exe91⤵PID:1188
-
\??\c:\bthhtb.exec:\bthhtb.exe92⤵PID:1752
-
\??\c:\5hhbnt.exec:\5hhbnt.exe93⤵PID:2620
-
\??\c:\ddvvv.exec:\ddvvv.exe94⤵PID:1644
-
\??\c:\pjdpd.exec:\pjdpd.exe95⤵PID:1600
-
\??\c:\lfxxxfr.exec:\lfxxxfr.exe96⤵PID:1732
-
\??\c:\5lfrrfl.exec:\5lfrrfl.exe97⤵PID:2060
-
\??\c:\nnbtbb.exec:\nnbtbb.exe98⤵PID:2360
-
\??\c:\nnhtht.exec:\nnhtht.exe99⤵PID:2936
-
\??\c:\jdvpv.exec:\jdvpv.exe100⤵PID:484
-
\??\c:\7jvpv.exec:\7jvpv.exe101⤵PID:1304
-
\??\c:\5rlxflx.exec:\5rlxflx.exe102⤵PID:2260
-
\??\c:\xxxllrf.exec:\xxxllrf.exe103⤵PID:1104
-
\??\c:\hbthtb.exec:\hbthtb.exe104⤵PID:2296
-
\??\c:\nbbbnn.exec:\nbbbnn.exe105⤵PID:1236
-
\??\c:\vvpdv.exec:\vvpdv.exe106⤵PID:2472
-
\??\c:\ddppv.exec:\ddppv.exe107⤵PID:616
-
\??\c:\xfxlfff.exec:\xfxlfff.exe108⤵PID:2080
-
\??\c:\hbthnb.exec:\hbthnb.exe109⤵PID:988
-
\??\c:\5thnhb.exec:\5thnhb.exe110⤵PID:2292
-
\??\c:\ppjdp.exec:\ppjdp.exe111⤵PID:1816
-
\??\c:\1jvjp.exec:\1jvjp.exe112⤵PID:1820
-
\??\c:\lrffxrr.exec:\lrffxrr.exe113⤵PID:2228
-
\??\c:\ffxfxfr.exec:\ffxfxfr.exe114⤵PID:1280
-
\??\c:\9ttbtn.exec:\9ttbtn.exe115⤵PID:1560
-
\??\c:\nhtbhn.exec:\nhtbhn.exe116⤵PID:3032
-
\??\c:\vvjdv.exec:\vvjdv.exe117⤵PID:2752
-
\??\c:\5vjvj.exec:\5vjvj.exe118⤵PID:2272
-
\??\c:\llxlxlr.exec:\llxlxlr.exe119⤵PID:2528
-
\??\c:\hhtbbb.exec:\hhtbbb.exe120⤵PID:2556
-
\??\c:\btnbhh.exec:\btnbhh.exe121⤵PID:2544
-
\??\c:\vjddj.exec:\vjddj.exe122⤵PID:2524
-
\??\c:\pjvpv.exec:\pjvpv.exe123⤵PID:2584
-
\??\c:\fxrxlrf.exec:\fxrxlrf.exe124⤵PID:1212
-
\??\c:\xlfxflr.exec:\xlfxflr.exe125⤵PID:2992
-
\??\c:\htnhtb.exec:\htnhtb.exe126⤵PID:2400
-
\??\c:\pdvjv.exec:\pdvjv.exe127⤵PID:2840
-
\??\c:\1xffrrx.exec:\1xffrrx.exe128⤵PID:3000
-
\??\c:\5ffxllf.exec:\5ffxllf.exe129⤵PID:1604
-
\??\c:\xrflrxl.exec:\xrflrxl.exe130⤵PID:700
-
\??\c:\bhtnhb.exec:\bhtnhb.exe131⤵PID:2768
-
\??\c:\7ttthn.exec:\7ttthn.exe132⤵PID:2004
-
\??\c:\5vpjj.exec:\5vpjj.exe133⤵PID:816
-
\??\c:\pvvdj.exec:\pvvdj.exe134⤵PID:2848
-
\??\c:\1xxllfx.exec:\1xxllfx.exe135⤵PID:1564
-
\??\c:\3rllrrf.exec:\3rllrrf.exe136⤵PID:1240
-
\??\c:\ththtt.exec:\ththtt.exe137⤵PID:1732
-
\??\c:\1httbn.exec:\1httbn.exe138⤵PID:2060
-
\??\c:\7jppd.exec:\7jppd.exe139⤵PID:2052
-
\??\c:\3lfflrf.exec:\3lfflrf.exe140⤵PID:1912
-
\??\c:\lxrfrrx.exec:\lxrfrrx.exe141⤵PID:484
-
\??\c:\hhttnt.exec:\hhttnt.exe142⤵PID:1304
-
\??\c:\7htbnt.exec:\7htbnt.exe143⤵PID:580
-
\??\c:\vjvvv.exec:\vjvvv.exe144⤵PID:1496
-
\??\c:\xfxfxfr.exec:\xfxfxfr.exe145⤵PID:444
-
\??\c:\9flrrxx.exec:\9flrrxx.exe146⤵PID:1608
-
\??\c:\bbhhtn.exec:\bbhhtn.exe147⤵PID:2140
-
\??\c:\7hnhbt.exec:\7hnhbt.exe148⤵PID:2328
-
\??\c:\jjjvp.exec:\jjjvp.exe149⤵PID:1808
-
\??\c:\1lffrrf.exec:\1lffrrf.exe150⤵PID:548
-
\??\c:\xxlffrr.exec:\xxlffrr.exe151⤵PID:468
-
\??\c:\7bnbhn.exec:\7bnbhn.exe152⤵PID:2600
-
\??\c:\nthhtt.exec:\nthhtt.exe153⤵PID:1820
-
\??\c:\pjvvj.exec:\pjvvj.exe154⤵PID:632
-
\??\c:\fxxflxf.exec:\fxxflxf.exe155⤵PID:1984
-
\??\c:\lfrlfrf.exec:\lfrlfrf.exe156⤵PID:2208
-
\??\c:\7btbhn.exec:\7btbhn.exe157⤵PID:2644
-
\??\c:\nnhbbh.exec:\nnhbbh.exe158⤵PID:1648
-
\??\c:\3jjpp.exec:\3jjpp.exe159⤵PID:2272
-
\??\c:\dvpjv.exec:\dvpjv.exe160⤵PID:2652
-
\??\c:\xrflxfr.exec:\xrflxfr.exe161⤵PID:1544
-
\??\c:\hhhbtb.exec:\hhhbtb.exe162⤵PID:2876
-
\??\c:\nnhnht.exec:\nnhnht.exe163⤵PID:2232
-
\??\c:\pjjvp.exec:\pjjvp.exe164⤵PID:2640
-
\??\c:\7djdp.exec:\7djdp.exe165⤵PID:2572
-
\??\c:\lrxfrfx.exec:\lrxfrfx.exe166⤵PID:1996
-
\??\c:\tbhbhb.exec:\tbhbhb.exe167⤵PID:2400
-
\??\c:\thtttb.exec:\thtttb.exe168⤵PID:2980
-
\??\c:\jjdjv.exec:\jjdjv.exe169⤵PID:3000
-
\??\c:\pddjp.exec:\pddjp.exe170⤵PID:2316
-
\??\c:\nnhnnb.exec:\nnhnnb.exe171⤵PID:700
-
\??\c:\nhnnnn.exec:\nhnnnn.exe172⤵PID:1044
-
\??\c:\pjpdj.exec:\pjpdj.exe173⤵PID:1188
-
\??\c:\frfxlxf.exec:\frfxlxf.exe174⤵PID:816
-
\??\c:\nnnbbt.exec:\nnnbbt.exe175⤵PID:2848
-
\??\c:\dvpjj.exec:\dvpjj.exe176⤵PID:1564
-
\??\c:\vpdjp.exec:\vpdjp.exe177⤵PID:2788
-
\??\c:\lfrfrxf.exec:\lfrfrxf.exe178⤵PID:1732
-
\??\c:\5hbnhn.exec:\5hbnhn.exe179⤵PID:2256
-
\??\c:\5hhtbn.exec:\5hhtbn.exe180⤵PID:2052
-
\??\c:\9pdjj.exec:\9pdjj.exe181⤵PID:1232
-
\??\c:\vpddp.exec:\vpddp.exe182⤵PID:484
-
\??\c:\lfxfrfx.exec:\lfxfrfx.exe183⤵PID:1304
-
\??\c:\fxlrffr.exec:\fxlrffr.exe184⤵PID:580
-
\??\c:\3nhtnt.exec:\3nhtnt.exe185⤵PID:1496
-
\??\c:\bnttbn.exec:\bnttbn.exe186⤵PID:444
-
\??\c:\ppvdp.exec:\ppvdp.exe187⤵PID:1608
-
\??\c:\ffxxrrf.exec:\ffxxrrf.exe188⤵PID:2140
-
\??\c:\llfrflf.exec:\llfrflf.exe189⤵PID:2328
-
\??\c:\btnbnb.exec:\btnbnb.exe190⤵PID:1808
-
\??\c:\nnhhtn.exec:\nnhhtn.exe191⤵PID:548
-
\??\c:\dddvj.exec:\dddvj.exe192⤵PID:468
-
\??\c:\vvpjv.exec:\vvpjv.exe193⤵PID:2600
-
\??\c:\ffrllxl.exec:\ffrllxl.exe194⤵PID:1820
-
\??\c:\xrfflrr.exec:\xrfflrr.exe195⤵PID:632
-
\??\c:\btthtb.exec:\btthtb.exe196⤵PID:1984
-
\??\c:\nhtntb.exec:\nhtntb.exe197⤵PID:2208
-
\??\c:\dddvd.exec:\dddvd.exe198⤵PID:2644
-
\??\c:\xxxlfrl.exec:\xxxlfrl.exe199⤵PID:2264
-
\??\c:\7rlrfrf.exec:\7rlrfrf.exe200⤵PID:2272
-
\??\c:\9hhbbn.exec:\9hhbbn.exe201⤵PID:2592
-
\??\c:\tnnhnb.exec:\tnnhnb.exe202⤵PID:1544
-
\??\c:\jjjvj.exec:\jjjvj.exe203⤵PID:2596
-
\??\c:\fxlrffl.exec:\fxlrffl.exe204⤵PID:2372
-
\??\c:\llrrfrf.exec:\llrrfrf.exe205⤵PID:2536
-
\??\c:\btttbb.exec:\btttbb.exe206⤵PID:2572
-
\??\c:\1nbnnt.exec:\1nbnnt.exe207⤵PID:1996
-
\??\c:\pddjp.exec:\pddjp.exe208⤵PID:2400
-
\??\c:\9djvv.exec:\9djvv.exe209⤵PID:2580
-
\??\c:\llrrxff.exec:\llrrxff.exe210⤵PID:2588
-
\??\c:\9flfflx.exec:\9flfflx.exe211⤵PID:2176
-
\??\c:\fxrfrrf.exec:\fxrfrrf.exe212⤵PID:2824
-
\??\c:\5nnbhh.exec:\5nnbhh.exe213⤵PID:1712
-
\??\c:\vpppv.exec:\vpppv.exe214⤵PID:2844
-
\??\c:\ppvjj.exec:\ppvjj.exe215⤵PID:2004
-
\??\c:\xrflrfr.exec:\xrflrfr.exe216⤵PID:1348
-
\??\c:\lfxrxxl.exec:\lfxrxxl.exe217⤵PID:1688
-
\??\c:\bbthbb.exec:\bbthbb.exe218⤵PID:2796
-
\??\c:\hbnnnt.exec:\hbnnnt.exe219⤵PID:1376
-
\??\c:\vvvpd.exec:\vvvpd.exe220⤵PID:536
-
\??\c:\vpjjj.exec:\vpjjj.exe221⤵PID:2256
-
\??\c:\1rxfrfx.exec:\1rxfrfx.exe222⤵PID:796
-
\??\c:\xlfxxrr.exec:\xlfxxrr.exe223⤵PID:824
-
\??\c:\nbntnh.exec:\nbntnh.exe224⤵PID:644
-
\??\c:\5bhtnb.exec:\5bhtnb.exe225⤵PID:580
-
\??\c:\vvjdp.exec:\vvjdp.exe226⤵PID:3036
-
\??\c:\frrflrf.exec:\frrflrf.exe227⤵PID:940
-
\??\c:\lflrffr.exec:\lflrffr.exe228⤵PID:444
-
\??\c:\1bnbhh.exec:\1bnbhh.exe229⤵PID:2076
-
\??\c:\dvppv.exec:\dvppv.exe230⤵PID:1500
-
\??\c:\pdjvp.exec:\pdjvp.exe231⤵PID:2328
-
\??\c:\9rxrlrf.exec:\9rxrlrf.exe232⤵PID:880
-
\??\c:\ffxlxlf.exec:\ffxlxlf.exe233⤵PID:2104
-
\??\c:\nhbhbh.exec:\nhbhbh.exe234⤵PID:1440
-
\??\c:\1nnbnn.exec:\1nnbnn.exe235⤵PID:1964
-
\??\c:\jjdjv.exec:\jjdjv.exe236⤵PID:2748
-
\??\c:\jdjvj.exec:\jdjvj.exe237⤵PID:2764
-
\??\c:\9llxrfl.exec:\9llxrfl.exe238⤵PID:3032
-
\??\c:\7flfxfr.exec:\7flfxfr.exe239⤵PID:2636
-
\??\c:\hbnnbh.exec:\hbnnbh.exe240⤵PID:2136
-
\??\c:\7tbtnh.exec:\7tbtnh.exe241⤵PID:2800
-
\??\c:\pvdpd.exec:\pvdpd.exe242⤵PID:2552