Analysis
-
max time kernel
150s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe
-
Size
80KB
-
MD5
b81113e46cace4b5c006ce46ef2618d0
-
SHA1
803c1f679da1fa0d3f8389f9fc2a7f3d7add9519
-
SHA256
3a79969b89cf4c560a4a9d1937eb4ff7c904be80563a0ab526668e00d31f3ae4
-
SHA512
26a851e4f7361d5d84f326544845fc9743ab554b4cf2163f12d49ee11dce64b013724cdee1251d916892883462af2f5d75d6e0a41be3b2b08d1b9564c4285cf5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoLU1gxm1S3PQ7CnPRKiir5K:ymb3NkkiQ3mdBjFoLkmx/g8ZKzK
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4028-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/960-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4088-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2736-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3536-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1652-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3248-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2732-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4824-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/384-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5000-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2916-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2704-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1916-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3736-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4904-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2976-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1996-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3136-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/880-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vvvdj.exefrflrrr.exehhtnhh.exetthbbh.exexlfxlrx.exebbbtht.exepdvjv.exerfffxxx.exehtbnnh.exebbhhhb.exepvvpp.exefxrrrrl.exenhbbbb.exevppjj.exexlllfll.exentnbtn.exevjdvj.exexfxlfrx.exerlxxfrr.exe7bhnnn.exe7djdv.exelffffff.exe1pppj.exevvpdd.exexrrlfxx.exehbtttb.exe7hnbtn.exevjjdv.exe7thbhn.exeppvvv.exexrxllrf.exe5nthnh.exevvppp.exerflrflf.exexflrlxf.exetnbhtb.exejvpdp.exe1xffxrl.exetththt.exetbbhnh.exevvpvv.exerffrrrr.exe7rfxrrr.exennbhth.exe3jdvp.exepjjvj.exentnntn.exe1pvpj.exevvjvd.exelrrrxrx.exetbthbt.exedjvdv.exepdvpd.exexffxllr.exeththtt.exehhnnnb.exevpdvp.exelrlrxrf.exefrrlxxr.exebtthtn.exedvjdp.exejddjv.exefxfxlfx.exe3flxrlx.exepid process 4028 vvvdj.exe 4088 frflrrr.exe 960 hhtnhh.exe 2736 tthbbh.exe 1652 xlfxlrx.exe 3536 bbbtht.exe 3248 pdvjv.exe 2732 rfffxxx.exe 4352 htbnnh.exe 696 bbhhhb.exe 3168 pvvpp.exe 4904 fxrrrrl.exe 4824 nhbbbb.exe 3736 vppjj.exe 384 xlllfll.exe 5000 ntnbtn.exe 1916 vjdvj.exe 2916 xfxlfrx.exe 3624 rlxxfrr.exe 2704 7bhnnn.exe 2976 7djdv.exe 2912 lffffff.exe 1996 1pppj.exe 4840 vvpdd.exe 3136 xrrlfxx.exe 880 hbtttb.exe 1796 7hnbtn.exe 4932 vjjdv.exe 1472 7thbhn.exe 3372 ppvvv.exe 2584 xrxllrf.exe 2352 5nthnh.exe 4488 vvppp.exe 2244 rflrflf.exe 4876 xflrlxf.exe 60 tnbhtb.exe 4088 jvpdp.exe 2764 1xffxrl.exe 1552 tththt.exe 3080 tbbhnh.exe 5088 vvpvv.exe 4272 rffrrrr.exe 2992 7rfxrrr.exe 3248 nnbhth.exe 792 3jdvp.exe 2080 pjjvj.exe 864 ntnntn.exe 5116 1pvpj.exe 3160 vvjvd.exe 8 lrrrxrx.exe 4332 tbthbt.exe 3392 djvdv.exe 3912 pdvpd.exe 3840 xffxllr.exe 1464 ththtt.exe 3716 hhnnnb.exe 2916 vpdvp.exe 3172 lrlrxrf.exe 2196 frrlxxr.exe 1716 btthtn.exe 1496 dvjdp.exe 1632 jddjv.exe 2020 fxfxlfx.exe 2972 3flxrlx.exe -
Processes:
resource yara_rule behavioral2/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4028-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4028-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/960-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/960-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/960-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/960-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4088-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2736-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1652-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3536-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1652-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3248-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4824-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/384-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5000-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2916-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2704-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3736-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2976-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1996-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3136-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/880-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-188-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exevvvdj.exefrflrrr.exehhtnhh.exetthbbh.exexlfxlrx.exebbbtht.exepdvjv.exerfffxxx.exehtbnnh.exebbhhhb.exepvvpp.exefxrrrrl.exenhbbbb.exevppjj.exexlllfll.exentnbtn.exevjdvj.exexfxlfrx.exerlxxfrr.exe7bhnnn.exe7djdv.exedescription pid process target process PID 3032 wrote to memory of 4028 3032 b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe vvvdj.exe PID 3032 wrote to memory of 4028 3032 b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe vvvdj.exe PID 3032 wrote to memory of 4028 3032 b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe vvvdj.exe PID 4028 wrote to memory of 4088 4028 vvvdj.exe jvpdp.exe PID 4028 wrote to memory of 4088 4028 vvvdj.exe jvpdp.exe PID 4028 wrote to memory of 4088 4028 vvvdj.exe jvpdp.exe PID 4088 wrote to memory of 960 4088 frflrrr.exe hhtnhh.exe PID 4088 wrote to memory of 960 4088 frflrrr.exe hhtnhh.exe PID 4088 wrote to memory of 960 4088 frflrrr.exe hhtnhh.exe PID 960 wrote to memory of 2736 960 hhtnhh.exe tthbbh.exe PID 960 wrote to memory of 2736 960 hhtnhh.exe tthbbh.exe PID 960 wrote to memory of 2736 960 hhtnhh.exe tthbbh.exe PID 2736 wrote to memory of 1652 2736 tthbbh.exe xlfxlrx.exe PID 2736 wrote to memory of 1652 2736 tthbbh.exe xlfxlrx.exe PID 2736 wrote to memory of 1652 2736 tthbbh.exe xlfxlrx.exe PID 1652 wrote to memory of 3536 1652 xlfxlrx.exe bbbtht.exe PID 1652 wrote to memory of 3536 1652 xlfxlrx.exe bbbtht.exe PID 1652 wrote to memory of 3536 1652 xlfxlrx.exe bbbtht.exe PID 3536 wrote to memory of 3248 3536 bbbtht.exe nnbhth.exe PID 3536 wrote to memory of 3248 3536 bbbtht.exe nnbhth.exe PID 3536 wrote to memory of 3248 3536 bbbtht.exe nnbhth.exe PID 3248 wrote to memory of 2732 3248 pdvjv.exe rfffxxx.exe PID 3248 wrote to memory of 2732 3248 pdvjv.exe rfffxxx.exe PID 3248 wrote to memory of 2732 3248 pdvjv.exe rfffxxx.exe PID 2732 wrote to memory of 4352 2732 rfffxxx.exe htbnnh.exe PID 2732 wrote to memory of 4352 2732 rfffxxx.exe htbnnh.exe PID 2732 wrote to memory of 4352 2732 rfffxxx.exe htbnnh.exe PID 4352 wrote to memory of 696 4352 htbnnh.exe bbhhhb.exe PID 4352 wrote to memory of 696 4352 htbnnh.exe bbhhhb.exe PID 4352 wrote to memory of 696 4352 htbnnh.exe bbhhhb.exe PID 696 wrote to memory of 3168 696 bbhhhb.exe pvvpp.exe PID 696 wrote to memory of 3168 696 bbhhhb.exe pvvpp.exe PID 696 wrote to memory of 3168 696 bbhhhb.exe pvvpp.exe PID 3168 wrote to memory of 4904 3168 pvvpp.exe fxrrrrl.exe PID 3168 wrote to memory of 4904 3168 pvvpp.exe fxrrrrl.exe PID 3168 wrote to memory of 4904 3168 pvvpp.exe fxrrrrl.exe PID 4904 wrote to memory of 4824 4904 fxrrrrl.exe nhbbbb.exe PID 4904 wrote to memory of 4824 4904 fxrrrrl.exe nhbbbb.exe PID 4904 wrote to memory of 4824 4904 fxrrrrl.exe nhbbbb.exe PID 4824 wrote to memory of 3736 4824 nhbbbb.exe vppjj.exe PID 4824 wrote to memory of 3736 4824 nhbbbb.exe vppjj.exe PID 4824 wrote to memory of 3736 4824 nhbbbb.exe vppjj.exe PID 3736 wrote to memory of 384 3736 vppjj.exe xlllfll.exe PID 3736 wrote to memory of 384 3736 vppjj.exe xlllfll.exe PID 3736 wrote to memory of 384 3736 vppjj.exe xlllfll.exe PID 384 wrote to memory of 5000 384 xlllfll.exe ntnbtn.exe PID 384 wrote to memory of 5000 384 xlllfll.exe ntnbtn.exe PID 384 wrote to memory of 5000 384 xlllfll.exe ntnbtn.exe PID 5000 wrote to memory of 1916 5000 ntnbtn.exe vjdvj.exe PID 5000 wrote to memory of 1916 5000 ntnbtn.exe vjdvj.exe PID 5000 wrote to memory of 1916 5000 ntnbtn.exe vjdvj.exe PID 1916 wrote to memory of 2916 1916 vjdvj.exe xfxlfrx.exe PID 1916 wrote to memory of 2916 1916 vjdvj.exe xfxlfrx.exe PID 1916 wrote to memory of 2916 1916 vjdvj.exe xfxlfrx.exe PID 2916 wrote to memory of 3624 2916 xfxlfrx.exe rlxxfrr.exe PID 2916 wrote to memory of 3624 2916 xfxlfrx.exe rlxxfrr.exe PID 2916 wrote to memory of 3624 2916 xfxlfrx.exe rlxxfrr.exe PID 3624 wrote to memory of 2704 3624 rlxxfrr.exe 7bhnnn.exe PID 3624 wrote to memory of 2704 3624 rlxxfrr.exe 7bhnnn.exe PID 3624 wrote to memory of 2704 3624 rlxxfrr.exe 7bhnnn.exe PID 2704 wrote to memory of 2976 2704 7bhnnn.exe 7djdv.exe PID 2704 wrote to memory of 2976 2704 7bhnnn.exe 7djdv.exe PID 2704 wrote to memory of 2976 2704 7bhnnn.exe 7djdv.exe PID 2976 wrote to memory of 2912 2976 7djdv.exe lffffff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b81113e46cace4b5c006ce46ef2618d0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\vvvdj.exec:\vvvdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\frflrrr.exec:\frflrrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\hhtnhh.exec:\hhtnhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\tthbbh.exec:\tthbbh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\xlfxlrx.exec:\xlfxlrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\bbbtht.exec:\bbbtht.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
\??\c:\pdvjv.exec:\pdvjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
\??\c:\rfffxxx.exec:\rfffxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\htbnnh.exec:\htbnnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\bbhhhb.exec:\bbhhhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
\??\c:\pvvpp.exec:\pvvpp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\fxrrrrl.exec:\fxrrrrl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\nhbbbb.exec:\nhbbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
\??\c:\vppjj.exec:\vppjj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\xlllfll.exec:\xlllfll.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
\??\c:\ntnbtn.exec:\ntnbtn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
\??\c:\vjdvj.exec:\vjdvj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\xfxlfrx.exec:\xfxlfrx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\rlxxfrr.exec:\rlxxfrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\7bhnnn.exec:\7bhnnn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\7djdv.exec:\7djdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\lffffff.exec:\lffffff.exe23⤵
- Executes dropped EXE
PID:2912 -
\??\c:\1pppj.exec:\1pppj.exe24⤵
- Executes dropped EXE
PID:1996 -
\??\c:\vvpdd.exec:\vvpdd.exe25⤵
- Executes dropped EXE
PID:4840 -
\??\c:\xrrlfxx.exec:\xrrlfxx.exe26⤵
- Executes dropped EXE
PID:3136 -
\??\c:\hbtttb.exec:\hbtttb.exe27⤵
- Executes dropped EXE
PID:880 -
\??\c:\7hnbtn.exec:\7hnbtn.exe28⤵
- Executes dropped EXE
PID:1796 -
\??\c:\vjjdv.exec:\vjjdv.exe29⤵
- Executes dropped EXE
PID:4932 -
\??\c:\7thbhn.exec:\7thbhn.exe30⤵
- Executes dropped EXE
PID:1472 -
\??\c:\ppvvv.exec:\ppvvv.exe31⤵
- Executes dropped EXE
PID:3372 -
\??\c:\xrxllrf.exec:\xrxllrf.exe32⤵
- Executes dropped EXE
PID:2584 -
\??\c:\5nthnh.exec:\5nthnh.exe33⤵
- Executes dropped EXE
PID:2352 -
\??\c:\vvppp.exec:\vvppp.exe34⤵
- Executes dropped EXE
PID:4488 -
\??\c:\rflrflf.exec:\rflrflf.exe35⤵
- Executes dropped EXE
PID:2244 -
\??\c:\xflrlxf.exec:\xflrlxf.exe36⤵
- Executes dropped EXE
PID:4876 -
\??\c:\tnbhtb.exec:\tnbhtb.exe37⤵
- Executes dropped EXE
PID:60 -
\??\c:\jvpdp.exec:\jvpdp.exe38⤵
- Executes dropped EXE
PID:4088 -
\??\c:\1xffxrl.exec:\1xffxrl.exe39⤵
- Executes dropped EXE
PID:2764 -
\??\c:\tththt.exec:\tththt.exe40⤵
- Executes dropped EXE
PID:1552 -
\??\c:\tbbhnh.exec:\tbbhnh.exe41⤵
- Executes dropped EXE
PID:3080 -
\??\c:\vvpvv.exec:\vvpvv.exe42⤵
- Executes dropped EXE
PID:5088 -
\??\c:\rffrrrr.exec:\rffrrrr.exe43⤵
- Executes dropped EXE
PID:4272 -
\??\c:\7rfxrrr.exec:\7rfxrrr.exe44⤵
- Executes dropped EXE
PID:2992 -
\??\c:\nnbhth.exec:\nnbhth.exe45⤵
- Executes dropped EXE
PID:3248 -
\??\c:\3jdvp.exec:\3jdvp.exe46⤵
- Executes dropped EXE
PID:792 -
\??\c:\pjjvj.exec:\pjjvj.exe47⤵
- Executes dropped EXE
PID:2080 -
\??\c:\ntnntn.exec:\ntnntn.exe48⤵
- Executes dropped EXE
PID:864 -
\??\c:\1pvpj.exec:\1pvpj.exe49⤵
- Executes dropped EXE
PID:5116 -
\??\c:\vvjvd.exec:\vvjvd.exe50⤵
- Executes dropped EXE
PID:3160 -
\??\c:\lrrrxrx.exec:\lrrrxrx.exe51⤵
- Executes dropped EXE
PID:8 -
\??\c:\tbthbt.exec:\tbthbt.exe52⤵
- Executes dropped EXE
PID:4332 -
\??\c:\djvdv.exec:\djvdv.exe53⤵
- Executes dropped EXE
PID:3392 -
\??\c:\pdvpd.exec:\pdvpd.exe54⤵
- Executes dropped EXE
PID:3912 -
\??\c:\xffxllr.exec:\xffxllr.exe55⤵
- Executes dropped EXE
PID:3840 -
\??\c:\ththtt.exec:\ththtt.exe56⤵
- Executes dropped EXE
PID:1464 -
\??\c:\hhnnnb.exec:\hhnnnb.exe57⤵
- Executes dropped EXE
PID:3716 -
\??\c:\vpdvp.exec:\vpdvp.exe58⤵
- Executes dropped EXE
PID:2916 -
\??\c:\lrlrxrf.exec:\lrlrxrf.exe59⤵
- Executes dropped EXE
PID:3172 -
\??\c:\frrlxxr.exec:\frrlxxr.exe60⤵
- Executes dropped EXE
PID:2196 -
\??\c:\btthtn.exec:\btthtn.exe61⤵
- Executes dropped EXE
PID:1716 -
\??\c:\dvjdp.exec:\dvjdp.exe62⤵
- Executes dropped EXE
PID:1496 -
\??\c:\jddjv.exec:\jddjv.exe63⤵
- Executes dropped EXE
PID:1632 -
\??\c:\fxfxlfx.exec:\fxfxlfx.exe64⤵
- Executes dropped EXE
PID:2020 -
\??\c:\3flxrlx.exec:\3flxrlx.exe65⤵
- Executes dropped EXE
PID:2972 -
\??\c:\hhtthb.exec:\hhtthb.exe66⤵PID:4840
-
\??\c:\5pvdd.exec:\5pvdd.exe67⤵PID:1560
-
\??\c:\jvdvv.exec:\jvdvv.exe68⤵PID:4236
-
\??\c:\ffflxxr.exec:\ffflxxr.exe69⤵PID:4344
-
\??\c:\nnbthb.exec:\nnbthb.exe70⤵PID:4764
-
\??\c:\ppjdp.exec:\ppjdp.exe71⤵PID:4252
-
\??\c:\pvvjd.exec:\pvvjd.exe72⤵PID:3572
-
\??\c:\fffxrll.exec:\fffxrll.exe73⤵PID:548
-
\??\c:\hhtnnt.exec:\hhtnnt.exe74⤵PID:4496
-
\??\c:\hhtthn.exec:\hhtthn.exe75⤵PID:972
-
\??\c:\pppdv.exec:\pppdv.exe76⤵PID:3616
-
\??\c:\xflxrrr.exec:\xflxrrr.exe77⤵PID:3032
-
\??\c:\rffrflx.exec:\rffrflx.exe78⤵PID:1488
-
\??\c:\thhbnn.exec:\thhbnn.exe79⤵PID:5056
-
\??\c:\vppjv.exec:\vppjv.exe80⤵PID:2264
-
\??\c:\1jpdp.exec:\1jpdp.exe81⤵PID:4936
-
\??\c:\xrfflrl.exec:\xrfflrl.exe82⤵PID:1740
-
\??\c:\nthtth.exec:\nthtth.exe83⤵PID:3808
-
\??\c:\1jpdp.exec:\1jpdp.exe84⤵PID:1652
-
\??\c:\vvdvj.exec:\vvdvj.exe85⤵PID:2292
-
\??\c:\xrrrxfx.exec:\xrrrxfx.exe86⤵PID:3864
-
\??\c:\bhhnhb.exec:\bhhnhb.exe87⤵PID:2268
-
\??\c:\pdvdd.exec:\pdvdd.exe88⤵PID:4176
-
\??\c:\dpvpv.exec:\dpvpv.exe89⤵PID:3480
-
\??\c:\hbtttn.exec:\hbtttn.exe90⤵PID:5080
-
\??\c:\pdvpp.exec:\pdvpp.exe91⤵PID:3400
-
\??\c:\lfllxfl.exec:\lfllxfl.exe92⤵PID:2612
-
\??\c:\nhbttn.exec:\nhbttn.exe93⤵PID:2848
-
\??\c:\7vpdj.exec:\7vpdj.exe94⤵PID:2540
-
\??\c:\7llfrrl.exec:\7llfrrl.exe95⤵PID:8
-
\??\c:\nbhbtn.exec:\nbhbtn.exe96⤵PID:2040
-
\??\c:\hhhtnb.exec:\hhhtnb.exe97⤵PID:4712
-
\??\c:\vjpjv.exec:\vjpjv.exe98⤵PID:4196
-
\??\c:\llllxxf.exec:\llllxxf.exe99⤵PID:1212
-
\??\c:\xrrlxxr.exec:\xrrlxxr.exe100⤵PID:704
-
\??\c:\nhhhhh.exec:\nhhhhh.exe101⤵PID:4600
-
\??\c:\vppjd.exec:\vppjd.exe102⤵PID:2072
-
\??\c:\1hhbtn.exec:\1hhbtn.exe103⤵PID:1948
-
\??\c:\pjpjd.exec:\pjpjd.exe104⤵PID:2296
-
\??\c:\lfffxfx.exec:\lfffxfx.exe105⤵PID:4312
-
\??\c:\hbnthh.exec:\hbnthh.exe106⤵PID:2308
-
\??\c:\pjvdd.exec:\pjvdd.exe107⤵PID:736
-
\??\c:\jppjd.exec:\jppjd.exe108⤵PID:4776
-
\??\c:\rfrrxll.exec:\rfrrxll.exe109⤵PID:3136
-
\??\c:\tbhbtt.exec:\tbhbtt.exe110⤵PID:4468
-
\??\c:\pdjdd.exec:\pdjdd.exe111⤵PID:4344
-
\??\c:\dppdv.exec:\dppdv.exe112⤵PID:3664
-
\??\c:\lflrrrl.exec:\lflrrrl.exe113⤵PID:4252
-
\??\c:\xfrllrx.exec:\xfrllrx.exe114⤵PID:4920
-
\??\c:\9ttbnn.exec:\9ttbnn.exe115⤵PID:548
-
\??\c:\vvpjv.exec:\vvpjv.exe116⤵PID:4280
-
\??\c:\fxfrlfx.exec:\fxfrlfx.exe117⤵PID:684
-
\??\c:\9hhbtt.exec:\9hhbtt.exe118⤵PID:2632
-
\??\c:\jjvdj.exec:\jjvdj.exe119⤵PID:4028
-
\??\c:\5rfrllf.exec:\5rfrllf.exe120⤵PID:1700
-
\??\c:\xllfrfx.exec:\xllfrfx.exe121⤵PID:540
-
\??\c:\htbbht.exec:\htbbht.exe122⤵PID:828
-
\??\c:\3djjj.exec:\3djjj.exe123⤵PID:4080
-
\??\c:\jdjdp.exec:\jdjdp.exe124⤵PID:3808
-
\??\c:\rfxfffx.exec:\rfxfffx.exe125⤵PID:1272
-
\??\c:\httnhh.exec:\httnhh.exe126⤵PID:4044
-
\??\c:\jjjpj.exec:\jjjpj.exe127⤵PID:4672
-
\??\c:\vpjdp.exec:\vpjdp.exe128⤵PID:3844
-
\??\c:\xlllxlf.exec:\xlllxlf.exe129⤵PID:380
-
\??\c:\7rflflx.exec:\7rflflx.exe130⤵PID:1252
-
\??\c:\nhbbnh.exec:\nhbbnh.exe131⤵PID:596
-
\??\c:\jdvdj.exec:\jdvdj.exe132⤵PID:3392
-
\??\c:\ppvpj.exec:\ppvpj.exe133⤵PID:1344
-
\??\c:\lxfxrrr.exec:\lxfxrrr.exe134⤵PID:4712
-
\??\c:\tnhntn.exec:\tnhntn.exe135⤵PID:3872
-
\??\c:\dvdvj.exec:\dvdvj.exe136⤵PID:2916
-
\??\c:\jvdvp.exec:\jvdvp.exe137⤵PID:2708
-
\??\c:\thnhtt.exec:\thnhtt.exe138⤵PID:628
-
\??\c:\pdjjp.exec:\pdjjp.exe139⤵PID:1920
-
\??\c:\fxfxllr.exec:\fxfxllr.exe140⤵PID:1496
-
\??\c:\tnhnbh.exec:\tnhnbh.exe141⤵PID:4860
-
\??\c:\bttnhh.exec:\bttnhh.exe142⤵PID:2020
-
\??\c:\jvvpv.exec:\jvvpv.exe143⤵PID:3592
-
\??\c:\fllfxrl.exec:\fllfxrl.exe144⤵PID:2608
-
\??\c:\9fxrllr.exec:\9fxrllr.exe145⤵PID:1148
-
\??\c:\bhhnhb.exec:\bhhnhb.exe146⤵PID:5044
-
\??\c:\ddjdd.exec:\ddjdd.exe147⤵PID:4932
-
\??\c:\fxfxrlf.exec:\fxfxrlf.exe148⤵PID:2016
-
\??\c:\bhnnbt.exec:\bhnnbt.exe149⤵PID:1468
-
\??\c:\hhnhtt.exec:\hhnhtt.exe150⤵PID:4316
-
\??\c:\jdvpd.exec:\jdvpd.exe151⤵PID:972
-
\??\c:\rrfxrrl.exec:\rrfxrrl.exe152⤵PID:1144
-
\??\c:\tnhthh.exec:\tnhthh.exe153⤵PID:2884
-
\??\c:\vdjpp.exec:\vdjpp.exe154⤵PID:4844
-
\??\c:\5pvpj.exec:\5pvpj.exe155⤵PID:4268
-
\??\c:\rrxlxxr.exec:\rrxlxxr.exe156⤵PID:3656
-
\??\c:\xxxrrxr.exec:\xxxrrxr.exe157⤵PID:2264
-
\??\c:\tnbtnn.exec:\tnbtnn.exe158⤵PID:540
-
\??\c:\9tttnn.exec:\9tttnn.exe159⤵PID:2580
-
\??\c:\djdvv.exec:\djdvv.exe160⤵PID:1652
-
\??\c:\fxrlxxr.exec:\fxrlxxr.exe161⤵PID:3888
-
\??\c:\tthnhh.exec:\tthnhh.exe162⤵PID:3580
-
\??\c:\pdjdp.exec:\pdjdp.exe163⤵PID:2952
-
\??\c:\xxxrlfx.exec:\xxxrlfx.exe164⤵PID:2476
-
\??\c:\tthbtt.exec:\tthbtt.exe165⤵PID:864
-
\??\c:\bntbhn.exec:\bntbhn.exe166⤵PID:5092
-
\??\c:\tnnhbb.exec:\tnnhbb.exe167⤵PID:3876
-
\??\c:\ddppj.exec:\ddppj.exe168⤵PID:3784
-
\??\c:\fxxrrrl.exec:\fxxrrrl.exe169⤵PID:4172
-
\??\c:\bhttbh.exec:\bhttbh.exe170⤵PID:4196
-
\??\c:\pvvvp.exec:\pvvvp.exe171⤵PID:3624
-
\??\c:\rffxrrr.exec:\rffxrrr.exe172⤵PID:2704
-
\??\c:\nnhhth.exec:\nnhhth.exe173⤵PID:2976
-
\??\c:\5vvjd.exec:\5vvjd.exe174⤵PID:4996
-
\??\c:\vdjpv.exec:\vdjpv.exe175⤵PID:1828
-
\??\c:\fflflrl.exec:\fflflrl.exe176⤵PID:1944
-
\??\c:\hbtbth.exec:\hbtbth.exe177⤵PID:3148
-
\??\c:\jjjjd.exec:\jjjjd.exe178⤵PID:736
-
\??\c:\rrrlllf.exec:\rrrlllf.exe179⤵PID:3108
-
\??\c:\xlxfrxf.exec:\xlxfrxf.exe180⤵PID:1844
-
\??\c:\nnhtbn.exec:\nnhtbn.exe181⤵PID:1484
-
\??\c:\vvvdj.exec:\vvvdj.exe182⤵PID:4348
-
\??\c:\rfffxxl.exec:\rfffxxl.exe183⤵PID:4344
-
\??\c:\nhhbtn.exec:\nhhbtn.exe184⤵PID:2888
-
\??\c:\vdddd.exec:\vdddd.exe185⤵PID:1776
-
\??\c:\frfffxx.exec:\frfffxx.exe186⤵PID:2352
-
\??\c:\xxrxrxf.exec:\xxrxrxf.exe187⤵PID:4284
-
\??\c:\nhthnn.exec:\nhthnn.exe188⤵PID:3032
-
\??\c:\djdpp.exec:\djdpp.exe189⤵PID:4856
-
\??\c:\xrlffff.exec:\xrlffff.exe190⤵PID:4952
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe191⤵PID:4016
-
\??\c:\bbbtnt.exec:\bbbtnt.exe192⤵PID:60
-
\??\c:\vpvdp.exec:\vpvdp.exe193⤵PID:2764
-
\??\c:\fxrlfff.exec:\fxrlfff.exe194⤵PID:4204
-
\??\c:\nthbtn.exec:\nthbtn.exe195⤵PID:3048
-
\??\c:\bthtnt.exec:\bthtnt.exe196⤵PID:1832
-
\??\c:\pddvp.exec:\pddvp.exe197⤵PID:2500
-
\??\c:\jppvv.exec:\jppvv.exe198⤵PID:3076
-
\??\c:\9lxxlff.exec:\9lxxlff.exe199⤵PID:696
-
\??\c:\bnnnhb.exec:\bnnnhb.exe200⤵PID:4772
-
\??\c:\3ppjd.exec:\3ppjd.exe201⤵PID:4460
-
\??\c:\xrxlrrr.exec:\xrxlrrr.exe202⤵PID:1252
-
\??\c:\rlxrrlr.exec:\rlxrrlr.exe203⤵PID:1480
-
\??\c:\bntbbb.exec:\bntbbb.exe204⤵PID:4308
-
\??\c:\jdpjd.exec:\jdpjd.exe205⤵PID:2956
-
\??\c:\fxfflfx.exec:\fxfflfx.exe206⤵PID:4712
-
\??\c:\bnhbbn.exec:\bnhbbn.exe207⤵PID:4884
-
\??\c:\hbbbhn.exec:\hbbbhn.exe208⤵PID:2704
-
\??\c:\9jpdv.exec:\9jpdv.exe209⤵PID:4556
-
\??\c:\ffrrxrx.exec:\ffrrxrx.exe210⤵PID:2176
-
\??\c:\ttthhh.exec:\ttthhh.exe211⤵PID:2308
-
\??\c:\btnhhh.exec:\btnhhh.exe212⤵PID:3504
-
\??\c:\vpvjp.exec:\vpvjp.exe213⤵PID:3592
-
\??\c:\vjjpp.exec:\vjjpp.exe214⤵PID:2036
-
\??\c:\rxfffff.exec:\rxfffff.exe215⤵PID:5044
-
\??\c:\thnhhn.exec:\thnhhn.exe216⤵PID:3268
-
\??\c:\vppjv.exec:\vppjv.exe217⤵PID:4252
-
\??\c:\xxlfrfl.exec:\xxlfrfl.exe218⤵PID:2824
-
\??\c:\bntnhb.exec:\bntnhb.exe219⤵PID:4496
-
\??\c:\nhttnn.exec:\nhttnn.exe220⤵PID:3868
-
\??\c:\vpdvv.exec:\vpdvv.exe221⤵PID:976
-
\??\c:\jdppp.exec:\jdppp.exe222⤵PID:3704
-
\??\c:\1lfrrff.exec:\1lfrrff.exe223⤵PID:2884
-
\??\c:\htttnt.exec:\htttnt.exe224⤵PID:3260
-
\??\c:\tthtnb.exec:\tthtnb.exe225⤵PID:4412
-
\??\c:\jpjdv.exec:\jpjdv.exe226⤵PID:4088
-
\??\c:\3lllllf.exec:\3lllllf.exe227⤵PID:2620
-
\??\c:\1xxrfxr.exec:\1xxrfxr.exe228⤵PID:3280
-
\??\c:\tnnbbn.exec:\tnnbbn.exe229⤵PID:2580
-
\??\c:\1thnnb.exec:\1thnnb.exe230⤵PID:3440
-
\??\c:\jdpvv.exec:\jdpvv.exe231⤵PID:2344
-
\??\c:\7xflrrl.exec:\7xflrrl.exe232⤵PID:792
-
\??\c:\hbbbhh.exec:\hbbbhh.exe233⤵PID:3844
-
\??\c:\1btnbn.exec:\1btnbn.exe234⤵PID:2476
-
\??\c:\vdpjj.exec:\vdpjj.exe235⤵PID:4368
-
\??\c:\jjjjj.exec:\jjjjj.exe236⤵PID:3912
-
\??\c:\lxlxrxr.exec:\lxlxrxr.exe237⤵PID:1512
-
\??\c:\ttnnhh.exec:\ttnnhh.exe238⤵PID:3148
-
\??\c:\thnhtt.exec:\thnhtt.exe239⤵PID:3144
-
\??\c:\vvpvv.exec:\vvpvv.exe240⤵PID:924
-
\??\c:\lrrfffl.exec:\lrrfffl.exe241⤵PID:4236
-
\??\c:\lxflfrf.exec:\lxflfrf.exe242⤵PID:452