Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 06:36
Behavioral task
behavioral1
Sample
c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe
-
Size
80KB
-
MD5
c6b54ed0a412ff1d53c8cc90ab346660
-
SHA1
9b6788e323d239e86e84dacc6475f7d3fac90bd7
-
SHA256
19ba1e4afc27a28b2f37dee4ace395cc371ed26e9c646ad6ac94789388f7ddf7
-
SHA512
536e21ec78f8373bff91b387c27c76cf047012a5f27ad7f64f345abdf4ce576863d0ac56c2d12da100cb8ed134180fa55e3f646911b8bbd4f730ce896fdf2183
-
SSDEEP
1536:zvQBeOGtrYS3srx93UBWfwC6Ggnouy8iT4+C2HVM1p6T7QS:zhOmTsF93UYfwC6GIoutiTU2HVS63QS
Malware Config
Signatures
-
Detect Blackmoon payload 42 IoCs
Processes:
resource yara_rule behavioral1/memory/2100-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2896-15-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2964-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2136-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2640-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2728-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2456-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2612-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2936-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2936-89-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2108-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2688-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2312-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/352-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2404-185-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2392-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1864-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/904-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1368-238-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2004-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1036-254-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2884-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2320-286-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2900-298-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1600-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2588-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2724-343-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2688-398-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2688-399-0x0000000000250000-0x0000000000277000-memory.dmp family_blackmoon behavioral1/memory/2812-411-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/344-477-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2824-696-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2868-758-0x00000000003B0000-0x00000000003D7000-memory.dmp family_blackmoon behavioral1/memory/2412-774-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1304-780-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/960-796-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1996-808-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2584-896-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/2492-1184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1340-28169-0x0000000076BA0000-0x0000000076CBF000-memory.dmp family_blackmoon behavioral1/memory/1340-30210-0x0000000076BA0000-0x0000000076CBF000-memory.dmp family_blackmoon behavioral1/memory/1340-30794-0x0000000076BA0000-0x0000000076CBF000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
bbnntb.exevpvdj.exefrllrlr.exentnthb.exepjvdp.exepvpjp.exettnhhh.exebbhnbn.exejdvvv.exerfrfxfx.exe1tnntt.exehtntbn.exevpvdd.exejvpdj.exelfxlxfr.exetntbbb.exetntnnn.exepjdpv.exerlfxllr.exelrrrfxf.exethbbhh.exethtbtb.exejdpdj.exelxxxxxf.exexrllxfx.exebbnntt.exehhtnhn.exevpddp.exefrflrlx.exe5nhthb.exebnhbtn.exedvjjp.exelfllrrf.exethhhtn.exebnhhth.exevjvjp.exelxfflfr.exenhtnnn.exenbnhhb.exethhntt.exe9djjp.exelxllllr.exexxxxxff.exenbnnhh.exe9vjjj.exevjppd.exexrxrxrf.exefflxfxr.exenbhntt.exedpppd.exedpjdv.exelxxrllr.exe5bthtn.exebthhtb.exejvdvv.exe9pvvp.exefxfffxf.exe7lfxfxx.exe3tnhht.exedvvdd.exelxllxfl.exenhthbh.exe7bhbnn.exedpvjp.exepid process 2896 bbnntb.exe 2964 vpvdj.exe 2136 frllrlr.exe 2640 ntnthb.exe 2604 pjvdp.exe 2728 pvpjp.exe 2656 ttnhhh.exe 2612 bbhnbn.exe 2456 jdvvv.exe 2936 rfrfxfx.exe 2108 1tnntt.exe 2688 htntbn.exe 2756 vpvdd.exe 2820 jvpdj.exe 1220 lfxlxfr.exe 2312 tntbbb.exe 1768 tntnnn.exe 1092 pjdpv.exe 1680 rlfxllr.exe 1788 lrrrfxf.exe 352 thbbhh.exe 2296 thtbtb.exe 2404 jdpdj.exe 2392 lxxxxxf.exe 2232 xrllxfx.exe 1864 bbnntt.exe 904 hhtnhn.exe 3048 vpddp.exe 1368 frflrlx.exe 2004 5nhthb.exe 1036 bnhbtn.exe 2288 dvjjp.exe 2744 lfllrrf.exe 2884 thhhtn.exe 112 bnhhth.exe 2320 vjvjp.exe 1520 lxfflfr.exe 2184 nhtnnn.exe 2900 nbnhhb.exe 1600 thhntt.exe 2836 9djjp.exe 2540 lxllllr.exe 2588 xxxxxff.exe 2660 nbnnhh.exe 2648 9vjjj.exe 2724 vjppd.exe 2480 xrxrxrf.exe 2608 fflxfxr.exe 2560 nbhntt.exe 2476 dpppd.exe 2464 dpjdv.exe 2944 lxxrllr.exe 2568 5bthtn.exe 2760 bthhtb.exe 1984 jvdvv.exe 2688 9pvvp.exe 1664 fxfffxf.exe 2812 7lfxfxx.exe 2824 3tnhht.exe 1748 dvvdd.exe 2224 lxllxfl.exe 1668 nhthbh.exe 1460 7bhbnn.exe 2940 dpvjp.exe -
Processes:
resource yara_rule behavioral1/memory/2100-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2100-7-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bbnntb.exe upx behavioral1/memory/2896-8-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpvdj.exe upx behavioral1/memory/2896-15-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\frllrlr.exe upx behavioral1/memory/2964-24-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ntnthb.exe upx behavioral1/memory/2136-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2640-33-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2640-41-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjvdp.exe upx behavioral1/memory/2604-48-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\pvpjp.exe upx C:\ttnhhh.exe upx behavioral1/memory/2728-58-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bbhnbn.exe upx C:\jdvvv.exe upx behavioral1/memory/2456-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2612-73-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rfrfxfx.exe upx C:\1tnntt.exe upx behavioral1/memory/2936-90-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2108-97-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\htntbn.exe upx C:\vpvdd.exe upx behavioral1/memory/2688-106-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvpdj.exe upx behavioral1/memory/2820-114-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfxlxfr.exe upx C:\tntbbb.exe upx behavioral1/memory/2312-136-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tntnnn.exe upx behavioral1/memory/1768-137-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjdpv.exe upx C:\rlfxllr.exe upx behavioral1/memory/1680-156-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\lrrrfxf.exe upx C:\thbbhh.exe upx behavioral1/memory/352-168-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\thtbtb.exe upx behavioral1/memory/352-176-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdpdj.exe upx behavioral1/memory/2404-185-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lxxxxxf.exe upx behavioral1/memory/2392-199-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xrllxfx.exe upx \??\c:\bbnntt.exe upx behavioral1/memory/1864-207-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1864-214-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hhtnhn.exe upx C:\vpddp.exe upx behavioral1/memory/904-223-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\frflrlx.exe upx C:\5nhthb.exe upx behavioral1/memory/1368-238-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2004-246-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bnhbtn.exe upx behavioral1/memory/1036-254-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvjjp.exe upx behavioral1/memory/2288-256-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2884-268-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2884-274-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exebbnntb.exevpvdj.exefrllrlr.exentnthb.exepjvdp.exepvpjp.exettnhhh.exebbhnbn.exejdvvv.exerfrfxfx.exe1tnntt.exehtntbn.exevpvdd.exejvpdj.exelfxlxfr.exedescription pid process target process PID 2100 wrote to memory of 2896 2100 c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe bbnntb.exe PID 2100 wrote to memory of 2896 2100 c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe bbnntb.exe PID 2100 wrote to memory of 2896 2100 c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe bbnntb.exe PID 2100 wrote to memory of 2896 2100 c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe bbnntb.exe PID 2896 wrote to memory of 2964 2896 bbnntb.exe vpvdj.exe PID 2896 wrote to memory of 2964 2896 bbnntb.exe vpvdj.exe PID 2896 wrote to memory of 2964 2896 bbnntb.exe vpvdj.exe PID 2896 wrote to memory of 2964 2896 bbnntb.exe vpvdj.exe PID 2964 wrote to memory of 2136 2964 vpvdj.exe frllrlr.exe PID 2964 wrote to memory of 2136 2964 vpvdj.exe frllrlr.exe PID 2964 wrote to memory of 2136 2964 vpvdj.exe frllrlr.exe PID 2964 wrote to memory of 2136 2964 vpvdj.exe frllrlr.exe PID 2136 wrote to memory of 2640 2136 frllrlr.exe ntnthb.exe PID 2136 wrote to memory of 2640 2136 frllrlr.exe ntnthb.exe PID 2136 wrote to memory of 2640 2136 frllrlr.exe ntnthb.exe PID 2136 wrote to memory of 2640 2136 frllrlr.exe ntnthb.exe PID 2640 wrote to memory of 2604 2640 ntnthb.exe pjvdp.exe PID 2640 wrote to memory of 2604 2640 ntnthb.exe pjvdp.exe PID 2640 wrote to memory of 2604 2640 ntnthb.exe pjvdp.exe PID 2640 wrote to memory of 2604 2640 ntnthb.exe pjvdp.exe PID 2604 wrote to memory of 2728 2604 pjvdp.exe pvpjp.exe PID 2604 wrote to memory of 2728 2604 pjvdp.exe pvpjp.exe PID 2604 wrote to memory of 2728 2604 pjvdp.exe pvpjp.exe PID 2604 wrote to memory of 2728 2604 pjvdp.exe pvpjp.exe PID 2728 wrote to memory of 2656 2728 pvpjp.exe ttnhhh.exe PID 2728 wrote to memory of 2656 2728 pvpjp.exe ttnhhh.exe PID 2728 wrote to memory of 2656 2728 pvpjp.exe ttnhhh.exe PID 2728 wrote to memory of 2656 2728 pvpjp.exe ttnhhh.exe PID 2656 wrote to memory of 2612 2656 ttnhhh.exe bbhnbn.exe PID 2656 wrote to memory of 2612 2656 ttnhhh.exe bbhnbn.exe PID 2656 wrote to memory of 2612 2656 ttnhhh.exe bbhnbn.exe PID 2656 wrote to memory of 2612 2656 ttnhhh.exe bbhnbn.exe PID 2612 wrote to memory of 2456 2612 bbhnbn.exe jdvvv.exe PID 2612 wrote to memory of 2456 2612 bbhnbn.exe jdvvv.exe PID 2612 wrote to memory of 2456 2612 bbhnbn.exe jdvvv.exe PID 2612 wrote to memory of 2456 2612 bbhnbn.exe jdvvv.exe PID 2456 wrote to memory of 2936 2456 jdvvv.exe rfrfxfx.exe PID 2456 wrote to memory of 2936 2456 jdvvv.exe rfrfxfx.exe PID 2456 wrote to memory of 2936 2456 jdvvv.exe rfrfxfx.exe PID 2456 wrote to memory of 2936 2456 jdvvv.exe rfrfxfx.exe PID 2936 wrote to memory of 2108 2936 rfrfxfx.exe 1tnntt.exe PID 2936 wrote to memory of 2108 2936 rfrfxfx.exe 1tnntt.exe PID 2936 wrote to memory of 2108 2936 rfrfxfx.exe 1tnntt.exe PID 2936 wrote to memory of 2108 2936 rfrfxfx.exe 1tnntt.exe PID 2108 wrote to memory of 2688 2108 1tnntt.exe htntbn.exe PID 2108 wrote to memory of 2688 2108 1tnntt.exe htntbn.exe PID 2108 wrote to memory of 2688 2108 1tnntt.exe htntbn.exe PID 2108 wrote to memory of 2688 2108 1tnntt.exe htntbn.exe PID 2688 wrote to memory of 2756 2688 htntbn.exe vpvdd.exe PID 2688 wrote to memory of 2756 2688 htntbn.exe vpvdd.exe PID 2688 wrote to memory of 2756 2688 htntbn.exe vpvdd.exe PID 2688 wrote to memory of 2756 2688 htntbn.exe vpvdd.exe PID 2756 wrote to memory of 2820 2756 vpvdd.exe jvpdj.exe PID 2756 wrote to memory of 2820 2756 vpvdd.exe jvpdj.exe PID 2756 wrote to memory of 2820 2756 vpvdd.exe jvpdj.exe PID 2756 wrote to memory of 2820 2756 vpvdd.exe jvpdj.exe PID 2820 wrote to memory of 1220 2820 jvpdj.exe lfxlxfr.exe PID 2820 wrote to memory of 1220 2820 jvpdj.exe lfxlxfr.exe PID 2820 wrote to memory of 1220 2820 jvpdj.exe lfxlxfr.exe PID 2820 wrote to memory of 1220 2820 jvpdj.exe lfxlxfr.exe PID 1220 wrote to memory of 2312 1220 lfxlxfr.exe tntbbb.exe PID 1220 wrote to memory of 2312 1220 lfxlxfr.exe tntbbb.exe PID 1220 wrote to memory of 2312 1220 lfxlxfr.exe tntbbb.exe PID 1220 wrote to memory of 2312 1220 lfxlxfr.exe tntbbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c6b54ed0a412ff1d53c8cc90ab346660_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\bbnntb.exec:\bbnntb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\vpvdj.exec:\vpvdj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\frllrlr.exec:\frllrlr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\ntnthb.exec:\ntnthb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\pjvdp.exec:\pjvdp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\pvpjp.exec:\pvpjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\ttnhhh.exec:\ttnhhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\bbhnbn.exec:\bbhnbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\jdvvv.exec:\jdvvv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\rfrfxfx.exec:\rfrfxfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\1tnntt.exec:\1tnntt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\htntbn.exec:\htntbn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\vpvdd.exec:\vpvdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\jvpdj.exec:\jvpdj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\lfxlxfr.exec:\lfxlxfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
\??\c:\tntbbb.exec:\tntbbb.exe17⤵
- Executes dropped EXE
PID:2312 -
\??\c:\tntnnn.exec:\tntnnn.exe18⤵
- Executes dropped EXE
PID:1768 -
\??\c:\pjdpv.exec:\pjdpv.exe19⤵
- Executes dropped EXE
PID:1092 -
\??\c:\rlfxllr.exec:\rlfxllr.exe20⤵
- Executes dropped EXE
PID:1680 -
\??\c:\lrrrfxf.exec:\lrrrfxf.exe21⤵
- Executes dropped EXE
PID:1788 -
\??\c:\thbbhh.exec:\thbbhh.exe22⤵
- Executes dropped EXE
PID:352 -
\??\c:\thtbtb.exec:\thtbtb.exe23⤵
- Executes dropped EXE
PID:2296 -
\??\c:\jdpdj.exec:\jdpdj.exe24⤵
- Executes dropped EXE
PID:2404 -
\??\c:\lxxxxxf.exec:\lxxxxxf.exe25⤵
- Executes dropped EXE
PID:2392 -
\??\c:\xrllxfx.exec:\xrllxfx.exe26⤵
- Executes dropped EXE
PID:2232 -
\??\c:\bbnntt.exec:\bbnntt.exe27⤵
- Executes dropped EXE
PID:1864 -
\??\c:\hhtnhn.exec:\hhtnhn.exe28⤵
- Executes dropped EXE
PID:904 -
\??\c:\vpddp.exec:\vpddp.exe29⤵
- Executes dropped EXE
PID:3048 -
\??\c:\frflrlx.exec:\frflrlx.exe30⤵
- Executes dropped EXE
PID:1368 -
\??\c:\5nhthb.exec:\5nhthb.exe31⤵
- Executes dropped EXE
PID:2004 -
\??\c:\bnhbtn.exec:\bnhbtn.exe32⤵
- Executes dropped EXE
PID:1036 -
\??\c:\dvjjp.exec:\dvjjp.exe33⤵
- Executes dropped EXE
PID:2288 -
\??\c:\lfllrrf.exec:\lfllrrf.exe34⤵
- Executes dropped EXE
PID:2744 -
\??\c:\thhhtn.exec:\thhhtn.exe35⤵
- Executes dropped EXE
PID:2884 -
\??\c:\bnhhth.exec:\bnhhth.exe36⤵
- Executes dropped EXE
PID:112 -
\??\c:\vjvjp.exec:\vjvjp.exe37⤵
- Executes dropped EXE
PID:2320 -
\??\c:\lxfflfr.exec:\lxfflfr.exe38⤵
- Executes dropped EXE
PID:1520 -
\??\c:\nhtnnn.exec:\nhtnnn.exe39⤵
- Executes dropped EXE
PID:2184 -
\??\c:\nbnhhb.exec:\nbnhhb.exe40⤵
- Executes dropped EXE
PID:2900 -
\??\c:\thhntt.exec:\thhntt.exe41⤵
- Executes dropped EXE
PID:1600 -
\??\c:\9djjp.exec:\9djjp.exe42⤵
- Executes dropped EXE
PID:2836 -
\??\c:\lxllllr.exec:\lxllllr.exe43⤵
- Executes dropped EXE
PID:2540 -
\??\c:\xxxxxff.exec:\xxxxxff.exe44⤵
- Executes dropped EXE
PID:2588 -
\??\c:\nbnnhh.exec:\nbnnhh.exe45⤵
- Executes dropped EXE
PID:2660 -
\??\c:\9vjjj.exec:\9vjjj.exe46⤵
- Executes dropped EXE
PID:2648 -
\??\c:\vjppd.exec:\vjppd.exe47⤵
- Executes dropped EXE
PID:2724 -
\??\c:\xrxrxrf.exec:\xrxrxrf.exe48⤵
- Executes dropped EXE
PID:2480 -
\??\c:\fflxfxr.exec:\fflxfxr.exe49⤵
- Executes dropped EXE
PID:2608 -
\??\c:\nbhntt.exec:\nbhntt.exe50⤵
- Executes dropped EXE
PID:2560 -
\??\c:\dpppd.exec:\dpppd.exe51⤵
- Executes dropped EXE
PID:2476 -
\??\c:\dpjdv.exec:\dpjdv.exe52⤵
- Executes dropped EXE
PID:2464 -
\??\c:\lxxrllr.exec:\lxxrllr.exe53⤵
- Executes dropped EXE
PID:2944 -
\??\c:\5bthtn.exec:\5bthtn.exe54⤵
- Executes dropped EXE
PID:2568 -
\??\c:\bthhtb.exec:\bthhtb.exe55⤵
- Executes dropped EXE
PID:2760 -
\??\c:\jvdvv.exec:\jvdvv.exe56⤵
- Executes dropped EXE
PID:1984 -
\??\c:\9pvvp.exec:\9pvvp.exe57⤵
- Executes dropped EXE
PID:2688 -
\??\c:\fxfffxf.exec:\fxfffxf.exe58⤵
- Executes dropped EXE
PID:1664 -
\??\c:\7lfxfxx.exec:\7lfxfxx.exe59⤵
- Executes dropped EXE
PID:2812 -
\??\c:\3tnhht.exec:\3tnhht.exe60⤵
- Executes dropped EXE
PID:2824 -
\??\c:\dvvdd.exec:\dvvdd.exe61⤵
- Executes dropped EXE
PID:1748 -
\??\c:\lxllxfl.exec:\lxllxfl.exe62⤵
- Executes dropped EXE
PID:2224 -
\??\c:\nhthbh.exec:\nhthbh.exe63⤵
- Executes dropped EXE
PID:1668 -
\??\c:\7bhbnn.exec:\7bhbnn.exe64⤵
- Executes dropped EXE
PID:1460 -
\??\c:\dpvjp.exec:\dpvjp.exe65⤵
- Executes dropped EXE
PID:2940 -
\??\c:\jjjvv.exec:\jjjvv.exe66⤵PID:1632
-
\??\c:\rrrflxl.exec:\rrrflxl.exe67⤵PID:1788
-
\??\c:\ntthtn.exec:\ntthtn.exe68⤵PID:2268
-
\??\c:\bhhttn.exec:\bhhttn.exe69⤵PID:2060
-
\??\c:\vjvvd.exec:\vjvvd.exe70⤵PID:2624
-
\??\c:\7dvvd.exec:\7dvvd.exe71⤵PID:2872
-
\??\c:\5frlrrx.exec:\5frlrrx.exe72⤵PID:344
-
\??\c:\lrxlrrx.exec:\lrxlrrx.exe73⤵PID:1628
-
\??\c:\1bnthh.exec:\1bnthh.exe74⤵PID:3020
-
\??\c:\pddvd.exec:\pddvd.exe75⤵PID:1864
-
\??\c:\lfxfffx.exec:\lfxfffx.exe76⤵PID:3008
-
\??\c:\xrflrxx.exec:\xrflrxx.exe77⤵PID:1136
-
\??\c:\1nntnb.exec:\1nntnb.exe78⤵PID:2152
-
\??\c:\nbhhhh.exec:\nbhhhh.exe79⤵PID:960
-
\??\c:\7tbnnb.exec:\7tbnnb.exe80⤵PID:1552
-
\??\c:\dvvpv.exec:\dvvpv.exe81⤵PID:608
-
\??\c:\rxrrxll.exec:\rxrrxll.exe82⤵PID:2012
-
\??\c:\xrfrllr.exec:\xrfrllr.exe83⤵PID:828
-
\??\c:\thnhnh.exec:\thnhnh.exe84⤵PID:1572
-
\??\c:\pjjpv.exec:\pjjpv.exe85⤵PID:1524
-
\??\c:\jvpvj.exec:\jvpvj.exe86⤵PID:2884
-
\??\c:\rxfrxrr.exec:\rxfrxrr.exe87⤵PID:112
-
\??\c:\flxxrlx.exec:\flxxrlx.exe88⤵PID:1960
-
\??\c:\bnttbt.exec:\bnttbt.exe89⤵PID:1292
-
\??\c:\3vpvd.exec:\3vpvd.exe90⤵PID:2912
-
\??\c:\dvjpv.exec:\dvjpv.exe91⤵PID:356
-
\??\c:\xllflrr.exec:\xllflrr.exe92⤵PID:2628
-
\??\c:\rflffff.exec:\rflffff.exe93⤵PID:3000
-
\??\c:\7nhnhh.exec:\7nhnhh.exe94⤵PID:2056
-
\??\c:\pjpvp.exec:\pjpvp.exe95⤵PID:2136
-
\??\c:\9jppd.exec:\9jppd.exe96⤵PID:2552
-
\??\c:\3xffffx.exec:\3xffffx.exe97⤵PID:2580
-
\??\c:\frfflff.exec:\frfflff.exe98⤵PID:2640
-
\??\c:\ttbnnh.exec:\ttbnnh.exe99⤵PID:2732
-
\??\c:\hthhhn.exec:\hthhhn.exe100⤵PID:2848
-
\??\c:\7vvdd.exec:\7vvdd.exe101⤵PID:2728
-
\??\c:\fxffflr.exec:\fxffflr.exe102⤵PID:2720
-
\??\c:\3xlxxxx.exec:\3xlxxxx.exe103⤵PID:2376
-
\??\c:\nbhhhb.exec:\nbhhhb.exe104⤵PID:2456
-
\??\c:\5nbhhh.exec:\5nbhhh.exe105⤵PID:1064
-
\??\c:\nhntnt.exec:\nhntnt.exe106⤵PID:1932
-
\??\c:\vpvvp.exec:\vpvvp.exe107⤵PID:1736
-
\??\c:\rllrffr.exec:\rllrffr.exe108⤵PID:2696
-
\??\c:\lfrllff.exec:\lfrllff.exe109⤵PID:1424
-
\??\c:\lrxxxfr.exec:\lrxxxfr.exe110⤵PID:1428
-
\??\c:\hbbbbb.exec:\hbbbbb.exe111⤵PID:2808
-
\??\c:\hbbnht.exec:\hbbnht.exe112⤵PID:1720
-
\??\c:\jvddj.exec:\jvddj.exe113⤵PID:2824
-
\??\c:\5dppv.exec:\5dppv.exe114⤵PID:1748
-
\??\c:\9lffffx.exec:\9lffffx.exe115⤵PID:2360
-
\??\c:\xxlrxxx.exec:\xxlrxxx.exe116⤵PID:1092
-
\??\c:\bnhhhn.exec:\bnhhhn.exe117⤵PID:3036
-
\??\c:\tbtnbn.exec:\tbtnbn.exe118⤵PID:2940
-
\??\c:\pddvp.exec:\pddvp.exe119⤵PID:2544
-
\??\c:\xfrrxfl.exec:\xfrrxfl.exe120⤵PID:1788
-
\??\c:\9xfllll.exec:\9xfllll.exe121⤵PID:2424
-
\??\c:\nbntnt.exec:\nbntnt.exe122⤵PID:2396
-
\??\c:\thbntt.exec:\thbntt.exe123⤵PID:2404
-
\??\c:\vvvpd.exec:\vvvpd.exe124⤵PID:2428
-
\??\c:\jddvv.exec:\jddvv.exe125⤵PID:2868
-
\??\c:\9rrlrxl.exec:\9rrlrxl.exe126⤵PID:768
-
\??\c:\lfxxlrr.exec:\lfxxlrr.exe127⤵PID:820
-
\??\c:\hthhht.exec:\hthhht.exe128⤵PID:2412
-
\??\c:\thnnbh.exec:\thnnbh.exe129⤵PID:1304
-
\??\c:\ppjpd.exec:\ppjpd.exe130⤵PID:1140
-
\??\c:\vpddd.exec:\vpddd.exe131⤵PID:1368
-
\??\c:\fxrflrr.exec:\fxrflrr.exe132⤵PID:960
-
\??\c:\5fflrxl.exec:\5fflrxl.exe133⤵PID:1552
-
\??\c:\ttntbh.exec:\ttntbh.exe134⤵PID:1996
-
\??\c:\btnhhh.exec:\btnhhh.exe135⤵PID:2116
-
\??\c:\ddpvj.exec:\ddpvj.exe136⤵PID:2888
-
\??\c:\jvvvv.exec:\jvvvv.exe137⤵PID:3056
-
\??\c:\rllrffx.exec:\rllrffx.exe138⤵PID:2980
-
\??\c:\frfllrr.exec:\frfllrr.exe139⤵PID:2120
-
\??\c:\ntnnbh.exec:\ntnnbh.exe140⤵PID:1944
-
\??\c:\1fxxlfr.exec:\1fxxlfr.exe141⤵PID:2112
-
\??\c:\lfxfrrf.exec:\lfxfrrf.exe142⤵PID:1616
-
\??\c:\bhthtb.exec:\bhthtb.exe143⤵PID:2368
-
\??\c:\1bbnnb.exec:\1bbnnb.exe144⤵PID:1600
-
\??\c:\bhhnbn.exec:\bhhnbn.exe145⤵PID:2840
-
\??\c:\pjdpd.exec:\pjdpd.exe146⤵PID:2644
-
\??\c:\9pjpp.exec:\9pjpp.exe147⤵PID:2096
-
\??\c:\lllxxfr.exec:\lllxxfr.exe148⤵PID:2136
-
\??\c:\rxlllll.exec:\rxlllll.exe149⤵PID:2664
-
\??\c:\3httbh.exec:\3httbh.exe150⤵PID:2580
-
\??\c:\7nbhtt.exec:\7nbhtt.exe151⤵PID:2584
-
\??\c:\vdppv.exec:\vdppv.exe152⤵PID:2712
-
\??\c:\jvppd.exec:\jvppd.exe153⤵PID:2848
-
\??\c:\fxrxflf.exec:\fxrxflf.exe154⤵PID:2728
-
\??\c:\llxflll.exec:\llxflll.exe155⤵PID:2720
-
\??\c:\1tnhnt.exec:\1tnhnt.exe156⤵PID:2376
-
\??\c:\hbthhn.exec:\hbthhn.exe157⤵PID:2448
-
\??\c:\dpdjj.exec:\dpdjj.exe158⤵PID:2768
-
\??\c:\xxrffrx.exec:\xxrffrx.exe159⤵PID:2760
-
\??\c:\xllrxrr.exec:\xllrxrr.exe160⤵PID:2684
-
\??\c:\fxrxxxf.exec:\fxrxxxf.exe161⤵PID:2828
-
\??\c:\hhhhbn.exec:\hhhhbn.exe162⤵PID:1324
-
\??\c:\nhhbth.exec:\nhhbth.exe163⤵PID:1384
-
\??\c:\jdjpv.exec:\jdjpv.exe164⤵PID:1956
-
\??\c:\jjpjp.exec:\jjpjp.exe165⤵PID:1672
-
\??\c:\9fflrxf.exec:\9fflrxf.exe166⤵PID:1544
-
\??\c:\xrlfrlr.exec:\xrlfrlr.exe167⤵PID:1208
-
\??\c:\tthhnh.exec:\tthhnh.exe168⤵PID:2420
-
\??\c:\nnhnnt.exec:\nnhnnt.exe169⤵PID:1092
-
\??\c:\vvpjj.exec:\vvpjj.exe170⤵PID:2196
-
\??\c:\1ppvp.exec:\1ppvp.exe171⤵PID:1592
-
\??\c:\ffrrxxx.exec:\ffrrxxx.exe172⤵PID:2072
-
\??\c:\xrflllr.exec:\xrflllr.exe173⤵PID:2052
-
\??\c:\nhbhbb.exec:\nhbhbb.exe174⤵PID:1760
-
\??\c:\5vvvd.exec:\5vvvd.exe175⤵PID:2872
-
\??\c:\1djpj.exec:\1djpj.exe176⤵PID:2880
-
\??\c:\xxxlrrf.exec:\xxxlrrf.exe177⤵PID:2868
-
\??\c:\frllxlr.exec:\frllxlr.exe178⤵PID:576
-
\??\c:\1ttbnt.exec:\1ttbnt.exe179⤵PID:3024
-
\??\c:\bnhbhh.exec:\bnhbhh.exe180⤵PID:3008
-
\??\c:\9pjjd.exec:\9pjjd.exe181⤵PID:1304
-
\??\c:\pjvvd.exec:\pjvvd.exe182⤵PID:1136
-
\??\c:\xxlfllx.exec:\xxlfllx.exe183⤵PID:1596
-
\??\c:\fxrrxff.exec:\fxrrxff.exe184⤵PID:1952
-
\??\c:\bnbhtn.exec:\bnbhtn.exe185⤵PID:1036
-
\??\c:\5nhnnt.exec:\5nhnnt.exe186⤵PID:1692
-
\??\c:\rrfrrfl.exec:\rrfrrfl.exe187⤵PID:3044
-
\??\c:\lxlrxfl.exec:\lxlrxfl.exe188⤵PID:2984
-
\??\c:\bthhtt.exec:\bthhtt.exe189⤵PID:2856
-
\??\c:\5dvpd.exec:\5dvpd.exe190⤵PID:872
-
\??\c:\ppdpv.exec:\ppdpv.exe191⤵PID:112
-
\??\c:\frflxrf.exec:\frflxrf.exe192⤵PID:2120
-
\??\c:\flfxllx.exec:\flfxllx.exe193⤵PID:1520
-
\??\c:\bthhtb.exec:\bthhtb.exe194⤵PID:2912
-
\??\c:\thnnnn.exec:\thnnnn.exe195⤵PID:1584
-
\??\c:\1dpvj.exec:\1dpvj.exe196⤵PID:2556
-
\??\c:\fllxrxx.exec:\fllxrxx.exe197⤵PID:3000
-
\??\c:\3rfrflf.exec:\3rfrflf.exe198⤵PID:2056
-
\??\c:\nhhhht.exec:\nhhhht.exe199⤵PID:2652
-
\??\c:\5bnbhb.exec:\5bnbhb.exe200⤵PID:2552
-
\??\c:\pjddd.exec:\pjddd.exe201⤵PID:2708
-
\??\c:\pdjdv.exec:\pdjdv.exe202⤵PID:2260
-
\??\c:\llflflf.exec:\llflflf.exe203⤵PID:2772
-
\??\c:\xrlrllf.exec:\xrlrllf.exe204⤵PID:2732
-
\??\c:\thbnhn.exec:\thbnhn.exe205⤵PID:2616
-
\??\c:\httttn.exec:\httttn.exe206⤵PID:2492
-
\??\c:\pdpjd.exec:\pdpjd.exe207⤵PID:2720
-
\??\c:\9llxrrr.exec:\9llxrrr.exe208⤵PID:2376
-
\??\c:\5rllrfl.exec:\5rllrfl.exe209⤵PID:2460
-
\??\c:\hhbhbn.exec:\hhbhbn.exe210⤵PID:2776
-
\??\c:\jpdpd.exec:\jpdpd.exe211⤵PID:2692
-
\??\c:\dvdpp.exec:\dvdpp.exe212⤵PID:2756
-
\??\c:\ffxxrfr.exec:\ffxxrfr.exe213⤵PID:2688
-
\??\c:\fxlxflx.exec:\fxlxflx.exe214⤵PID:1324
-
\??\c:\nntntn.exec:\nntntn.exe215⤵PID:2220
-
\??\c:\httbbt.exec:\httbbt.exe216⤵PID:2824
-
\??\c:\vjjjj.exec:\vjjjj.exe217⤵PID:1928
-
\??\c:\djvdd.exec:\djvdd.exe218⤵PID:2224
-
\??\c:\rlrrrfr.exec:\rlrrrfr.exe219⤵PID:1208
-
\??\c:\5fxflrf.exec:\5fxflrf.exe220⤵PID:1132
-
\??\c:\tbtbhn.exec:\tbtbhn.exe221⤵PID:1092
-
\??\c:\hthnnn.exec:\hthnnn.exe222⤵PID:1344
-
\??\c:\pdpjv.exec:\pdpjv.exe223⤵PID:1592
-
\??\c:\lrfxrff.exec:\lrfxrff.exe224⤵PID:2300
-
\??\c:\xrflrrx.exec:\xrflrrx.exe225⤵PID:1812
-
\??\c:\9fflxlx.exec:\9fflxlx.exe226⤵PID:2396
-
\??\c:\tthntb.exec:\tthntb.exe227⤵PID:2392
-
\??\c:\djvdv.exec:\djvdv.exe228⤵PID:2880
-
\??\c:\dvvdp.exec:\dvvdp.exe229⤵PID:2284
-
\??\c:\xrxlfrr.exec:\xrxlfrr.exe230⤵PID:820
-
\??\c:\rrrrxlr.exec:\rrrrxlr.exe231⤵PID:2412
-
\??\c:\3hhbhb.exec:\3hhbhb.exe232⤵PID:1184
-
\??\c:\ttbbhh.exec:\ttbbhh.exe233⤵PID:1564
-
\??\c:\bbthht.exec:\bbthht.exe234⤵PID:3032
-
\??\c:\1djpv.exec:\1djpv.exe235⤵PID:1640
-
\??\c:\vpjpv.exec:\vpjpv.exe236⤵PID:2236
-
\??\c:\llflrrx.exec:\llflrrx.exe237⤵PID:988
-
\??\c:\rrrrxfl.exec:\rrrrxfl.exe238⤵PID:2228
-
\??\c:\nhbntt.exec:\nhbntt.exe239⤵PID:2744
-
\??\c:\3nhthh.exec:\3nhthh.exe240⤵PID:1244
-
\??\c:\hbbhhn.exec:\hbbhhn.exe241⤵PID:2252
-
\??\c:\7dppv.exec:\7dppv.exe242⤵PID:2884