Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 10:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe
-
Size
99KB
-
MD5
e50c2ae097fd2a808fbc3a0d559b2020
-
SHA1
d4a12df09db7465bf810e0954395e7b05142da16
-
SHA256
cbf3c8473c0750fa44fe095059509bb6fc1965dd5ecb5ec24b559869578dc955
-
SHA512
6bc0c6ed817a28d927c834dcaaaa327059d3830d312c475aa0d31ca44d2856bc6e2944a4485277352613f5f117c439ce3bfb88b9a7e4a1e0bdde37570ebcabbc
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73tvn+Yp99zm+/KZBHq/4wcD:n3C9BRo7tvnJ99T/KZE/8
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/2044-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2072-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/872-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/888-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/456-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/456-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4016-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/516-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3144-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2764-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3252-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1912-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4064-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3196-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4100-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3536-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3384-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
httbnn.exetthtbb.exexrfxrrr.exexxxrrrl.exebtbbbb.exentttnn.exe7fxrlff.exexxfxxxx.exehbnhhh.exe9tbthb.exedvvpj.exe3fllrlr.exefrrlllf.exehnnnnn.exejpddv.exejddvp.exe1djjj.exerxrrlrr.exennnhtn.exe3hnhhh.exejpjjj.exefxrrlrl.exexxlrxlf.exehbhbbb.exebhhhbb.exejjdjj.exefxlllrl.exe3lllffx.exenntntt.exe3jddv.exevpvvv.exelfllfxx.exelrlllrr.exebhnnhh.exe1dddd.exepvjdj.exelxfxxxx.exexxxrffl.exebtbhhh.exebbbbtt.exe7jpjd.exexxfxffx.exexlffffx.exehbbttn.exevvdvp.exe5flfrrf.exexlrrlrl.exethnhhh.exe9vdvd.exe5pjjj.exe7flfrrl.exehnhbbt.exebhhbtt.exeddpvv.exefxxxxxx.exe5hnnhh.exennnbtn.exedvjdp.exelrlfxrr.exebnhbbb.exebtnhbb.exepjpjd.exelrffrrl.exerxfxxll.exepid process 2072 httbnn.exe 3436 tthtbb.exe 872 xrfxrrr.exe 888 xxxrrrl.exe 456 btbbbb.exe 3168 ntttnn.exe 3940 7fxrlff.exe 4016 xxfxxxx.exe 516 hbnhhh.exe 1820 9tbthb.exe 3144 dvvpj.exe 2764 3fllrlr.exe 3384 frrlllf.exe 3536 hnnnnn.exe 4556 jpddv.exe 4612 jddvp.exe 3344 1djjj.exe 3272 rxrrlrr.exe 3004 nnnhtn.exe 3252 3hnhhh.exe 1912 jpjjj.exe 1576 fxrrlrl.exe 4100 xxlrxlf.exe 2152 hbhbbb.exe 4340 bhhhbb.exe 5052 jjdjj.exe 3196 fxlllrl.exe 4000 3lllffx.exe 1500 nntntt.exe 4064 3jddv.exe 212 vpvvv.exe 208 lfllfxx.exe 4380 lrlllrr.exe 2580 bhnnhh.exe 4432 1dddd.exe 4320 pvjdj.exe 316 lxfxxxx.exe 3476 xxxrffl.exe 4672 btbhhh.exe 1236 bbbbtt.exe 456 7jpjd.exe 5008 xxfxffx.exe 936 xlffffx.exe 4596 hbbttn.exe 1324 vvdvp.exe 516 5flfrrf.exe 3200 xlrrlrl.exe 2184 thnhhh.exe 1988 9vdvd.exe 5016 5pjjj.exe 3364 7flfrrl.exe 2136 hnhbbt.exe 436 bhhbtt.exe 4196 ddpvv.exe 968 fxxxxxx.exe 3864 5hnnhh.exe 3844 nnnbtn.exe 2272 dvjdp.exe 2816 lrlfxrr.exe 2952 bnhbbb.exe 2176 btnhbb.exe 4992 pjpjd.exe 4820 lrffrrl.exe 3268 rxfxxll.exe -
Processes:
resource yara_rule behavioral2/memory/2044-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2072-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/872-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/888-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4016-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/516-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3144-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2764-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3252-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1912-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4064-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3196-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4100-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3536-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3384-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/516-73-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exehttbnn.exetthtbb.exexrfxrrr.exexxxrrrl.exebtbbbb.exentttnn.exe7fxrlff.exexxfxxxx.exehbnhhh.exe9tbthb.exedvvpj.exe3fllrlr.exefrrlllf.exehnnnnn.exejpddv.exejddvp.exe1djjj.exerxrrlrr.exennnhtn.exe3hnhhh.exejpjjj.exedescription pid process target process PID 2044 wrote to memory of 2072 2044 e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe httbnn.exe PID 2044 wrote to memory of 2072 2044 e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe httbnn.exe PID 2044 wrote to memory of 2072 2044 e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe httbnn.exe PID 2072 wrote to memory of 3436 2072 httbnn.exe tthtbb.exe PID 2072 wrote to memory of 3436 2072 httbnn.exe tthtbb.exe PID 2072 wrote to memory of 3436 2072 httbnn.exe tthtbb.exe PID 3436 wrote to memory of 872 3436 tthtbb.exe xrfxrrr.exe PID 3436 wrote to memory of 872 3436 tthtbb.exe xrfxrrr.exe PID 3436 wrote to memory of 872 3436 tthtbb.exe xrfxrrr.exe PID 872 wrote to memory of 888 872 xrfxrrr.exe xxxrrrl.exe PID 872 wrote to memory of 888 872 xrfxrrr.exe xxxrrrl.exe PID 872 wrote to memory of 888 872 xrfxrrr.exe xxxrrrl.exe PID 888 wrote to memory of 456 888 xxxrrrl.exe btbbbb.exe PID 888 wrote to memory of 456 888 xxxrrrl.exe btbbbb.exe PID 888 wrote to memory of 456 888 xxxrrrl.exe btbbbb.exe PID 456 wrote to memory of 3168 456 btbbbb.exe ntttnn.exe PID 456 wrote to memory of 3168 456 btbbbb.exe ntttnn.exe PID 456 wrote to memory of 3168 456 btbbbb.exe ntttnn.exe PID 3168 wrote to memory of 3940 3168 ntttnn.exe 7fxrlff.exe PID 3168 wrote to memory of 3940 3168 ntttnn.exe 7fxrlff.exe PID 3168 wrote to memory of 3940 3168 ntttnn.exe 7fxrlff.exe PID 3940 wrote to memory of 4016 3940 7fxrlff.exe xxfxxxx.exe PID 3940 wrote to memory of 4016 3940 7fxrlff.exe xxfxxxx.exe PID 3940 wrote to memory of 4016 3940 7fxrlff.exe xxfxxxx.exe PID 4016 wrote to memory of 516 4016 xxfxxxx.exe hbnhhh.exe PID 4016 wrote to memory of 516 4016 xxfxxxx.exe hbnhhh.exe PID 4016 wrote to memory of 516 4016 xxfxxxx.exe hbnhhh.exe PID 516 wrote to memory of 1820 516 hbnhhh.exe 9tbthb.exe PID 516 wrote to memory of 1820 516 hbnhhh.exe 9tbthb.exe PID 516 wrote to memory of 1820 516 hbnhhh.exe 9tbthb.exe PID 1820 wrote to memory of 3144 1820 9tbthb.exe dvvpj.exe PID 1820 wrote to memory of 3144 1820 9tbthb.exe dvvpj.exe PID 1820 wrote to memory of 3144 1820 9tbthb.exe dvvpj.exe PID 3144 wrote to memory of 2764 3144 dvvpj.exe 3fllrlr.exe PID 3144 wrote to memory of 2764 3144 dvvpj.exe 3fllrlr.exe PID 3144 wrote to memory of 2764 3144 dvvpj.exe 3fllrlr.exe PID 2764 wrote to memory of 3384 2764 3fllrlr.exe frrlllf.exe PID 2764 wrote to memory of 3384 2764 3fllrlr.exe frrlllf.exe PID 2764 wrote to memory of 3384 2764 3fllrlr.exe frrlllf.exe PID 3384 wrote to memory of 3536 3384 frrlllf.exe hnnnnn.exe PID 3384 wrote to memory of 3536 3384 frrlllf.exe hnnnnn.exe PID 3384 wrote to memory of 3536 3384 frrlllf.exe hnnnnn.exe PID 3536 wrote to memory of 4556 3536 hnnnnn.exe jpddv.exe PID 3536 wrote to memory of 4556 3536 hnnnnn.exe jpddv.exe PID 3536 wrote to memory of 4556 3536 hnnnnn.exe jpddv.exe PID 4556 wrote to memory of 4612 4556 jpddv.exe jddvp.exe PID 4556 wrote to memory of 4612 4556 jpddv.exe jddvp.exe PID 4556 wrote to memory of 4612 4556 jpddv.exe jddvp.exe PID 4612 wrote to memory of 3344 4612 jddvp.exe 1djjj.exe PID 4612 wrote to memory of 3344 4612 jddvp.exe 1djjj.exe PID 4612 wrote to memory of 3344 4612 jddvp.exe 1djjj.exe PID 3344 wrote to memory of 3272 3344 1djjj.exe rxrrlrr.exe PID 3344 wrote to memory of 3272 3344 1djjj.exe rxrrlrr.exe PID 3344 wrote to memory of 3272 3344 1djjj.exe rxrrlrr.exe PID 3272 wrote to memory of 3004 3272 rxrrlrr.exe nnnhtn.exe PID 3272 wrote to memory of 3004 3272 rxrrlrr.exe nnnhtn.exe PID 3272 wrote to memory of 3004 3272 rxrrlrr.exe nnnhtn.exe PID 3004 wrote to memory of 3252 3004 nnnhtn.exe 3hnhhh.exe PID 3004 wrote to memory of 3252 3004 nnnhtn.exe 3hnhhh.exe PID 3004 wrote to memory of 3252 3004 nnnhtn.exe 3hnhhh.exe PID 3252 wrote to memory of 1912 3252 3hnhhh.exe jpjjj.exe PID 3252 wrote to memory of 1912 3252 3hnhhh.exe jpjjj.exe PID 3252 wrote to memory of 1912 3252 3hnhhh.exe jpjjj.exe PID 1912 wrote to memory of 1576 1912 jpjjj.exe fxrrlrl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e50c2ae097fd2a808fbc3a0d559b2020_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\httbnn.exec:\httbnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\tthtbb.exec:\tthtbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\xrfxrrr.exec:\xrfxrrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\xxxrrrl.exec:\xxxrrrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\btbbbb.exec:\btbbbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
\??\c:\ntttnn.exec:\ntttnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\7fxrlff.exec:\7fxrlff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
\??\c:\xxfxxxx.exec:\xxfxxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
\??\c:\hbnhhh.exec:\hbnhhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:516 -
\??\c:\9tbthb.exec:\9tbthb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\dvvpj.exec:\dvvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
\??\c:\3fllrlr.exec:\3fllrlr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\frrlllf.exec:\frrlllf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\hnnnnn.exec:\hnnnnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
\??\c:\jpddv.exec:\jpddv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
\??\c:\jddvp.exec:\jddvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\1djjj.exec:\1djjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\rxrrlrr.exec:\rxrrlrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
\??\c:\nnnhtn.exec:\nnnhtn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\3hnhhh.exec:\3hnhhh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\jpjjj.exec:\jpjjj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\fxrrlrl.exec:\fxrrlrl.exe23⤵
- Executes dropped EXE
PID:1576 -
\??\c:\xxlrxlf.exec:\xxlrxlf.exe24⤵
- Executes dropped EXE
PID:4100 -
\??\c:\hbhbbb.exec:\hbhbbb.exe25⤵
- Executes dropped EXE
PID:2152 -
\??\c:\bhhhbb.exec:\bhhhbb.exe26⤵
- Executes dropped EXE
PID:4340 -
\??\c:\jjdjj.exec:\jjdjj.exe27⤵
- Executes dropped EXE
PID:5052 -
\??\c:\fxlllrl.exec:\fxlllrl.exe28⤵
- Executes dropped EXE
PID:3196 -
\??\c:\3lllffx.exec:\3lllffx.exe29⤵
- Executes dropped EXE
PID:4000 -
\??\c:\nntntt.exec:\nntntt.exe30⤵
- Executes dropped EXE
PID:1500 -
\??\c:\3jddv.exec:\3jddv.exe31⤵
- Executes dropped EXE
PID:4064 -
\??\c:\vpvvv.exec:\vpvvv.exe32⤵
- Executes dropped EXE
PID:212 -
\??\c:\lfllfxx.exec:\lfllfxx.exe33⤵
- Executes dropped EXE
PID:208 -
\??\c:\lrlllrr.exec:\lrlllrr.exe34⤵
- Executes dropped EXE
PID:4380 -
\??\c:\bhnnhh.exec:\bhnnhh.exe35⤵
- Executes dropped EXE
PID:2580 -
\??\c:\1dddd.exec:\1dddd.exe36⤵
- Executes dropped EXE
PID:4432 -
\??\c:\pvjdj.exec:\pvjdj.exe37⤵
- Executes dropped EXE
PID:4320 -
\??\c:\lxfxxxx.exec:\lxfxxxx.exe38⤵
- Executes dropped EXE
PID:316 -
\??\c:\xxxrffl.exec:\xxxrffl.exe39⤵
- Executes dropped EXE
PID:3476 -
\??\c:\btbhhh.exec:\btbhhh.exe40⤵
- Executes dropped EXE
PID:4672 -
\??\c:\bbbbtt.exec:\bbbbtt.exe41⤵
- Executes dropped EXE
PID:1236 -
\??\c:\7jpjd.exec:\7jpjd.exe42⤵
- Executes dropped EXE
PID:456 -
\??\c:\xxfxffx.exec:\xxfxffx.exe43⤵
- Executes dropped EXE
PID:5008 -
\??\c:\xlffffx.exec:\xlffffx.exe44⤵
- Executes dropped EXE
PID:936 -
\??\c:\hbbttn.exec:\hbbttn.exe45⤵
- Executes dropped EXE
PID:4596 -
\??\c:\vvdvp.exec:\vvdvp.exe46⤵
- Executes dropped EXE
PID:1324 -
\??\c:\5flfrrf.exec:\5flfrrf.exe47⤵
- Executes dropped EXE
PID:516 -
\??\c:\xlrrlrl.exec:\xlrrlrl.exe48⤵
- Executes dropped EXE
PID:3200 -
\??\c:\thnhhh.exec:\thnhhh.exe49⤵
- Executes dropped EXE
PID:2184 -
\??\c:\9vdvd.exec:\9vdvd.exe50⤵
- Executes dropped EXE
PID:1988 -
\??\c:\5pjjj.exec:\5pjjj.exe51⤵
- Executes dropped EXE
PID:5016 -
\??\c:\7flfrrl.exec:\7flfrrl.exe52⤵
- Executes dropped EXE
PID:3364 -
\??\c:\hnhbbt.exec:\hnhbbt.exe53⤵
- Executes dropped EXE
PID:2136 -
\??\c:\bhhbtt.exec:\bhhbtt.exe54⤵
- Executes dropped EXE
PID:436 -
\??\c:\ddpvv.exec:\ddpvv.exe55⤵
- Executes dropped EXE
PID:4196 -
\??\c:\fxxxxxx.exec:\fxxxxxx.exe56⤵
- Executes dropped EXE
PID:968 -
\??\c:\5hnnhh.exec:\5hnnhh.exe57⤵
- Executes dropped EXE
PID:3864 -
\??\c:\nnnbtn.exec:\nnnbtn.exe58⤵
- Executes dropped EXE
PID:3844 -
\??\c:\dvjdp.exec:\dvjdp.exe59⤵
- Executes dropped EXE
PID:2272 -
\??\c:\lrlfxrr.exec:\lrlfxrr.exe60⤵
- Executes dropped EXE
PID:2816 -
\??\c:\bnhbbb.exec:\bnhbbb.exe61⤵
- Executes dropped EXE
PID:2952 -
\??\c:\btnhbb.exec:\btnhbb.exe62⤵
- Executes dropped EXE
PID:2176 -
\??\c:\pjpjd.exec:\pjpjd.exe63⤵
- Executes dropped EXE
PID:4992 -
\??\c:\lrffrrl.exec:\lrffrrl.exe64⤵
- Executes dropped EXE
PID:4820 -
\??\c:\rxfxxll.exec:\rxfxxll.exe65⤵
- Executes dropped EXE
PID:3268 -
\??\c:\5bnnnn.exec:\5bnnnn.exe66⤵PID:4292
-
\??\c:\tnnhnh.exec:\tnnhnh.exe67⤵PID:1124
-
\??\c:\ppjjv.exec:\ppjjv.exe68⤵PID:60
-
\??\c:\9pdvj.exec:\9pdvj.exe69⤵PID:4248
-
\??\c:\rlfflff.exec:\rlfflff.exe70⤵PID:5052
-
\??\c:\3thbtt.exec:\3thbtt.exe71⤵PID:4112
-
\??\c:\thhbtt.exec:\thhbtt.exe72⤵PID:3196
-
\??\c:\dppjd.exec:\dppjd.exe73⤵PID:4756
-
\??\c:\xlfflrf.exec:\xlfflrf.exe74⤵PID:2804
-
\??\c:\rxlxflr.exec:\rxlxflr.exe75⤵PID:1160
-
\??\c:\thhbnt.exec:\thhbnt.exe76⤵PID:1500
-
\??\c:\pdjdv.exec:\pdjdv.exe77⤵PID:1900
-
\??\c:\dpjdp.exec:\dpjdp.exe78⤵PID:3612
-
\??\c:\9xxrfxr.exec:\9xxrfxr.exe79⤵PID:404
-
\??\c:\rrllllx.exec:\rrllllx.exe80⤵PID:3092
-
\??\c:\tnhhbh.exec:\tnhhbh.exe81⤵PID:4040
-
\??\c:\hntnbb.exec:\hntnbb.exe82⤵PID:4260
-
\??\c:\7pvpd.exec:\7pvpd.exe83⤵PID:460
-
\??\c:\rlrrfff.exec:\rlrrfff.exe84⤵PID:388
-
\??\c:\rflxxfr.exec:\rflxxfr.exe85⤵PID:4520
-
\??\c:\bhbnhh.exec:\bhbnhh.exe86⤵PID:804
-
\??\c:\bhnhbb.exec:\bhnhbb.exe87⤵PID:2356
-
\??\c:\ppppp.exec:\ppppp.exe88⤵PID:872
-
\??\c:\dpdpd.exec:\dpdpd.exe89⤵PID:2248
-
\??\c:\flrrllf.exec:\flrrllf.exe90⤵PID:1020
-
\??\c:\7llllff.exec:\7llllff.exe91⤵PID:3912
-
\??\c:\nhhbtn.exec:\nhhbtn.exe92⤵PID:4596
-
\??\c:\ntnhth.exec:\ntnhth.exe93⤵PID:1472
-
\??\c:\jdvvp.exec:\jdvvp.exe94⤵PID:1952
-
\??\c:\lfxfxrl.exec:\lfxfxrl.exe95⤵PID:1076
-
\??\c:\llrlffl.exec:\llrlffl.exe96⤵PID:2324
-
\??\c:\nhbtnh.exec:\nhbtnh.exe97⤵PID:964
-
\??\c:\pvvpp.exec:\pvvpp.exe98⤵PID:4712
-
\??\c:\vvppj.exec:\vvppj.exe99⤵PID:904
-
\??\c:\xlxrfxf.exec:\xlxrfxf.exe100⤵PID:3452
-
\??\c:\xffxrrl.exec:\xffxrrl.exe101⤵PID:3628
-
\??\c:\ttbttn.exec:\ttbttn.exe102⤵PID:968
-
\??\c:\pdvdp.exec:\pdvdp.exe103⤵PID:3864
-
\??\c:\dppjd.exec:\dppjd.exe104⤵PID:3676
-
\??\c:\9llfrlf.exec:\9llfrlf.exe105⤵PID:2988
-
\??\c:\xfrfrlf.exec:\xfrfrlf.exe106⤵PID:2816
-
\??\c:\thtnbb.exec:\thtnbb.exe107⤵PID:4684
-
\??\c:\vvdpv.exec:\vvdpv.exe108⤵PID:2576
-
\??\c:\ddvpd.exec:\ddvpd.exe109⤵PID:2396
-
\??\c:\xlrrxxx.exec:\xlrrxxx.exe110⤵PID:4820
-
\??\c:\bbttnh.exec:\bbttnh.exe111⤵PID:4688
-
\??\c:\hnttnt.exec:\hnttnt.exe112⤵PID:2008
-
\??\c:\jdvpd.exec:\jdvpd.exe113⤵PID:4024
-
\??\c:\pjjdv.exec:\pjjdv.exe114⤵PID:3400
-
\??\c:\xlxrlll.exec:\xlxrlll.exe115⤵PID:4248
-
\??\c:\hnbhtt.exec:\hnbhtt.exe116⤵PID:2768
-
\??\c:\htbtbt.exec:\htbtbt.exe117⤵PID:2872
-
\??\c:\jdjjp.exec:\jdjjp.exe118⤵PID:4388
-
\??\c:\xlfxxxr.exec:\xlfxxxr.exe119⤵PID:3872
-
\??\c:\lffxxxr.exec:\lffxxxr.exe120⤵PID:4308
-
\??\c:\hnthbb.exec:\hnthbb.exe121⤵PID:1368
-
\??\c:\bbnthb.exec:\bbnthb.exe122⤵PID:5044
-
\??\c:\ppjvp.exec:\ppjvp.exe123⤵PID:3736
-
\??\c:\5jjvp.exec:\5jjvp.exe124⤵PID:3704
-
\??\c:\vpjdv.exec:\vpjdv.exe125⤵PID:4380
-
\??\c:\frrrxrr.exec:\frrrxrr.exe126⤵PID:2580
-
\??\c:\xxlllxx.exec:\xxlllxx.exe127⤵PID:1588
-
\??\c:\5ttbth.exec:\5ttbth.exe128⤵PID:4468
-
\??\c:\ddjjv.exec:\ddjjv.exe129⤵PID:1892
-
\??\c:\1ddpj.exec:\1ddpj.exe130⤵PID:3796
-
\??\c:\lflfxrx.exec:\lflfxrx.exe131⤵PID:1248
-
\??\c:\fxxlrrr.exec:\fxxlrrr.exe132⤵PID:5004
-
\??\c:\1lrrrrl.exec:\1lrrrrl.exe133⤵PID:1856
-
\??\c:\thhhbb.exec:\thhhbb.exe134⤵PID:2640
-
\??\c:\vpjdv.exec:\vpjdv.exe135⤵PID:4492
-
\??\c:\djvjd.exec:\djvjd.exe136⤵PID:4528
-
\??\c:\7rxrrrr.exec:\7rxrrrr.exe137⤵PID:1820
-
\??\c:\xrrlffx.exec:\xrrlffx.exe138⤵PID:1324
-
\??\c:\fllllll.exec:\fllllll.exe139⤵PID:516
-
\??\c:\5ttnnn.exec:\5ttnnn.exe140⤵PID:4544
-
\??\c:\pppjj.exec:\pppjj.exe141⤵PID:1616
-
\??\c:\9jjdv.exec:\9jjdv.exe142⤵PID:556
-
\??\c:\fxrlfxr.exec:\fxrlfxr.exe143⤵PID:540
-
\??\c:\lrxrllf.exec:\lrxrllf.exe144⤵PID:3600
-
\??\c:\thbhbh.exec:\thbhbh.exe145⤵PID:3284
-
\??\c:\pdpvp.exec:\pdpvp.exe146⤵PID:4356
-
\??\c:\1dvpj.exec:\1dvpj.exe147⤵PID:4508
-
\??\c:\frrlffr.exec:\frrlffr.exe148⤵PID:3844
-
\??\c:\lxfrrlx.exec:\lxfrrlx.exe149⤵PID:4792
-
\??\c:\hhthbt.exec:\hhthbt.exe150⤵PID:1328
-
\??\c:\9bbhnn.exec:\9bbhnn.exe151⤵PID:412
-
\??\c:\dvvpv.exec:\dvvpv.exe152⤵PID:116
-
\??\c:\lflfxxx.exec:\lflfxxx.exe153⤵PID:2176
-
\??\c:\rllfxxx.exec:\rllfxxx.exe154⤵PID:4992
-
\??\c:\nhtnht.exec:\nhtnht.exe155⤵PID:1756
-
\??\c:\tnnhtb.exec:\tnnhtb.exe156⤵PID:3268
-
\??\c:\jvvdv.exec:\jvvdv.exe157⤵PID:4292
-
\??\c:\jddvj.exec:\jddvj.exe158⤵PID:1132
-
\??\c:\rllfrfx.exec:\rllfrfx.exe159⤵PID:60
-
\??\c:\rlfxffx.exec:\rlfxffx.exe160⤵PID:3112
-
\??\c:\xlxrrrl.exec:\xlxrrrl.exe161⤵PID:772
-
\??\c:\bhnhhh.exec:\bhnhhh.exe162⤵PID:3780
-
\??\c:\httnnt.exec:\httnnt.exe163⤵PID:2932
-
\??\c:\dvvdp.exec:\dvvdp.exe164⤵PID:4000
-
\??\c:\5vdvp.exec:\5vdvp.exe165⤵PID:5064
-
\??\c:\rrfrllf.exec:\rrfrllf.exe166⤵PID:2308
-
\??\c:\bhtnhb.exec:\bhtnhb.exe167⤵PID:4180
-
\??\c:\jdjdv.exec:\jdjdv.exe168⤵PID:4444
-
\??\c:\xxxxrrl.exec:\xxxxrrl.exe169⤵PID:312
-
\??\c:\rllfrrl.exec:\rllfrrl.exe170⤵PID:2044
-
\??\c:\tttthh.exec:\tttthh.exe171⤵PID:1388
-
\??\c:\jjpjd.exec:\jjpjd.exe172⤵PID:4952
-
\??\c:\lrrlffx.exec:\lrrlffx.exe173⤵PID:460
-
\??\c:\bbhbnt.exec:\bbhbnt.exe174⤵PID:3188
-
\??\c:\rllfxxr.exec:\rllfxxr.exe175⤵PID:4564
-
\??\c:\lrrrllf.exec:\lrrrllf.exe176⤵PID:4912
-
\??\c:\bhnhbt.exec:\bhnhbt.exe177⤵PID:1236
-
\??\c:\djjdd.exec:\djjdd.exe178⤵PID:5008
-
\??\c:\dvvvv.exec:\dvvvv.exe179⤵PID:648
-
\??\c:\rxfrfff.exec:\rxfrfff.exe180⤵PID:1824
-
\??\c:\hhbbtt.exec:\hhbbtt.exe181⤵PID:3912
-
\??\c:\hbntbn.exec:\hbntbn.exe182⤵PID:4036
-
\??\c:\5bhbtn.exec:\5bhbtn.exe183⤵PID:2320
-
\??\c:\btnhbh.exec:\btnhbh.exe184⤵PID:1772
-
\??\c:\bnnhtt.exec:\bnnhtt.exe185⤵PID:4544
-
\??\c:\jdpvp.exec:\jdpvp.exe186⤵PID:1616
-
\??\c:\djjjv.exec:\djjjv.exe187⤵PID:2136
-
\??\c:\xllfxxf.exec:\xllfxxf.exe188⤵PID:904
-
\??\c:\xxxxrll.exec:\xxxxrll.exe189⤵PID:3372
-
\??\c:\bnhhnn.exec:\bnhhnn.exe190⤵PID:5032
-
\??\c:\nhhtnb.exec:\nhhtnb.exe191⤵PID:4356
-
\??\c:\dvvdv.exec:\dvvdv.exe192⤵PID:4600
-
\??\c:\xlfxrrr.exec:\xlfxrrr.exe193⤵PID:3844
-
\??\c:\fffxfxf.exec:\fffxfxf.exe194⤵PID:2988
-
\??\c:\nnntht.exec:\nnntht.exe195⤵PID:1328
-
\??\c:\7hnhbb.exec:\7hnhbb.exe196⤵PID:412
-
\??\c:\9pdvv.exec:\9pdvv.exe197⤵PID:116
-
\??\c:\rxffxxr.exec:\rxffxxr.exe198⤵PID:2176
-
\??\c:\frlxrxr.exec:\frlxrxr.exe199⤵PID:4992
-
\??\c:\hbhbbn.exec:\hbhbbn.exe200⤵PID:1756
-
\??\c:\nhtnbb.exec:\nhtnbb.exe201⤵PID:2008
-
\??\c:\3pppd.exec:\3pppd.exe202⤵PID:2896
-
\??\c:\dvjdd.exec:\dvjdd.exe203⤵PID:5052
-
\??\c:\xrffffl.exec:\xrffffl.exe204⤵PID:3740
-
\??\c:\5xxxrlf.exec:\5xxxrlf.exe205⤵PID:3196
-
\??\c:\hbttnb.exec:\hbttnb.exe206⤵PID:4756
-
\??\c:\vppjj.exec:\vppjj.exe207⤵PID:1068
-
\??\c:\dvjvd.exec:\dvjvd.exe208⤵PID:3696
-
\??\c:\fxlllrx.exec:\fxlllrx.exe209⤵PID:1500
-
\??\c:\bbnntt.exec:\bbnntt.exe210⤵PID:1368
-
\??\c:\tntntb.exec:\tntntb.exe211⤵PID:2308
-
\??\c:\pjjjv.exec:\pjjjv.exe212⤵PID:404
-
\??\c:\pjjdv.exec:\pjjdv.exe213⤵PID:4452
-
\??\c:\llxrlll.exec:\llxrlll.exe214⤵PID:4040
-
\??\c:\xflfxrr.exec:\xflfxrr.exe215⤵PID:2580
-
\??\c:\nnbbtb.exec:\nnbbtb.exe216⤵PID:1692
-
\??\c:\htbtnt.exec:\htbtnt.exe217⤵PID:4952
-
\??\c:\vdvpp.exec:\vdvpp.exe218⤵PID:4656
-
\??\c:\3rrlfff.exec:\3rrlfff.exe219⤵PID:3188
-
\??\c:\9rxrlrl.exec:\9rxrlrl.exe220⤵PID:2356
-
\??\c:\nnnnnn.exec:\nnnnnn.exe221⤵PID:760
-
\??\c:\hntnhh.exec:\hntnhh.exe222⤵PID:2756
-
\??\c:\jpppd.exec:\jpppd.exe223⤵PID:5008
-
\??\c:\1pvdv.exec:\1pvdv.exe224⤵PID:4568
-
\??\c:\7xlllxx.exec:\7xlllxx.exe225⤵PID:2568
-
\??\c:\lffxrxl.exec:\lffxrxl.exe226⤵PID:3200
-
\??\c:\nbbthb.exec:\nbbthb.exe227⤵PID:2184
-
\??\c:\9nnhbb.exec:\9nnhbb.exe228⤵PID:5016
-
\??\c:\dvvpp.exec:\dvvpp.exe229⤵PID:2236
-
\??\c:\dvpjj.exec:\dvpjj.exe230⤵PID:3156
-
\??\c:\rlfxrll.exec:\rlfxrll.exe231⤵PID:1616
-
\??\c:\fxrlfrl.exec:\fxrlfrl.exe232⤵PID:2136
-
\??\c:\hhnntt.exec:\hhnntt.exe233⤵PID:3284
-
\??\c:\ttbtnn.exec:\ttbtnn.exe234⤵PID:2556
-
\??\c:\vjjdd.exec:\vjjdd.exe235⤵PID:5032
-
\??\c:\jddpj.exec:\jddpj.exe236⤵PID:4356
-
\??\c:\5lrllll.exec:\5lrllll.exe237⤵PID:4792
-
\??\c:\hbhhtt.exec:\hbhhtt.exe238⤵PID:2120
-
\??\c:\tnnbnh.exec:\tnnbnh.exe239⤵PID:2988
-
\??\c:\3vpjj.exec:\3vpjj.exe240⤵PID:644
-
\??\c:\1vddp.exec:\1vddp.exe241⤵PID:2192
-
\??\c:\xrfxlll.exec:\xrfxlll.exe242⤵PID:3184