Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 07:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe
Resource
win7-20240419-en
windows7-x64
5 signatures
150 seconds
General
-
Target
170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe
-
Size
76KB
-
MD5
bc36c930d0a95c6606f148f7ac1ff780
-
SHA1
7018928a8165b7f797c0641efe06052dde649713
-
SHA256
170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c
-
SHA512
cacb84766ac28e99257b8a471c48c702f2397cd52edce0e5bf00fcb213cc0467d3979ecbba9b6c0faa29bd8765fdede23c1af9bf5f313c289a774bb8573370c3
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIoAh2QpUnX1APr:ymb3NkkiQ3mdBjFIsIVbpUOr
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/1788-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2864-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1064-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4884-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3736-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2404-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/624-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2040-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1044-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/916-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4876-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1712-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1756-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2624-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3268-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4892-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1216-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1840-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/232-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2816-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3016-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2920-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
5jvjv.exellrlfff.exennnnhb.exenbthth.exejppjj.exexffxxrr.exerlfxxrr.exehtnhtb.exenhnhhh.exedjvjd.exefffxxxr.exehhtbtt.exebntnhb.exeppppd.exelxrrrlr.exe1tttnt.exevppjd.exeffllxrr.exebttnnn.exedjjdv.exerrxxrrr.exexxlrrlr.exe7tbtnn.exe1ddvp.exefrxxxxl.exebthhtt.exe7jdvp.exeffrxfll.exenbnhhb.exe1fxfxxx.exenbhnbb.exe9bbbtt.exe7vdvp.exexflfxxr.exe5nbtbb.exenbhhtt.exepppdd.exerlrflxr.exehntnhh.exehbhbtt.exedvpjp.exelllfxxx.exetnnhnn.exenhhbbb.exejvjpj.exeppjdp.exellrrffr.exehhbntn.exepdjjd.exepvvjd.exe1llfxxr.exebntnbt.exenhnnbb.exedppjp.exexlflxrx.exebttnnn.exevdjvv.exelxrlxxx.exe5rxrlll.exe5nnnhn.exepjvdp.exerllfxrr.exenbnhbb.exetntnhh.exepid process 2864 5jvjv.exe 1064 llrlfff.exe 4884 nnnnhb.exe 1600 nbthth.exe 2040 jppjj.exe 624 xffxxrr.exe 2404 rlfxxrr.exe 3736 htnhtb.exe 1044 nhnhhh.exe 916 djvjd.exe 4876 fffxxxr.exe 1712 hhtbtt.exe 1756 bntnhb.exe 5100 ppppd.exe 2624 lxrrrlr.exe 3268 1tttnt.exe 4892 vppjd.exe 3784 ffllxrr.exe 1216 bttnnn.exe 4076 djjdv.exe 1840 rrxxrrr.exe 232 xxlrrlr.exe 1192 7tbtnn.exe 3004 1ddvp.exe 2816 frxxxxl.exe 316 bthhtt.exe 3016 7jdvp.exe 4848 ffrxfll.exe 4932 nbnhhb.exe 2920 1fxfxxx.exe 1636 nbhnbb.exe 5096 9bbbtt.exe 3696 7vdvp.exe 3548 xflfxxr.exe 1748 5nbtbb.exe 2696 nbhhtt.exe 2232 pppdd.exe 3648 rlrflxr.exe 4036 hntnhh.exe 1236 hbhbtt.exe 4972 dvpjp.exe 3260 lllfxxx.exe 4316 tnnhnn.exe 2864 nhhbbb.exe 3904 jvjpj.exe 2568 ppjdp.exe 1600 llrrffr.exe 4792 hhbntn.exe 4680 pdjjd.exe 3456 pvvjd.exe 60 1llfxxr.exe 4172 bntnbt.exe 1796 nhnnbb.exe 1044 dppjp.exe 4668 xlflxrx.exe 740 bttnnn.exe 3748 vdjvv.exe 1276 lxrlxxx.exe 1048 5rxrlll.exe 2540 5nnnhn.exe 3928 pjvdp.exe 4156 rllfxrr.exe 1432 nbnhbb.exe 1848 tntnhh.exe -
Processes:
resource yara_rule behavioral2/memory/1788-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2864-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1064-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4884-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/624-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3736-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2404-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/624-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2040-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1044-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/916-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4876-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1712-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1756-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2624-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3268-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4892-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1216-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1840-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/232-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2816-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3016-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2920-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe5jvjv.exellrlfff.exennnnhb.exenbthth.exejppjj.exexffxxrr.exerlfxxrr.exehtnhtb.exenhnhhh.exedjvjd.exefffxxxr.exehhtbtt.exebntnhb.exeppppd.exelxrrrlr.exe1tttnt.exevppjd.exeffllxrr.exebttnnn.exedjjdv.exerrxxrrr.exedescription pid process target process PID 1788 wrote to memory of 2864 1788 170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe 5jvjv.exe PID 1788 wrote to memory of 2864 1788 170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe 5jvjv.exe PID 1788 wrote to memory of 2864 1788 170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe 5jvjv.exe PID 2864 wrote to memory of 1064 2864 5jvjv.exe llrlfff.exe PID 2864 wrote to memory of 1064 2864 5jvjv.exe llrlfff.exe PID 2864 wrote to memory of 1064 2864 5jvjv.exe llrlfff.exe PID 1064 wrote to memory of 4884 1064 llrlfff.exe nnnnhb.exe PID 1064 wrote to memory of 4884 1064 llrlfff.exe nnnnhb.exe PID 1064 wrote to memory of 4884 1064 llrlfff.exe nnnnhb.exe PID 4884 wrote to memory of 1600 4884 nnnnhb.exe nbthth.exe PID 4884 wrote to memory of 1600 4884 nnnnhb.exe nbthth.exe PID 4884 wrote to memory of 1600 4884 nnnnhb.exe nbthth.exe PID 1600 wrote to memory of 2040 1600 nbthth.exe jppjj.exe PID 1600 wrote to memory of 2040 1600 nbthth.exe jppjj.exe PID 1600 wrote to memory of 2040 1600 nbthth.exe jppjj.exe PID 2040 wrote to memory of 624 2040 jppjj.exe xffxxrr.exe PID 2040 wrote to memory of 624 2040 jppjj.exe xffxxrr.exe PID 2040 wrote to memory of 624 2040 jppjj.exe xffxxrr.exe PID 624 wrote to memory of 2404 624 xffxxrr.exe rlfxxrr.exe PID 624 wrote to memory of 2404 624 xffxxrr.exe rlfxxrr.exe PID 624 wrote to memory of 2404 624 xffxxrr.exe rlfxxrr.exe PID 2404 wrote to memory of 3736 2404 rlfxxrr.exe htnhtb.exe PID 2404 wrote to memory of 3736 2404 rlfxxrr.exe htnhtb.exe PID 2404 wrote to memory of 3736 2404 rlfxxrr.exe htnhtb.exe PID 3736 wrote to memory of 1044 3736 htnhtb.exe nhnhhh.exe PID 3736 wrote to memory of 1044 3736 htnhtb.exe nhnhhh.exe PID 3736 wrote to memory of 1044 3736 htnhtb.exe nhnhhh.exe PID 1044 wrote to memory of 916 1044 nhnhhh.exe djvjd.exe PID 1044 wrote to memory of 916 1044 nhnhhh.exe djvjd.exe PID 1044 wrote to memory of 916 1044 nhnhhh.exe djvjd.exe PID 916 wrote to memory of 4876 916 djvjd.exe fffxxxr.exe PID 916 wrote to memory of 4876 916 djvjd.exe fffxxxr.exe PID 916 wrote to memory of 4876 916 djvjd.exe fffxxxr.exe PID 4876 wrote to memory of 1712 4876 fffxxxr.exe hhtbtt.exe PID 4876 wrote to memory of 1712 4876 fffxxxr.exe hhtbtt.exe PID 4876 wrote to memory of 1712 4876 fffxxxr.exe hhtbtt.exe PID 1712 wrote to memory of 1756 1712 hhtbtt.exe bntnhb.exe PID 1712 wrote to memory of 1756 1712 hhtbtt.exe bntnhb.exe PID 1712 wrote to memory of 1756 1712 hhtbtt.exe bntnhb.exe PID 1756 wrote to memory of 5100 1756 bntnhb.exe ppppd.exe PID 1756 wrote to memory of 5100 1756 bntnhb.exe ppppd.exe PID 1756 wrote to memory of 5100 1756 bntnhb.exe ppppd.exe PID 5100 wrote to memory of 2624 5100 ppppd.exe lxrrrlr.exe PID 5100 wrote to memory of 2624 5100 ppppd.exe lxrrrlr.exe PID 5100 wrote to memory of 2624 5100 ppppd.exe lxrrrlr.exe PID 2624 wrote to memory of 3268 2624 lxrrrlr.exe 1tttnt.exe PID 2624 wrote to memory of 3268 2624 lxrrrlr.exe 1tttnt.exe PID 2624 wrote to memory of 3268 2624 lxrrrlr.exe 1tttnt.exe PID 3268 wrote to memory of 4892 3268 1tttnt.exe vppjd.exe PID 3268 wrote to memory of 4892 3268 1tttnt.exe vppjd.exe PID 3268 wrote to memory of 4892 3268 1tttnt.exe vppjd.exe PID 4892 wrote to memory of 3784 4892 vppjd.exe ffllxrr.exe PID 4892 wrote to memory of 3784 4892 vppjd.exe ffllxrr.exe PID 4892 wrote to memory of 3784 4892 vppjd.exe ffllxrr.exe PID 3784 wrote to memory of 1216 3784 ffllxrr.exe bttnnn.exe PID 3784 wrote to memory of 1216 3784 ffllxrr.exe bttnnn.exe PID 3784 wrote to memory of 1216 3784 ffllxrr.exe bttnnn.exe PID 1216 wrote to memory of 4076 1216 bttnnn.exe djjdv.exe PID 1216 wrote to memory of 4076 1216 bttnnn.exe djjdv.exe PID 1216 wrote to memory of 4076 1216 bttnnn.exe djjdv.exe PID 4076 wrote to memory of 1840 4076 djjdv.exe rrxxrrr.exe PID 4076 wrote to memory of 1840 4076 djjdv.exe rrxxrrr.exe PID 4076 wrote to memory of 1840 4076 djjdv.exe rrxxrrr.exe PID 1840 wrote to memory of 232 1840 rrxxrrr.exe xxlrrlr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\170791bb26493cf8caad81e4f1eb39791676644888f669ae7cfb2c8f94ea118c_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\5jvjv.exec:\5jvjv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\llrlfff.exec:\llrlfff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\nnnnhb.exec:\nnnnhb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\nbthth.exec:\nbthth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\jppjj.exec:\jppjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\xffxxrr.exec:\xffxxrr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
\??\c:\rlfxxrr.exec:\rlfxxrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\htnhtb.exec:\htnhtb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\nhnhhh.exec:\nhnhhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\djvjd.exec:\djvjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
\??\c:\fffxxxr.exec:\fffxxxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\hhtbtt.exec:\hhtbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\bntnhb.exec:\bntnhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
\??\c:\ppppd.exec:\ppppd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\lxrrrlr.exec:\lxrrrlr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\1tttnt.exec:\1tttnt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
\??\c:\vppjd.exec:\vppjd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\ffllxrr.exec:\ffllxrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
\??\c:\bttnnn.exec:\bttnnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\djjdv.exec:\djjdv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
\??\c:\rrxxrrr.exec:\rrxxrrr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
\??\c:\xxlrrlr.exec:\xxlrrlr.exe23⤵
- Executes dropped EXE
PID:232 -
\??\c:\7tbtnn.exec:\7tbtnn.exe24⤵
- Executes dropped EXE
PID:1192 -
\??\c:\1ddvp.exec:\1ddvp.exe25⤵
- Executes dropped EXE
PID:3004 -
\??\c:\frxxxxl.exec:\frxxxxl.exe26⤵
- Executes dropped EXE
PID:2816 -
\??\c:\bthhtt.exec:\bthhtt.exe27⤵
- Executes dropped EXE
PID:316 -
\??\c:\7jdvp.exec:\7jdvp.exe28⤵
- Executes dropped EXE
PID:3016 -
\??\c:\ffrxfll.exec:\ffrxfll.exe29⤵
- Executes dropped EXE
PID:4848 -
\??\c:\nbnhhb.exec:\nbnhhb.exe30⤵
- Executes dropped EXE
PID:4932 -
\??\c:\1fxfxxx.exec:\1fxfxxx.exe31⤵
- Executes dropped EXE
PID:2920 -
\??\c:\nbhnbb.exec:\nbhnbb.exe32⤵
- Executes dropped EXE
PID:1636 -
\??\c:\9bbbtt.exec:\9bbbtt.exe33⤵
- Executes dropped EXE
PID:5096 -
\??\c:\7vdvp.exec:\7vdvp.exe34⤵
- Executes dropped EXE
PID:3696 -
\??\c:\xflfxxr.exec:\xflfxxr.exe35⤵
- Executes dropped EXE
PID:3548 -
\??\c:\5nbtbb.exec:\5nbtbb.exe36⤵
- Executes dropped EXE
PID:1748 -
\??\c:\nbhhtt.exec:\nbhhtt.exe37⤵
- Executes dropped EXE
PID:2696 -
\??\c:\pppdd.exec:\pppdd.exe38⤵
- Executes dropped EXE
PID:2232 -
\??\c:\rlrflxr.exec:\rlrflxr.exe39⤵
- Executes dropped EXE
PID:3648 -
\??\c:\hntnhh.exec:\hntnhh.exe40⤵
- Executes dropped EXE
PID:4036 -
\??\c:\hbhbtt.exec:\hbhbtt.exe41⤵
- Executes dropped EXE
PID:1236 -
\??\c:\dvpjp.exec:\dvpjp.exe42⤵
- Executes dropped EXE
PID:4972 -
\??\c:\lllfxxx.exec:\lllfxxx.exe43⤵
- Executes dropped EXE
PID:3260 -
\??\c:\tnnhnn.exec:\tnnhnn.exe44⤵
- Executes dropped EXE
PID:4316 -
\??\c:\nhhbbb.exec:\nhhbbb.exe45⤵
- Executes dropped EXE
PID:2864 -
\??\c:\jvjpj.exec:\jvjpj.exe46⤵
- Executes dropped EXE
PID:3904 -
\??\c:\ppjdp.exec:\ppjdp.exe47⤵
- Executes dropped EXE
PID:2568 -
\??\c:\llrrffr.exec:\llrrffr.exe48⤵
- Executes dropped EXE
PID:1600 -
\??\c:\hhbntn.exec:\hhbntn.exe49⤵
- Executes dropped EXE
PID:4792 -
\??\c:\pdjjd.exec:\pdjjd.exe50⤵
- Executes dropped EXE
PID:4680 -
\??\c:\pvvjd.exec:\pvvjd.exe51⤵
- Executes dropped EXE
PID:3456 -
\??\c:\1llfxxr.exec:\1llfxxr.exe52⤵
- Executes dropped EXE
PID:60 -
\??\c:\bntnbt.exec:\bntnbt.exe53⤵
- Executes dropped EXE
PID:4172 -
\??\c:\nhnnbb.exec:\nhnnbb.exe54⤵
- Executes dropped EXE
PID:1796 -
\??\c:\dppjp.exec:\dppjp.exe55⤵
- Executes dropped EXE
PID:1044 -
\??\c:\xlflxrx.exec:\xlflxrx.exe56⤵
- Executes dropped EXE
PID:4668 -
\??\c:\bttnnn.exec:\bttnnn.exe57⤵
- Executes dropped EXE
PID:740 -
\??\c:\vdjvv.exec:\vdjvv.exe58⤵
- Executes dropped EXE
PID:3748 -
\??\c:\lxrlxxx.exec:\lxrlxxx.exe59⤵
- Executes dropped EXE
PID:1276 -
\??\c:\5rxrlll.exec:\5rxrlll.exe60⤵
- Executes dropped EXE
PID:1048 -
\??\c:\5nnnhn.exec:\5nnnhn.exe61⤵
- Executes dropped EXE
PID:2540 -
\??\c:\pjvdp.exec:\pjvdp.exe62⤵
- Executes dropped EXE
PID:3928 -
\??\c:\rllfxrr.exec:\rllfxrr.exe63⤵
- Executes dropped EXE
PID:4156 -
\??\c:\nbnhbb.exec:\nbnhbb.exe64⤵
- Executes dropped EXE
PID:1432 -
\??\c:\tntnhh.exec:\tntnhh.exe65⤵
- Executes dropped EXE
PID:1848 -
\??\c:\pjddv.exec:\pjddv.exe66⤵PID:3440
-
\??\c:\xlrlllr.exec:\xlrlllr.exe67⤵PID:8
-
\??\c:\1fllffl.exec:\1fllffl.exe68⤵PID:212
-
\??\c:\nhbbbt.exec:\nhbbbt.exe69⤵PID:1112
-
\??\c:\bbhbnn.exec:\bbhbnn.exe70⤵PID:1408
-
\??\c:\vvjdv.exec:\vvjdv.exe71⤵PID:4832
-
\??\c:\fxrlfff.exec:\fxrlfff.exe72⤵PID:5084
-
\??\c:\fxrlrrf.exec:\fxrlrrf.exe73⤵PID:1192
-
\??\c:\hbtnbt.exec:\hbtnbt.exe74⤵PID:2816
-
\??\c:\nbbhbn.exec:\nbbhbn.exe75⤵PID:1300
-
\??\c:\vpdvj.exec:\vpdvj.exe76⤵PID:4200
-
\??\c:\pvdvp.exec:\pvdvp.exe77⤵PID:4164
-
\??\c:\9frrlll.exec:\9frrlll.exe78⤵PID:4848
-
\??\c:\ttntht.exec:\ttntht.exe79⤵PID:3700
-
\??\c:\hhnnbh.exec:\hhnnbh.exe80⤵PID:1012
-
\??\c:\jvvpj.exec:\jvvpj.exe81⤵PID:3432
-
\??\c:\rxxxrrr.exec:\rxxxrrr.exe82⤵PID:2796
-
\??\c:\9xxrlxl.exec:\9xxrlxl.exe83⤵PID:548
-
\??\c:\bhtnnn.exec:\bhtnnn.exe84⤵PID:968
-
\??\c:\nhhbbt.exec:\nhhbbt.exe85⤵PID:1748
-
\??\c:\pdddj.exec:\pdddj.exe86⤵PID:2468
-
\??\c:\pjvpj.exec:\pjvpj.exe87⤵PID:3496
-
\??\c:\7xxlffx.exec:\7xxlffx.exe88⤵PID:4940
-
\??\c:\tttnbb.exec:\tttnbb.exe89⤵PID:4036
-
\??\c:\jppvv.exec:\jppvv.exe90⤵PID:4564
-
\??\c:\xxxrrrl.exec:\xxxrrrl.exe91⤵PID:4476
-
\??\c:\hhnbtt.exec:\hhnbtt.exe92⤵PID:872
-
\??\c:\hhhbtt.exec:\hhhbtt.exe93⤵PID:4028
-
\??\c:\vpjpj.exec:\vpjpj.exe94⤵PID:1064
-
\??\c:\vdjjj.exec:\vdjjj.exe95⤵PID:4508
-
\??\c:\flxrlfx.exec:\flxrlfx.exe96⤵PID:2556
-
\??\c:\7nnhth.exec:\7nnhth.exe97⤵PID:4136
-
\??\c:\jpjdd.exec:\jpjdd.exe98⤵PID:1496
-
\??\c:\fxrlffx.exec:\fxrlffx.exe99⤵PID:1680
-
\??\c:\htttnb.exec:\htttnb.exe100⤵PID:4840
-
\??\c:\htnbhh.exec:\htnbhh.exe101⤵PID:3036
-
\??\c:\dpvpj.exec:\dpvpj.exe102⤵PID:680
-
\??\c:\pjppp.exec:\pjppp.exe103⤵PID:1796
-
\??\c:\rfffffl.exec:\rfffffl.exe104⤵PID:1708
-
\??\c:\hbhnhn.exec:\hbhnhn.exe105⤵PID:4772
-
\??\c:\thnhbh.exec:\thnhbh.exe106⤵PID:4900
-
\??\c:\frxfrrr.exec:\frxfrrr.exe107⤵PID:4808
-
\??\c:\3tntnn.exec:\3tntnn.exe108⤵PID:1712
-
\??\c:\nnttnn.exec:\nnttnn.exe109⤵PID:2276
-
\??\c:\pppvp.exec:\pppvp.exe110⤵PID:2720
-
\??\c:\xxflflx.exec:\xxflflx.exe111⤵PID:2168
-
\??\c:\xrxxllf.exec:\xrxxllf.exe112⤵PID:2752
-
\??\c:\tthhtb.exec:\tthhtb.exe113⤵PID:920
-
\??\c:\djvdp.exec:\djvdp.exe114⤵PID:4540
-
\??\c:\frxlxrr.exec:\frxlxrr.exe115⤵PID:2436
-
\??\c:\7nnnnn.exec:\7nnnnn.exe116⤵PID:2348
-
\??\c:\vpjpj.exec:\vpjpj.exe117⤵PID:4076
-
\??\c:\frflxfl.exec:\frflxfl.exe118⤵PID:2464
-
\??\c:\bbhnht.exec:\bbhnht.exe119⤵PID:2892
-
\??\c:\vjjjv.exec:\vjjjv.exe120⤵PID:2192
-
\??\c:\ppvpp.exec:\ppvpp.exe121⤵PID:4132
-
\??\c:\xrxrrrx.exec:\xrxrrrx.exe122⤵PID:3740
-
\??\c:\1rfrlll.exec:\1rfrlll.exe123⤵PID:5084
-
\??\c:\bbnhnn.exec:\bbnhnn.exe124⤵PID:4348
-
\??\c:\1hnhbh.exec:\1hnhbh.exe125⤵PID:1940
-
\??\c:\djvdp.exec:\djvdp.exe126⤵PID:3632
-
\??\c:\rrrlrrx.exec:\rrrlrrx.exe127⤵PID:3608
-
\??\c:\bntthb.exec:\bntthb.exe128⤵PID:808
-
\??\c:\nhnhhh.exec:\nhnhhh.exe129⤵PID:3300
-
\??\c:\ddpdj.exec:\ddpdj.exe130⤵PID:2920
-
\??\c:\xrfxllf.exec:\xrfxllf.exe131⤵PID:4584
-
\??\c:\7httnh.exec:\7httnh.exe132⤵PID:2092
-
\??\c:\dvjjp.exec:\dvjjp.exe133⤵PID:4408
-
\??\c:\frlfflf.exec:\frlfflf.exe134⤵PID:1320
-
\??\c:\7rxrxrl.exec:\7rxrxrl.exe135⤵PID:2484
-
\??\c:\nhhbbt.exec:\nhhbbt.exe136⤵PID:2412
-
\??\c:\ddppp.exec:\ddppp.exe137⤵PID:2548
-
\??\c:\bbttnn.exec:\bbttnn.exe138⤵PID:4644
-
\??\c:\jjppj.exec:\jjppj.exe139⤵PID:4576
-
\??\c:\lxfrlfr.exec:\lxfrlfr.exe140⤵PID:3776
-
\??\c:\7bhhbb.exec:\7bhhbb.exe141⤵PID:1412
-
\??\c:\vjddd.exec:\vjddd.exe142⤵PID:3672
-
\??\c:\vvddd.exec:\vvddd.exe143⤵PID:3108
-
\??\c:\1rrrrff.exec:\1rrrrff.exe144⤵PID:4188
-
\??\c:\hhtthn.exec:\hhtthn.exe145⤵PID:4984
-
\??\c:\ffxrrrr.exec:\ffxrrrr.exe146⤵PID:2040
-
\??\c:\1xflllf.exec:\1xflllf.exe147⤵PID:3456
-
\??\c:\5ddvv.exec:\5ddvv.exe148⤵PID:1792
-
\??\c:\ddvvp.exec:\ddvvp.exe149⤵PID:876
-
\??\c:\ffxlxrl.exec:\ffxlxrl.exe150⤵PID:2528
-
\??\c:\5xxrlrr.exec:\5xxrlrr.exe151⤵PID:1044
-
\??\c:\9hbthh.exec:\9hbthh.exe152⤵PID:2356
-
\??\c:\djdjv.exec:\djdjv.exe153⤵PID:1072
-
\??\c:\xfxfrlr.exec:\xfxfrlr.exe154⤵PID:3384
-
\??\c:\lrxxxff.exec:\lrxxxff.exe155⤵PID:4716
-
\??\c:\nbnbtn.exec:\nbnbtn.exe156⤵PID:4928
-
\??\c:\ddppd.exec:\ddppd.exe157⤵PID:3028
-
\??\c:\lllxrlx.exec:\lllxrlx.exe158⤵PID:2252
-
\??\c:\rlffxrl.exec:\rlffxrl.exe159⤵PID:4696
-
\??\c:\thhhbt.exec:\thhhbt.exe160⤵PID:4468
-
\??\c:\djddv.exec:\djddv.exe161⤵PID:3596
-
\??\c:\jdjjd.exec:\jdjjd.exe162⤵PID:1848
-
\??\c:\rrfxllf.exec:\rrfxllf.exe163⤵PID:5064
-
\??\c:\5lxrxxf.exec:\5lxrxxf.exe164⤵PID:1808
-
\??\c:\1bntbt.exec:\1bntbt.exe165⤵PID:4420
-
\??\c:\3bttbb.exec:\3bttbb.exe166⤵PID:1996
-
\??\c:\7vdpp.exec:\7vdpp.exe167⤵PID:4332
-
\??\c:\7pjdd.exec:\7pjdd.exe168⤵PID:2792
-
\??\c:\xxllrff.exec:\xxllrff.exe169⤵PID:5036
-
\??\c:\frffffx.exec:\frffffx.exe170⤵PID:3632
-
\??\c:\bhntnb.exec:\bhntnb.exe171⤵PID:2224
-
\??\c:\7htntt.exec:\7htntt.exe172⤵PID:3492
-
\??\c:\vpddv.exec:\vpddv.exe173⤵PID:2360
-
\??\c:\jjjdd.exec:\jjjdd.exe174⤵PID:1420
-
\??\c:\lfrxfff.exec:\lfrxfff.exe175⤵PID:2988
-
\??\c:\xrrlxxf.exec:\xrrlxxf.exe176⤵PID:3600
-
\??\c:\3tnhhh.exec:\3tnhhh.exe177⤵PID:3408
-
\??\c:\vdddv.exec:\vdddv.exe178⤵PID:3920
-
\??\c:\vvdpv.exec:\vvdpv.exe179⤵PID:3648
-
\??\c:\lfffrxx.exec:\lfffrxx.exe180⤵PID:1604
-
\??\c:\1rxrllf.exec:\1rxrllf.exe181⤵PID:3448
-
\??\c:\nbbbbb.exec:\nbbbbb.exe182⤵PID:4368
-
\??\c:\pvvvv.exec:\pvvvv.exe183⤵PID:1540
-
\??\c:\lllrrlr.exec:\lllrrlr.exe184⤵PID:2864
-
\??\c:\7lrfxxx.exec:\7lrfxxx.exe185⤵PID:372
-
\??\c:\hbhhbb.exec:\hbhhbb.exe186⤵PID:3340
-
\??\c:\bbhhnb.exec:\bbhhnb.exe187⤵PID:1284
-
\??\c:\jvdvv.exec:\jvdvv.exe188⤵PID:2040
-
\??\c:\lxllfll.exec:\lxllfll.exe189⤵PID:388
-
\??\c:\lfxxxrx.exec:\lfxxxrx.exe190⤵PID:1556
-
\??\c:\9tttnb.exec:\9tttnb.exe191⤵PID:4372
-
\??\c:\nhnhbb.exec:\nhnhbb.exe192⤵PID:3736
-
\??\c:\vpvvv.exec:\vpvvv.exe193⤵PID:1092
-
\??\c:\jvddd.exec:\jvddd.exe194⤵PID:3052
-
\??\c:\rllllll.exec:\rllllll.exe195⤵PID:2744
-
\??\c:\xxxrxlf.exec:\xxxrxlf.exe196⤵PID:900
-
\??\c:\ttbbtb.exec:\ttbbtb.exe197⤵PID:3688
-
\??\c:\vvvpj.exec:\vvvpj.exe198⤵PID:1276
-
\??\c:\jjvdv.exec:\jjvdv.exe199⤵PID:2688
-
\??\c:\rxxfxxr.exec:\rxxfxxr.exe200⤵PID:656
-
\??\c:\tbhbbb.exec:\tbhbbb.exe201⤵PID:2272
-
\??\c:\9nnhbb.exec:\9nnhbb.exe202⤵PID:3076
-
\??\c:\7dpjj.exec:\7dpjj.exe203⤵PID:2436
-
\??\c:\frfxxxx.exec:\frfxxxx.exe204⤵PID:3032
-
\??\c:\rffxrrl.exec:\rffxrrl.exe205⤵PID:2892
-
\??\c:\hbtnht.exec:\hbtnht.exe206⤵PID:2208
-
\??\c:\7htnhn.exec:\7htnhn.exe207⤵PID:4268
-
\??\c:\jdjjd.exec:\jdjjd.exe208⤵PID:1624
-
\??\c:\jvdjv.exec:\jvdjv.exe209⤵PID:4400
-
\??\c:\llffxxr.exec:\llffxxr.exe210⤵PID:1720
-
\??\c:\9xxxxxx.exec:\9xxxxxx.exe211⤵PID:2224
-
\??\c:\nhnhnn.exec:\nhnhnn.exe212⤵PID:3492
-
\??\c:\hhhbtt.exec:\hhhbtt.exe213⤵PID:3020
-
\??\c:\jjpvp.exec:\jjpvp.exe214⤵PID:3376
-
\??\c:\frlfxxr.exec:\frlfxxr.exe215⤵PID:536
-
\??\c:\tnnnnn.exec:\tnnnnn.exe216⤵PID:2340
-
\??\c:\lflflfr.exec:\lflflfr.exe217⤵PID:3684
-
\??\c:\bhntbh.exec:\bhntbh.exe218⤵PID:1536
-
\??\c:\dvdpv.exec:\dvdpv.exe219⤵PID:1344
-
\??\c:\lxrffff.exec:\lxrffff.exe220⤵PID:1404
-
\??\c:\jvppj.exec:\jvppj.exe221⤵PID:872
-
\??\c:\xrxrrrf.exec:\xrxrrrf.exe222⤵PID:1272
-
\??\c:\3rxrxxf.exec:\3rxrxxf.exe223⤵PID:2240
-
\??\c:\bhthth.exec:\bhthth.exe224⤵PID:1444
-
\??\c:\jvvpp.exec:\jvvpp.exe225⤵PID:372
-
\??\c:\1jpjd.exec:\1jpjd.exe226⤵PID:1212
-
\??\c:\1xrlllf.exec:\1xrlllf.exe227⤵PID:1284
-
\??\c:\xxxxrrr.exec:\xxxxrrr.exe228⤵PID:3036
-
\??\c:\btthhb.exec:\btthhb.exe229⤵PID:1544
-
\??\c:\ppvpp.exec:\ppvpp.exe230⤵PID:4436
-
\??\c:\3jvpp.exec:\3jvpp.exe231⤵PID:632
-
\??\c:\lrlxffx.exec:\lrlxffx.exe232⤵PID:1716
-
\??\c:\hnhhhh.exec:\hnhhhh.exe233⤵PID:1664
-
\??\c:\btnnhb.exec:\btnnhb.exe234⤵PID:1372
-
\??\c:\1vdvp.exec:\1vdvp.exe235⤵PID:2448
-
\??\c:\vvjjj.exec:\vvjjj.exe236⤵PID:1528
-
\??\c:\lfrlfll.exec:\lfrlfll.exe237⤵PID:4928
-
\??\c:\7rxxrrl.exec:\7rxxrrl.exe238⤵PID:4020
-
\??\c:\hbhhhh.exec:\hbhhhh.exe239⤵PID:1560
-
\??\c:\ttthhn.exec:\ttthhn.exe240⤵PID:5048
-
\??\c:\vvjdv.exec:\vvjdv.exe241⤵PID:1216
-
\??\c:\vdpjj.exec:\vdpjj.exe242⤵PID:3596