Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 07:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exe
-
Size
76KB
-
MD5
e410c09aa53435fc5a29f33b324e9f40
-
SHA1
a828d13bb6317571a93a5265a945501288fcbcb0
-
SHA256
1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065
-
SHA512
d4ba38c83bb4c598dccda461c4ac7f09a4bcb93b483beda6586500ff1bf36f36e282836e02a62c2a95fc4b7d7ae5be464aaaf285de4cfce75e5d78ba7be9c939
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAX8gu3Gno9yvrjKX:ymb3NkkiQ3mdBjFo68t3Gno9IU
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/2256-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4236-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4600-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1756-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1756-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1404-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/404-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4948-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4092-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/556-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3264-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3112-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1896-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/816-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3232-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3984-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3320-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4808-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2092-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1560-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pvddv.exelrrfxrf.exehhnhhh.exepdjdj.exefrrllll.exejdvpd.exexxffllx.exexxxxxfx.exevvjvp.exefxflxxx.exenbttbn.exeppjjj.exelrfflff.exehhtnhh.exevvddd.exe7ffffll.exe7hhbbt.exejjvjp.exellxxxfl.exefllffff.exennthhn.exejjjdj.exe7jvvd.exellxrrll.exehbhbhh.exefffxrxx.exelllffrf.exedjppp.exevdpjj.exerxlffff.exethhnth.exejvppj.exerrllrrf.exerxllfxx.exetbntnt.exedvvjj.exeffflrxl.exerrrrrrr.exebthnhn.exevpppp.exelxrrlrr.exe9ntbtt.exejpvpd.exellxlflf.exexxlxfff.exebhhhhn.exebtnhhn.exeppjdp.exeffrrrrr.exe3xffllx.exebbttbb.exedpvvv.exenbhhbh.exe1jppp.exexffllxx.exethnnhh.exe9djjj.exelxflllr.exehttbhn.exepvppd.exeddjvd.exefxfxfxx.exetnbbhh.exejpjjv.exepid process 2256 pvddv.exe 4236 lrrfxrf.exe 4688 hhnhhh.exe 3024 pdjdj.exe 4428 frrllll.exe 4600 jdvpd.exe 1756 xxffllx.exe 4916 xxxxxfx.exe 1404 vvjvp.exe 404 fxflxxx.exe 4968 nbttbn.exe 2808 ppjjj.exe 4948 lrfflff.exe 2000 hhtnhh.exe 4092 vvddd.exe 556 7ffffll.exe 4088 7hhbbt.exe 3264 jjvjp.exe 3112 llxxxfl.exe 768 fllffff.exe 1896 nnthhn.exe 816 jjjdj.exe 3232 7jvvd.exe 3984 llxrrll.exe 3320 hbhbhh.exe 3512 fffxrxx.exe 4808 lllffrf.exe 2092 djppp.exe 2316 vdpjj.exe 1560 rxlffff.exe 3036 thhnth.exe 2460 jvppj.exe 4792 rrllrrf.exe 4284 rxllfxx.exe 704 tbntnt.exe 2896 dvvjj.exe 1648 ffflrxl.exe 1392 rrrrrrr.exe 4272 bthnhn.exe 3304 vpppp.exe 1164 lxrrlrr.exe 448 9ntbtt.exe 4924 jpvpd.exe 4236 llxlflf.exe 5104 xxlxfff.exe 2524 bhhhhn.exe 3096 btnhhn.exe 4820 ppjdp.exe 4384 ffrrrrr.exe 4892 3xffllx.exe 1424 bbttbb.exe 4816 dpvvv.exe 1404 nbhhbh.exe 2720 1jppp.exe 4888 xffllxx.exe 2776 thnnhh.exe 2504 9djjj.exe 2584 lxflllr.exe 624 httbhn.exe 4092 pvppd.exe 1784 ddjvd.exe 4088 fxfxfxx.exe 1464 tnbbhh.exe 4748 jpjjv.exe -
Processes:
resource yara_rule behavioral2/memory/2256-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4236-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3024-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1756-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1756-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4916-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1404-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/404-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4948-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4092-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/556-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3264-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3112-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1896-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/816-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3232-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3984-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3320-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4808-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2092-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1560-198-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exepvddv.exelrrfxrf.exehhnhhh.exepdjdj.exefrrllll.exejdvpd.exexxffllx.exexxxxxfx.exevvjvp.exefxflxxx.exenbttbn.exeppjjj.exelrfflff.exehhtnhh.exevvddd.exe7ffffll.exe7hhbbt.exejjvjp.exellxxxfl.exefllffff.exennthhn.exedescription pid process target process PID 3720 wrote to memory of 2256 3720 1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exe pvddv.exe PID 3720 wrote to memory of 2256 3720 1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exe pvddv.exe PID 3720 wrote to memory of 2256 3720 1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exe pvddv.exe PID 2256 wrote to memory of 4236 2256 pvddv.exe lrrfxrf.exe PID 2256 wrote to memory of 4236 2256 pvddv.exe lrrfxrf.exe PID 2256 wrote to memory of 4236 2256 pvddv.exe lrrfxrf.exe PID 4236 wrote to memory of 4688 4236 lrrfxrf.exe hhnhhh.exe PID 4236 wrote to memory of 4688 4236 lrrfxrf.exe hhnhhh.exe PID 4236 wrote to memory of 4688 4236 lrrfxrf.exe hhnhhh.exe PID 4688 wrote to memory of 3024 4688 hhnhhh.exe pdjdj.exe PID 4688 wrote to memory of 3024 4688 hhnhhh.exe pdjdj.exe PID 4688 wrote to memory of 3024 4688 hhnhhh.exe pdjdj.exe PID 3024 wrote to memory of 4428 3024 pdjdj.exe frrllll.exe PID 3024 wrote to memory of 4428 3024 pdjdj.exe frrllll.exe PID 3024 wrote to memory of 4428 3024 pdjdj.exe frrllll.exe PID 4428 wrote to memory of 4600 4428 frrllll.exe jdvpd.exe PID 4428 wrote to memory of 4600 4428 frrllll.exe jdvpd.exe PID 4428 wrote to memory of 4600 4428 frrllll.exe jdvpd.exe PID 4600 wrote to memory of 1756 4600 jdvpd.exe xxffllx.exe PID 4600 wrote to memory of 1756 4600 jdvpd.exe xxffllx.exe PID 4600 wrote to memory of 1756 4600 jdvpd.exe xxffllx.exe PID 1756 wrote to memory of 4916 1756 xxffllx.exe xxxxxfx.exe PID 1756 wrote to memory of 4916 1756 xxffllx.exe xxxxxfx.exe PID 1756 wrote to memory of 4916 1756 xxffllx.exe xxxxxfx.exe PID 4916 wrote to memory of 1404 4916 xxxxxfx.exe vvjvp.exe PID 4916 wrote to memory of 1404 4916 xxxxxfx.exe vvjvp.exe PID 4916 wrote to memory of 1404 4916 xxxxxfx.exe vvjvp.exe PID 1404 wrote to memory of 404 1404 vvjvp.exe fxflxxx.exe PID 1404 wrote to memory of 404 1404 vvjvp.exe fxflxxx.exe PID 1404 wrote to memory of 404 1404 vvjvp.exe fxflxxx.exe PID 404 wrote to memory of 4968 404 fxflxxx.exe nbttbn.exe PID 404 wrote to memory of 4968 404 fxflxxx.exe nbttbn.exe PID 404 wrote to memory of 4968 404 fxflxxx.exe nbttbn.exe PID 4968 wrote to memory of 2808 4968 nbttbn.exe ppjjj.exe PID 4968 wrote to memory of 2808 4968 nbttbn.exe ppjjj.exe PID 4968 wrote to memory of 2808 4968 nbttbn.exe ppjjj.exe PID 2808 wrote to memory of 4948 2808 ppjjj.exe lrfflff.exe PID 2808 wrote to memory of 4948 2808 ppjjj.exe lrfflff.exe PID 2808 wrote to memory of 4948 2808 ppjjj.exe lrfflff.exe PID 4948 wrote to memory of 2000 4948 lrfflff.exe hhtnhh.exe PID 4948 wrote to memory of 2000 4948 lrfflff.exe hhtnhh.exe PID 4948 wrote to memory of 2000 4948 lrfflff.exe hhtnhh.exe PID 2000 wrote to memory of 4092 2000 hhtnhh.exe vvddd.exe PID 2000 wrote to memory of 4092 2000 hhtnhh.exe vvddd.exe PID 2000 wrote to memory of 4092 2000 hhtnhh.exe vvddd.exe PID 4092 wrote to memory of 556 4092 vvddd.exe 7ffffll.exe PID 4092 wrote to memory of 556 4092 vvddd.exe 7ffffll.exe PID 4092 wrote to memory of 556 4092 vvddd.exe 7ffffll.exe PID 556 wrote to memory of 4088 556 7ffffll.exe 7hhbbt.exe PID 556 wrote to memory of 4088 556 7ffffll.exe 7hhbbt.exe PID 556 wrote to memory of 4088 556 7ffffll.exe 7hhbbt.exe PID 4088 wrote to memory of 3264 4088 7hhbbt.exe jjvjp.exe PID 4088 wrote to memory of 3264 4088 7hhbbt.exe jjvjp.exe PID 4088 wrote to memory of 3264 4088 7hhbbt.exe jjvjp.exe PID 3264 wrote to memory of 3112 3264 jjvjp.exe llxxxfl.exe PID 3264 wrote to memory of 3112 3264 jjvjp.exe llxxxfl.exe PID 3264 wrote to memory of 3112 3264 jjvjp.exe llxxxfl.exe PID 3112 wrote to memory of 768 3112 llxxxfl.exe fllffff.exe PID 3112 wrote to memory of 768 3112 llxxxfl.exe fllffff.exe PID 3112 wrote to memory of 768 3112 llxxxfl.exe fllffff.exe PID 768 wrote to memory of 1896 768 fllffff.exe nnthhn.exe PID 768 wrote to memory of 1896 768 fllffff.exe nnthhn.exe PID 768 wrote to memory of 1896 768 fllffff.exe nnthhn.exe PID 1896 wrote to memory of 816 1896 nnthhn.exe jjjdj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1a73c415b80e34342bf1106d06341de1749e98c94b0f785b62e506f3538e3065_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\pvddv.exec:\pvddv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\lrrfxrf.exec:\lrrfxrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\hhnhhh.exec:\hhnhhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\pdjdj.exec:\pdjdj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\frrllll.exec:\frrllll.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
\??\c:\jdvpd.exec:\jdvpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\xxffllx.exec:\xxffllx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
\??\c:\xxxxxfx.exec:\xxxxxfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
\??\c:\vvjvp.exec:\vvjvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\fxflxxx.exec:\fxflxxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
\??\c:\nbttbn.exec:\nbttbn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\ppjjj.exec:\ppjjj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\lrfflff.exec:\lrfflff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
\??\c:\hhtnhh.exec:\hhtnhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\vvddd.exec:\vvddd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
\??\c:\7ffffll.exec:\7ffffll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\7hhbbt.exec:\7hhbbt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\jjvjp.exec:\jjvjp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
\??\c:\llxxxfl.exec:\llxxxfl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
\??\c:\fllffff.exec:\fllffff.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
\??\c:\nnthhn.exec:\nnthhn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\jjjdj.exec:\jjjdj.exe23⤵
- Executes dropped EXE
PID:816 -
\??\c:\7jvvd.exec:\7jvvd.exe24⤵
- Executes dropped EXE
PID:3232 -
\??\c:\llxrrll.exec:\llxrrll.exe25⤵
- Executes dropped EXE
PID:3984 -
\??\c:\hbhbhh.exec:\hbhbhh.exe26⤵
- Executes dropped EXE
PID:3320 -
\??\c:\fffxrxx.exec:\fffxrxx.exe27⤵
- Executes dropped EXE
PID:3512 -
\??\c:\lllffrf.exec:\lllffrf.exe28⤵
- Executes dropped EXE
PID:4808 -
\??\c:\djppp.exec:\djppp.exe29⤵
- Executes dropped EXE
PID:2092 -
\??\c:\vdpjj.exec:\vdpjj.exe30⤵
- Executes dropped EXE
PID:2316 -
\??\c:\rxlffff.exec:\rxlffff.exe31⤵
- Executes dropped EXE
PID:1560 -
\??\c:\thhnth.exec:\thhnth.exe32⤵
- Executes dropped EXE
PID:3036 -
\??\c:\jvppj.exec:\jvppj.exe33⤵
- Executes dropped EXE
PID:2460 -
\??\c:\rrllrrf.exec:\rrllrrf.exe34⤵
- Executes dropped EXE
PID:4792 -
\??\c:\rxllfxx.exec:\rxllfxx.exe35⤵
- Executes dropped EXE
PID:4284 -
\??\c:\tbntnt.exec:\tbntnt.exe36⤵
- Executes dropped EXE
PID:704 -
\??\c:\dvvjj.exec:\dvvjj.exe37⤵
- Executes dropped EXE
PID:2896 -
\??\c:\ffflrxl.exec:\ffflrxl.exe38⤵
- Executes dropped EXE
PID:1648 -
\??\c:\rrrrrrr.exec:\rrrrrrr.exe39⤵
- Executes dropped EXE
PID:1392 -
\??\c:\bthnhn.exec:\bthnhn.exe40⤵
- Executes dropped EXE
PID:4272 -
\??\c:\vpppp.exec:\vpppp.exe41⤵
- Executes dropped EXE
PID:3304 -
\??\c:\lxrrlrr.exec:\lxrrlrr.exe42⤵
- Executes dropped EXE
PID:1164 -
\??\c:\9ntbtt.exec:\9ntbtt.exe43⤵
- Executes dropped EXE
PID:448 -
\??\c:\jpvpd.exec:\jpvpd.exe44⤵
- Executes dropped EXE
PID:4924 -
\??\c:\llxlflf.exec:\llxlflf.exe45⤵
- Executes dropped EXE
PID:4236 -
\??\c:\xxlxfff.exec:\xxlxfff.exe46⤵
- Executes dropped EXE
PID:5104 -
\??\c:\bhhhhn.exec:\bhhhhn.exe47⤵
- Executes dropped EXE
PID:2524 -
\??\c:\btnhhn.exec:\btnhhn.exe48⤵
- Executes dropped EXE
PID:3096 -
\??\c:\ppjdp.exec:\ppjdp.exe49⤵
- Executes dropped EXE
PID:4820 -
\??\c:\ffrrrrr.exec:\ffrrrrr.exe50⤵
- Executes dropped EXE
PID:4384 -
\??\c:\3xffllx.exec:\3xffllx.exe51⤵
- Executes dropped EXE
PID:4892 -
\??\c:\bbttbb.exec:\bbttbb.exe52⤵
- Executes dropped EXE
PID:1424 -
\??\c:\dpvvv.exec:\dpvvv.exe53⤵
- Executes dropped EXE
PID:4816 -
\??\c:\nbhhbh.exec:\nbhhbh.exe54⤵
- Executes dropped EXE
PID:1404 -
\??\c:\1jppp.exec:\1jppp.exe55⤵
- Executes dropped EXE
PID:2720 -
\??\c:\xffllxx.exec:\xffllxx.exe56⤵
- Executes dropped EXE
PID:4888 -
\??\c:\thnnhh.exec:\thnnhh.exe57⤵
- Executes dropped EXE
PID:2776 -
\??\c:\9djjj.exec:\9djjj.exe58⤵
- Executes dropped EXE
PID:2504 -
\??\c:\lxflllr.exec:\lxflllr.exe59⤵
- Executes dropped EXE
PID:2584 -
\??\c:\httbhn.exec:\httbhn.exe60⤵
- Executes dropped EXE
PID:624 -
\??\c:\pvppd.exec:\pvppd.exe61⤵
- Executes dropped EXE
PID:4092 -
\??\c:\ddjvd.exec:\ddjvd.exe62⤵
- Executes dropped EXE
PID:1784 -
\??\c:\fxfxfxx.exec:\fxfxfxx.exe63⤵
- Executes dropped EXE
PID:4088 -
\??\c:\tnbbhh.exec:\tnbbhh.exe64⤵
- Executes dropped EXE
PID:1464 -
\??\c:\jpjjv.exec:\jpjjv.exe65⤵
- Executes dropped EXE
PID:4748 -
\??\c:\lllfrrr.exec:\lllfrrr.exe66⤵PID:4932
-
\??\c:\hnnnnh.exec:\hnnnnh.exe67⤵PID:2040
-
\??\c:\bnnhnn.exec:\bnnhnn.exe68⤵PID:1644
-
\??\c:\ppvvd.exec:\ppvvd.exe69⤵PID:2088
-
\??\c:\lfxxlrr.exec:\lfxxlrr.exe70⤵PID:1056
-
\??\c:\httnhh.exec:\httnhh.exe71⤵PID:1960
-
\??\c:\nntbnt.exec:\nntbnt.exe72⤵PID:2020
-
\??\c:\vpppj.exec:\vpppj.exe73⤵PID:4804
-
\??\c:\lrrrrrr.exec:\lrrrrrr.exe74⤵PID:4808
-
\??\c:\thhbtt.exec:\thhbtt.exe75⤵PID:880
-
\??\c:\bhhbnb.exec:\bhhbnb.exe76⤵PID:3068
-
\??\c:\pjjjj.exec:\pjjjj.exe77⤵PID:696
-
\??\c:\xxfllxr.exec:\xxfllxr.exe78⤵PID:1336
-
\??\c:\hhbhtt.exec:\hhbhtt.exe79⤵PID:2676
-
\??\c:\ntbbtb.exec:\ntbbtb.exe80⤵PID:4276
-
\??\c:\vvjdj.exec:\vvjdj.exe81⤵PID:1688
-
\??\c:\9vpdv.exec:\9vpdv.exe82⤵PID:548
-
\??\c:\fxxrffr.exec:\fxxrffr.exe83⤵PID:3356
-
\??\c:\hhbthb.exec:\hhbthb.exe84⤵PID:1908
-
\??\c:\vjdvv.exec:\vjdvv.exe85⤵PID:1096
-
\??\c:\flxxfxx.exec:\flxxfxx.exe86⤵PID:1392
-
\??\c:\fxrllll.exec:\fxrllll.exe87⤵PID:4332
-
\??\c:\ntbtnn.exec:\ntbtnn.exe88⤵PID:4752
-
\??\c:\pppjv.exec:\pppjv.exe89⤵PID:688
-
\??\c:\7jpjj.exec:\7jpjj.exe90⤵PID:3268
-
\??\c:\ffxffff.exec:\ffxffff.exe91⤵PID:1276
-
\??\c:\htbbtt.exec:\htbbtt.exe92⤵PID:5104
-
\??\c:\1hnhhb.exec:\1hnhhb.exe93⤵PID:4328
-
\??\c:\jvdvv.exec:\jvdvv.exe94⤵PID:672
-
\??\c:\djddd.exec:\djddd.exe95⤵PID:2468
-
\??\c:\flrrllr.exec:\flrrllr.exe96⤵PID:3488
-
\??\c:\nbbttb.exec:\nbbttb.exe97⤵PID:4848
-
\??\c:\tbhbhh.exec:\tbhbhh.exe98⤵PID:1536
-
\??\c:\bnttth.exec:\bnttth.exe99⤵PID:2720
-
\??\c:\jvdpp.exec:\jvdpp.exe100⤵PID:2560
-
\??\c:\jpppp.exec:\jpppp.exe101⤵PID:1372
-
\??\c:\xxrrffl.exec:\xxrrffl.exe102⤵PID:4992
-
\??\c:\7nbhbb.exec:\7nbhbb.exe103⤵PID:1440
-
\??\c:\thnnhn.exec:\thnnhn.exe104⤵PID:2592
-
\??\c:\dppjj.exec:\dppjj.exe105⤵PID:4616
-
\??\c:\llxxxrr.exec:\llxxxrr.exe106⤵PID:2452
-
\??\c:\ppdjv.exec:\ppdjv.exe107⤵PID:1328
-
\??\c:\fxxxfff.exec:\fxxxfff.exe108⤵PID:3400
-
\??\c:\hntbbh.exec:\hntbbh.exe109⤵PID:4588
-
\??\c:\btbtnb.exec:\btbtnb.exe110⤵PID:5088
-
\??\c:\djjpd.exec:\djjpd.exe111⤵PID:1548
-
\??\c:\jvdpp.exec:\jvdpp.exe112⤵PID:752
-
\??\c:\fllfxxf.exec:\fllfxxf.exe113⤵PID:2068
-
\??\c:\btbnnt.exec:\btbnnt.exe114⤵PID:4184
-
\??\c:\dpjdj.exec:\dpjdj.exe115⤵PID:3116
-
\??\c:\rffxxxr.exec:\rffxxxr.exe116⤵PID:1732
-
\??\c:\jpvvd.exec:\jpvvd.exe117⤵PID:1996
-
\??\c:\jjppp.exec:\jjppp.exe118⤵PID:4144
-
\??\c:\lflllrr.exec:\lflllrr.exe119⤵PID:3896
-
\??\c:\tnbtht.exec:\tnbtht.exe120⤵PID:1524
-
\??\c:\vdpdj.exec:\vdpdj.exe121⤵PID:5040
-
\??\c:\lfxlfxl.exec:\lfxlfxl.exe122⤵PID:2460
-
\??\c:\fllrlfx.exec:\fllrlfx.exe123⤵PID:4404
-
\??\c:\bhbhhh.exec:\bhbhhh.exe124⤵PID:400
-
\??\c:\3flxllx.exec:\3flxllx.exe125⤵PID:548
-
\??\c:\3nntnh.exec:\3nntnh.exe126⤵PID:2484
-
\??\c:\nhhbtn.exec:\nhhbtn.exe127⤵PID:952
-
\??\c:\fxfxxxx.exec:\fxfxxxx.exe128⤵PID:2864
-
\??\c:\nbhtnh.exec:\nbhtnh.exe129⤵PID:4272
-
\??\c:\ntthbt.exec:\ntthbt.exe130⤵PID:1976
-
\??\c:\vvvvv.exec:\vvvvv.exe131⤵PID:448
-
\??\c:\rlffrxx.exec:\rlffrxx.exe132⤵PID:4420
-
\??\c:\ntbttt.exec:\ntbttt.exe133⤵PID:3024
-
\??\c:\hnnnbb.exec:\hnnnbb.exe134⤵PID:3352
-
\??\c:\ddpdv.exec:\ddpdv.exe135⤵PID:3016
-
\??\c:\9fxxffl.exec:\9fxxffl.exe136⤵PID:1664
-
\??\c:\bhbttn.exec:\bhbttn.exe137⤵PID:4384
-
\??\c:\9dvvp.exec:\9dvvp.exe138⤵PID:3708
-
\??\c:\djjdv.exec:\djjdv.exe139⤵PID:4232
-
\??\c:\9rrxrrx.exec:\9rrxrrx.exe140⤵PID:1536
-
\??\c:\tbnbnh.exec:\tbnbnh.exe141⤵PID:4032
-
\??\c:\nnhhhh.exec:\nnhhhh.exe142⤵PID:3772
-
\??\c:\3pppp.exec:\3pppp.exe143⤵PID:1592
-
\??\c:\rlxrlll.exec:\rlxrlll.exe144⤵PID:5044
-
\??\c:\rflffff.exec:\rflffff.exe145⤵PID:208
-
\??\c:\hnhbnh.exec:\hnhbnh.exe146⤵PID:4092
-
\??\c:\jvvvp.exec:\jvvvp.exe147⤵PID:640
-
\??\c:\dppjp.exec:\dppjp.exe148⤵PID:3112
-
\??\c:\xlrxlfr.exec:\xlrxlfr.exe149⤵PID:768
-
\??\c:\3flfxlr.exec:\3flfxlr.exe150⤵PID:3364
-
\??\c:\bntnnn.exec:\bntnnn.exe151⤵PID:3672
-
\??\c:\djvpj.exec:\djvpj.exe152⤵PID:1380
-
\??\c:\pvjdv.exec:\pvjdv.exe153⤵PID:2088
-
\??\c:\lrllflx.exec:\lrllflx.exe154⤵PID:3984
-
\??\c:\1bhhht.exec:\1bhhht.exe155⤵PID:440
-
\??\c:\bbnhtb.exec:\bbnhtb.exe156⤵PID:3512
-
\??\c:\ddvvv.exec:\ddvvv.exe157⤵PID:4908
-
\??\c:\dvvpj.exec:\dvvpj.exe158⤵PID:4808
-
\??\c:\9frxxxf.exec:\9frxxxf.exe159⤵PID:3484
-
\??\c:\rfrxfrr.exec:\rfrxfrr.exe160⤵PID:3744
-
\??\c:\hbhhnt.exec:\hbhhnt.exe161⤵PID:1524
-
\??\c:\vvpjd.exec:\vvpjd.exe162⤵PID:4276
-
\??\c:\vvvpv.exec:\vvvpv.exe163⤵PID:4244
-
\??\c:\fxxrlrl.exec:\fxxrlrl.exe164⤵PID:1688
-
\??\c:\rxxrxxx.exec:\rxxrxxx.exe165⤵PID:1676
-
\??\c:\9hntbb.exec:\9hntbb.exe166⤵PID:1608
-
\??\c:\btbtnn.exec:\btbtnn.exe167⤵PID:1436
-
\??\c:\3ddjj.exec:\3ddjj.exe168⤵PID:4316
-
\??\c:\djvjv.exec:\djvjv.exe169⤵PID:3936
-
\??\c:\9lrxfrl.exec:\9lrxfrl.exe170⤵PID:3584
-
\??\c:\hnhtnb.exec:\hnhtnb.exe171⤵PID:3424
-
\??\c:\tntnnt.exec:\tntnnt.exe172⤵PID:1520
-
\??\c:\pdvjd.exec:\pdvjd.exe173⤵PID:4328
-
\??\c:\llxflff.exec:\llxflff.exe174⤵PID:3016
-
\??\c:\xlfffll.exec:\xlfffll.exe175⤵PID:2468
-
\??\c:\bbbbbb.exec:\bbbbbb.exe176⤵PID:4912
-
\??\c:\ttthbb.exec:\ttthbb.exe177⤵PID:3708
-
\??\c:\vjvpp.exec:\vjvpp.exe178⤵PID:4232
-
\??\c:\fflllfl.exec:\fflllfl.exe179⤵PID:4888
-
\??\c:\bhhhht.exec:\bhhhht.exe180⤵PID:4032
-
\??\c:\hhnhtn.exec:\hhnhtn.exe181⤵PID:1272
-
\??\c:\vddvj.exec:\vddvj.exe182⤵PID:5116
-
\??\c:\xfxrrrl.exec:\xfxrrrl.exe183⤵PID:100
-
\??\c:\lllfxll.exec:\lllfxll.exe184⤵PID:3032
-
\??\c:\bnhbnt.exec:\bnhbnt.exe185⤵PID:4560
-
\??\c:\pvppv.exec:\pvppv.exe186⤵PID:2772
-
\??\c:\ddvpj.exec:\ddvpj.exe187⤵PID:4012
-
\??\c:\lxlllll.exec:\lxlllll.exe188⤵PID:1896
-
\??\c:\hhttbb.exec:\hhttbb.exe189⤵PID:1632
-
\??\c:\jppjp.exec:\jppjp.exe190⤵PID:3232
-
\??\c:\1lxxxff.exec:\1lxxxff.exe191⤵PID:1960
-
\??\c:\nhbhhh.exec:\nhbhhh.exe192⤵PID:1492
-
\??\c:\9thttn.exec:\9thttn.exe193⤵PID:4960
-
\??\c:\ddvvv.exec:\ddvvv.exe194⤵PID:2092
-
\??\c:\fxlrrlx.exec:\fxlrrlx.exe195⤵PID:1996
-
\??\c:\bnthbt.exec:\bnthbt.exe196⤵PID:4128
-
\??\c:\ntbbbh.exec:\ntbbbh.exe197⤵PID:2120
-
\??\c:\vppjp.exec:\vppjp.exe198⤵PID:4068
-
\??\c:\jdjjp.exec:\jdjjp.exe199⤵PID:2576
-
\??\c:\lxfxfrx.exec:\lxfxfrx.exe200⤵PID:4372
-
\??\c:\btbhhh.exec:\btbhhh.exe201⤵PID:3900
-
\??\c:\pvddp.exec:\pvddp.exe202⤵PID:2896
-
\??\c:\jvjdj.exec:\jvjdj.exe203⤵PID:1908
-
\??\c:\llffxxx.exec:\llffxxx.exe204⤵PID:2484
-
\??\c:\bbnhtn.exec:\bbnhtn.exe205⤵PID:3720
-
\??\c:\hbhhnb.exec:\hbhhnb.exe206⤵PID:4332
-
\??\c:\jddvj.exec:\jddvj.exe207⤵PID:4584
-
\??\c:\1ffxxxr.exec:\1ffxxxr.exe208⤵PID:996
-
\??\c:\bnhhbb.exec:\bnhhbb.exe209⤵PID:4416
-
\??\c:\dpvvp.exec:\dpvvp.exe210⤵PID:1012
-
\??\c:\jjvdp.exec:\jjvdp.exe211⤵PID:4328
-
\??\c:\ffllxfx.exec:\ffllxfx.exe212⤵PID:3016
-
\??\c:\lflrxrx.exec:\lflrxrx.exe213⤵PID:4848
-
\??\c:\btbttt.exec:\btbttt.exe214⤵PID:4912
-
\??\c:\bnnbtn.exec:\bnnbtn.exe215⤵PID:2488
-
\??\c:\dvvpp.exec:\dvvpp.exe216⤵PID:4508
-
\??\c:\xxxxlrr.exec:\xxxxlrr.exe217⤵PID:3772
-
\??\c:\tbttnb.exec:\tbttnb.exe218⤵PID:4032
-
\??\c:\7nnnnn.exec:\7nnnnn.exe219⤵PID:2000
-
\??\c:\vjvdv.exec:\vjvdv.exe220⤵PID:4484
-
\??\c:\jddvv.exec:\jddvv.exe221⤵PID:2100
-
\??\c:\frrffff.exec:\frrffff.exe222⤵PID:1496
-
\??\c:\rxllffl.exec:\rxllffl.exe223⤵PID:816
-
\??\c:\btnhhb.exec:\btnhhb.exe224⤵PID:3364
-
\??\c:\1djpp.exec:\1djpp.exe225⤵PID:1644
-
\??\c:\dvpjv.exec:\dvpjv.exe226⤵PID:1896
-
\??\c:\lxlrrxx.exec:\lxlrrxx.exe227⤵PID:4024
-
\??\c:\lrffflf.exec:\lrffflf.exe228⤵PID:3048
-
\??\c:\btbbtt.exec:\btbbtt.exe229⤵PID:3276
-
\??\c:\pdvvv.exec:\pdvvv.exe230⤵PID:4216
-
\??\c:\jjppv.exec:\jjppv.exe231⤵PID:940
-
\??\c:\7xxrlrr.exec:\7xxrlrr.exe232⤵PID:2092
-
\??\c:\lrlllrx.exec:\lrlllrx.exe233⤵PID:3036
-
\??\c:\thhbht.exec:\thhbht.exe234⤵PID:5040
-
\??\c:\5ntnnt.exec:\5ntnnt.exe235⤵PID:2120
-
\??\c:\pvddv.exec:\pvddv.exe236⤵PID:4068
-
\??\c:\vdjpd.exec:\vdjpd.exe237⤵PID:2576
-
\??\c:\7lrfffx.exec:\7lrfffx.exe238⤵PID:3092
-
\??\c:\llrxfxx.exec:\llrxfxx.exe239⤵PID:548
-
\??\c:\hbbtnn.exec:\hbbtnn.exe240⤵PID:4876
-
\??\c:\bbtttt.exec:\bbtttt.exe241⤵PID:3304
-
\??\c:\jjjvv.exec:\jjjvv.exe242⤵PID:1276