Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 07:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exe
-
Size
335KB
-
MD5
e1757d743b01fddf39ac30c69ee49d90
-
SHA1
e7b9936dd27f2a82b27e293c57fd1cf821b069f4
-
SHA256
1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1
-
SHA512
9d3d1446fa000a23566156de48d01ca339b07dae2f3c540720d65c0762330aec549c8c608118cdacc73822882cb45998ec58cbf516be0198392768e1ee0cba8b
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo7LCgnilBxBqwZK2q6sYTsmZDSFdBE0rXE4efT:n3C9BRo/CEilXBG2qZSlSFdBXExT
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/4584-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4540-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3772-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2316-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3232-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4572-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1280-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1488-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3908-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2768-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2276-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2240-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4652-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1128-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4980-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4204-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4396-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3048-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4108-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3552-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
thbbtb.exevppjv.exexxfrxrr.exe1hnhth.exehbhhhh.exehnbttt.exetnttnb.exejjpjj.exeppdpd.exe7tnnnh.exedvjvd.exe5lrlfrr.exejpppp.exe5nhhnt.exeddppj.exexxrrlrr.exeffllffl.exentnbtb.exe7rrrfff.exenbbbnt.exepjddv.exehbtttn.exettbtnt.exepjddj.exe9dddp.exeddvjv.exefxffxfx.exetbtnnn.exedvvpj.exerrfxrrr.exepdvpd.exexxrrflx.exevpdvd.exellllflf.exebnnntn.exejdpdp.exerxlfflr.exehtthth.exejvvdp.exebthbtt.exexrfffll.exebttbnt.exehnnbnn.exevjddv.exehhhbtn.exepvppp.exefrllxfr.exelfrrlrf.exehbtnbb.exeflrrrff.exehhnnhn.exellxxxrx.exehtbttt.exeppjjj.exevvjjd.exelxxrrrx.exeflfxxxf.exe9dddd.exellrrrrr.exexfxxrlr.exe9bhhhn.exevpvjd.exexrfxfff.exenhnnhh.exepid process 4540 thbbtb.exe 3772 vppjv.exe 2316 xxfrxrr.exe 3232 1hnhth.exe 4572 hbhhhh.exe 1280 hnbttt.exe 1488 tnttnb.exe 3692 jjpjj.exe 1448 ppdpd.exe 2720 7tnnnh.exe 3908 dvjvd.exe 5100 5lrlfrr.exe 2768 jpppp.exe 2676 5nhhnt.exe 2276 ddppj.exe 2240 xxrrlrr.exe 3468 ffllffl.exe 4996 ntnbtb.exe 4652 7rrrfff.exe 1128 nbbbnt.exe 4980 pjddv.exe 3556 hbtttn.exe 4204 ttbtnt.exe 1208 pjddj.exe 4396 9dddp.exe 4856 ddvjv.exe 3048 fxffxfx.exe 4108 tbtnnn.exe 4528 dvvpj.exe 3552 rrfxrrr.exe 3940 pdvpd.exe 4292 xxrrflx.exe 4932 vpdvd.exe 3144 llllflf.exe 1600 bnnntn.exe 1540 jdpdp.exe 4456 rxlfflr.exe 800 htthth.exe 3032 jvvdp.exe 4472 bthbtt.exe 1136 xrfffll.exe 4604 bttbnt.exe 1212 hnnbnn.exe 3764 vjddv.exe 4580 hhhbtn.exe 3636 pvppp.exe 2760 frllxfr.exe 1640 lfrrlrf.exe 4744 hbtnbb.exe 4872 flrrrff.exe 4120 hhnnhn.exe 4736 llxxxrx.exe 2568 htbttt.exe 4844 ppjjj.exe 4228 vvjjd.exe 5088 lxxrrrx.exe 1472 flfxxxf.exe 2512 9dddd.exe 2160 llrrrrr.exe 3232 xfxxrlr.exe 4528 9bhhhn.exe 4944 vpvjd.exe 2736 xrfxfff.exe 2924 nhnnhh.exe -
Processes:
resource yara_rule behavioral2/memory/4584-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4540-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3772-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2316-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3232-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1280-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1280-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1280-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1488-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2768-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2276-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3468-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2240-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4652-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1128-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4980-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4204-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4396-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4108-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3552-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-207-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exethbbtb.exevppjv.exexxfrxrr.exe1hnhth.exehbhhhh.exehnbttt.exetnttnb.exejjpjj.exeppdpd.exe7tnnnh.exedvjvd.exe5lrlfrr.exejpppp.exe5nhhnt.exeddppj.exexxrrlrr.exeffllffl.exentnbtb.exe7rrrfff.exenbbbnt.exepjddv.exedescription pid process target process PID 4584 wrote to memory of 4540 4584 1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exe thbbtb.exe PID 4584 wrote to memory of 4540 4584 1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exe thbbtb.exe PID 4584 wrote to memory of 4540 4584 1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exe thbbtb.exe PID 4540 wrote to memory of 3772 4540 thbbtb.exe vppjv.exe PID 4540 wrote to memory of 3772 4540 thbbtb.exe vppjv.exe PID 4540 wrote to memory of 3772 4540 thbbtb.exe vppjv.exe PID 3772 wrote to memory of 2316 3772 vppjv.exe xxfrxrr.exe PID 3772 wrote to memory of 2316 3772 vppjv.exe xxfrxrr.exe PID 3772 wrote to memory of 2316 3772 vppjv.exe xxfrxrr.exe PID 2316 wrote to memory of 3232 2316 xxfrxrr.exe 1hnhth.exe PID 2316 wrote to memory of 3232 2316 xxfrxrr.exe 1hnhth.exe PID 2316 wrote to memory of 3232 2316 xxfrxrr.exe 1hnhth.exe PID 3232 wrote to memory of 4572 3232 1hnhth.exe hbhhhh.exe PID 3232 wrote to memory of 4572 3232 1hnhth.exe hbhhhh.exe PID 3232 wrote to memory of 4572 3232 1hnhth.exe hbhhhh.exe PID 4572 wrote to memory of 1280 4572 hbhhhh.exe hnbttt.exe PID 4572 wrote to memory of 1280 4572 hbhhhh.exe hnbttt.exe PID 4572 wrote to memory of 1280 4572 hbhhhh.exe hnbttt.exe PID 1280 wrote to memory of 1488 1280 hnbttt.exe tnttnb.exe PID 1280 wrote to memory of 1488 1280 hnbttt.exe tnttnb.exe PID 1280 wrote to memory of 1488 1280 hnbttt.exe tnttnb.exe PID 1488 wrote to memory of 3692 1488 tnttnb.exe jjpjj.exe PID 1488 wrote to memory of 3692 1488 tnttnb.exe jjpjj.exe PID 1488 wrote to memory of 3692 1488 tnttnb.exe jjpjj.exe PID 3692 wrote to memory of 1448 3692 jjpjj.exe ppdpd.exe PID 3692 wrote to memory of 1448 3692 jjpjj.exe ppdpd.exe PID 3692 wrote to memory of 1448 3692 jjpjj.exe ppdpd.exe PID 1448 wrote to memory of 2720 1448 ppdpd.exe 7tnnnh.exe PID 1448 wrote to memory of 2720 1448 ppdpd.exe 7tnnnh.exe PID 1448 wrote to memory of 2720 1448 ppdpd.exe 7tnnnh.exe PID 2720 wrote to memory of 3908 2720 7tnnnh.exe dvjvd.exe PID 2720 wrote to memory of 3908 2720 7tnnnh.exe dvjvd.exe PID 2720 wrote to memory of 3908 2720 7tnnnh.exe dvjvd.exe PID 3908 wrote to memory of 5100 3908 dvjvd.exe 5lrlfrr.exe PID 3908 wrote to memory of 5100 3908 dvjvd.exe 5lrlfrr.exe PID 3908 wrote to memory of 5100 3908 dvjvd.exe 5lrlfrr.exe PID 5100 wrote to memory of 2768 5100 5lrlfrr.exe jpppp.exe PID 5100 wrote to memory of 2768 5100 5lrlfrr.exe jpppp.exe PID 5100 wrote to memory of 2768 5100 5lrlfrr.exe jpppp.exe PID 2768 wrote to memory of 2676 2768 jpppp.exe 5nhhnt.exe PID 2768 wrote to memory of 2676 2768 jpppp.exe 5nhhnt.exe PID 2768 wrote to memory of 2676 2768 jpppp.exe 5nhhnt.exe PID 2676 wrote to memory of 2276 2676 5nhhnt.exe ddppj.exe PID 2676 wrote to memory of 2276 2676 5nhhnt.exe ddppj.exe PID 2676 wrote to memory of 2276 2676 5nhhnt.exe ddppj.exe PID 2276 wrote to memory of 2240 2276 ddppj.exe xxrrlrr.exe PID 2276 wrote to memory of 2240 2276 ddppj.exe xxrrlrr.exe PID 2276 wrote to memory of 2240 2276 ddppj.exe xxrrlrr.exe PID 2240 wrote to memory of 3468 2240 xxrrlrr.exe ffllffl.exe PID 2240 wrote to memory of 3468 2240 xxrrlrr.exe ffllffl.exe PID 2240 wrote to memory of 3468 2240 xxrrlrr.exe ffllffl.exe PID 3468 wrote to memory of 4996 3468 ffllffl.exe ntnbtb.exe PID 3468 wrote to memory of 4996 3468 ffllffl.exe ntnbtb.exe PID 3468 wrote to memory of 4996 3468 ffllffl.exe ntnbtb.exe PID 4996 wrote to memory of 4652 4996 ntnbtb.exe 7rrrfff.exe PID 4996 wrote to memory of 4652 4996 ntnbtb.exe 7rrrfff.exe PID 4996 wrote to memory of 4652 4996 ntnbtb.exe 7rrrfff.exe PID 4652 wrote to memory of 1128 4652 7rrrfff.exe nbbbnt.exe PID 4652 wrote to memory of 1128 4652 7rrrfff.exe nbbbnt.exe PID 4652 wrote to memory of 1128 4652 7rrrfff.exe nbbbnt.exe PID 1128 wrote to memory of 4980 1128 nbbbnt.exe pjddv.exe PID 1128 wrote to memory of 4980 1128 nbbbnt.exe pjddv.exe PID 1128 wrote to memory of 4980 1128 nbbbnt.exe pjddv.exe PID 4980 wrote to memory of 3556 4980 pjddv.exe hbtttn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1df23a1c674df8907efce94ad1e27ed97aa19e5290ccf65966478916f2732aa1_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
\??\c:\thbbtb.exec:\thbbtb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
\??\c:\vppjv.exec:\vppjv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\xxfrxrr.exec:\xxfrxrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\1hnhth.exec:\1hnhth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
\??\c:\hbhhhh.exec:\hbhhhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\hnbttt.exec:\hnbttt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
\??\c:\tnttnb.exec:\tnttnb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
\??\c:\jjpjj.exec:\jjpjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\ppdpd.exec:\ppdpd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\7tnnnh.exec:\7tnnnh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\dvjvd.exec:\dvjvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\5lrlfrr.exec:\5lrlfrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\jpppp.exec:\jpppp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\5nhhnt.exec:\5nhhnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\ddppj.exec:\ddppj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\xxrrlrr.exec:\xxrrlrr.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\ffllffl.exec:\ffllffl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\ntnbtb.exec:\ntnbtb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\7rrrfff.exec:\7rrrfff.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
\??\c:\nbbbnt.exec:\nbbbnt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
\??\c:\pjddv.exec:\pjddv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\hbtttn.exec:\hbtttn.exe23⤵
- Executes dropped EXE
PID:3556 -
\??\c:\ttbtnt.exec:\ttbtnt.exe24⤵
- Executes dropped EXE
PID:4204 -
\??\c:\pjddj.exec:\pjddj.exe25⤵
- Executes dropped EXE
PID:1208 -
\??\c:\9dddp.exec:\9dddp.exe26⤵
- Executes dropped EXE
PID:4396 -
\??\c:\ddvjv.exec:\ddvjv.exe27⤵
- Executes dropped EXE
PID:4856 -
\??\c:\fxffxfx.exec:\fxffxfx.exe28⤵
- Executes dropped EXE
PID:3048 -
\??\c:\tbtnnn.exec:\tbtnnn.exe29⤵
- Executes dropped EXE
PID:4108 -
\??\c:\dvvpj.exec:\dvvpj.exe30⤵
- Executes dropped EXE
PID:4528 -
\??\c:\rrfxrrr.exec:\rrfxrrr.exe31⤵
- Executes dropped EXE
PID:3552 -
\??\c:\pdvpd.exec:\pdvpd.exe32⤵
- Executes dropped EXE
PID:3940 -
\??\c:\xxrrflx.exec:\xxrrflx.exe33⤵
- Executes dropped EXE
PID:4292 -
\??\c:\vpdvd.exec:\vpdvd.exe34⤵
- Executes dropped EXE
PID:4932 -
\??\c:\llllflf.exec:\llllflf.exe35⤵
- Executes dropped EXE
PID:3144 -
\??\c:\bnnntn.exec:\bnnntn.exe36⤵
- Executes dropped EXE
PID:1600 -
\??\c:\jdpdp.exec:\jdpdp.exe37⤵
- Executes dropped EXE
PID:1540 -
\??\c:\rxlfflr.exec:\rxlfflr.exe38⤵
- Executes dropped EXE
PID:4456 -
\??\c:\htthth.exec:\htthth.exe39⤵
- Executes dropped EXE
PID:800 -
\??\c:\jvvdp.exec:\jvvdp.exe40⤵
- Executes dropped EXE
PID:3032 -
\??\c:\bthbtt.exec:\bthbtt.exe41⤵
- Executes dropped EXE
PID:4472 -
\??\c:\xrfffll.exec:\xrfffll.exe42⤵
- Executes dropped EXE
PID:1136 -
\??\c:\bttbnt.exec:\bttbnt.exe43⤵
- Executes dropped EXE
PID:4604 -
\??\c:\hnnbnn.exec:\hnnbnn.exe44⤵
- Executes dropped EXE
PID:1212 -
\??\c:\vjddv.exec:\vjddv.exe45⤵
- Executes dropped EXE
PID:3764 -
\??\c:\hhhbtn.exec:\hhhbtn.exe46⤵
- Executes dropped EXE
PID:4580 -
\??\c:\pvppp.exec:\pvppp.exe47⤵
- Executes dropped EXE
PID:3636 -
\??\c:\frllxfr.exec:\frllxfr.exe48⤵
- Executes dropped EXE
PID:2760 -
\??\c:\lfrrlrf.exec:\lfrrlrf.exe49⤵
- Executes dropped EXE
PID:1640 -
\??\c:\hbtnbb.exec:\hbtnbb.exe50⤵
- Executes dropped EXE
PID:4744 -
\??\c:\flrrrff.exec:\flrrrff.exe51⤵
- Executes dropped EXE
PID:4872 -
\??\c:\hhnnhn.exec:\hhnnhn.exe52⤵
- Executes dropped EXE
PID:4120 -
\??\c:\llxxxrx.exec:\llxxxrx.exe53⤵
- Executes dropped EXE
PID:4736 -
\??\c:\htbttt.exec:\htbttt.exe54⤵
- Executes dropped EXE
PID:2568 -
\??\c:\ppjjj.exec:\ppjjj.exe55⤵
- Executes dropped EXE
PID:4844 -
\??\c:\vvjjd.exec:\vvjjd.exe56⤵
- Executes dropped EXE
PID:4228 -
\??\c:\lxxrrrx.exec:\lxxrrrx.exe57⤵
- Executes dropped EXE
PID:5088 -
\??\c:\flfxxxf.exec:\flfxxxf.exe58⤵
- Executes dropped EXE
PID:1472 -
\??\c:\9dddd.exec:\9dddd.exe59⤵
- Executes dropped EXE
PID:2512 -
\??\c:\llrrrrr.exec:\llrrrrr.exe60⤵
- Executes dropped EXE
PID:2160 -
\??\c:\xfxxrlr.exec:\xfxxrlr.exe61⤵
- Executes dropped EXE
PID:3232 -
\??\c:\9bhhhn.exec:\9bhhhn.exe62⤵
- Executes dropped EXE
PID:4528 -
\??\c:\vpvjd.exec:\vpvjd.exe63⤵
- Executes dropped EXE
PID:4944 -
\??\c:\xrfxfff.exec:\xrfxfff.exe64⤵
- Executes dropped EXE
PID:2736 -
\??\c:\nhnnhh.exec:\nhnnhh.exe65⤵
- Executes dropped EXE
PID:2924 -
\??\c:\hnnnnn.exec:\hnnnnn.exe66⤵PID:1664
-
\??\c:\vjddv.exec:\vjddv.exe67⤵PID:4188
-
\??\c:\flxxlfx.exec:\flxxlfx.exe68⤵PID:4132
-
\??\c:\nntnhb.exec:\nntnhb.exe69⤵PID:2280
-
\??\c:\1nnbtn.exec:\1nnbtn.exe70⤵PID:3732
-
\??\c:\5djdv.exec:\5djdv.exe71⤵PID:2692
-
\??\c:\lrxflrx.exec:\lrxflrx.exe72⤵PID:2492
-
\??\c:\thtnhh.exec:\thtnhh.exe73⤵PID:3388
-
\??\c:\vdvvp.exec:\vdvvp.exe74⤵PID:1212
-
\??\c:\vjpjd.exec:\vjpjd.exe75⤵PID:736
-
\??\c:\lfflffr.exec:\lfflffr.exe76⤵PID:3560
-
\??\c:\7hbhhh.exec:\7hbhhh.exe77⤵PID:692
-
\??\c:\9pdvv.exec:\9pdvv.exe78⤵PID:4980
-
\??\c:\rrxrrxx.exec:\rrxrrxx.exe79⤵PID:1840
-
\??\c:\7bbtbh.exec:\7bbtbh.exe80⤵PID:3556
-
\??\c:\frffffl.exec:\frffffl.exe81⤵PID:2688
-
\??\c:\nnbnnh.exec:\nnbnnh.exe82⤵PID:4712
-
\??\c:\pdvdd.exec:\pdvdd.exe83⤵PID:3196
-
\??\c:\3rrrffr.exec:\3rrrffr.exe84⤵PID:864
-
\??\c:\fxffxxx.exec:\fxffxxx.exe85⤵PID:4440
-
\??\c:\1thhbh.exec:\1thhbh.exe86⤵PID:888
-
\??\c:\dpjjd.exec:\dpjjd.exe87⤵PID:208
-
\??\c:\nhtbbn.exec:\nhtbbn.exe88⤵PID:2992
-
\??\c:\9jvvp.exec:\9jvvp.exe89⤵PID:2264
-
\??\c:\xfrlxrx.exec:\xfrlxrx.exe90⤵PID:2292
-
\??\c:\nnbtnn.exec:\nnbtnn.exe91⤵PID:3692
-
\??\c:\pjpjj.exec:\pjpjj.exe92⤵PID:1448
-
\??\c:\llffxff.exec:\llffxff.exe93⤵PID:972
-
\??\c:\rlfxffl.exec:\rlfxffl.exe94⤵PID:4132
-
\??\c:\thbbbh.exec:\thbbbh.exe95⤵PID:4656
-
\??\c:\jvvpj.exec:\jvvpj.exe96⤵PID:2192
-
\??\c:\vppjj.exec:\vppjj.exe97⤵PID:2824
-
\??\c:\5rlffll.exec:\5rlffll.exe98⤵PID:536
-
\??\c:\tnhbnb.exec:\tnhbnb.exe99⤵PID:3640
-
\??\c:\djvvv.exec:\djvvv.exe100⤵PID:2260
-
\??\c:\lrffxxx.exec:\lrffxxx.exe101⤵PID:692
-
\??\c:\fffllff.exec:\fffllff.exe102⤵PID:4980
-
\??\c:\bnnhbh.exec:\bnnhbh.exe103⤵PID:4204
-
\??\c:\jjvpj.exec:\jjvpj.exe104⤵PID:3556
-
\??\c:\rxxrfxr.exec:\rxxrfxr.exe105⤵PID:212
-
\??\c:\tbnntn.exec:\tbnntn.exe106⤵PID:1296
-
\??\c:\dvpjd.exec:\dvpjd.exe107⤵PID:3196
-
\??\c:\vddvp.exec:\vddvp.exe108⤵PID:728
-
\??\c:\rxrrrll.exec:\rxrrrll.exe109⤵PID:1692
-
\??\c:\1thhbb.exec:\1thhbb.exe110⤵PID:4984
-
\??\c:\jvppv.exec:\jvppv.exe111⤵PID:4572
-
\??\c:\llxlxrl.exec:\llxlxrl.exe112⤵PID:3672
-
\??\c:\ttbtnh.exec:\ttbtnh.exe113⤵PID:4292
-
\??\c:\bnhhbh.exec:\bnhhbh.exe114⤵PID:4512
-
\??\c:\vpvjj.exec:\vpvjj.exe115⤵PID:2576
-
\??\c:\xllrffr.exec:\xllrffr.exe116⤵PID:1704
-
\??\c:\3hhntt.exec:\3hhntt.exe117⤵PID:972
-
\??\c:\thhhnn.exec:\thhhnn.exe118⤵PID:1964
-
\??\c:\pvjdd.exec:\pvjdd.exe119⤵PID:4656
-
\??\c:\llfrfrx.exec:\llfrfrx.exe120⤵PID:2192
-
\??\c:\bnhbnh.exec:\bnhbnh.exe121⤵PID:2824
-
\??\c:\jjvpj.exec:\jjvpj.exe122⤵PID:2364
-
\??\c:\djjjj.exec:\djjjj.exe123⤵PID:4320
-
\??\c:\hthntb.exec:\hthntb.exe124⤵PID:1984
-
\??\c:\7jvvv.exec:\7jvvv.exe125⤵PID:2056
-
\??\c:\xrxrlll.exec:\xrxrlll.exe126⤵PID:4404
-
\??\c:\lrxlfxx.exec:\lrxlfxx.exe127⤵PID:4912
-
\??\c:\ntttnh.exec:\ntttnh.exe128⤵PID:4648
-
\??\c:\pvpvd.exec:\pvpvd.exe129⤵PID:4540
-
\??\c:\djjdd.exec:\djjdd.exe130⤵PID:5028
-
\??\c:\xffrlrr.exec:\xffrlrr.exe131⤵PID:2684
-
\??\c:\9ntnnt.exec:\9ntnnt.exe132⤵PID:3396
-
\??\c:\1pdvd.exec:\1pdvd.exe133⤵PID:4488
-
\??\c:\rfxlllr.exec:\rfxlllr.exe134⤵PID:1512
-
\??\c:\ffrrlxx.exec:\ffrrlxx.exe135⤵PID:2372
-
\??\c:\nnbnhn.exec:\nnbnhn.exe136⤵PID:1136
-
\??\c:\9vjjd.exec:\9vjjd.exe137⤵PID:908
-
\??\c:\rlrflll.exec:\rlrflll.exe138⤵PID:2720
-
\??\c:\htnthb.exec:\htnthb.exe139⤵PID:4556
-
\??\c:\vpddv.exec:\vpddv.exe140⤵PID:3948
-
\??\c:\pjjdv.exec:\pjjdv.exe141⤵PID:1844
-
\??\c:\frxxlfr.exec:\frxxlfr.exe142⤵PID:4472
-
\??\c:\jjppj.exec:\jjppj.exe143⤵PID:1656
-
\??\c:\pjvjj.exec:\pjvjj.exe144⤵PID:2192
-
\??\c:\xflxfrx.exec:\xflxfrx.exe145⤵PID:320
-
\??\c:\bhhbbb.exec:\bhhbbb.exe146⤵PID:4320
-
\??\c:\vjvvj.exec:\vjvvj.exe147⤵PID:4392
-
\??\c:\ffrrllr.exec:\ffrrllr.exe148⤵PID:2056
-
\??\c:\hthhbn.exec:\hthhbn.exe149⤵PID:4844
-
\??\c:\bththh.exec:\bththh.exe150⤵PID:4912
-
\??\c:\dvdpp.exec:\dvdpp.exe151⤵PID:4648
-
\??\c:\xxfxrrl.exec:\xxfxrrl.exe152⤵PID:660
-
\??\c:\nnbbhh.exec:\nnbbhh.exe153⤵PID:3304
-
\??\c:\7pvpd.exec:\7pvpd.exe154⤵PID:4528
-
\??\c:\dpdpv.exec:\dpdpv.exe155⤵PID:1772
-
\??\c:\rlllrll.exec:\rlllrll.exe156⤵PID:4056
-
\??\c:\hhbthn.exec:\hhbthn.exe157⤵PID:1512
-
\??\c:\vdvdj.exec:\vdvdj.exe158⤵PID:2372
-
\??\c:\llxxrxr.exec:\llxxrxr.exe159⤵PID:1136
-
\??\c:\rfxrllf.exec:\rfxrllf.exe160⤵PID:908
-
\??\c:\tnnnnb.exec:\tnnnnb.exe161⤵PID:1160
-
\??\c:\7vddd.exec:\7vddd.exe162⤵PID:4556
-
\??\c:\xfflfll.exec:\xfflfll.exe163⤵PID:2492
-
\??\c:\hnbbtt.exec:\hnbbtt.exe164⤵PID:1964
-
\??\c:\vjvvp.exec:\vjvvp.exe165⤵PID:1660
-
\??\c:\xflllfl.exec:\xflllfl.exe166⤵PID:1212
-
\??\c:\bbnbhn.exec:\bbnbhn.exe167⤵PID:2096
-
\??\c:\djppv.exec:\djppv.exe168⤵PID:5080
-
\??\c:\lfllfll.exec:\lfllfll.exe169⤵PID:4120
-
\??\c:\btnnnt.exec:\btnnnt.exe170⤵PID:4464
-
\??\c:\ppvvp.exec:\ppvvp.exe171⤵PID:464
-
\??\c:\lfllrxf.exec:\lfllrxf.exe172⤵PID:212
-
\??\c:\fxffrrx.exec:\fxffrrx.exe173⤵PID:3208
-
\??\c:\bhhhbh.exec:\bhhhbh.exe174⤵PID:1332
-
\??\c:\vpddv.exec:\vpddv.exe175⤵PID:4536
-
\??\c:\7fxxllf.exec:\7fxxllf.exe176⤵PID:2284
-
\??\c:\bhthhn.exec:\bhthhn.exe177⤵PID:1280
-
\??\c:\vdppp.exec:\vdppp.exe178⤵PID:4288
-
\??\c:\1rlfxxr.exec:\1rlfxxr.exe179⤵PID:3732
-
\??\c:\fxlxrrx.exec:\fxlxrrx.exe180⤵PID:648
-
\??\c:\hbnhtt.exec:\hbnhtt.exe181⤵PID:1664
-
\??\c:\3pvvv.exec:\3pvvv.exe182⤵PID:428
-
\??\c:\fxxxrrx.exec:\fxxxrrx.exe183⤵PID:1540
-
\??\c:\rlrlrfr.exec:\rlrlrfr.exe184⤵PID:336
-
\??\c:\nbhttt.exec:\nbhttt.exe185⤵PID:1844
-
\??\c:\vvvpd.exec:\vvvpd.exe186⤵PID:736
-
\??\c:\rxxxlxl.exec:\rxxxlxl.exe187⤵PID:3560
-
\??\c:\thhhbb.exec:\thhhbb.exe188⤵PID:4708
-
\??\c:\9pppj.exec:\9pppj.exe189⤵PID:2844
-
\??\c:\jjvpd.exec:\jjvpd.exe190⤵PID:1552
-
\??\c:\xlrlxxl.exec:\xlrlxxl.exe191⤵PID:2960
-
\??\c:\5hbthn.exec:\5hbthn.exe192⤵PID:2568
-
\??\c:\hnbbtb.exec:\hnbbtb.exe193⤵PID:3052
-
\??\c:\vvpjj.exec:\vvpjj.exe194⤵PID:3232
-
\??\c:\3flllxl.exec:\3flllxl.exe195⤵PID:4904
-
\??\c:\7rrrrrr.exec:\7rrrrrr.exe196⤵PID:4488
-
\??\c:\hbnnhn.exec:\hbnnhn.exe197⤵PID:2280
-
\??\c:\vddpd.exec:\vddpd.exe198⤵PID:2692
-
\??\c:\3llrrrr.exec:\3llrrrr.exe199⤵PID:3340
-
\??\c:\rrfrrff.exec:\rrfrrff.exe200⤵PID:648
-
\??\c:\ntbhnt.exec:\ntbhnt.exe201⤵PID:1664
-
\??\c:\5pvvv.exec:\5pvvv.exe202⤵PID:3532
-
\??\c:\9lfxllx.exec:\9lfxllx.exe203⤵PID:2800
-
\??\c:\xffrrff.exec:\xffrrff.exe204⤵PID:3864
-
\??\c:\bthbth.exec:\bthbth.exe205⤵PID:3480
-
\??\c:\1jppp.exec:\1jppp.exe206⤵PID:932
-
\??\c:\ddpvp.exec:\ddpvp.exe207⤵PID:1844
-
\??\c:\7flrlll.exec:\7flrlll.exe208⤵PID:2292
-
\??\c:\btbttt.exec:\btbttt.exe209⤵PID:2520
-
\??\c:\bbnhbb.exec:\bbnhbb.exe210⤵PID:1212
-
\??\c:\3jvpv.exec:\3jvpv.exe211⤵PID:4380
-
\??\c:\pdpjd.exec:\pdpjd.exe212⤵PID:4204
-
\??\c:\ffxfflr.exec:\ffxfflr.exe213⤵PID:3772
-
\??\c:\tbhhbt.exec:\tbhhbt.exe214⤵PID:4464
-
\??\c:\hthbbt.exec:\hthbbt.exe215⤵PID:212
-
\??\c:\pvvpd.exec:\pvvpd.exe216⤵PID:4476
-
\??\c:\lfffxxf.exec:\lfffxxf.exe217⤵PID:4536
-
\??\c:\xrrlflf.exec:\xrrlflf.exe218⤵PID:3748
-
\??\c:\hhhbnh.exec:\hhhbnh.exe219⤵PID:1488
-
\??\c:\1pvvp.exec:\1pvvp.exe220⤵PID:4692
-
\??\c:\frlrllf.exec:\frlrllf.exe221⤵PID:3692
-
\??\c:\rrfrfrl.exec:\rrfrfrl.exe222⤵PID:3144
-
\??\c:\nhttnt.exec:\nhttnt.exe223⤵PID:3008
-
\??\c:\ppdvv.exec:\ppdvv.exe224⤵PID:2328
-
\??\c:\jjjjd.exec:\jjjjd.exe225⤵PID:1704
-
\??\c:\xflffxx.exec:\xflffxx.exe226⤵PID:2532
-
\??\c:\9hhhhb.exec:\9hhhhb.exe227⤵PID:1096
-
\??\c:\ntbbbb.exec:\ntbbbb.exe228⤵PID:2248
-
\??\c:\dpvvp.exec:\dpvvp.exe229⤵PID:2492
-
\??\c:\llfflfl.exec:\llfflfl.exe230⤵PID:1000
-
\??\c:\lxlffll.exec:\lxlffll.exe231⤵PID:1448
-
\??\c:\bnhtbt.exec:\bnhtbt.exe232⤵PID:4592
-
\??\c:\vvpjp.exec:\vvpjp.exe233⤵PID:1656
-
\??\c:\xffrlxx.exec:\xffrlxx.exe234⤵PID:1804
-
\??\c:\rlrlfff.exec:\rlrlfff.exe235⤵PID:4120
-
\??\c:\tnbbbn.exec:\tnbbbn.exe236⤵PID:972
-
\??\c:\jpddd.exec:\jpddd.exe237⤵PID:5028
-
\??\c:\rfffxxx.exec:\rfffxxx.exe238⤵PID:4464
-
\??\c:\ffxfxlx.exec:\ffxfxlx.exe239⤵PID:212
-
\??\c:\9ntttb.exec:\9ntttb.exe240⤵PID:2284
-
\??\c:\vdddd.exec:\vdddd.exe241⤵PID:4536
-
\??\c:\rrffxfx.exec:\rrffxfx.exe242⤵PID:3748