Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 20:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exe
-
Size
95KB
-
MD5
09f37fda7b8df6367968cb640f4d8b00
-
SHA1
204428adf66673ade1ea8b79abb0655e5fa38aca
-
SHA256
a0049debd0cb677baaf88a056f42a0b46f09717997b4bca0f535fcbfb5b97983
-
SHA512
a85b26632fa69b1397c70a78f2d691908199946b9feaf5e06c37ca4d555487ed8007aaac22fed7d6597f7b24a85229336804394704cee0a4d2312442d40608d5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73XH/YP1HFrJximAAxS1rj/2CC:ymb3NkkiQ3mdBjFo73PYP1lri3K8Gwy5
Malware Config
Signatures
-
Detect Blackmoon payload 29 IoCs
Processes:
resource yara_rule behavioral2/memory/3968-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4856-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2884-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2884-27-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3612-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/392-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3324-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2272-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2384-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2384-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3904-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2268-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1200-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3204-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2128-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1108-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2280-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4888-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1512-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4028-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/904-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4260-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4016-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3496-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4084-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/444-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
bttbhn.exevpddj.exevjjdv.exerxrlfff.exefffxrrl.exebthhnn.exevvjdv.exexxrlffx.exerrxxllx.exehnhhbh.exe3vvvv.exerflffrr.exetthbbb.exejpjdv.exe7lllfll.exehbthhb.exebhntbt.exepvdpj.exefxrflrl.exehnbtbh.exetnnnhb.exepjppd.exerrrffff.exe1ttnhb.exettthnh.exepdjdd.exe9xxxlll.exebnnhbb.exe7ppjd.exerlrlxrx.exentttbb.exe7jpjd.exe9rxrfff.exethtbbb.exevdvvp.exedvjdp.exelxrrlfx.exenhhbtt.exevvpdv.exerffffrf.exexrfrfrl.exetthbhh.exepjdpj.exepjvjd.exe3rxlffx.exe3htthb.exevpdvv.exeddjvj.exelrfxrrr.exennnhbb.exevddjd.exennhbbt.exenbbtnh.exejvvdd.exexxrlffx.exenbtntb.exe1vvpj.exejvjpv.exerflfrrr.exehnhhnt.exethnnhh.exejpjdv.exe5rllflf.exethnntn.exepid process 4856 bttbhn.exe 3612 vpddj.exe 2884 vjjdv.exe 392 rxrlfff.exe 3324 fffxrrl.exe 2272 bthhnn.exe 2384 vvjdv.exe 3904 xxrlffx.exe 2324 rrxxllx.exe 3872 hnhhbh.exe 4676 3vvvv.exe 2268 rflffrr.exe 2812 tthbbb.exe 1200 jpjdv.exe 3204 7lllfll.exe 904 hbthhb.exe 4028 bhntbt.exe 4752 pvdpj.exe 4888 fxrflrl.exe 2128 hnbtbh.exe 1108 tnnnhb.exe 2280 pjppd.exe 1512 rrrffff.exe 4004 1ttnhb.exe 1500 ttthnh.exe 4260 pdjdd.exe 4016 9xxxlll.exe 3496 bnnhbb.exe 4084 7ppjd.exe 3436 rlrlxrx.exe 444 ntttbb.exe 4848 7jpjd.exe 1612 9rxrfff.exe 3000 thtbbb.exe 1780 vdvvp.exe 2212 dvjdp.exe 3968 lxrrlfx.exe 864 nhhbtt.exe 3256 vvpdv.exe 3304 rffffrf.exe 3100 xrfrfrl.exe 3068 tthbhh.exe 2920 pjdpj.exe 4392 pjvjd.exe 4696 3rxlffx.exe 3936 3htthb.exe 856 vpdvv.exe 1340 ddjvj.exe 5000 lrfxrrr.exe 2336 nnnhbb.exe 1968 vddjd.exe 2264 nnhbbt.exe 972 nbbtnh.exe 1712 jvvdd.exe 2096 xxrlffx.exe 2652 nbtntb.exe 4928 1vvpj.exe 3316 jvjpv.exe 2128 rflfrrr.exe 3116 hnhhnt.exe 5068 thnnhh.exe 3132 jpjdv.exe 4428 5rllflf.exe 1008 thnntn.exe -
Processes:
resource yara_rule behavioral2/memory/3968-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2884-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3612-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/392-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3324-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2272-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2384-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2384-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3904-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3904-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1200-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2128-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1108-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2280-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4888-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1512-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4028-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/904-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4260-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4016-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3496-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4084-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/444-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exebttbhn.exevpddj.exevjjdv.exerxrlfff.exefffxrrl.exebthhnn.exevvjdv.exexxrlffx.exerrxxllx.exehnhhbh.exe3vvvv.exerflffrr.exetthbbb.exejpjdv.exe7lllfll.exehbthhb.exebhntbt.exepvdpj.exefxrflrl.exehnbtbh.exetnnnhb.exedescription pid process target process PID 3968 wrote to memory of 4856 3968 09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exe bttbhn.exe PID 3968 wrote to memory of 4856 3968 09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exe bttbhn.exe PID 3968 wrote to memory of 4856 3968 09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exe bttbhn.exe PID 4856 wrote to memory of 3612 4856 bttbhn.exe vpddj.exe PID 4856 wrote to memory of 3612 4856 bttbhn.exe vpddj.exe PID 4856 wrote to memory of 3612 4856 bttbhn.exe vpddj.exe PID 3612 wrote to memory of 2884 3612 vpddj.exe vjjdv.exe PID 3612 wrote to memory of 2884 3612 vpddj.exe vjjdv.exe PID 3612 wrote to memory of 2884 3612 vpddj.exe vjjdv.exe PID 2884 wrote to memory of 392 2884 vjjdv.exe rxrlfff.exe PID 2884 wrote to memory of 392 2884 vjjdv.exe rxrlfff.exe PID 2884 wrote to memory of 392 2884 vjjdv.exe rxrlfff.exe PID 392 wrote to memory of 3324 392 rxrlfff.exe fffxrrl.exe PID 392 wrote to memory of 3324 392 rxrlfff.exe fffxrrl.exe PID 392 wrote to memory of 3324 392 rxrlfff.exe fffxrrl.exe PID 3324 wrote to memory of 2272 3324 fffxrrl.exe bthhnn.exe PID 3324 wrote to memory of 2272 3324 fffxrrl.exe bthhnn.exe PID 3324 wrote to memory of 2272 3324 fffxrrl.exe bthhnn.exe PID 2272 wrote to memory of 2384 2272 bthhnn.exe vvjdv.exe PID 2272 wrote to memory of 2384 2272 bthhnn.exe vvjdv.exe PID 2272 wrote to memory of 2384 2272 bthhnn.exe vvjdv.exe PID 2384 wrote to memory of 3904 2384 vvjdv.exe xxrlffx.exe PID 2384 wrote to memory of 3904 2384 vvjdv.exe xxrlffx.exe PID 2384 wrote to memory of 3904 2384 vvjdv.exe xxrlffx.exe PID 3904 wrote to memory of 2324 3904 xxrlffx.exe rrxxllx.exe PID 3904 wrote to memory of 2324 3904 xxrlffx.exe rrxxllx.exe PID 3904 wrote to memory of 2324 3904 xxrlffx.exe rrxxllx.exe PID 2324 wrote to memory of 3872 2324 rrxxllx.exe hnhhbh.exe PID 2324 wrote to memory of 3872 2324 rrxxllx.exe hnhhbh.exe PID 2324 wrote to memory of 3872 2324 rrxxllx.exe hnhhbh.exe PID 3872 wrote to memory of 4676 3872 hnhhbh.exe 3vvvv.exe PID 3872 wrote to memory of 4676 3872 hnhhbh.exe 3vvvv.exe PID 3872 wrote to memory of 4676 3872 hnhhbh.exe 3vvvv.exe PID 4676 wrote to memory of 2268 4676 3vvvv.exe rflffrr.exe PID 4676 wrote to memory of 2268 4676 3vvvv.exe rflffrr.exe PID 4676 wrote to memory of 2268 4676 3vvvv.exe rflffrr.exe PID 2268 wrote to memory of 2812 2268 rflffrr.exe tthbbb.exe PID 2268 wrote to memory of 2812 2268 rflffrr.exe tthbbb.exe PID 2268 wrote to memory of 2812 2268 rflffrr.exe tthbbb.exe PID 2812 wrote to memory of 1200 2812 tthbbb.exe jpjdv.exe PID 2812 wrote to memory of 1200 2812 tthbbb.exe jpjdv.exe PID 2812 wrote to memory of 1200 2812 tthbbb.exe jpjdv.exe PID 1200 wrote to memory of 3204 1200 jpjdv.exe 7lllfll.exe PID 1200 wrote to memory of 3204 1200 jpjdv.exe 7lllfll.exe PID 1200 wrote to memory of 3204 1200 jpjdv.exe 7lllfll.exe PID 3204 wrote to memory of 904 3204 7lllfll.exe hbthhb.exe PID 3204 wrote to memory of 904 3204 7lllfll.exe hbthhb.exe PID 3204 wrote to memory of 904 3204 7lllfll.exe hbthhb.exe PID 904 wrote to memory of 4028 904 hbthhb.exe bhntbt.exe PID 904 wrote to memory of 4028 904 hbthhb.exe bhntbt.exe PID 904 wrote to memory of 4028 904 hbthhb.exe bhntbt.exe PID 4028 wrote to memory of 4752 4028 bhntbt.exe pvdpj.exe PID 4028 wrote to memory of 4752 4028 bhntbt.exe pvdpj.exe PID 4028 wrote to memory of 4752 4028 bhntbt.exe pvdpj.exe PID 4752 wrote to memory of 4888 4752 pvdpj.exe fxrflrl.exe PID 4752 wrote to memory of 4888 4752 pvdpj.exe fxrflrl.exe PID 4752 wrote to memory of 4888 4752 pvdpj.exe fxrflrl.exe PID 4888 wrote to memory of 2128 4888 fxrflrl.exe hnbtbh.exe PID 4888 wrote to memory of 2128 4888 fxrflrl.exe hnbtbh.exe PID 4888 wrote to memory of 2128 4888 fxrflrl.exe hnbtbh.exe PID 2128 wrote to memory of 1108 2128 hnbtbh.exe tnnnhb.exe PID 2128 wrote to memory of 1108 2128 hnbtbh.exe tnnnhb.exe PID 2128 wrote to memory of 1108 2128 hnbtbh.exe tnnnhb.exe PID 1108 wrote to memory of 2280 1108 tnnnhb.exe pjppd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09f37fda7b8df6367968cb640f4d8b00_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\bttbhn.exec:\bttbhn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
\??\c:\vpddj.exec:\vpddj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\vjjdv.exec:\vjjdv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\rxrlfff.exec:\rxrlfff.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
\??\c:\fffxrrl.exec:\fffxrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
\??\c:\bthhnn.exec:\bthhnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\vvjdv.exec:\vvjdv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\xxrlffx.exec:\xxrlffx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
\??\c:\rrxxllx.exec:\rrxxllx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\hnhhbh.exec:\hnhhbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
\??\c:\3vvvv.exec:\3vvvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\rflffrr.exec:\rflffrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\tthbbb.exec:\tthbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\jpjdv.exec:\jpjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
\??\c:\7lllfll.exec:\7lllfll.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
\??\c:\hbthhb.exec:\hbthhb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:904 -
\??\c:\bhntbt.exec:\bhntbt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\pvdpj.exec:\pvdpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\fxrflrl.exec:\fxrflrl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\hnbtbh.exec:\hnbtbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\tnnnhb.exec:\tnnnhb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\pjppd.exec:\pjppd.exe23⤵
- Executes dropped EXE
PID:2280 -
\??\c:\rrrffff.exec:\rrrffff.exe24⤵
- Executes dropped EXE
PID:1512 -
\??\c:\1ttnhb.exec:\1ttnhb.exe25⤵
- Executes dropped EXE
PID:4004 -
\??\c:\ttthnh.exec:\ttthnh.exe26⤵
- Executes dropped EXE
PID:1500 -
\??\c:\pdjdd.exec:\pdjdd.exe27⤵
- Executes dropped EXE
PID:4260 -
\??\c:\9xxxlll.exec:\9xxxlll.exe28⤵
- Executes dropped EXE
PID:4016 -
\??\c:\bnnhbb.exec:\bnnhbb.exe29⤵
- Executes dropped EXE
PID:3496 -
\??\c:\7ppjd.exec:\7ppjd.exe30⤵
- Executes dropped EXE
PID:4084 -
\??\c:\rlrlxrx.exec:\rlrlxrx.exe31⤵
- Executes dropped EXE
PID:3436 -
\??\c:\ntttbb.exec:\ntttbb.exe32⤵
- Executes dropped EXE
PID:444 -
\??\c:\7jpjd.exec:\7jpjd.exe33⤵
- Executes dropped EXE
PID:4848 -
\??\c:\9rxrfff.exec:\9rxrfff.exe34⤵
- Executes dropped EXE
PID:1612 -
\??\c:\thtbbb.exec:\thtbbb.exe35⤵
- Executes dropped EXE
PID:3000 -
\??\c:\vdvvp.exec:\vdvvp.exe36⤵
- Executes dropped EXE
PID:1780 -
\??\c:\dvjdp.exec:\dvjdp.exe37⤵
- Executes dropped EXE
PID:2212 -
\??\c:\lxrrlfx.exec:\lxrrlfx.exe38⤵
- Executes dropped EXE
PID:3968 -
\??\c:\nhhbtt.exec:\nhhbtt.exe39⤵
- Executes dropped EXE
PID:864 -
\??\c:\vvpdv.exec:\vvpdv.exe40⤵
- Executes dropped EXE
PID:3256 -
\??\c:\rffffrf.exec:\rffffrf.exe41⤵
- Executes dropped EXE
PID:3304 -
\??\c:\xrfrfrl.exec:\xrfrfrl.exe42⤵
- Executes dropped EXE
PID:3100 -
\??\c:\tthbhh.exec:\tthbhh.exe43⤵
- Executes dropped EXE
PID:3068 -
\??\c:\pjdpj.exec:\pjdpj.exe44⤵
- Executes dropped EXE
PID:2920 -
\??\c:\pjvjd.exec:\pjvjd.exe45⤵
- Executes dropped EXE
PID:4392 -
\??\c:\3rxlffx.exec:\3rxlffx.exe46⤵
- Executes dropped EXE
PID:4696 -
\??\c:\3htthb.exec:\3htthb.exe47⤵
- Executes dropped EXE
PID:3936 -
\??\c:\vpdvv.exec:\vpdvv.exe48⤵
- Executes dropped EXE
PID:856 -
\??\c:\ddjvj.exec:\ddjvj.exe49⤵
- Executes dropped EXE
PID:1340 -
\??\c:\lrfxrrr.exec:\lrfxrrr.exe50⤵
- Executes dropped EXE
PID:5000 -
\??\c:\nnnhbb.exec:\nnnhbb.exe51⤵
- Executes dropped EXE
PID:2336 -
\??\c:\vddjd.exec:\vddjd.exe52⤵
- Executes dropped EXE
PID:1968 -
\??\c:\nnhbbt.exec:\nnhbbt.exe53⤵
- Executes dropped EXE
PID:2264 -
\??\c:\nbbtnh.exec:\nbbtnh.exe54⤵
- Executes dropped EXE
PID:972 -
\??\c:\jvvdd.exec:\jvvdd.exe55⤵
- Executes dropped EXE
PID:1712 -
\??\c:\xxrlffx.exec:\xxrlffx.exe56⤵
- Executes dropped EXE
PID:2096 -
\??\c:\nbtntb.exec:\nbtntb.exe57⤵
- Executes dropped EXE
PID:2652 -
\??\c:\1vvpj.exec:\1vvpj.exe58⤵
- Executes dropped EXE
PID:4928 -
\??\c:\jvjpv.exec:\jvjpv.exe59⤵
- Executes dropped EXE
PID:3316 -
\??\c:\rflfrrr.exec:\rflfrrr.exe60⤵
- Executes dropped EXE
PID:2128 -
\??\c:\hnhhnt.exec:\hnhhnt.exe61⤵
- Executes dropped EXE
PID:3116 -
\??\c:\thnnhh.exec:\thnnhh.exe62⤵
- Executes dropped EXE
PID:5068 -
\??\c:\jpjdv.exec:\jpjdv.exe63⤵
- Executes dropped EXE
PID:3132 -
\??\c:\5rllflf.exec:\5rllflf.exe64⤵
- Executes dropped EXE
PID:4428 -
\??\c:\thnntn.exec:\thnntn.exe65⤵
- Executes dropped EXE
PID:1008 -
\??\c:\1nttnn.exec:\1nttnn.exe66⤵PID:1052
-
\??\c:\3pvpj.exec:\3pvpj.exe67⤵PID:1500
-
\??\c:\vpvpp.exec:\vpvpp.exe68⤵PID:4260
-
\??\c:\lrxrfxr.exec:\lrxrfxr.exe69⤵PID:3076
-
\??\c:\7hbhbh.exec:\7hbhbh.exe70⤵PID:4016
-
\??\c:\tnhbtn.exec:\tnhbtn.exe71⤵PID:4744
-
\??\c:\ddpdv.exec:\ddpdv.exe72⤵PID:4880
-
\??\c:\vppjd.exec:\vppjd.exe73⤵PID:2080
-
\??\c:\1fllllf.exec:\1fllllf.exe74⤵PID:1576
-
\??\c:\hbttbt.exec:\hbttbt.exe75⤵PID:4064
-
\??\c:\vdvjp.exec:\vdvjp.exe76⤵PID:4848
-
\??\c:\rllxrrl.exec:\rllxrrl.exe77⤵PID:3104
-
\??\c:\fllrlrl.exec:\fllrlrl.exe78⤵PID:4964
-
\??\c:\ntbbnn.exec:\ntbbnn.exe79⤵PID:4348
-
\??\c:\dpvjd.exec:\dpvjd.exe80⤵PID:1852
-
\??\c:\jdjvj.exec:\jdjvj.exe81⤵PID:3688
-
\??\c:\lfrrxxf.exec:\lfrrxxf.exe82⤵PID:864
-
\??\c:\hbttbb.exec:\hbttbb.exe83⤵PID:2508
-
\??\c:\btnnhn.exec:\btnnhn.exe84⤵PID:4760
-
\??\c:\dvjdv.exec:\dvjdv.exe85⤵PID:4192
-
\??\c:\jvddp.exec:\jvddp.exe86⤵PID:2152
-
\??\c:\lxflxxx.exec:\lxflxxx.exe87⤵PID:3068
-
\??\c:\rrllffl.exec:\rrllffl.exe88⤵PID:2044
-
\??\c:\bnbtnh.exec:\bnbtnh.exe89⤵PID:2656
-
\??\c:\pvppj.exec:\pvppj.exe90⤵PID:4696
-
\??\c:\jddvj.exec:\jddvj.exe91⤵PID:5112
-
\??\c:\xrrlxxr.exec:\xrrlxxr.exe92⤵PID:2324
-
\??\c:\jvdpj.exec:\jvdpj.exe93⤵PID:1340
-
\??\c:\dppdp.exec:\dppdp.exe94⤵PID:2620
-
\??\c:\fxxrllx.exec:\fxxrllx.exe95⤵PID:2336
-
\??\c:\bnnhnb.exec:\bnnhnb.exe96⤵PID:1968
-
\??\c:\rrxxlrx.exec:\rrxxlrx.exe97⤵PID:2264
-
\??\c:\fxfxfrl.exec:\fxfxfrl.exe98⤵PID:904
-
\??\c:\5ntttt.exec:\5ntttt.exe99⤵PID:1896
-
\??\c:\ttbbbb.exec:\ttbbbb.exe100⤵PID:4180
-
\??\c:\1djdp.exec:\1djdp.exe101⤵PID:5100
-
\??\c:\rlfrlfx.exec:\rlfrlfx.exe102⤵PID:1556
-
\??\c:\flfflxl.exec:\flfflxl.exe103⤵PID:2676
-
\??\c:\bbbbhh.exec:\bbbbhh.exe104⤵PID:3160
-
\??\c:\pjjdv.exec:\pjjdv.exe105⤵PID:2188
-
\??\c:\vjpjd.exec:\vjpjd.exe106⤵PID:3276
-
\??\c:\ppddj.exec:\ppddj.exe107⤵PID:1932
-
\??\c:\llfrlfx.exec:\llfrlfx.exe108⤵PID:4668
-
\??\c:\thhttt.exec:\thhttt.exe109⤵PID:4552
-
\??\c:\3thhbb.exec:\3thhbb.exe110⤵PID:4376
-
\??\c:\lffrfxl.exec:\lffrfxl.exe111⤵PID:1012
-
\??\c:\htttnn.exec:\htttnn.exe112⤵PID:832
-
\??\c:\ddvvd.exec:\ddvvd.exe113⤵PID:3628
-
\??\c:\rflfrrl.exec:\rflfrrl.exe114⤵PID:3948
-
\??\c:\frxxxxx.exec:\frxxxxx.exe115⤵PID:4744
-
\??\c:\bthbtt.exec:\bthbtt.exe116⤵PID:408
-
\??\c:\bbnnnb.exec:\bbnnnb.exe117⤵PID:2980
-
\??\c:\pdjjp.exec:\pdjjp.exe118⤵PID:1620
-
\??\c:\7jppd.exec:\7jppd.exe119⤵PID:3852
-
\??\c:\7flfxxx.exec:\7flfxxx.exe120⤵PID:452
-
\??\c:\nhhbtb.exec:\nhhbtb.exe121⤵PID:3000
-
\??\c:\btttnt.exec:\btttnt.exe122⤵PID:1168
-
\??\c:\pvdvp.exec:\pvdvp.exe123⤵PID:1056
-
\??\c:\jpjjd.exec:\jpjjd.exe124⤵PID:4024
-
\??\c:\xlrxxll.exec:\xlrxxll.exe125⤵PID:1720
-
\??\c:\bbtbht.exec:\bbtbht.exe126⤵PID:3692
-
\??\c:\bhtbbh.exec:\bhtbbh.exe127⤵PID:2508
-
\??\c:\jpvpp.exec:\jpvpp.exe128⤵PID:4760
-
\??\c:\lffrrlf.exec:\lffrrlf.exe129⤵PID:3940
-
\??\c:\rfxrlfr.exec:\rfxrlfr.exe130⤵PID:2152
-
\??\c:\tnbbhh.exec:\tnbbhh.exe131⤵PID:2024
-
\??\c:\tnbhnt.exec:\tnbhnt.exe132⤵PID:2044
-
\??\c:\ppvvd.exec:\ppvvd.exe133⤵PID:1560
-
\??\c:\1ppdv.exec:\1ppdv.exe134⤵PID:2588
-
\??\c:\3rxrrrl.exec:\3rxrrrl.exe135⤵PID:1680
-
\??\c:\rllfxrl.exec:\rllfxrl.exe136⤵PID:732
-
\??\c:\9hnbtt.exec:\9hnbtt.exe137⤵PID:1824
-
\??\c:\1bnbtn.exec:\1bnbtn.exe138⤵PID:972
-
\??\c:\3pvjj.exec:\3pvjj.exe139⤵PID:4712
-
\??\c:\jvpdj.exec:\jvpdj.exe140⤵PID:4408
-
\??\c:\lfrflfl.exec:\lfrflfl.exe141⤵PID:4180
-
\??\c:\xlrflrx.exec:\xlrflrx.exe142⤵PID:1868
-
\??\c:\hbthtn.exec:\hbthtn.exe143⤵PID:1336
-
\??\c:\3tbbtb.exec:\3tbbtb.exe144⤵PID:3780
-
\??\c:\ppvdv.exec:\ppvdv.exe145⤵PID:2208
-
\??\c:\3pppd.exec:\3pppd.exe146⤵PID:620
-
\??\c:\3rffxxf.exec:\3rffxxf.exe147⤵PID:4248
-
\??\c:\7lrlffx.exec:\7lrlffx.exe148⤵PID:4292
-
\??\c:\ntttnn.exec:\ntttnn.exe149⤵PID:4376
-
\??\c:\1tbtnt.exec:\1tbtnt.exe150⤵PID:3500
-
\??\c:\dvdpj.exec:\dvdpj.exe151⤵PID:3040
-
\??\c:\vjdvd.exec:\vjdvd.exe152⤵PID:3620
-
\??\c:\lflllrx.exec:\lflllrx.exe153⤵PID:464
-
\??\c:\fxxrlfx.exec:\fxxrlfx.exe154⤵PID:8
-
\??\c:\hthbbb.exec:\hthbbb.exe155⤵PID:1196
-
\??\c:\lllfxxr.exec:\lllfxxr.exe156⤵PID:508
-
\??\c:\lffxrrl.exec:\lffxrrl.exe157⤵PID:1620
-
\??\c:\hbbtnn.exec:\hbbtnn.exe158⤵PID:3200
-
\??\c:\jvpjj.exec:\jvpjj.exe159⤵PID:3020
-
\??\c:\pvvvv.exec:\pvvvv.exe160⤵PID:3512
-
\??\c:\xlrflfx.exec:\xlrflfx.exe161⤵PID:3028
-
\??\c:\frlxrlf.exec:\frlxrlf.exe162⤵PID:4596
-
\??\c:\btnhth.exec:\btnhth.exe163⤵PID:1220
-
\??\c:\9pjpp.exec:\9pjpp.exe164⤵PID:2512
-
\??\c:\xxlllll.exec:\xxlllll.exe165⤵PID:3304
-
\??\c:\lffxfll.exec:\lffxfll.exe166⤵PID:4536
-
\??\c:\bttnbb.exec:\bttnbb.exe167⤵PID:3064
-
\??\c:\ddddd.exec:\ddddd.exe168⤵PID:3152
-
\??\c:\xxrllfx.exec:\xxrllfx.exe169⤵PID:1760
-
\??\c:\hhhbhh.exec:\hhhbhh.exe170⤵PID:1964
-
\??\c:\btbbnh.exec:\btbbnh.exe171⤵PID:4696
-
\??\c:\jdvpd.exec:\jdvpd.exe172⤵PID:5112
-
\??\c:\5ddvj.exec:\5ddvj.exe173⤵PID:1680
-
\??\c:\3lfxrll.exec:\3lfxrll.exe174⤵PID:4176
-
\??\c:\rlrlrrl.exec:\rlrlrrl.exe175⤵PID:4344
-
\??\c:\nnnhhb.exec:\nnnhhb.exe176⤵PID:2168
-
\??\c:\bbhnbt.exec:\bbhnbt.exe177⤵PID:2384
-
\??\c:\pdvpd.exec:\pdvpd.exe178⤵PID:2520
-
\??\c:\xrlxfll.exec:\xrlxfll.exe179⤵PID:4592
-
\??\c:\tthhhh.exec:\tthhhh.exe180⤵PID:3084
-
\??\c:\7nnhtt.exec:\7nnhtt.exe181⤵PID:1836
-
\??\c:\vpppd.exec:\vpppd.exe182⤵PID:3668
-
\??\c:\pvpdv.exec:\pvpdv.exe183⤵PID:4956
-
\??\c:\fxfxllr.exec:\fxfxllr.exe184⤵PID:4768
-
\??\c:\htbttb.exec:\htbttb.exe185⤵PID:912
-
\??\c:\thbthh.exec:\thbthh.exe186⤵PID:2888
-
\??\c:\djjdp.exec:\djjdp.exe187⤵PID:4260
-
\??\c:\vdjdp.exec:\vdjdp.exe188⤵PID:4864
-
\??\c:\lflxllf.exec:\lflxllf.exe189⤵PID:4876
-
\??\c:\tbhbtt.exec:\tbhbtt.exe190⤵PID:448
-
\??\c:\dddjd.exec:\dddjd.exe191⤵PID:2668
-
\??\c:\dvjvd.exec:\dvjvd.exe192⤵PID:4272
-
\??\c:\xlrfrxr.exec:\xlrfrxr.exe193⤵PID:1848
-
\??\c:\7fxxxxr.exec:\7fxxxxr.exe194⤵PID:4480
-
\??\c:\tthhnh.exec:\tthhnh.exe195⤵PID:1612
-
\??\c:\jpjvp.exec:\jpjvp.exe196⤵PID:3104
-
\??\c:\vppjd.exec:\vppjd.exe197⤵PID:4964
-
\??\c:\lrrxfrx.exec:\lrrxfrx.exe198⤵PID:1852
-
\??\c:\lflfflf.exec:\lflfflf.exe199⤵PID:1056
-
\??\c:\bthtnb.exec:\bthtnb.exe200⤵PID:1412
-
\??\c:\5vjdj.exec:\5vjdj.exe201⤵PID:976
-
\??\c:\jjpdv.exec:\jjpdv.exe202⤵PID:2408
-
\??\c:\3fxffrx.exec:\3fxffrx.exe203⤵PID:2512
-
\??\c:\rfxxflr.exec:\rfxxflr.exe204⤵PID:2832
-
\??\c:\5hhnbb.exec:\5hhnbb.exe205⤵PID:2744
-
\??\c:\tbhttn.exec:\tbhttn.exe206⤵PID:4012
-
\??\c:\jpdjv.exec:\jpdjv.exe207⤵PID:4976
-
\??\c:\lrlrfrr.exec:\lrlrfrr.exe208⤵PID:1560
-
\??\c:\fxxrllf.exec:\fxxrllf.exe209⤵PID:4696
-
\??\c:\hhbbtt.exec:\hhbbtt.exe210⤵PID:4208
-
\??\c:\1nhnht.exec:\1nhnht.exe211⤵PID:1680
-
\??\c:\3dpjd.exec:\3dpjd.exe212⤵PID:1068
-
\??\c:\3vvvp.exec:\3vvvp.exe213⤵PID:3900
-
\??\c:\xrxxllr.exec:\xrxxllr.exe214⤵PID:4928
-
\??\c:\3rffrxx.exec:\3rffrxx.exe215⤵PID:4740
-
\??\c:\bthbhh.exec:\bthbhh.exe216⤵PID:2676
-
\??\c:\btnnnn.exec:\btnnnn.exe217⤵PID:1108
-
\??\c:\9btbhb.exec:\9btbhb.exe218⤵PID:4264
-
\??\c:\vppjd.exec:\vppjd.exe219⤵PID:4428
-
\??\c:\lfxxlfx.exec:\lfxxlfx.exe220⤵PID:1008
-
\??\c:\3xxxffl.exec:\3xxxffl.exe221⤵PID:5116
-
\??\c:\btnhht.exec:\btnhht.exe222⤵PID:4552
-
\??\c:\vddvp.exec:\vddvp.exe223⤵PID:2900
-
\??\c:\llxxfxl.exec:\llxxfxl.exe224⤵PID:3500
-
\??\c:\thbnhb.exec:\thbnhb.exe225⤵PID:4864
-
\??\c:\bthbbb.exec:\bthbbb.exe226⤵PID:3620
-
\??\c:\7vvvj.exec:\7vvvj.exe227⤵PID:4744
-
\??\c:\jdvjp.exec:\jdvjp.exe228⤵PID:4064
-
\??\c:\xrfrrrr.exec:\xrfrrrr.exe229⤵PID:4884
-
\??\c:\5flxlfl.exec:\5flxlfl.exe230⤵PID:4384
-
\??\c:\btbhtn.exec:\btbhtn.exe231⤵PID:4320
-
\??\c:\7tntnh.exec:\7tntnh.exe232⤵PID:1612
-
\??\c:\dvvjv.exec:\dvvjv.exe233⤵PID:4348
-
\??\c:\ddvpd.exec:\ddvpd.exe234⤵PID:5092
-
\??\c:\5llxrlf.exec:\5llxrlf.exe235⤵PID:3792
-
\??\c:\fllfrrf.exec:\fllfrrf.exe236⤵PID:1392
-
\??\c:\hbbnbh.exec:\hbbnbh.exe237⤵PID:3256
-
\??\c:\dpvpj.exec:\dpvpj.exe238⤵PID:2616
-
\??\c:\vvjpv.exec:\vvjpv.exe239⤵PID:2948
-
\??\c:\flrlxxl.exec:\flrlxxl.exe240⤵PID:4536
-
\??\c:\hbnhtn.exec:\hbnhtn.exe241⤵PID:3940
-