Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 21:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe
-
Size
226KB
-
MD5
8e5f450f54cc322b8aec4108765c1520
-
SHA1
0cd36872a052883ef67ee51c06945aedf5325a1f
-
SHA256
bca8d2d402ca1c2d3abefcba1c8aeabb14c284656ec5d8a37a9a77f12a1633db
-
SHA512
ce80de7713f4b15fced06b1d8f36adec3b0d3e2f4cd20a466292be7c3f36ae77910cc202baec9590af2fe53a06af967c5f75085ebde8a5739d3239effce98a35
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeGb:n3C9BRo7MlrWKo+lxKF
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/3784-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3652-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1536-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1484-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/772-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1536-33-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/928-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2388-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3120-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3028-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3772-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5064-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2672-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3312-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1932-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4956-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1064-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/448-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4632-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2692-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2584-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3068-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3704-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3nhbtt.exehnnhtt.exenhhbnn.exehtnbnb.exeppjdd.exexfxrllf.exehtbbtt.exepvpjv.exexfrffrx.exepdpvd.exelfrxlrr.exepvvdp.exeflxrrrr.exebnttnn.exelfrfrfx.exetnnhnt.exexrfxlxr.exettnttb.exepvpjd.exebhhbbb.exevjpjj.exevpppj.exejpjjd.exe9hhtnb.exevpvpp.exerrlfrll.exepvpdp.exejjpdd.exerrrxxfx.exebhhhnh.exerfrxfrr.exevvvvp.exepvdvv.exelflxfff.exebtbttt.exejdjvj.exehbtntn.exennhbbb.exevjdjd.exe9frlxrr.exevdddd.exe3flffff.exe5rxxllx.exetnbhhh.exepjdpd.exebthnhb.exedjvvv.exefxxfrff.exentttnt.exevjvjd.exefrlxrlf.exenhttbb.exebnbbnh.exe3jjvd.exellrxxlf.exebtbtnh.exepdpdj.exerfffrrr.exefxrlfrf.exehbthbt.exevdpdj.exelrffrfr.exenhttnt.exejdvvv.exepid process 3784 3nhbtt.exe 4004 hnnhtt.exe 928 nhhbnn.exe 1536 htnbnb.exe 772 ppjdd.exe 1484 xfxrllf.exe 2388 htbbtt.exe 3120 pvpjv.exe 3028 xfrffrx.exe 3772 pdpvd.exe 4988 lfrxlrr.exe 5064 pvvdp.exe 2672 flxrrrr.exe 4544 bnttnn.exe 3312 lfrfrfx.exe 1196 tnnhnt.exe 3628 xrfxlxr.exe 4784 ttnttb.exe 1932 pvpjd.exe 4956 bhhbbb.exe 1064 vjpjj.exe 448 vpppj.exe 4628 jpjjd.exe 4632 9hhtnb.exe 5024 vpvpp.exe 2692 rrlfrll.exe 4288 pvpdp.exe 2584 jjpdd.exe 3068 rrrxxfx.exe 3704 bhhhnh.exe 3500 rfrxfrr.exe 5100 vvvvp.exe 2788 pvdvv.exe 3920 lflxfff.exe 948 btbttt.exe 3624 jdjvj.exe 1996 hbtntn.exe 4360 nnhbbb.exe 3380 vjdjd.exe 3784 9frlxrr.exe 692 vdddd.exe 2532 3flffff.exe 2356 5rxxllx.exe 1428 tnbhhh.exe 4316 pjdpd.exe 1264 bthnhb.exe 4920 djvvv.exe 864 fxxfrff.exe 3788 ntttnt.exe 4144 vjvjd.exe 3892 frlxrlf.exe 3028 nhttbb.exe 1052 bnbbnh.exe 5064 3jjvd.exe 568 llrxxlf.exe 4284 btbtnh.exe 636 pdpdj.exe 1964 rfffrrr.exe 4672 fxrlfrf.exe 3628 hbthbt.exe 4776 vdpdj.exe 4124 lrffrfr.exe 4072 nhttnt.exe 1656 jdvvv.exe -
Processes:
resource yara_rule behavioral2/memory/3784-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1536-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1484-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/772-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2388-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3120-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3028-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3772-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5064-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2672-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3312-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1932-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4956-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1064-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/448-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4632-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2692-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2584-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3068-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3704-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe3nhbtt.exehnnhtt.exenhhbnn.exehtnbnb.exeppjdd.exexfxrllf.exehtbbtt.exepvpjv.exexfrffrx.exepdpvd.exelfrxlrr.exepvvdp.exeflxrrrr.exebnttnn.exelfrfrfx.exetnnhnt.exexrfxlxr.exettnttb.exepvpjd.exebhhbbb.exevjpjj.exedescription pid process target process PID 3652 wrote to memory of 3784 3652 8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe 3nhbtt.exe PID 3652 wrote to memory of 3784 3652 8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe 3nhbtt.exe PID 3652 wrote to memory of 3784 3652 8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe 3nhbtt.exe PID 3784 wrote to memory of 4004 3784 3nhbtt.exe hnnhtt.exe PID 3784 wrote to memory of 4004 3784 3nhbtt.exe hnnhtt.exe PID 3784 wrote to memory of 4004 3784 3nhbtt.exe hnnhtt.exe PID 4004 wrote to memory of 928 4004 hnnhtt.exe nhhbnn.exe PID 4004 wrote to memory of 928 4004 hnnhtt.exe nhhbnn.exe PID 4004 wrote to memory of 928 4004 hnnhtt.exe nhhbnn.exe PID 928 wrote to memory of 1536 928 nhhbnn.exe htnbnb.exe PID 928 wrote to memory of 1536 928 nhhbnn.exe htnbnb.exe PID 928 wrote to memory of 1536 928 nhhbnn.exe htnbnb.exe PID 1536 wrote to memory of 772 1536 htnbnb.exe ppjdd.exe PID 1536 wrote to memory of 772 1536 htnbnb.exe ppjdd.exe PID 1536 wrote to memory of 772 1536 htnbnb.exe ppjdd.exe PID 772 wrote to memory of 1484 772 ppjdd.exe xfxrllf.exe PID 772 wrote to memory of 1484 772 ppjdd.exe xfxrllf.exe PID 772 wrote to memory of 1484 772 ppjdd.exe xfxrllf.exe PID 1484 wrote to memory of 2388 1484 xfxrllf.exe htbbtt.exe PID 1484 wrote to memory of 2388 1484 xfxrllf.exe htbbtt.exe PID 1484 wrote to memory of 2388 1484 xfxrllf.exe htbbtt.exe PID 2388 wrote to memory of 3120 2388 htbbtt.exe pvpjv.exe PID 2388 wrote to memory of 3120 2388 htbbtt.exe pvpjv.exe PID 2388 wrote to memory of 3120 2388 htbbtt.exe pvpjv.exe PID 3120 wrote to memory of 3028 3120 pvpjv.exe xfrffrx.exe PID 3120 wrote to memory of 3028 3120 pvpjv.exe xfrffrx.exe PID 3120 wrote to memory of 3028 3120 pvpjv.exe xfrffrx.exe PID 3028 wrote to memory of 3772 3028 xfrffrx.exe pdpvd.exe PID 3028 wrote to memory of 3772 3028 xfrffrx.exe pdpvd.exe PID 3028 wrote to memory of 3772 3028 xfrffrx.exe pdpvd.exe PID 3772 wrote to memory of 4988 3772 pdpvd.exe lfrxlrr.exe PID 3772 wrote to memory of 4988 3772 pdpvd.exe lfrxlrr.exe PID 3772 wrote to memory of 4988 3772 pdpvd.exe lfrxlrr.exe PID 4988 wrote to memory of 5064 4988 lfrxlrr.exe pvvdp.exe PID 4988 wrote to memory of 5064 4988 lfrxlrr.exe pvvdp.exe PID 4988 wrote to memory of 5064 4988 lfrxlrr.exe pvvdp.exe PID 5064 wrote to memory of 2672 5064 pvvdp.exe flxrrrr.exe PID 5064 wrote to memory of 2672 5064 pvvdp.exe flxrrrr.exe PID 5064 wrote to memory of 2672 5064 pvvdp.exe flxrrrr.exe PID 2672 wrote to memory of 4544 2672 flxrrrr.exe bnttnn.exe PID 2672 wrote to memory of 4544 2672 flxrrrr.exe bnttnn.exe PID 2672 wrote to memory of 4544 2672 flxrrrr.exe bnttnn.exe PID 4544 wrote to memory of 3312 4544 bnttnn.exe lfrfrfx.exe PID 4544 wrote to memory of 3312 4544 bnttnn.exe lfrfrfx.exe PID 4544 wrote to memory of 3312 4544 bnttnn.exe lfrfrfx.exe PID 3312 wrote to memory of 1196 3312 lfrfrfx.exe tnnhnt.exe PID 3312 wrote to memory of 1196 3312 lfrfrfx.exe tnnhnt.exe PID 3312 wrote to memory of 1196 3312 lfrfrfx.exe tnnhnt.exe PID 1196 wrote to memory of 3628 1196 tnnhnt.exe xrfxlxr.exe PID 1196 wrote to memory of 3628 1196 tnnhnt.exe xrfxlxr.exe PID 1196 wrote to memory of 3628 1196 tnnhnt.exe xrfxlxr.exe PID 3628 wrote to memory of 4784 3628 xrfxlxr.exe ttnttb.exe PID 3628 wrote to memory of 4784 3628 xrfxlxr.exe ttnttb.exe PID 3628 wrote to memory of 4784 3628 xrfxlxr.exe ttnttb.exe PID 4784 wrote to memory of 1932 4784 ttnttb.exe pvpjd.exe PID 4784 wrote to memory of 1932 4784 ttnttb.exe pvpjd.exe PID 4784 wrote to memory of 1932 4784 ttnttb.exe pvpjd.exe PID 1932 wrote to memory of 4956 1932 pvpjd.exe bhhbbb.exe PID 1932 wrote to memory of 4956 1932 pvpjd.exe bhhbbb.exe PID 1932 wrote to memory of 4956 1932 pvpjd.exe bhhbbb.exe PID 4956 wrote to memory of 1064 4956 bhhbbb.exe vjpjj.exe PID 4956 wrote to memory of 1064 4956 bhhbbb.exe vjpjj.exe PID 4956 wrote to memory of 1064 4956 bhhbbb.exe vjpjj.exe PID 1064 wrote to memory of 448 1064 vjpjj.exe vpppj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8e5f450f54cc322b8aec4108765c1520_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\3nhbtt.exec:\3nhbtt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
\??\c:\hnnhtt.exec:\hnnhtt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\nhhbnn.exec:\nhhbnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\htnbnb.exec:\htnbnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\ppjdd.exec:\ppjdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\xfxrllf.exec:\xfxrllf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
\??\c:\htbbtt.exec:\htbbtt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\pvpjv.exec:\pvpjv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
\??\c:\xfrffrx.exec:\xfrffrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\pdpvd.exec:\pdpvd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\lfrxlrr.exec:\lfrxlrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
\??\c:\pvvdp.exec:\pvvdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
\??\c:\flxrrrr.exec:\flxrrrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\bnttnn.exec:\bnttnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
\??\c:\lfrfrfx.exec:\lfrfrfx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\tnnhnt.exec:\tnnhnt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\xrfxlxr.exec:\xrfxlxr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\ttnttb.exec:\ttnttb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\pvpjd.exec:\pvpjd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\bhhbbb.exec:\bhhbbb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\vjpjj.exec:\vjpjj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\vpppj.exec:\vpppj.exe23⤵
- Executes dropped EXE
PID:448 -
\??\c:\jpjjd.exec:\jpjjd.exe24⤵
- Executes dropped EXE
PID:4628 -
\??\c:\9hhtnb.exec:\9hhtnb.exe25⤵
- Executes dropped EXE
PID:4632 -
\??\c:\vpvpp.exec:\vpvpp.exe26⤵
- Executes dropped EXE
PID:5024 -
\??\c:\rrlfrll.exec:\rrlfrll.exe27⤵
- Executes dropped EXE
PID:2692 -
\??\c:\pvpdp.exec:\pvpdp.exe28⤵
- Executes dropped EXE
PID:4288 -
\??\c:\jjpdd.exec:\jjpdd.exe29⤵
- Executes dropped EXE
PID:2584 -
\??\c:\rrrxxfx.exec:\rrrxxfx.exe30⤵
- Executes dropped EXE
PID:3068 -
\??\c:\bhhhnh.exec:\bhhhnh.exe31⤵
- Executes dropped EXE
PID:3704 -
\??\c:\rfrxfrr.exec:\rfrxfrr.exe32⤵
- Executes dropped EXE
PID:3500 -
\??\c:\vvvvp.exec:\vvvvp.exe33⤵
- Executes dropped EXE
PID:5100 -
\??\c:\pvdvv.exec:\pvdvv.exe34⤵
- Executes dropped EXE
PID:2788 -
\??\c:\lflxfff.exec:\lflxfff.exe35⤵
- Executes dropped EXE
PID:3920 -
\??\c:\btbttt.exec:\btbttt.exe36⤵
- Executes dropped EXE
PID:948 -
\??\c:\jdjvj.exec:\jdjvj.exe37⤵
- Executes dropped EXE
PID:3624 -
\??\c:\hbtntn.exec:\hbtntn.exe38⤵
- Executes dropped EXE
PID:1996 -
\??\c:\nnhbbb.exec:\nnhbbb.exe39⤵
- Executes dropped EXE
PID:4360 -
\??\c:\vjdjd.exec:\vjdjd.exe40⤵
- Executes dropped EXE
PID:3380 -
\??\c:\9frlxrr.exec:\9frlxrr.exe41⤵
- Executes dropped EXE
PID:3784 -
\??\c:\vdddd.exec:\vdddd.exe42⤵
- Executes dropped EXE
PID:692 -
\??\c:\3flffff.exec:\3flffff.exe43⤵
- Executes dropped EXE
PID:2532 -
\??\c:\5rxxllx.exec:\5rxxllx.exe44⤵
- Executes dropped EXE
PID:2356 -
\??\c:\tnbhhh.exec:\tnbhhh.exe45⤵
- Executes dropped EXE
PID:1428 -
\??\c:\pjdpd.exec:\pjdpd.exe46⤵
- Executes dropped EXE
PID:4316 -
\??\c:\bthnhb.exec:\bthnhb.exe47⤵
- Executes dropped EXE
PID:1264 -
\??\c:\djvvv.exec:\djvvv.exe48⤵
- Executes dropped EXE
PID:4920 -
\??\c:\fxxfrff.exec:\fxxfrff.exe49⤵
- Executes dropped EXE
PID:864 -
\??\c:\ntttnt.exec:\ntttnt.exe50⤵
- Executes dropped EXE
PID:3788 -
\??\c:\vjvjd.exec:\vjvjd.exe51⤵
- Executes dropped EXE
PID:4144 -
\??\c:\frlxrlf.exec:\frlxrlf.exe52⤵
- Executes dropped EXE
PID:3892 -
\??\c:\nhttbb.exec:\nhttbb.exe53⤵
- Executes dropped EXE
PID:3028 -
\??\c:\bnbbnh.exec:\bnbbnh.exe54⤵
- Executes dropped EXE
PID:1052 -
\??\c:\3jjvd.exec:\3jjvd.exe55⤵
- Executes dropped EXE
PID:5064 -
\??\c:\llrxxlf.exec:\llrxxlf.exe56⤵
- Executes dropped EXE
PID:568 -
\??\c:\btbtnh.exec:\btbtnh.exe57⤵
- Executes dropped EXE
PID:4284 -
\??\c:\pdpdj.exec:\pdpdj.exe58⤵
- Executes dropped EXE
PID:636 -
\??\c:\rfffrrr.exec:\rfffrrr.exe59⤵
- Executes dropped EXE
PID:1964 -
\??\c:\fxrlfrf.exec:\fxrlfrf.exe60⤵
- Executes dropped EXE
PID:4672 -
\??\c:\hbthbt.exec:\hbthbt.exe61⤵
- Executes dropped EXE
PID:3628 -
\??\c:\vdpdj.exec:\vdpdj.exe62⤵
- Executes dropped EXE
PID:4776 -
\??\c:\lrffrfr.exec:\lrffrfr.exe63⤵
- Executes dropped EXE
PID:4124 -
\??\c:\nhttnt.exec:\nhttnt.exe64⤵
- Executes dropped EXE
PID:4072 -
\??\c:\jdvvv.exec:\jdvvv.exe65⤵
- Executes dropped EXE
PID:1656 -
\??\c:\1rxlffx.exec:\1rxlffx.exe66⤵PID:2668
-
\??\c:\llffxxr.exec:\llffxxr.exe67⤵PID:1036
-
\??\c:\bttnhh.exec:\bttnhh.exe68⤵PID:5036
-
\??\c:\9jjdv.exec:\9jjdv.exe69⤵PID:3952
-
\??\c:\xlrlffx.exec:\xlrlffx.exe70⤵PID:3092
-
\??\c:\hhtntb.exec:\hhtntb.exe71⤵PID:3356
-
\??\c:\thnnhh.exec:\thnnhh.exe72⤵PID:2508
-
\??\c:\pddvp.exec:\pddvp.exe73⤵PID:412
-
\??\c:\fxrlxxr.exec:\fxrlxxr.exe74⤵PID:4816
-
\??\c:\fffxrlf.exec:\fffxrlf.exe75⤵PID:2716
-
\??\c:\jddjv.exec:\jddjv.exe76⤵PID:1068
-
\??\c:\pppdv.exec:\pppdv.exe77⤵PID:3704
-
\??\c:\xrrlxfx.exec:\xrrlxfx.exe78⤵PID:1852
-
\??\c:\bbtnhh.exec:\bbtnhh.exe79⤵PID:1800
-
\??\c:\pddvp.exec:\pddvp.exe80⤵PID:4788
-
\??\c:\xrfxffl.exec:\xrfxffl.exe81⤵PID:2436
-
\??\c:\lfrllll.exec:\lfrllll.exe82⤵PID:3660
-
\??\c:\btnbhh.exec:\btnbhh.exe83⤵PID:1552
-
\??\c:\pdvpj.exec:\pdvpj.exe84⤵PID:4356
-
\??\c:\1jdvp.exec:\1jdvp.exe85⤵PID:2524
-
\??\c:\xxfllrf.exec:\xxfllrf.exe86⤵PID:4420
-
\??\c:\ntbhbh.exec:\ntbhbh.exe87⤵PID:2512
-
\??\c:\9tbtbt.exec:\9tbtbt.exe88⤵PID:2820
-
\??\c:\pvjjp.exec:\pvjjp.exe89⤵PID:4688
-
\??\c:\lrfxfxl.exec:\lrfxfxl.exe90⤵PID:1924
-
\??\c:\7thhnb.exec:\7thhnb.exe91⤵PID:4868
-
\??\c:\hnttbt.exec:\hnttbt.exe92⤵PID:2656
-
\??\c:\vppdv.exec:\vppdv.exe93⤵PID:772
-
\??\c:\rllxxxr.exec:\rllxxxr.exe94⤵PID:548
-
\??\c:\dvjvv.exec:\dvjvv.exe95⤵PID:3056
-
\??\c:\rfxxlfr.exec:\rfxxlfr.exe96⤵PID:2352
-
\??\c:\bnhnnb.exec:\bnhnnb.exe97⤵PID:3124
-
\??\c:\jjvdp.exec:\jjvdp.exe98⤵PID:748
-
\??\c:\5lrxfxf.exec:\5lrxfxf.exe99⤵PID:3504
-
\??\c:\nhhbnh.exec:\nhhbnh.exe100⤵PID:2660
-
\??\c:\djjjd.exec:\djjjd.exe101⤵PID:4480
-
\??\c:\jvvdd.exec:\jvvdd.exe102⤵PID:4760
-
\??\c:\fflfxrl.exec:\fflfxrl.exe103⤵PID:1404
-
\??\c:\hnnttt.exec:\hnnttt.exe104⤵PID:568
-
\??\c:\ppjjp.exec:\ppjjp.exe105⤵PID:4284
-
\??\c:\xlfxffx.exec:\xlfxffx.exe106⤵PID:4560
-
\??\c:\ntbhnh.exec:\ntbhnh.exe107⤵PID:4352
-
\??\c:\vjvpp.exec:\vjvpp.exe108⤵PID:4992
-
\??\c:\7xxlfll.exec:\7xxlfll.exe109⤵PID:4860
-
\??\c:\5lrllll.exec:\5lrllll.exe110⤵PID:388
-
\??\c:\5httnt.exec:\5httnt.exe111⤵PID:4440
-
\??\c:\djppj.exec:\djppj.exe112⤵PID:4312
-
\??\c:\xrrrrxx.exec:\xrrrrxx.exe113⤵PID:4568
-
\??\c:\5frrrxf.exec:\5frrrxf.exe114⤵PID:804
-
\??\c:\btbhhn.exec:\btbhhn.exe115⤵PID:4628
-
\??\c:\ppdpv.exec:\ppdpv.exe116⤵PID:4100
-
\??\c:\pjvvv.exec:\pjvvv.exe117⤵PID:3556
-
\??\c:\rrfffll.exec:\rrfffll.exe118⤵PID:1592
-
\??\c:\hhnnnh.exec:\hhnnnh.exe119⤵PID:3104
-
\??\c:\nnhhhb.exec:\nnhhhb.exe120⤵PID:3724
-
\??\c:\dppdv.exec:\dppdv.exe121⤵PID:2032
-
\??\c:\llrrffr.exec:\llrrffr.exe122⤵PID:3708
-
\??\c:\xrrxrxl.exec:\xrrxrxl.exe123⤵PID:4648
-
\??\c:\5nbbbb.exec:\5nbbbb.exe124⤵PID:5108
-
\??\c:\tntttn.exec:\tntttn.exe125⤵PID:924
-
\??\c:\jdppd.exec:\jdppd.exe126⤵PID:4228
-
\??\c:\xllffxf.exec:\xllffxf.exe127⤵PID:4880
-
\??\c:\rlrrlrr.exec:\rlrrlrr.exe128⤵PID:5060
-
\??\c:\bbbbtb.exec:\bbbbtb.exe129⤵PID:948
-
\??\c:\tbntbh.exec:\tbntbh.exe130⤵PID:4468
-
\??\c:\vpvvp.exec:\vpvvp.exe131⤵PID:3664
-
\??\c:\xxfrllf.exec:\xxfrllf.exe132⤵PID:1500
-
\??\c:\llffrxx.exec:\llffrxx.exe133⤵PID:3688
-
\??\c:\bbbbtn.exec:\bbbbtn.exe134⤵PID:2564
-
\??\c:\vvppj.exec:\vvppj.exe135⤵PID:1584
-
\??\c:\vdppv.exec:\vdppv.exe136⤵PID:3416
-
\??\c:\fllffxl.exec:\fllffxl.exe137⤵PID:1116
-
\??\c:\hnbbbh.exec:\hnbbbh.exe138⤵PID:2520
-
\??\c:\bbbhnt.exec:\bbbhnt.exe139⤵PID:1536
-
\??\c:\pjvpp.exec:\pjvpp.exe140⤵PID:1284
-
\??\c:\xllffll.exec:\xllffll.exe141⤵PID:2724
-
\??\c:\hbhbhh.exec:\hbhbhh.exe142⤵PID:2860
-
\??\c:\tbhhnt.exec:\tbhhnt.exe143⤵PID:3852
-
\??\c:\pvdpp.exec:\pvdpp.exe144⤵PID:2856
-
\??\c:\rflffxl.exec:\rflffxl.exe145⤵PID:1532
-
\??\c:\xfxxrrx.exec:\xfxxrrx.exe146⤵PID:5068
-
\??\c:\hnthtb.exec:\hnthtb.exe147⤵PID:2908
-
\??\c:\1jjjj.exec:\1jjjj.exe148⤵PID:1196
-
\??\c:\dpvjv.exec:\dpvjv.exe149⤵PID:3948
-
\??\c:\lrffrxf.exec:\lrffrxf.exe150⤵PID:4992
-
\??\c:\nhtthh.exec:\nhtthh.exe151⤵PID:2400
-
\??\c:\btbbbh.exec:\btbbbh.exe152⤵PID:1656
-
\??\c:\vjppp.exec:\vjppp.exe153⤵PID:2284
-
\??\c:\7lxxrxr.exec:\7lxxrxr.exe154⤵PID:4216
-
\??\c:\7tbttb.exec:\7tbttb.exe155⤵PID:1588
-
\??\c:\tnnhbn.exec:\tnnhbn.exe156⤵PID:3296
-
\??\c:\jjppp.exec:\jjppp.exe157⤵PID:4632
-
\??\c:\lflffff.exec:\lflffff.exe158⤵PID:4168
-
\??\c:\tbhhht.exec:\tbhhht.exe159⤵PID:2896
-
\??\c:\bttthn.exec:\bttthn.exe160⤵PID:4676
-
\??\c:\9djjj.exec:\9djjj.exe161⤵PID:3068
-
\??\c:\1rlllrr.exec:\1rlllrr.exe162⤵PID:2716
-
\??\c:\ffxxflf.exec:\ffxxflf.exe163⤵PID:3956
-
\??\c:\tbhbtn.exec:\tbhbtn.exe164⤵PID:5048
-
\??\c:\ppvvv.exec:\ppvvv.exe165⤵PID:1848
-
\??\c:\ppddv.exec:\ppddv.exe166⤵PID:4536
-
\??\c:\lrffxrr.exec:\lrffxrr.exe167⤵PID:836
-
\??\c:\hhtthn.exec:\hhtthn.exe168⤵PID:3680
-
\??\c:\hbttnn.exec:\hbttnn.exe169⤵PID:1996
-
\??\c:\jvjdd.exec:\jvjdd.exe170⤵PID:4372
-
\??\c:\llxxrxx.exec:\llxxrxx.exe171⤵PID:4360
-
\??\c:\rlfffrx.exec:\rlfffrx.exe172⤵PID:3380
-
\??\c:\ddjjj.exec:\ddjjj.exe173⤵PID:3036
-
\??\c:\lfllfll.exec:\lfllfll.exe174⤵PID:692
-
\??\c:\jdjjd.exec:\jdjjd.exe175⤵PID:3972
-
\??\c:\5djdd.exec:\5djdd.exe176⤵PID:1400
-
\??\c:\pvppp.exec:\pvppp.exe177⤵PID:1428
-
\??\c:\3rflffx.exec:\3rflffx.exe178⤵PID:468
-
\??\c:\3hntbh.exec:\3hntbh.exe179⤵PID:2520
-
\??\c:\hhtttb.exec:\hhtttb.exe180⤵PID:772
-
\??\c:\djjdd.exec:\djjdd.exe181⤵PID:3056
-
\??\c:\3vppv.exec:\3vppv.exe182⤵PID:3120
-
\??\c:\rlllrfr.exec:\rlllrfr.exe183⤵PID:2860
-
\??\c:\nnbttt.exec:\nnbttt.exe184⤵PID:5076
-
\??\c:\hhttbh.exec:\hhttbh.exe185⤵PID:3048
-
\??\c:\9vddd.exec:\9vddd.exe186⤵PID:4452
-
\??\c:\xxffflr.exec:\xxffflr.exe187⤵PID:3496
-
\??\c:\rlxrrrr.exec:\rlxrrrr.exe188⤵PID:1260
-
\??\c:\bbtttn.exec:\bbtttn.exe189⤵PID:4560
-
\??\c:\jjjjj.exec:\jjjjj.exe190⤵PID:3536
-
\??\c:\5vdpp.exec:\5vdpp.exe191⤵PID:3176
-
\??\c:\llxxxrf.exec:\llxxxrf.exe192⤵PID:396
-
\??\c:\btthhh.exec:\btthhh.exe193⤵PID:2668
-
\??\c:\nbhhbh.exec:\nbhhbh.exe194⤵PID:1036
-
\??\c:\dvdvp.exec:\dvdvp.exe195⤵PID:4976
-
\??\c:\ffxfxrr.exec:\ffxfxrr.exe196⤵PID:3180
-
\??\c:\tbnnht.exec:\tbnnht.exe197⤵PID:676
-
\??\c:\jjpvj.exec:\jjpvj.exe198⤵PID:2692
-
\??\c:\vddpj.exec:\vddpj.exe199⤵PID:3428
-
\??\c:\1fllfrr.exec:\1fllfrr.exe200⤵PID:1088
-
\??\c:\bbnnht.exec:\bbnnht.exe201⤵PID:1976
-
\??\c:\nnhtnt.exec:\nnhtnt.exe202⤵PID:4576
-
\??\c:\dppvj.exec:\dppvj.exe203⤵PID:456
-
\??\c:\lrfxfrr.exec:\lrfxfrr.exe204⤵PID:3956
-
\??\c:\hbnbbb.exec:\hbnbbb.exe205⤵PID:1800
-
\??\c:\jjvdd.exec:\jjvdd.exe206⤵PID:4036
-
\??\c:\jdpvj.exec:\jdpvj.exe207⤵PID:3624
-
\??\c:\xxfxxxx.exec:\xxfxxxx.exe208⤵PID:4380
-
\??\c:\hbtnbb.exec:\hbtnbb.exe209⤵PID:3916
-
\??\c:\ppvvp.exec:\ppvvp.exe210⤵PID:3420
-
\??\c:\pvvvv.exec:\pvvvv.exe211⤵PID:4300
-
\??\c:\fffxrxr.exec:\fffxrxr.exe212⤵PID:4996
-
\??\c:\xlrllll.exec:\xlrllll.exe213⤵PID:1408
-
\??\c:\bhbthh.exec:\bhbthh.exe214⤵PID:3036
-
\??\c:\vjppp.exec:\vjppp.exe215⤵PID:2424
-
\??\c:\jjvvp.exec:\jjvvp.exe216⤵PID:2356
-
\??\c:\xllllll.exec:\xllllll.exe217⤵PID:1400
-
\??\c:\nhhhhn.exec:\nhhhhn.exe218⤵PID:1428
-
\??\c:\nhbbbb.exec:\nhbbbb.exe219⤵PID:2808
-
\??\c:\vpddp.exec:\vpddp.exe220⤵PID:548
-
\??\c:\9flffff.exec:\9flffff.exe221⤵PID:4864
-
\??\c:\9hbtht.exec:\9hbtht.exe222⤵PID:2396
-
\??\c:\pjpdd.exec:\pjpdd.exe223⤵PID:3852
-
\??\c:\jjpjd.exec:\jjpjd.exe224⤵PID:1808
-
\??\c:\lrfflll.exec:\lrfflll.exe225⤵PID:1008
-
\??\c:\nnbthh.exec:\nnbthh.exe226⤵PID:4080
-
\??\c:\vvvvv.exec:\vvvvv.exe227⤵PID:5056
-
\??\c:\jdjdp.exec:\jdjdp.exe228⤵PID:4256
-
\??\c:\7llfflf.exec:\7llfflf.exe229⤵PID:2160
-
\??\c:\bbnnbh.exec:\bbnnbh.exe230⤵PID:388
-
\??\c:\hhhhnn.exec:\hhhhnn.exe231⤵PID:4312
-
\??\c:\vppjv.exec:\vppjv.exe232⤵PID:3884
-
\??\c:\flfxrrr.exec:\flfxrrr.exe233⤵PID:4904
-
\??\c:\lrxxlll.exec:\lrxxlll.exe234⤵PID:3092
-
\??\c:\dvdvd.exec:\dvdvd.exe235⤵PID:3296
-
\??\c:\5xflxfl.exec:\5xflxfl.exe236⤵PID:1108
-
\??\c:\hhnttb.exec:\hhnttb.exe237⤵PID:1592
-
\??\c:\5dppp.exec:\5dppp.exe238⤵PID:3640
-
\??\c:\rrxrrrf.exec:\rrxrrrf.exe239⤵PID:4676
-
\??\c:\nhhbnt.exec:\nhhbnt.exe240⤵PID:3068
-
\??\c:\hbthbh.exec:\hbthbh.exe241⤵PID:3708
-
\??\c:\djppv.exec:\djppv.exe242⤵PID:1684