Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 21:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe
-
Size
58KB
-
MD5
8ab389b7e4e99721fec4d6a60cc87460
-
SHA1
ff6f3ace55f4a915f2308448e79f16229b354fb6
-
SHA256
9c157bd599fbcfaf2c9737f06f57350268b65e8c8d982328128fbe71fab1831f
-
SHA512
5afcd81d7d65732512f7e83832144e33be75deb06fa08744251ab449e40e353bcfed0f22d545cc5bf6ebc0a90c46f84350324633a5e72315d4cfd31df9b7b340
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIm2hT:ymb3NkkiQ3mdBjFIsIrhT
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/1704-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4776-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4168-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1268-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1136-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4320-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/680-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/680-54-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3664-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3340-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/864-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1376-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1044-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3100-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3644-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2704-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1072-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3952-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2860-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2496-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4048-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3400-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1992-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1764-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
5jddv.exelrlrlxr.exetnttth.exe7rfrxxr.exentbbht.exeppjjv.exelfffrxf.exehbhbbn.exerrfllrf.exetnttbb.exeddvvp.exe9llrlll.exehntttb.exe7vddd.exellxffrl.exebbntnn.exejvdpj.exefrfxfxr.exebbhbnt.exevdppj.exetttthn.exetnnnnt.exevvpdj.exeffxxxfx.exehbtbbn.exepjppv.exelxrlflf.exejdjpv.exexfrlfxx.exethttnn.exenhnttb.exevpjdv.exexffrrfl.exehttnth.exevvjdv.exeffllflx.exebhthnh.exebnbhhh.exevjpdv.exellrrrlr.exerllllfl.exetthbbh.exevpvjp.exe5btbnh.exefrxrlfx.exehhnttb.exepdjvj.exe1lrlrrf.exerrlxxxf.exehbhnth.exedjjdp.exerxflrxf.exennnttb.exentnhbh.exevjjjp.exefffflll.exenhbttt.exevjjdd.exellfxrll.exeflxrxxf.exe3bhthn.exejddvp.exerrxxfrx.exexlxfrfl.exepid process 4776 5jddv.exe 3580 lrlrlxr.exe 4168 tnttth.exe 1268 7rfrxxr.exe 1136 ntbbht.exe 4320 ppjjv.exe 680 lfffrxf.exe 3664 hbhbbn.exe 1960 rrfllrf.exe 3340 tnttbb.exe 864 ddvvp.exe 1376 9llrlll.exe 2888 hntttb.exe 1044 7vddd.exe 548 llxffrl.exe 3100 bbntnn.exe 3644 jvdpj.exe 4536 frfxfxr.exe 2704 bbhbnt.exe 1072 vdppj.exe 4968 tttthn.exe 3908 tnnnnt.exe 3952 vvpdj.exe 4440 ffxxxfx.exe 2860 hbtbbn.exe 2496 pjppv.exe 4048 lxrlflf.exe 756 jdjpv.exe 3400 xfrlfxx.exe 1992 thttnn.exe 1764 nhnttb.exe 4160 vpjdv.exe 624 xffrrfl.exe 656 httnth.exe 4648 vvjdv.exe 4696 ffllflx.exe 4100 bhthnh.exe 3516 bnbhhh.exe 4392 vjpdv.exe 860 llrrrlr.exe 2352 rllllfl.exe 4208 tthbbh.exe 768 vpvjp.exe 3196 5btbnh.exe 3448 frxrlfx.exe 4988 hhnttb.exe 2200 pdjvj.exe 3380 1lrlrrf.exe 2016 rrlxxxf.exe 3036 hbhnth.exe 2240 djjdp.exe 4108 rxflrxf.exe 2624 nnnttb.exe 1404 ntnhbh.exe 4156 vjjjp.exe 4908 fffflll.exe 1044 nhbttt.exe 2368 vjjdd.exe 2872 llfxrll.exe 2528 flxrxxf.exe 2104 3bhthn.exe 1448 jddvp.exe 2020 rrxxfrx.exe 4912 xlxfrfl.exe -
Processes:
resource yara_rule behavioral2/memory/1704-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4776-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4168-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1268-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4320-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/680-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3664-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3340-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/864-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1376-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2888-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1044-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3100-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3644-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2704-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1072-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3952-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2860-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2496-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4048-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3400-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1992-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1764-202-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe5jddv.exelrlrlxr.exetnttth.exe7rfrxxr.exentbbht.exeppjjv.exelfffrxf.exehbhbbn.exerrfllrf.exetnttbb.exeddvvp.exe9llrlll.exehntttb.exe7vddd.exellxffrl.exebbntnn.exejvdpj.exefrfxfxr.exebbhbnt.exevdppj.exetttthn.exedescription pid process target process PID 1704 wrote to memory of 4776 1704 8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe 5jddv.exe PID 1704 wrote to memory of 4776 1704 8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe 5jddv.exe PID 1704 wrote to memory of 4776 1704 8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe 5jddv.exe PID 4776 wrote to memory of 3580 4776 5jddv.exe lrlrlxr.exe PID 4776 wrote to memory of 3580 4776 5jddv.exe lrlrlxr.exe PID 4776 wrote to memory of 3580 4776 5jddv.exe lrlrlxr.exe PID 3580 wrote to memory of 4168 3580 lrlrlxr.exe tnttth.exe PID 3580 wrote to memory of 4168 3580 lrlrlxr.exe tnttth.exe PID 3580 wrote to memory of 4168 3580 lrlrlxr.exe tnttth.exe PID 4168 wrote to memory of 1268 4168 tnttth.exe 7rfrxxr.exe PID 4168 wrote to memory of 1268 4168 tnttth.exe 7rfrxxr.exe PID 4168 wrote to memory of 1268 4168 tnttth.exe 7rfrxxr.exe PID 1268 wrote to memory of 1136 1268 7rfrxxr.exe ntbbht.exe PID 1268 wrote to memory of 1136 1268 7rfrxxr.exe ntbbht.exe PID 1268 wrote to memory of 1136 1268 7rfrxxr.exe ntbbht.exe PID 1136 wrote to memory of 4320 1136 ntbbht.exe ppjjv.exe PID 1136 wrote to memory of 4320 1136 ntbbht.exe ppjjv.exe PID 1136 wrote to memory of 4320 1136 ntbbht.exe ppjjv.exe PID 4320 wrote to memory of 680 4320 ppjjv.exe lfffrxf.exe PID 4320 wrote to memory of 680 4320 ppjjv.exe lfffrxf.exe PID 4320 wrote to memory of 680 4320 ppjjv.exe lfffrxf.exe PID 680 wrote to memory of 3664 680 lfffrxf.exe hbhbbn.exe PID 680 wrote to memory of 3664 680 lfffrxf.exe hbhbbn.exe PID 680 wrote to memory of 3664 680 lfffrxf.exe hbhbbn.exe PID 3664 wrote to memory of 1960 3664 hbhbbn.exe rrfllrf.exe PID 3664 wrote to memory of 1960 3664 hbhbbn.exe rrfllrf.exe PID 3664 wrote to memory of 1960 3664 hbhbbn.exe rrfllrf.exe PID 1960 wrote to memory of 3340 1960 rrfllrf.exe tnttbb.exe PID 1960 wrote to memory of 3340 1960 rrfllrf.exe tnttbb.exe PID 1960 wrote to memory of 3340 1960 rrfllrf.exe tnttbb.exe PID 3340 wrote to memory of 864 3340 tnttbb.exe ddvvp.exe PID 3340 wrote to memory of 864 3340 tnttbb.exe ddvvp.exe PID 3340 wrote to memory of 864 3340 tnttbb.exe ddvvp.exe PID 864 wrote to memory of 1376 864 ddvvp.exe 9llrlll.exe PID 864 wrote to memory of 1376 864 ddvvp.exe 9llrlll.exe PID 864 wrote to memory of 1376 864 ddvvp.exe 9llrlll.exe PID 1376 wrote to memory of 2888 1376 9llrlll.exe hntttb.exe PID 1376 wrote to memory of 2888 1376 9llrlll.exe hntttb.exe PID 1376 wrote to memory of 2888 1376 9llrlll.exe hntttb.exe PID 2888 wrote to memory of 1044 2888 hntttb.exe 7vddd.exe PID 2888 wrote to memory of 1044 2888 hntttb.exe 7vddd.exe PID 2888 wrote to memory of 1044 2888 hntttb.exe 7vddd.exe PID 1044 wrote to memory of 548 1044 7vddd.exe llxffrl.exe PID 1044 wrote to memory of 548 1044 7vddd.exe llxffrl.exe PID 1044 wrote to memory of 548 1044 7vddd.exe llxffrl.exe PID 548 wrote to memory of 3100 548 llxffrl.exe bbntnn.exe PID 548 wrote to memory of 3100 548 llxffrl.exe bbntnn.exe PID 548 wrote to memory of 3100 548 llxffrl.exe bbntnn.exe PID 3100 wrote to memory of 3644 3100 bbntnn.exe jvdpj.exe PID 3100 wrote to memory of 3644 3100 bbntnn.exe jvdpj.exe PID 3100 wrote to memory of 3644 3100 bbntnn.exe jvdpj.exe PID 3644 wrote to memory of 4536 3644 jvdpj.exe frfxfxr.exe PID 3644 wrote to memory of 4536 3644 jvdpj.exe frfxfxr.exe PID 3644 wrote to memory of 4536 3644 jvdpj.exe frfxfxr.exe PID 4536 wrote to memory of 2704 4536 frfxfxr.exe bbhbnt.exe PID 4536 wrote to memory of 2704 4536 frfxfxr.exe bbhbnt.exe PID 4536 wrote to memory of 2704 4536 frfxfxr.exe bbhbnt.exe PID 2704 wrote to memory of 1072 2704 bbhbnt.exe vdppj.exe PID 2704 wrote to memory of 1072 2704 bbhbnt.exe vdppj.exe PID 2704 wrote to memory of 1072 2704 bbhbnt.exe vdppj.exe PID 1072 wrote to memory of 4968 1072 vdppj.exe tttthn.exe PID 1072 wrote to memory of 4968 1072 vdppj.exe tttthn.exe PID 1072 wrote to memory of 4968 1072 vdppj.exe tttthn.exe PID 4968 wrote to memory of 3908 4968 tttthn.exe tnnnnt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8ab389b7e4e99721fec4d6a60cc87460_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\5jddv.exec:\5jddv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
\??\c:\lrlrlxr.exec:\lrlrlxr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
\??\c:\tnttth.exec:\tnttth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
\??\c:\7rfrxxr.exec:\7rfrxxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
\??\c:\ntbbht.exec:\ntbbht.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\ppjjv.exec:\ppjjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
\??\c:\lfffrxf.exec:\lfffrxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\hbhbbn.exec:\hbhbbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\rrfllrf.exec:\rrfllrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\tnttbb.exec:\tnttbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
\??\c:\ddvvp.exec:\ddvvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
\??\c:\9llrlll.exec:\9llrlll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\hntttb.exec:\hntttb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\7vddd.exec:\7vddd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\llxffrl.exec:\llxffrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\bbntnn.exec:\bbntnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\jvdpj.exec:\jvdpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
\??\c:\frfxfxr.exec:\frfxfxr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\bbhbnt.exec:\bbhbnt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\vdppj.exec:\vdppj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\tttthn.exec:\tttthn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\tnnnnt.exec:\tnnnnt.exe23⤵
- Executes dropped EXE
PID:3908 -
\??\c:\vvpdj.exec:\vvpdj.exe24⤵
- Executes dropped EXE
PID:3952 -
\??\c:\ffxxxfx.exec:\ffxxxfx.exe25⤵
- Executes dropped EXE
PID:4440 -
\??\c:\hbtbbn.exec:\hbtbbn.exe26⤵
- Executes dropped EXE
PID:2860 -
\??\c:\pjppv.exec:\pjppv.exe27⤵
- Executes dropped EXE
PID:2496 -
\??\c:\lxrlflf.exec:\lxrlflf.exe28⤵
- Executes dropped EXE
PID:4048 -
\??\c:\jdjpv.exec:\jdjpv.exe29⤵
- Executes dropped EXE
PID:756 -
\??\c:\xfrlfxx.exec:\xfrlfxx.exe30⤵
- Executes dropped EXE
PID:3400 -
\??\c:\thttnn.exec:\thttnn.exe31⤵
- Executes dropped EXE
PID:1992 -
\??\c:\nhnttb.exec:\nhnttb.exe32⤵
- Executes dropped EXE
PID:1764 -
\??\c:\vpjdv.exec:\vpjdv.exe33⤵
- Executes dropped EXE
PID:4160 -
\??\c:\xffrrfl.exec:\xffrrfl.exe34⤵
- Executes dropped EXE
PID:624 -
\??\c:\httnth.exec:\httnth.exe35⤵
- Executes dropped EXE
PID:656 -
\??\c:\vvjdv.exec:\vvjdv.exe36⤵
- Executes dropped EXE
PID:4648 -
\??\c:\ffllflx.exec:\ffllflx.exe37⤵
- Executes dropped EXE
PID:4696 -
\??\c:\bhthnh.exec:\bhthnh.exe38⤵
- Executes dropped EXE
PID:4100 -
\??\c:\bnbhhh.exec:\bnbhhh.exe39⤵
- Executes dropped EXE
PID:3516 -
\??\c:\vjpdv.exec:\vjpdv.exe40⤵
- Executes dropped EXE
PID:4392 -
\??\c:\llrrrlr.exec:\llrrrlr.exe41⤵
- Executes dropped EXE
PID:860 -
\??\c:\rllllfl.exec:\rllllfl.exe42⤵
- Executes dropped EXE
PID:2352 -
\??\c:\tthbbh.exec:\tthbbh.exe43⤵
- Executes dropped EXE
PID:4208 -
\??\c:\vpvjp.exec:\vpvjp.exe44⤵
- Executes dropped EXE
PID:768 -
\??\c:\5btbnh.exec:\5btbnh.exe45⤵
- Executes dropped EXE
PID:3196 -
\??\c:\frxrlfx.exec:\frxrlfx.exe46⤵
- Executes dropped EXE
PID:3448 -
\??\c:\hhnttb.exec:\hhnttb.exe47⤵
- Executes dropped EXE
PID:4988 -
\??\c:\pdjvj.exec:\pdjvj.exe48⤵
- Executes dropped EXE
PID:2200 -
\??\c:\1lrlrrf.exec:\1lrlrrf.exe49⤵
- Executes dropped EXE
PID:3380 -
\??\c:\rrlxxxf.exec:\rrlxxxf.exe50⤵
- Executes dropped EXE
PID:2016 -
\??\c:\hbhnth.exec:\hbhnth.exe51⤵
- Executes dropped EXE
PID:3036 -
\??\c:\djjdp.exec:\djjdp.exe52⤵
- Executes dropped EXE
PID:2240 -
\??\c:\rxflrxf.exec:\rxflrxf.exe53⤵
- Executes dropped EXE
PID:4108 -
\??\c:\nnnttb.exec:\nnnttb.exe54⤵
- Executes dropped EXE
PID:2624 -
\??\c:\ntnhbh.exec:\ntnhbh.exe55⤵
- Executes dropped EXE
PID:1404 -
\??\c:\vjjjp.exec:\vjjjp.exe56⤵
- Executes dropped EXE
PID:4156 -
\??\c:\fffflll.exec:\fffflll.exe57⤵
- Executes dropped EXE
PID:4908 -
\??\c:\nhbttt.exec:\nhbttt.exe58⤵
- Executes dropped EXE
PID:1044 -
\??\c:\vjjdd.exec:\vjjdd.exe59⤵
- Executes dropped EXE
PID:2368 -
\??\c:\llfxrll.exec:\llfxrll.exe60⤵
- Executes dropped EXE
PID:2872 -
\??\c:\flxrxxf.exec:\flxrxxf.exe61⤵
- Executes dropped EXE
PID:2528 -
\??\c:\3bhthn.exec:\3bhthn.exe62⤵
- Executes dropped EXE
PID:2104 -
\??\c:\jddvp.exec:\jddvp.exe63⤵
- Executes dropped EXE
PID:1448 -
\??\c:\rrxxfrx.exec:\rrxxfrx.exe64⤵
- Executes dropped EXE
PID:2020 -
\??\c:\xlxfrfl.exec:\xlxfrfl.exe65⤵
- Executes dropped EXE
PID:4912 -
\??\c:\bbhhnb.exec:\bbhhnb.exe66⤵PID:2832
-
\??\c:\vvpjp.exec:\vvpjp.exe67⤵PID:2736
-
\??\c:\ddpvv.exec:\ddpvv.exe68⤵PID:4680
-
\??\c:\lllrxfr.exec:\lllrxfr.exe69⤵PID:3632
-
\??\c:\5htbhh.exec:\5htbhh.exe70⤵PID:1508
-
\??\c:\vjvvp.exec:\vjvvp.exe71⤵PID:2996
-
\??\c:\rlxffrr.exec:\rlxffrr.exe72⤵PID:5016
-
\??\c:\xfxlfff.exec:\xfxlfff.exe73⤵PID:2052
-
\??\c:\nbbbtb.exec:\nbbbtb.exe74⤵PID:1480
-
\??\c:\vjjdv.exec:\vjjdv.exe75⤵PID:3720
-
\??\c:\jvddp.exec:\jvddp.exe76⤵PID:4472
-
\??\c:\lfrrffl.exec:\lfrrffl.exe77⤵PID:4904
-
\??\c:\htbbbn.exec:\htbbbn.exe78⤵PID:4172
-
\??\c:\vjpjd.exec:\vjpjd.exe79⤵PID:4160
-
\??\c:\vvpjd.exec:\vvpjd.exe80⤵PID:624
-
\??\c:\rxxrxrr.exec:\rxxrxrr.exe81⤵PID:324
-
\??\c:\9nbtht.exec:\9nbtht.exe82⤵PID:1848
-
\??\c:\3pdpp.exec:\3pdpp.exe83⤵PID:2912
-
\??\c:\xrlrffr.exec:\xrlrffr.exe84⤵PID:388
-
\??\c:\nhnnnn.exec:\nhnnnn.exe85⤵PID:3516
-
\??\c:\tntnnn.exec:\tntnnn.exe86⤵PID:4392
-
\??\c:\dppjv.exec:\dppjv.exe87⤵PID:860
-
\??\c:\lrxxxrx.exec:\lrxxxrx.exe88⤵PID:3296
-
\??\c:\hnnbtn.exec:\hnnbtn.exe89⤵PID:4564
-
\??\c:\7vdvv.exec:\7vdvv.exe90⤵PID:2288
-
\??\c:\xrrrxxr.exec:\xrrrxxr.exe91⤵PID:3384
-
\??\c:\bbhnhb.exec:\bbhnhb.exe92⤵PID:2652
-
\??\c:\dpvjj.exec:\dpvjj.exe93⤵PID:680
-
\??\c:\jvvdp.exec:\jvvdp.exe94⤵PID:3004
-
\??\c:\ffrxflx.exec:\ffrxflx.exe95⤵PID:5040
-
\??\c:\nhnnnt.exec:\nhnnnt.exe96⤵PID:4716
-
\??\c:\tntnnh.exec:\tntnnh.exe97⤵PID:2016
-
\??\c:\ppppp.exec:\ppppp.exe98⤵PID:1960
-
\??\c:\fflrxxf.exec:\fflrxxf.exe99⤵PID:2196
-
\??\c:\lllfxlx.exec:\lllfxlx.exe100⤵PID:864
-
\??\c:\nhnnhn.exec:\nhnnhn.exe101⤵PID:2692
-
\??\c:\vpppp.exec:\vpppp.exe102⤵PID:1864
-
\??\c:\5jppp.exec:\5jppp.exe103⤵PID:1096
-
\??\c:\rlrllff.exec:\rlrllff.exe104⤵PID:2752
-
\??\c:\nbnnnt.exec:\nbnnnt.exe105⤵PID:3700
-
\??\c:\bbtnbt.exec:\bbtnbt.exe106⤵PID:3356
-
\??\c:\dvppp.exec:\dvppp.exe107⤵PID:3644
-
\??\c:\lrxxflr.exec:\lrxxflr.exe108⤵PID:536
-
\??\c:\tbntbt.exec:\tbntbt.exe109⤵PID:2456
-
\??\c:\jpvdj.exec:\jpvdj.exe110⤵PID:3932
-
\??\c:\xfflrxl.exec:\xfflrxl.exe111⤵PID:3872
-
\??\c:\bbhtth.exec:\bbhtth.exe112⤵PID:4248
-
\??\c:\dpddv.exec:\dpddv.exe113⤵PID:2328
-
\??\c:\djddp.exec:\djddp.exe114⤵PID:1668
-
\??\c:\tbbtth.exec:\tbbtth.exe115⤵PID:4540
-
\??\c:\jddvv.exec:\jddvv.exe116⤵PID:1508
-
\??\c:\1pvvv.exec:\1pvvv.exe117⤵PID:2496
-
\??\c:\fxfllrr.exec:\fxfllrr.exe118⤵PID:4464
-
\??\c:\tttnbb.exec:\tttnbb.exe119⤵PID:4976
-
\??\c:\hhhthb.exec:\hhhthb.exe120⤵PID:3900
-
\??\c:\pjjjj.exec:\pjjjj.exe121⤵PID:2960
-
\??\c:\lfrrfrr.exec:\lfrrfrr.exe122⤵PID:2560
-
\??\c:\btbtnt.exec:\btbtnt.exe123⤵PID:4904
-
\??\c:\vpvjj.exec:\vpvjj.exe124⤵PID:4832
-
\??\c:\rxxxfrx.exec:\rxxxfrx.exe125⤵PID:1836
-
\??\c:\hnthth.exec:\hnthth.exe126⤵PID:2404
-
\??\c:\pjppp.exec:\pjppp.exe127⤵PID:2064
-
\??\c:\lxfllrl.exec:\lxfllrl.exe128⤵PID:3784
-
\??\c:\ntbttb.exec:\ntbttb.exe129⤵PID:4396
-
\??\c:\bnhhht.exec:\bnhhht.exe130⤵PID:2924
-
\??\c:\djpdp.exec:\djpdp.exe131⤵PID:2428
-
\??\c:\rfxxfrx.exec:\rfxxfrx.exe132⤵PID:1240
-
\??\c:\btthbh.exec:\btthbh.exe133⤵PID:2728
-
\??\c:\bhntbt.exec:\bhntbt.exe134⤵PID:1268
-
\??\c:\vdvvj.exec:\vdvvj.exe135⤵PID:3584
-
\??\c:\1lffrlf.exec:\1lffrlf.exe136⤵PID:2400
-
\??\c:\rllfxff.exec:\rllfxff.exe137⤵PID:4220
-
\??\c:\pppjv.exec:\pppjv.exe138⤵PID:3804
-
\??\c:\rrlxrfl.exec:\rrlxrfl.exe139⤵PID:3376
-
\??\c:\flllfrr.exec:\flllfrr.exe140⤵PID:3904
-
\??\c:\hbbhnt.exec:\hbbhnt.exe141⤵PID:1236
-
\??\c:\jvpjj.exec:\jvpjj.exe142⤵PID:3440
-
\??\c:\rfffllr.exec:\rfffllr.exe143⤵PID:452
-
\??\c:\xxxffff.exec:\xxxffff.exe144⤵PID:3080
-
\??\c:\nnttbb.exec:\nnttbb.exe145⤵PID:4052
-
\??\c:\vdvdd.exec:\vdvdd.exe146⤵PID:4932
-
\??\c:\xfxflxl.exec:\xfxflxl.exe147⤵PID:2180
-
\??\c:\ttthbh.exec:\ttthbh.exe148⤵PID:4980
-
\??\c:\nbhhtt.exec:\nbhhtt.exe149⤵PID:4848
-
\??\c:\jdvjv.exec:\jdvjv.exe150⤵PID:4652
-
\??\c:\xrrxffx.exec:\xrrxffx.exe151⤵PID:4536
-
\??\c:\1bbbbt.exec:\1bbbbt.exe152⤵PID:1932
-
\??\c:\vjjjd.exec:\vjjjd.exe153⤵PID:4076
-
\??\c:\vvdvv.exec:\vvdvv.exe154⤵PID:3932
-
\??\c:\llxrfxl.exec:\llxrfxl.exe155⤵PID:3872
-
\??\c:\ttttnn.exec:\ttttnn.exe156⤵PID:3628
-
\??\c:\ddjjd.exec:\ddjjd.exe157⤵PID:2328
-
\??\c:\vjdvp.exec:\vjdvp.exe158⤵PID:4328
-
\??\c:\lrxxllf.exec:\lrxxllf.exe159⤵PID:2996
-
\??\c:\httthh.exec:\httthh.exe160⤵PID:4048
-
\??\c:\jvdpp.exec:\jvdpp.exe161⤵PID:2052
-
\??\c:\rrrrlll.exec:\rrrrlll.exe162⤵PID:3224
-
\??\c:\5hhhhn.exec:\5hhhhn.exe163⤵PID:1724
-
\??\c:\jpppd.exec:\jpppd.exe164⤵PID:3564
-
\??\c:\pdvdd.exec:\pdvdd.exe165⤵PID:3364
-
\??\c:\lrxxflr.exec:\lrxxflr.exe166⤵PID:3104
-
\??\c:\xrxxrxx.exec:\xrxxrxx.exe167⤵PID:4608
-
\??\c:\hthtbh.exec:\hthtbh.exe168⤵PID:2792
-
\??\c:\ppppp.exec:\ppppp.exe169⤵PID:4204
-
\??\c:\dvpvv.exec:\dvpvv.exe170⤵PID:2356
-
\??\c:\xlxlxrl.exec:\xlxlxrl.exe171⤵PID:4376
-
\??\c:\htthbn.exec:\htthbn.exe172⤵PID:3572
-
\??\c:\1nttbh.exec:\1nttbh.exe173⤵PID:2204
-
\??\c:\jvvpj.exec:\jvvpj.exe174⤵PID:4088
-
\??\c:\vpjjj.exec:\vpjjj.exe175⤵PID:2084
-
\??\c:\rrflrlf.exec:\rrflrlf.exe176⤵PID:3296
-
\??\c:\7llrxfl.exec:\7llrxfl.exe177⤵PID:1408
-
\??\c:\bbbhhn.exec:\bbbhhn.exe178⤵PID:1560
-
\??\c:\djpjd.exec:\djpjd.exe179⤵PID:3880
-
\??\c:\jddjd.exec:\jddjd.exe180⤵PID:680
-
\??\c:\rxfxrrr.exec:\rxfxrrr.exe181⤵PID:3004
-
\??\c:\htbbnb.exec:\htbbnb.exe182⤵PID:3076
-
\??\c:\nnhttt.exec:\nnhttt.exe183⤵PID:5080
-
\??\c:\7vvvv.exec:\7vvvv.exe184⤵PID:1112
-
\??\c:\rllrlfr.exec:\rllrlfr.exe185⤵PID:3080
-
\??\c:\rxrxxrx.exec:\rxrxxrx.exe186⤵PID:1000
-
\??\c:\tbhbtt.exec:\tbhbtt.exe187⤵PID:2796
-
\??\c:\nbhhnt.exec:\nbhhnt.exe188⤵PID:1344
-
\??\c:\vdvjj.exec:\vdvjj.exe189⤵PID:1352
-
\??\c:\7frrxfl.exec:\7frrxfl.exe190⤵PID:2836
-
\??\c:\rrxflxf.exec:\rrxflxf.exe191⤵PID:4912
-
\??\c:\bbnnnh.exec:\bbnnnh.exe192⤵PID:3292
-
\??\c:\pvpjd.exec:\pvpjd.exe193⤵PID:4248
-
\??\c:\1xllllr.exec:\1xllllr.exe194⤵PID:1768
-
\??\c:\flrlrxx.exec:\flrlrxx.exe195⤵PID:3060
-
\??\c:\tnthtn.exec:\tnthtn.exe196⤵PID:2860
-
\??\c:\ppjvd.exec:\ppjvd.exe197⤵PID:2496
-
\??\c:\lfxrrlf.exec:\lfxrrlf.exe198⤵PID:1480
-
\??\c:\rrlfxfr.exec:\rrlfxfr.exe199⤵PID:2052
-
\??\c:\nbbnbb.exec:\nbbnbb.exe200⤵PID:3404
-
\??\c:\hthbnh.exec:\hthbnh.exe201⤵PID:4472
-
\??\c:\1pvpj.exec:\1pvpj.exe202⤵PID:1764
-
\??\c:\lffrrrr.exec:\lffrrrr.exe203⤵PID:4172
-
\??\c:\ffffxrr.exec:\ffffxrr.exe204⤵PID:1640
-
\??\c:\bhthbt.exec:\bhthbt.exe205⤵PID:324
-
\??\c:\jjjvj.exec:\jjjvj.exe206⤵PID:1092
-
\??\c:\3rrrrxx.exec:\3rrrrxx.exe207⤵PID:2912
-
\??\c:\nhbbhn.exec:\nhbbhn.exe208⤵PID:2356
-
\??\c:\nnhnhn.exec:\nnhnhn.exe209⤵PID:4376
-
\??\c:\jvpjj.exec:\jvpjj.exe210⤵PID:4392
-
\??\c:\rlllxrx.exec:\rlllxrx.exe211⤵PID:4712
-
\??\c:\7btnht.exec:\7btnht.exe212⤵PID:4168
-
\??\c:\jjvdj.exec:\jjvdj.exe213⤵PID:3196
-
\??\c:\7ppjd.exec:\7ppjd.exe214⤵PID:4368
-
\??\c:\xxxxxfx.exec:\xxxxxfx.exe215⤵PID:4988
-
\??\c:\ttbbhh.exec:\ttbbhh.exe216⤵PID:680
-
\??\c:\dvjpp.exec:\dvjpp.exe217⤵PID:3376
-
\??\c:\ddppp.exec:\ddppp.exe218⤵PID:1816
-
\??\c:\xxlfrff.exec:\xxlfrff.exe219⤵PID:4108
-
\??\c:\hnhntn.exec:\hnhntn.exe220⤵PID:4784
-
\??\c:\ttbbbh.exec:\ttbbbh.exe221⤵PID:4932
-
\??\c:\jvjjv.exec:\jvjjv.exe222⤵PID:4580
-
\??\c:\ffxxrrr.exec:\ffxxrrr.exe223⤵PID:3644
-
\??\c:\bnnhtb.exec:\bnnhtb.exe224⤵PID:2828
-
\??\c:\bnnbht.exec:\bnnbht.exe225⤵PID:1352
-
\??\c:\pvjpd.exec:\pvjpd.exe226⤵PID:2836
-
\??\c:\rxrlrxl.exec:\rxrlrxl.exe227⤵PID:3932
-
\??\c:\7xllxfx.exec:\7xllxfx.exe228⤵PID:3872
-
\??\c:\7bhnbt.exec:\7bhnbt.exe229⤵PID:2044
-
\??\c:\3jvdp.exec:\3jvdp.exe230⤵PID:1760
-
\??\c:\rrrfxlx.exec:\rrrfxlx.exe231⤵PID:4540
-
\??\c:\fxllllf.exec:\fxllllf.exe232⤵PID:2996
-
\??\c:\hbhhhh.exec:\hbhhhh.exe233⤵PID:4464
-
\??\c:\hbhhtn.exec:\hbhhtn.exe234⤵PID:3720
-
\??\c:\jjvdv.exec:\jjvdv.exe235⤵PID:2144
-
\??\c:\lllrflr.exec:\lllrflr.exe236⤵PID:4488
-
\??\c:\llrxfrr.exec:\llrxfrr.exe237⤵PID:4688
-
\??\c:\bhthnh.exec:\bhthnh.exe238⤵PID:2648
-
\??\c:\dvpvv.exec:\dvpvv.exe239⤵PID:1568
-
\??\c:\vvpdv.exec:\vvpdv.exe240⤵PID:2768
-
\??\c:\rfrlxxl.exec:\rfrlxxl.exe241⤵PID:1340
-
\??\c:\nhtttb.exec:\nhtttb.exe242⤵PID:4100