Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 04:57
Behavioral task
behavioral1
Sample
ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe
-
Size
76KB
-
MD5
ad5b1800eb93b415db85922481b26060
-
SHA1
df1986dca1dc4e4c0cf6bbff4c229f0588f55f8f
-
SHA256
b2060952273cf03d8cc6a5567f64846ba3d3145c06f7f952dca602fdd910d8bc
-
SHA512
0fa30772e4361e7f5fcd8aa639cb516139b11c0661bb2ad4ee070986edeee37e010da3afd78c3e5a2d2c84890ab676a1b31a9148c9226ed68409f6a8b2a6491f
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8PbhnyLFWoFLAxZhMDzE871:9hOmTsF93UYfwC6GIoutz5yLpOSDR1
Malware Config
Signatures
-
Detect Blackmoon payload 42 IoCs
Processes:
resource yara_rule behavioral1/memory/2840-1-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2476-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2744-20-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2772-39-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2796-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/304-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2552-81-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2204-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2964-108-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2188-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1612-129-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1552-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1712-146-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2892-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2892-151-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2732-166-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/264-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1496-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1780-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1056-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/928-256-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/564-279-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1848-302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2744-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2768-328-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-347-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1520-391-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2884-456-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/628-463-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1220-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1832-529-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2304-540-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2428-657-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2876-712-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/564-838-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1700-863-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1484-1063-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/640-1095-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1644-1108-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2764-1162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2888-1260-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ffflrxl.exebtbnhh.exejpjvd.exelrfrlfx.exehtnhhh.exeddvjp.exerlflrfr.exetnhntb.exenhbnbb.exe7vvdp.exe1fflrrx.exerxxfxlr.exenhnthh.exe1vjpp.exelfxfflr.exehhbthh.exe7bbntb.exe1ppvj.exefxrfxlr.exefxlrflx.exe7tthtb.exe3dpdj.exe5vpvd.exerlflxrf.exetntnbb.exe7hthth.exejddvd.exerrlfflx.exe3lflrxf.exethtnnb.exejjdjv.exe1fxflxl.exe7xrflrr.exe7hbnhn.exebthhnn.exevppdj.exejjdpp.exelxxrxlx.exe9ffxxfr.exebnhntt.exejdpdv.exe7dvjj.exerlxxrxx.exerlxlrxf.exe3bhhtt.exe7bntbb.exepjvvd.exejdvpd.exefflrxll.exefxllllr.exetnbntb.exebbhnbh.exevpdjp.exefxrlxfx.exexrfflrx.exehhbthh.exennnbht.exejvvdp.exejjjvd.exelllxflx.exexlllrlr.exebtnbth.exebbtntb.exe7vpvd.exepid process 2476 ffflrxl.exe 2744 btbnhh.exe 2664 jpjvd.exe 2772 lrfrlfx.exe 2564 htnhhh.exe 2796 ddvjp.exe 304 rlflrfr.exe 2552 tnhntb.exe 2204 nhbnbb.exe 2168 7vvdp.exe 2964 1fflrrx.exe 2188 rxxfxlr.exe 1552 nhnthh.exe 1612 1vjpp.exe 1712 lfxfflr.exe 2892 hhbthh.exe 2732 7bbntb.exe 852 1ppvj.exe 1404 fxrfxlr.exe 1728 fxlrflx.exe 264 7tthtb.exe 2112 3dpdj.exe 1720 5vpvd.exe 1496 rlflxrf.exe 1780 tntnbb.exe 1248 7hthth.exe 1056 jddvd.exe 928 rrlfflx.exe 1644 3lflrxf.exe 564 thtnnb.exe 2272 jjdjv.exe 2376 1fxflxl.exe 1848 7xrflrr.exe 1588 7hbnhn.exe 1308 bthhnn.exe 2292 vppdj.exe 2744 jjdpp.exe 2768 lxxrxlx.exe 2688 9ffxxfr.exe 2680 bnhntt.exe 1316 jdpdv.exe 2912 7dvjj.exe 2780 rlxxrxx.exe 2620 rlxlrxf.exe 2552 3bhhtt.exe 2000 7bntbb.exe 1520 pjvvd.exe 3060 jdvpd.exe 2080 fflrxll.exe 2340 fxllllr.exe 2936 tnbntb.exe 1792 bbhnbh.exe 2852 vpdjp.exe 1960 fxrlxfx.exe 2960 xrfflrx.exe 1812 hhbthh.exe 2884 nnnbht.exe 628 jvvdp.exe 2020 jjjvd.exe 1220 lllxflx.exe 540 xlllrlr.exe 2296 btnbth.exe 3016 bbtntb.exe 1036 7vpvd.exe -
Processes:
resource yara_rule behavioral1/memory/2840-1-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ffflrxl.exe upx behavioral1/memory/2476-11-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\btbnhh.exe upx behavioral1/memory/2744-20-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jpjvd.exe upx behavioral1/memory/2664-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2664-31-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\lrfrlfx.exe upx behavioral1/memory/2772-39-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2664-36-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\htnhhh.exe upx C:\ddvjp.exe upx behavioral1/memory/2796-55-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlflrfr.exe upx behavioral1/memory/2796-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/304-72-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnhntb.exe upx behavioral1/memory/2552-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2552-81-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhbnbb.exe upx C:\7vvdp.exe upx behavioral1/memory/2204-91-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1fflrrx.exe upx \??\c:\rxxfxlr.exe upx behavioral1/memory/2188-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2964-108-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhnthh.exe upx behavioral1/memory/2188-118-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1vjpp.exe upx behavioral1/memory/1612-129-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1552-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1712-137-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfxfflr.exe upx C:\hhbthh.exe upx behavioral1/memory/2892-147-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1712-146-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2892-156-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7bbntb.exe upx C:\1ppvj.exe upx behavioral1/memory/2732-166-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\fxrfxlr.exe upx behavioral1/memory/1728-183-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fxlrflx.exe upx C:\7tthtb.exe upx behavioral1/memory/264-192-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3dpdj.exe upx behavioral1/memory/2112-202-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/264-201-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5vpvd.exe upx \??\c:\rlflxrf.exe upx behavioral1/memory/1496-220-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tntnbb.exe upx C:\7hthth.exe upx behavioral1/memory/1780-235-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jddvd.exe upx behavioral1/memory/1056-246-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rrlfflx.exe upx behavioral1/memory/928-256-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3lflrxf.exe upx C:\thtnnb.exe upx behavioral1/memory/564-279-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jjdjv.exe upx C:\1fxflxl.exe upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exeffflrxl.exebtbnhh.exejpjvd.exelrfrlfx.exehtnhhh.exeddvjp.exerlflrfr.exetnhntb.exenhbnbb.exe7vvdp.exe1fflrrx.exerxxfxlr.exenhnthh.exe1vjpp.exelfxfflr.exedescription pid process target process PID 2840 wrote to memory of 2476 2840 ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe ffflrxl.exe PID 2840 wrote to memory of 2476 2840 ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe ffflrxl.exe PID 2840 wrote to memory of 2476 2840 ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe ffflrxl.exe PID 2840 wrote to memory of 2476 2840 ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe ffflrxl.exe PID 2476 wrote to memory of 2744 2476 ffflrxl.exe btbnhh.exe PID 2476 wrote to memory of 2744 2476 ffflrxl.exe btbnhh.exe PID 2476 wrote to memory of 2744 2476 ffflrxl.exe btbnhh.exe PID 2476 wrote to memory of 2744 2476 ffflrxl.exe btbnhh.exe PID 2744 wrote to memory of 2664 2744 btbnhh.exe jpjvd.exe PID 2744 wrote to memory of 2664 2744 btbnhh.exe jpjvd.exe PID 2744 wrote to memory of 2664 2744 btbnhh.exe jpjvd.exe PID 2744 wrote to memory of 2664 2744 btbnhh.exe jpjvd.exe PID 2664 wrote to memory of 2772 2664 jpjvd.exe lrfrlfx.exe PID 2664 wrote to memory of 2772 2664 jpjvd.exe lrfrlfx.exe PID 2664 wrote to memory of 2772 2664 jpjvd.exe lrfrlfx.exe PID 2664 wrote to memory of 2772 2664 jpjvd.exe lrfrlfx.exe PID 2772 wrote to memory of 2564 2772 lrfrlfx.exe htnhhh.exe PID 2772 wrote to memory of 2564 2772 lrfrlfx.exe htnhhh.exe PID 2772 wrote to memory of 2564 2772 lrfrlfx.exe htnhhh.exe PID 2772 wrote to memory of 2564 2772 lrfrlfx.exe htnhhh.exe PID 2564 wrote to memory of 2796 2564 htnhhh.exe ddvjp.exe PID 2564 wrote to memory of 2796 2564 htnhhh.exe ddvjp.exe PID 2564 wrote to memory of 2796 2564 htnhhh.exe ddvjp.exe PID 2564 wrote to memory of 2796 2564 htnhhh.exe ddvjp.exe PID 2796 wrote to memory of 304 2796 ddvjp.exe rlflrfr.exe PID 2796 wrote to memory of 304 2796 ddvjp.exe rlflrfr.exe PID 2796 wrote to memory of 304 2796 ddvjp.exe rlflrfr.exe PID 2796 wrote to memory of 304 2796 ddvjp.exe rlflrfr.exe PID 304 wrote to memory of 2552 304 rlflrfr.exe tnhntb.exe PID 304 wrote to memory of 2552 304 rlflrfr.exe tnhntb.exe PID 304 wrote to memory of 2552 304 rlflrfr.exe tnhntb.exe PID 304 wrote to memory of 2552 304 rlflrfr.exe tnhntb.exe PID 2552 wrote to memory of 2204 2552 tnhntb.exe nhbnbb.exe PID 2552 wrote to memory of 2204 2552 tnhntb.exe nhbnbb.exe PID 2552 wrote to memory of 2204 2552 tnhntb.exe nhbnbb.exe PID 2552 wrote to memory of 2204 2552 tnhntb.exe nhbnbb.exe PID 2204 wrote to memory of 2168 2204 nhbnbb.exe 7vvdp.exe PID 2204 wrote to memory of 2168 2204 nhbnbb.exe 7vvdp.exe PID 2204 wrote to memory of 2168 2204 nhbnbb.exe 7vvdp.exe PID 2204 wrote to memory of 2168 2204 nhbnbb.exe 7vvdp.exe PID 2168 wrote to memory of 2964 2168 7vvdp.exe 1fflrrx.exe PID 2168 wrote to memory of 2964 2168 7vvdp.exe 1fflrrx.exe PID 2168 wrote to memory of 2964 2168 7vvdp.exe 1fflrrx.exe PID 2168 wrote to memory of 2964 2168 7vvdp.exe 1fflrrx.exe PID 2964 wrote to memory of 2188 2964 1fflrrx.exe rxxfxlr.exe PID 2964 wrote to memory of 2188 2964 1fflrrx.exe rxxfxlr.exe PID 2964 wrote to memory of 2188 2964 1fflrrx.exe rxxfxlr.exe PID 2964 wrote to memory of 2188 2964 1fflrrx.exe rxxfxlr.exe PID 2188 wrote to memory of 1552 2188 rxxfxlr.exe nhnthh.exe PID 2188 wrote to memory of 1552 2188 rxxfxlr.exe nhnthh.exe PID 2188 wrote to memory of 1552 2188 rxxfxlr.exe nhnthh.exe PID 2188 wrote to memory of 1552 2188 rxxfxlr.exe nhnthh.exe PID 1552 wrote to memory of 1612 1552 nhnthh.exe 1vjpp.exe PID 1552 wrote to memory of 1612 1552 nhnthh.exe 1vjpp.exe PID 1552 wrote to memory of 1612 1552 nhnthh.exe 1vjpp.exe PID 1552 wrote to memory of 1612 1552 nhnthh.exe 1vjpp.exe PID 1612 wrote to memory of 1712 1612 1vjpp.exe lfxfflr.exe PID 1612 wrote to memory of 1712 1612 1vjpp.exe lfxfflr.exe PID 1612 wrote to memory of 1712 1612 1vjpp.exe lfxfflr.exe PID 1612 wrote to memory of 1712 1612 1vjpp.exe lfxfflr.exe PID 1712 wrote to memory of 2892 1712 lfxfflr.exe hhbthh.exe PID 1712 wrote to memory of 2892 1712 lfxfflr.exe hhbthh.exe PID 1712 wrote to memory of 2892 1712 lfxfflr.exe hhbthh.exe PID 1712 wrote to memory of 2892 1712 lfxfflr.exe hhbthh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ad5b1800eb93b415db85922481b26060_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\ffflrxl.exec:\ffflrxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\btbnhh.exec:\btbnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\jpjvd.exec:\jpjvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\lrfrlfx.exec:\lrfrlfx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\htnhhh.exec:\htnhhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\ddvjp.exec:\ddvjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\rlflrfr.exec:\rlflrfr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:304 -
\??\c:\tnhntb.exec:\tnhntb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\nhbnbb.exec:\nhbnbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\7vvdp.exec:\7vvdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\1fflrrx.exec:\1fflrrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\rxxfxlr.exec:\rxxfxlr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\nhnthh.exec:\nhnthh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
\??\c:\1vjpp.exec:\1vjpp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\lfxfflr.exec:\lfxfflr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\hhbthh.exec:\hhbthh.exe17⤵
- Executes dropped EXE
PID:2892 -
\??\c:\7bbntb.exec:\7bbntb.exe18⤵
- Executes dropped EXE
PID:2732 -
\??\c:\1ppvj.exec:\1ppvj.exe19⤵
- Executes dropped EXE
PID:852 -
\??\c:\fxrfxlr.exec:\fxrfxlr.exe20⤵
- Executes dropped EXE
PID:1404 -
\??\c:\fxlrflx.exec:\fxlrflx.exe21⤵
- Executes dropped EXE
PID:1728 -
\??\c:\7tthtb.exec:\7tthtb.exe22⤵
- Executes dropped EXE
PID:264 -
\??\c:\3dpdj.exec:\3dpdj.exe23⤵
- Executes dropped EXE
PID:2112 -
\??\c:\5vpvd.exec:\5vpvd.exe24⤵
- Executes dropped EXE
PID:1720 -
\??\c:\rlflxrf.exec:\rlflxrf.exe25⤵
- Executes dropped EXE
PID:1496 -
\??\c:\tntnbb.exec:\tntnbb.exe26⤵
- Executes dropped EXE
PID:1780 -
\??\c:\7hthth.exec:\7hthth.exe27⤵
- Executes dropped EXE
PID:1248 -
\??\c:\jddvd.exec:\jddvd.exe28⤵
- Executes dropped EXE
PID:1056 -
\??\c:\rrlfflx.exec:\rrlfflx.exe29⤵
- Executes dropped EXE
PID:928 -
\??\c:\3lflrxf.exec:\3lflrxf.exe30⤵
- Executes dropped EXE
PID:1644 -
\??\c:\thtnnb.exec:\thtnnb.exe31⤵
- Executes dropped EXE
PID:564 -
\??\c:\jjdjv.exec:\jjdjv.exe32⤵
- Executes dropped EXE
PID:2272 -
\??\c:\1fxflxl.exec:\1fxflxl.exe33⤵
- Executes dropped EXE
PID:2376 -
\??\c:\7xrflrr.exec:\7xrflrr.exe34⤵
- Executes dropped EXE
PID:1848 -
\??\c:\7hbnhn.exec:\7hbnhn.exe35⤵
- Executes dropped EXE
PID:1588 -
\??\c:\bthhnn.exec:\bthhnn.exe36⤵
- Executes dropped EXE
PID:1308 -
\??\c:\vppdj.exec:\vppdj.exe37⤵
- Executes dropped EXE
PID:2292 -
\??\c:\jjdpp.exec:\jjdpp.exe38⤵
- Executes dropped EXE
PID:2744 -
\??\c:\lxxrxlx.exec:\lxxrxlx.exe39⤵
- Executes dropped EXE
PID:2768 -
\??\c:\9ffxxfr.exec:\9ffxxfr.exe40⤵
- Executes dropped EXE
PID:2688 -
\??\c:\bnhntt.exec:\bnhntt.exe41⤵
- Executes dropped EXE
PID:2680 -
\??\c:\jdpdv.exec:\jdpdv.exe42⤵
- Executes dropped EXE
PID:1316 -
\??\c:\7dvjj.exec:\7dvjj.exe43⤵
- Executes dropped EXE
PID:2912 -
\??\c:\rlxxrxx.exec:\rlxxrxx.exe44⤵
- Executes dropped EXE
PID:2780 -
\??\c:\rlxlrxf.exec:\rlxlrxf.exe45⤵
- Executes dropped EXE
PID:2620 -
\??\c:\3bhhtt.exec:\3bhhtt.exe46⤵
- Executes dropped EXE
PID:2552 -
\??\c:\7bntbb.exec:\7bntbb.exe47⤵
- Executes dropped EXE
PID:2000 -
\??\c:\pjvvd.exec:\pjvvd.exe48⤵
- Executes dropped EXE
PID:1520 -
\??\c:\jdvpd.exec:\jdvpd.exe49⤵
- Executes dropped EXE
PID:3060 -
\??\c:\fflrxll.exec:\fflrxll.exe50⤵
- Executes dropped EXE
PID:2080 -
\??\c:\fxllllr.exec:\fxllllr.exe51⤵
- Executes dropped EXE
PID:2340 -
\??\c:\tnbntb.exec:\tnbntb.exe52⤵
- Executes dropped EXE
PID:2936 -
\??\c:\bbhnbh.exec:\bbhnbh.exe53⤵
- Executes dropped EXE
PID:1792 -
\??\c:\vpdjp.exec:\vpdjp.exe54⤵
- Executes dropped EXE
PID:2852 -
\??\c:\fxrlxfx.exec:\fxrlxfx.exe55⤵
- Executes dropped EXE
PID:1960 -
\??\c:\xrfflrx.exec:\xrfflrx.exe56⤵
- Executes dropped EXE
PID:2960 -
\??\c:\hhbthh.exec:\hhbthh.exe57⤵
- Executes dropped EXE
PID:1812 -
\??\c:\nnnbht.exec:\nnnbht.exe58⤵
- Executes dropped EXE
PID:2884 -
\??\c:\jvvdp.exec:\jvvdp.exe59⤵
- Executes dropped EXE
PID:628 -
\??\c:\jjjvd.exec:\jjjvd.exe60⤵
- Executes dropped EXE
PID:2020 -
\??\c:\lllxflx.exec:\lllxflx.exe61⤵
- Executes dropped EXE
PID:1220 -
\??\c:\xlllrlr.exec:\xlllrlr.exe62⤵
- Executes dropped EXE
PID:540 -
\??\c:\btnbth.exec:\btnbth.exe63⤵
- Executes dropped EXE
PID:2296 -
\??\c:\bbtntb.exec:\bbtntb.exe64⤵
- Executes dropped EXE
PID:3016 -
\??\c:\7vpvd.exec:\7vpvd.exe65⤵
- Executes dropped EXE
PID:1036 -
\??\c:\vjjjp.exec:\vjjjp.exe66⤵PID:1632
-
\??\c:\lfrfxfr.exec:\lfrfxfr.exe67⤵PID:896
-
\??\c:\lfrflrx.exec:\lfrflrx.exe68⤵PID:1544
-
\??\c:\ttnthh.exec:\ttnthh.exe69⤵PID:1032
-
\??\c:\htbhtt.exec:\htbhtt.exe70⤵PID:1832
-
\??\c:\dvdpv.exec:\dvdpv.exe71⤵PID:2304
-
\??\c:\ddvdj.exec:\ddvdj.exe72⤵PID:3024
-
\??\c:\ffxffrf.exec:\ffxffrf.exe73⤵PID:1732
-
\??\c:\frflflx.exec:\frflflx.exe74⤵PID:2472
-
\??\c:\3bbnbh.exec:\3bbnbh.exe75⤵PID:2144
-
\??\c:\dvddp.exec:\dvddp.exe76⤵PID:2284
-
\??\c:\vvvvp.exec:\vvvvp.exe77⤵PID:2264
-
\??\c:\5xrllxf.exec:\5xrllxf.exe78⤵PID:856
-
\??\c:\xrrfxfr.exec:\xrrfxfr.exe79⤵PID:1684
-
\??\c:\hbhhnt.exec:\hbhhnt.exe80⤵PID:2480
-
\??\c:\hbnntt.exec:\hbnntt.exe81⤵PID:2344
-
\??\c:\jdvvp.exec:\jdvvp.exe82⤵PID:2700
-
\??\c:\vpdpp.exec:\vpdpp.exe83⤵PID:3000
-
\??\c:\rrlllrx.exec:\rrlllrx.exe84⤵PID:2684
-
\??\c:\9frlffl.exec:\9frlffl.exe85⤵PID:2808
-
\??\c:\ntbbbn.exec:\ntbbbn.exe86⤵PID:2584
-
\??\c:\7nbnbb.exec:\7nbnbb.exe87⤵PID:1316
-
\??\c:\vjvvj.exec:\vjvvj.exe88⤵PID:2556
-
\??\c:\pdvdj.exec:\pdvdj.exe89⤵PID:2780
-
\??\c:\1xrlrlr.exec:\1xrlrlr.exe90⤵PID:2428
-
\??\c:\9fxrxfl.exec:\9fxrxfl.exe91⤵PID:860
-
\??\c:\hbnntt.exec:\hbnntt.exe92⤵PID:2940
-
\??\c:\ttbbtt.exec:\ttbbtt.exe93⤵PID:2088
-
\??\c:\jdjpp.exec:\jdjpp.exe94⤵PID:3068
-
\??\c:\vpdvj.exec:\vpdvj.exe95⤵PID:2080
-
\??\c:\xrxfrrl.exec:\xrxfrrl.exe96⤵PID:2340
-
\??\c:\xrfrflx.exec:\xrfrflx.exe97⤵PID:1608
-
\??\c:\9hbtbb.exec:\9hbtbb.exe98⤵PID:2624
-
\??\c:\hhtntb.exec:\hhtntb.exe99⤵PID:2876
-
\??\c:\dvjpv.exec:\dvjpv.exe100⤵PID:2860
-
\??\c:\lflrflx.exec:\lflrflx.exe101⤵PID:532
-
\??\c:\tnbnhh.exec:\tnbnhh.exe102⤵PID:1192
-
\??\c:\7hbntb.exec:\7hbntb.exe103⤵PID:852
-
\??\c:\ddvjp.exec:\ddvjp.exe104⤵PID:2052
-
\??\c:\jvpjp.exec:\jvpjp.exe105⤵PID:2064
-
\??\c:\9lfrxlr.exec:\9lfrxlr.exe106⤵PID:672
-
\??\c:\xrrxflr.exec:\xrrxflr.exe107⤵PID:2276
-
\??\c:\hbnhbh.exec:\hbnhbh.exe108⤵PID:264
-
\??\c:\3bttth.exec:\3bttth.exe109⤵PID:2028
-
\??\c:\vvpvj.exec:\vvpvj.exe110⤵PID:908
-
\??\c:\9dvdp.exec:\9dvdp.exe111⤵PID:576
-
\??\c:\lxlrrxf.exec:\lxlrrxf.exe112⤵PID:1160
-
\??\c:\7fxfrrf.exec:\7fxfrrf.exe113⤵PID:820
-
\??\c:\hhbtnb.exec:\hhbtnb.exe114⤵PID:1248
-
\??\c:\pdvvd.exec:\pdvvd.exe115⤵PID:640
-
\??\c:\vpjpv.exec:\vpjpv.exe116⤵PID:2368
-
\??\c:\xrffrrx.exec:\xrffrrx.exe117⤵PID:1964
-
\??\c:\lfxlffl.exec:\lfxlffl.exe118⤵PID:2364
-
\??\c:\5xrfrxl.exec:\5xrfrxl.exe119⤵PID:564
-
\??\c:\bnhttb.exec:\bnhttb.exe120⤵PID:1744
-
\??\c:\dvjpv.exec:\dvjpv.exe121⤵PID:2456
-
\??\c:\vjpvv.exec:\vjpvv.exe122⤵PID:1924
-
\??\c:\9jpdp.exec:\9jpdp.exe123⤵PID:1700
-
\??\c:\frfrxxl.exec:\frfrxxl.exe124⤵PID:1588
-
\??\c:\rfrlxxl.exec:\rfrlxxl.exe125⤵PID:2300
-
\??\c:\nhbnhh.exec:\nhbnhh.exe126⤵PID:2360
-
\??\c:\9nhhht.exec:\9nhhht.exe127⤵PID:2828
-
\??\c:\dvppd.exec:\dvppd.exe128⤵PID:2712
-
\??\c:\xllfllr.exec:\xllfllr.exe129⤵PID:2096
-
\??\c:\9xxlrfl.exec:\9xxlrfl.exe130⤵PID:2808
-
\??\c:\llfrrxx.exec:\llfrrxx.exe131⤵PID:2880
-
\??\c:\bbnthn.exec:\bbnthn.exe132⤵PID:1316
-
\??\c:\thtbbb.exec:\thtbbb.exe133⤵PID:2560
-
\??\c:\jvvdj.exec:\jvvdj.exe134⤵PID:2780
-
\??\c:\1pjjj.exec:\1pjjj.exe135⤵PID:2348
-
\??\c:\9lxllrl.exec:\9lxllrl.exe136⤵PID:2000
-
\??\c:\nnthhh.exec:\nnthhh.exe137⤵PID:2916
-
\??\c:\htthbh.exec:\htthbh.exe138⤵PID:3064
-
\??\c:\pjdvj.exec:\pjdvj.exe139⤵PID:3060
-
\??\c:\jjvjv.exec:\jjvjv.exe140⤵PID:2080
-
\??\c:\lrrxlfx.exec:\lrrxlfx.exe141⤵PID:2208
-
\??\c:\9rllflx.exec:\9rllflx.exe142⤵PID:1608
-
\??\c:\1hthnt.exec:\1hthnt.exe143⤵PID:1792
-
\??\c:\hbnttb.exec:\hbnttb.exe144⤵PID:2876
-
\??\c:\bthhhh.exec:\bthhhh.exe145⤵PID:2908
-
\??\c:\vjdjv.exec:\vjdjv.exe146⤵PID:532
-
\??\c:\1lflxxf.exec:\1lflxxf.exe147⤵PID:1604
-
\??\c:\1frxfrx.exec:\1frxfrx.exe148⤵PID:1280
-
\??\c:\hbbbbb.exec:\hbbbbb.exe149⤵PID:2052
-
\??\c:\nnhhnt.exec:\nnhhnt.exe150⤵PID:684
-
\??\c:\7pjvd.exec:\7pjvd.exe151⤵PID:2100
-
\??\c:\dpppd.exec:\dpppd.exe152⤵PID:2740
-
\??\c:\ddvpd.exec:\ddvpd.exe153⤵PID:1004
-
\??\c:\fxrrlxf.exec:\fxrrlxf.exe154⤵PID:1040
-
\??\c:\rfrxxfl.exec:\rfrxxfl.exe155⤵PID:1856
-
\??\c:\5btbhn.exec:\5btbhn.exe156⤵PID:1484
-
\??\c:\btntbb.exec:\btntbb.exe157⤵PID:956
-
\??\c:\1pjpd.exec:\1pjpd.exe158⤵PID:1060
-
\??\c:\dvpdv.exec:\dvpdv.exe159⤵PID:916
-
\??\c:\rrrxlrl.exec:\rrrxlrl.exe160⤵PID:640
-
\??\c:\lrlfrrx.exec:\lrlfrrx.exe161⤵PID:1992
-
\??\c:\bbthth.exec:\bbthth.exe162⤵PID:1644
-
\??\c:\nbnthn.exec:\nbnthn.exe163⤵PID:1932
-
\??\c:\ddvdd.exec:\ddvdd.exe164⤵PID:2144
-
\??\c:\jdvdd.exec:\jdvdd.exe165⤵PID:2284
-
\??\c:\rlfrlxf.exec:\rlfrlxf.exe166⤵PID:2456
-
\??\c:\5lrxflx.exec:\5lrxflx.exe167⤵PID:2196
-
\??\c:\tnnbhn.exec:\tnnbhn.exe168⤵PID:1700
-
\??\c:\nnbnhn.exec:\nnbnhn.exe169⤵PID:2004
-
\??\c:\pjdjv.exec:\pjdjv.exe170⤵PID:2696
-
\??\c:\pjjdj.exec:\pjjdj.exe171⤵PID:2832
-
\??\c:\lflflrx.exec:\lflflrx.exe172⤵PID:2764
-
\??\c:\flrxrlx.exec:\flrxrlx.exe173⤵PID:2380
-
\??\c:\bbnhbh.exec:\bbnhbh.exe174⤵PID:2844
-
\??\c:\bthnbh.exec:\bthnbh.exe175⤵PID:2564
-
\??\c:\jvddd.exec:\jvddd.exe176⤵PID:2600
-
\??\c:\jddjp.exec:\jddjp.exe177⤵PID:1928
-
\??\c:\7rfxflr.exec:\7rfxflr.exe178⤵PID:2676
-
\??\c:\fxrfxlr.exec:\fxrfxlr.exe179⤵PID:2552
-
\??\c:\tnbbbb.exec:\tnbbbb.exe180⤵PID:2544
-
\??\c:\nhnntt.exec:\nhnntt.exe181⤵PID:2932
-
\??\c:\jvpvj.exec:\jvpvj.exe182⤵PID:2044
-
\??\c:\ddvdj.exec:\ddvdj.exe183⤵PID:2008
-
\??\c:\9xlfrrr.exec:\9xlfrrr.exe184⤵PID:2188
-
\??\c:\rlfrrxx.exec:\rlfrrxx.exe185⤵PID:2616
-
\??\c:\hhthnn.exec:\hhthnn.exe186⤵PID:796
-
\??\c:\7nnbhb.exec:\7nnbhb.exe187⤵PID:2888
-
\??\c:\7vvpj.exec:\7vvpj.exe188⤵PID:2852
-
\??\c:\pjjvv.exec:\pjjvv.exe189⤵PID:1804
-
\??\c:\lfrxlxf.exec:\lfrxlxf.exe190⤵PID:1444
-
\??\c:\rlxrllx.exec:\rlxrllx.exe191⤵PID:1432
-
\??\c:\hbbhtt.exec:\hbbhtt.exe192⤵PID:2884
-
\??\c:\btnbnb.exec:\btnbnb.exe193⤵PID:2148
-
\??\c:\vpddd.exec:\vpddd.exe194⤵PID:2528
-
\??\c:\7pdvv.exec:\7pdvv.exe195⤵PID:1956
-
\??\c:\fxlxrfr.exec:\fxlxrfr.exe196⤵PID:1680
-
\??\c:\1fxxxfl.exec:\1fxxxfl.exe197⤵PID:2112
-
\??\c:\nhnbhn.exec:\nhnbhn.exe198⤵PID:2920
-
\??\c:\ppjpp.exec:\ppjpp.exe199⤵PID:1724
-
\??\c:\fxrlxlf.exec:\fxrlxlf.exe200⤵PID:1860
-
\??\c:\3xrxlrx.exec:\3xrxlrx.exe201⤵PID:1780
-
\??\c:\hhttbt.exec:\hhttbt.exe202⤵PID:1784
-
\??\c:\ttnbhn.exec:\ttnbhn.exe203⤵PID:1824
-
\??\c:\dvjdj.exec:\dvjdj.exe204⤵PID:2420
-
\??\c:\pdjjp.exec:\pdjjp.exe205⤵PID:1936
-
\??\c:\rlxxrlr.exec:\rlxxrlr.exe206⤵PID:2368
-
\??\c:\thtbnb.exec:\thtbnb.exe207⤵PID:1708
-
\??\c:\dvpdj.exec:\dvpdj.exe208⤵PID:2364
-
\??\c:\1pjjj.exec:\1pjjj.exe209⤵PID:2272
-
\??\c:\7xrlrlr.exec:\7xrlrlr.exe210⤵PID:2460
-
\??\c:\xlfxlrr.exec:\xlfxlrr.exe211⤵PID:1264
-
\??\c:\thhbhb.exec:\thhbhb.exe212⤵PID:1924
-
\??\c:\bthtbh.exec:\bthtbh.exe213⤵PID:2416
-
\??\c:\vpjvj.exec:\vpjvj.exe214⤵PID:2972
-
\??\c:\jdjjp.exec:\jdjjp.exe215⤵PID:2744
-
\??\c:\xllrfll.exec:\xllrfll.exe216⤵PID:2708
-
\??\c:\xrflrxx.exec:\xrflrxx.exe217⤵PID:2688
-
\??\c:\7tnhnn.exec:\7tnhnn.exe218⤵PID:2680
-
\??\c:\5tnbth.exec:\5tnbth.exe219⤵PID:2580
-
\??\c:\1dvjp.exec:\1dvjp.exe220⤵PID:2612
-
\??\c:\jvpvp.exec:\jvpvp.exe221⤵PID:2568
-
\??\c:\xrfffxf.exec:\xrfffxf.exe222⤵PID:1640
-
\??\c:\fxlfffl.exec:\fxlfffl.exe223⤵PID:2620
-
\??\c:\bnttbh.exec:\bnttbh.exe224⤵PID:1648
-
\??\c:\5ththn.exec:\5ththn.exe225⤵PID:1096
-
\??\c:\1vpjj.exec:\1vpjj.exe226⤵PID:1596
-
\??\c:\1ddjj.exec:\1ddjj.exe227⤵PID:2896
-
\??\c:\3xlfxrr.exec:\3xlfxrr.exe228⤵PID:1996
-
\??\c:\lfrlrrx.exec:\lfrlrrx.exe229⤵PID:2936
-
\??\c:\thnbbb.exec:\thnbbb.exe230⤵PID:2616
-
\??\c:\btnbhn.exec:\btnbhn.exe231⤵PID:1616
-
\??\c:\pdpvv.exec:\pdpvv.exe232⤵PID:2868
-
\??\c:\jjjjj.exec:\jjjjj.exe233⤵PID:2892
-
\??\c:\jvppp.exec:\jvppp.exe234⤵PID:1916
-
\??\c:\lxllrlr.exec:\lxllrlr.exe235⤵PID:1512
-
\??\c:\rfrxlrx.exec:\rfrxlrx.exe236⤵PID:1812
-
\??\c:\bnbhtt.exec:\bnbhtt.exe237⤵PID:316
-
\??\c:\nbbtbb.exec:\nbbtbb.exe238⤵PID:1240
-
\??\c:\jdppp.exec:\jdppp.exe239⤵PID:2060
-
\??\c:\jvjvj.exec:\jvjvj.exe240⤵PID:3012
-
\??\c:\ffrfxlx.exec:\ffrfxlx.exe241⤵PID:1300
-