Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 08:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exe
-
Size
76KB
-
MD5
9aa9f140fed36e6daad158c39d9d5e80
-
SHA1
b59c160b11a3a87094d92a95d81296342e8be24e
-
SHA256
2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d
-
SHA512
9f4ea372db3bac8e239bfe48fe4a5bda35255dd471768f3ba22afe7ebf0947aa28d19066c8bf019cecae09837a19128765d17c879e76417c8682916c06df3c3b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wVEJ47:ymb3NkkiQ3mdBjF+3TU2KEJ47
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/388-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3908-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4764-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4072-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1036-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2232-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3912-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3032-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1904-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-50-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4180-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1560-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3272-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1808-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4768-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1364-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2944-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3148-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4868-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4144-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1276-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1088-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
rlfxrlf.exebbhbtn.exe3bnhnn.exedjdpp.exebbhhhh.exejdvpv.exefxllfrl.exelflfxxr.exenthhtn.exevjvpd.exelrxlllf.exe1lrlrrx.exenhtnbt.exepvvdv.exelfrrlrl.exethhbtb.exedddjv.exeddjdj.exerfrlfff.exebbtbbh.exejjjdv.exellxrrfr.exenhtnbn.exevvvvv.exejjvpp.exefrfxxxx.exepdjjp.exelxxrrrf.exerrrffxx.exehnnbhh.exepdvvd.exelfrxlrl.exerrxfrxl.exevvddd.exerxxrffr.exehnntbh.exenhbbtt.exe7jdjd.exejppjv.exe7xllxxx.exerflfxxr.exebbbtnn.exeddvvj.exepjpjp.exenhtnbb.exenhnhnh.exebbtnhb.exedppjj.exevdjjv.exe1rrlffx.exehbbttn.exebtttnn.exejjjjd.exelxxlffx.exeththbn.exehntnbn.exejjjvp.exevdjdp.exexfllxxr.exenhnhhh.exevjjjd.exepdjdv.exehtbttt.exehhhttt.exepid process 4764 rlfxrlf.exe 388 bbhbtn.exe 3908 3bnhnn.exe 1036 djdpp.exe 2232 bbhhhh.exe 4620 jdvpv.exe 3912 fxllfrl.exe 1904 lflfxxr.exe 3032 nthhtn.exe 4180 vjvpd.exe 3344 lrxlllf.exe 2652 1lrlrrx.exe 1560 nhtnbt.exe 4856 pvvdv.exe 4704 lfrrlrl.exe 532 thhbtb.exe 3272 dddjv.exe 1808 ddjdj.exe 4788 rfrlfff.exe 4768 bbtbbh.exe 1364 jjjdv.exe 888 llxrrfr.exe 4796 nhtnbn.exe 3148 vvvvv.exe 2944 jjvpp.exe 4868 frfxxxx.exe 4144 pdjjp.exe 1604 lxxrrrf.exe 4004 rrrffxx.exe 1276 hnnbhh.exe 1088 pdvvd.exe 812 lfrxlrl.exe 4984 rrxfrxl.exe 4988 vvddd.exe 2168 rxxrffr.exe 4176 hnntbh.exe 3024 nhbbtt.exe 3212 7jdjd.exe 4496 jppjv.exe 2360 7xllxxx.exe 2532 rflfxxr.exe 2864 bbbtnn.exe 1744 ddvvj.exe 4564 pjpjp.exe 4636 nhtnbb.exe 4520 nhnhnh.exe 3404 bbtnhb.exe 3912 dppjj.exe 2952 vdjjv.exe 2104 1rrlffx.exe 2832 hbbttn.exe 2888 btttnn.exe 3648 jjjjd.exe 4696 lxxlffx.exe 3400 ththbn.exe 5016 hntnbn.exe 2828 jjjvp.exe 4140 vdjdp.exe 3712 xfllxxr.exe 4280 nhnhhh.exe 4376 vjjjd.exe 4548 pdjdv.exe 4952 htbttt.exe 4768 hhhttt.exe -
Processes:
resource yara_rule behavioral2/memory/388-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4764-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4072-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1036-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2232-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2232-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3912-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3032-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1904-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1560-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3272-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1808-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4768-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1364-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4868-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4144-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1276-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1088-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exerlfxrlf.exebbhbtn.exe3bnhnn.exedjdpp.exebbhhhh.exejdvpv.exefxllfrl.exelflfxxr.exenthhtn.exevjvpd.exelrxlllf.exe1lrlrrx.exenhtnbt.exepvvdv.exelfrrlrl.exethhbtb.exedddjv.exeddjdj.exerfrlfff.exebbtbbh.exejjjdv.exedescription pid process target process PID 4072 wrote to memory of 4764 4072 2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exe rlfxrlf.exe PID 4072 wrote to memory of 4764 4072 2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exe rlfxrlf.exe PID 4072 wrote to memory of 4764 4072 2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exe rlfxrlf.exe PID 4764 wrote to memory of 388 4764 rlfxrlf.exe bbhbtn.exe PID 4764 wrote to memory of 388 4764 rlfxrlf.exe bbhbtn.exe PID 4764 wrote to memory of 388 4764 rlfxrlf.exe bbhbtn.exe PID 388 wrote to memory of 3908 388 bbhbtn.exe 3bnhnn.exe PID 388 wrote to memory of 3908 388 bbhbtn.exe 3bnhnn.exe PID 388 wrote to memory of 3908 388 bbhbtn.exe 3bnhnn.exe PID 3908 wrote to memory of 1036 3908 3bnhnn.exe djdpp.exe PID 3908 wrote to memory of 1036 3908 3bnhnn.exe djdpp.exe PID 3908 wrote to memory of 1036 3908 3bnhnn.exe djdpp.exe PID 1036 wrote to memory of 2232 1036 djdpp.exe bbhhhh.exe PID 1036 wrote to memory of 2232 1036 djdpp.exe bbhhhh.exe PID 1036 wrote to memory of 2232 1036 djdpp.exe bbhhhh.exe PID 2232 wrote to memory of 4620 2232 bbhhhh.exe jdvpv.exe PID 2232 wrote to memory of 4620 2232 bbhhhh.exe jdvpv.exe PID 2232 wrote to memory of 4620 2232 bbhhhh.exe jdvpv.exe PID 4620 wrote to memory of 3912 4620 jdvpv.exe fxllfrl.exe PID 4620 wrote to memory of 3912 4620 jdvpv.exe fxllfrl.exe PID 4620 wrote to memory of 3912 4620 jdvpv.exe fxllfrl.exe PID 3912 wrote to memory of 1904 3912 fxllfrl.exe lflfxxr.exe PID 3912 wrote to memory of 1904 3912 fxllfrl.exe lflfxxr.exe PID 3912 wrote to memory of 1904 3912 fxllfrl.exe lflfxxr.exe PID 1904 wrote to memory of 3032 1904 lflfxxr.exe nthhtn.exe PID 1904 wrote to memory of 3032 1904 lflfxxr.exe nthhtn.exe PID 1904 wrote to memory of 3032 1904 lflfxxr.exe nthhtn.exe PID 3032 wrote to memory of 4180 3032 nthhtn.exe vjvpd.exe PID 3032 wrote to memory of 4180 3032 nthhtn.exe vjvpd.exe PID 3032 wrote to memory of 4180 3032 nthhtn.exe vjvpd.exe PID 4180 wrote to memory of 3344 4180 vjvpd.exe lrxlllf.exe PID 4180 wrote to memory of 3344 4180 vjvpd.exe lrxlllf.exe PID 4180 wrote to memory of 3344 4180 vjvpd.exe lrxlllf.exe PID 3344 wrote to memory of 2652 3344 lrxlllf.exe 1lrlrrx.exe PID 3344 wrote to memory of 2652 3344 lrxlllf.exe 1lrlrrx.exe PID 3344 wrote to memory of 2652 3344 lrxlllf.exe 1lrlrrx.exe PID 2652 wrote to memory of 1560 2652 1lrlrrx.exe nhtnbt.exe PID 2652 wrote to memory of 1560 2652 1lrlrrx.exe nhtnbt.exe PID 2652 wrote to memory of 1560 2652 1lrlrrx.exe nhtnbt.exe PID 1560 wrote to memory of 4856 1560 nhtnbt.exe pvvdv.exe PID 1560 wrote to memory of 4856 1560 nhtnbt.exe pvvdv.exe PID 1560 wrote to memory of 4856 1560 nhtnbt.exe pvvdv.exe PID 4856 wrote to memory of 4704 4856 pvvdv.exe lfrrlrl.exe PID 4856 wrote to memory of 4704 4856 pvvdv.exe lfrrlrl.exe PID 4856 wrote to memory of 4704 4856 pvvdv.exe lfrrlrl.exe PID 4704 wrote to memory of 532 4704 lfrrlrl.exe thhbtb.exe PID 4704 wrote to memory of 532 4704 lfrrlrl.exe thhbtb.exe PID 4704 wrote to memory of 532 4704 lfrrlrl.exe thhbtb.exe PID 532 wrote to memory of 3272 532 thhbtb.exe dddjv.exe PID 532 wrote to memory of 3272 532 thhbtb.exe dddjv.exe PID 532 wrote to memory of 3272 532 thhbtb.exe dddjv.exe PID 3272 wrote to memory of 1808 3272 dddjv.exe ddjdj.exe PID 3272 wrote to memory of 1808 3272 dddjv.exe ddjdj.exe PID 3272 wrote to memory of 1808 3272 dddjv.exe ddjdj.exe PID 1808 wrote to memory of 4788 1808 ddjdj.exe rfrlfff.exe PID 1808 wrote to memory of 4788 1808 ddjdj.exe rfrlfff.exe PID 1808 wrote to memory of 4788 1808 ddjdj.exe rfrlfff.exe PID 4788 wrote to memory of 4768 4788 rfrlfff.exe bbtbbh.exe PID 4788 wrote to memory of 4768 4788 rfrlfff.exe bbtbbh.exe PID 4788 wrote to memory of 4768 4788 rfrlfff.exe bbtbbh.exe PID 4768 wrote to memory of 1364 4768 bbtbbh.exe jjjdv.exe PID 4768 wrote to memory of 1364 4768 bbtbbh.exe jjjdv.exe PID 4768 wrote to memory of 1364 4768 bbtbbh.exe jjjdv.exe PID 1364 wrote to memory of 888 1364 jjjdv.exe llxrrfr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2148648f83cf2084431ddc17ea224b735d3978f58b584d1fef036e10537fb57d_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
\??\c:\rlfxrlf.exec:\rlfxrlf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
\??\c:\bbhbtn.exec:\bbhbtn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\3bnhnn.exec:\3bnhnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\djdpp.exec:\djdpp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
\??\c:\bbhhhh.exec:\bbhhhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\jdvpv.exec:\jdvpv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\fxllfrl.exec:\fxllfrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
\??\c:\lflfxxr.exec:\lflfxxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\nthhtn.exec:\nthhtn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\vjvpd.exec:\vjvpd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\lrxlllf.exec:\lrxlllf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\1lrlrrx.exec:\1lrlrrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\nhtnbt.exec:\nhtnbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\pvvdv.exec:\pvvdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
\??\c:\lfrrlrl.exec:\lfrrlrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\thhbtb.exec:\thhbtb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\dddjv.exec:\dddjv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
\??\c:\ddjdj.exec:\ddjdj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\rfrlfff.exec:\rfrlfff.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
\??\c:\bbtbbh.exec:\bbtbbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\jjjdv.exec:\jjjdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
\??\c:\llxrrfr.exec:\llxrrfr.exe23⤵
- Executes dropped EXE
PID:888 -
\??\c:\nhtnbn.exec:\nhtnbn.exe24⤵
- Executes dropped EXE
PID:4796 -
\??\c:\vvvvv.exec:\vvvvv.exe25⤵
- Executes dropped EXE
PID:3148 -
\??\c:\jjvpp.exec:\jjvpp.exe26⤵
- Executes dropped EXE
PID:2944 -
\??\c:\frfxxxx.exec:\frfxxxx.exe27⤵
- Executes dropped EXE
PID:4868 -
\??\c:\pdjjp.exec:\pdjjp.exe28⤵
- Executes dropped EXE
PID:4144 -
\??\c:\lxxrrrf.exec:\lxxrrrf.exe29⤵
- Executes dropped EXE
PID:1604 -
\??\c:\rrrffxx.exec:\rrrffxx.exe30⤵
- Executes dropped EXE
PID:4004 -
\??\c:\hnnbhh.exec:\hnnbhh.exe31⤵
- Executes dropped EXE
PID:1276 -
\??\c:\pdvvd.exec:\pdvvd.exe32⤵
- Executes dropped EXE
PID:1088 -
\??\c:\lfrxlrl.exec:\lfrxlrl.exe33⤵
- Executes dropped EXE
PID:812 -
\??\c:\rrxfrxl.exec:\rrxfrxl.exe34⤵
- Executes dropped EXE
PID:4984 -
\??\c:\vvddd.exec:\vvddd.exe35⤵
- Executes dropped EXE
PID:4988 -
\??\c:\rxxrffr.exec:\rxxrffr.exe36⤵
- Executes dropped EXE
PID:2168 -
\??\c:\hnntbh.exec:\hnntbh.exe37⤵
- Executes dropped EXE
PID:4176 -
\??\c:\nhbbtt.exec:\nhbbtt.exe38⤵
- Executes dropped EXE
PID:3024 -
\??\c:\7jdjd.exec:\7jdjd.exe39⤵
- Executes dropped EXE
PID:3212 -
\??\c:\jppjv.exec:\jppjv.exe40⤵
- Executes dropped EXE
PID:4496 -
\??\c:\7xllxxx.exec:\7xllxxx.exe41⤵
- Executes dropped EXE
PID:2360 -
\??\c:\rflfxxr.exec:\rflfxxr.exe42⤵
- Executes dropped EXE
PID:2532 -
\??\c:\bbbtnn.exec:\bbbtnn.exe43⤵
- Executes dropped EXE
PID:2864 -
\??\c:\ddvvj.exec:\ddvvj.exe44⤵
- Executes dropped EXE
PID:1744 -
\??\c:\pjpjp.exec:\pjpjp.exe45⤵
- Executes dropped EXE
PID:4564 -
\??\c:\nhtnbb.exec:\nhtnbb.exe46⤵
- Executes dropped EXE
PID:4636 -
\??\c:\nhnhnh.exec:\nhnhnh.exe47⤵
- Executes dropped EXE
PID:4520 -
\??\c:\bbtnhb.exec:\bbtnhb.exe48⤵
- Executes dropped EXE
PID:3404 -
\??\c:\dppjj.exec:\dppjj.exe49⤵
- Executes dropped EXE
PID:3912 -
\??\c:\vdjjv.exec:\vdjjv.exe50⤵
- Executes dropped EXE
PID:2952 -
\??\c:\1rrlffx.exec:\1rrlffx.exe51⤵
- Executes dropped EXE
PID:2104 -
\??\c:\hbbttn.exec:\hbbttn.exe52⤵
- Executes dropped EXE
PID:2832 -
\??\c:\btttnn.exec:\btttnn.exe53⤵
- Executes dropped EXE
PID:2888 -
\??\c:\jjjjd.exec:\jjjjd.exe54⤵
- Executes dropped EXE
PID:3648 -
\??\c:\lxxlffx.exec:\lxxlffx.exe55⤵
- Executes dropped EXE
PID:4696 -
\??\c:\ththbn.exec:\ththbn.exe56⤵
- Executes dropped EXE
PID:3400 -
\??\c:\hntnbn.exec:\hntnbn.exe57⤵
- Executes dropped EXE
PID:5016 -
\??\c:\jjjvp.exec:\jjjvp.exe58⤵
- Executes dropped EXE
PID:2828 -
\??\c:\vdjdp.exec:\vdjdp.exe59⤵
- Executes dropped EXE
PID:4140 -
\??\c:\xfllxxr.exec:\xfllxxr.exe60⤵
- Executes dropped EXE
PID:3712 -
\??\c:\nhnhhh.exec:\nhnhhh.exe61⤵
- Executes dropped EXE
PID:4280 -
\??\c:\vjjjd.exec:\vjjjd.exe62⤵
- Executes dropped EXE
PID:4376 -
\??\c:\pdjdv.exec:\pdjdv.exe63⤵
- Executes dropped EXE
PID:4548 -
\??\c:\htbttt.exec:\htbttt.exe64⤵
- Executes dropped EXE
PID:4952 -
\??\c:\hhhttt.exec:\hhhttt.exe65⤵
- Executes dropped EXE
PID:4768 -
\??\c:\jdvpj.exec:\jdvpj.exe66⤵PID:2248
-
\??\c:\llfxxrr.exec:\llfxxrr.exe67⤵PID:2276
-
\??\c:\xrxrllf.exec:\xrxrllf.exe68⤵PID:3752
-
\??\c:\ttbttb.exec:\ttbttb.exe69⤵PID:2868
-
\??\c:\djdpj.exec:\djdpj.exe70⤵PID:2012
-
\??\c:\jvdvj.exec:\jvdvj.exe71⤵PID:3108
-
\??\c:\bthhnt.exec:\bthhnt.exe72⤵PID:2948
-
\??\c:\7hnhhb.exec:\7hnhhb.exe73⤵PID:4936
-
\??\c:\vvppp.exec:\vvppp.exe74⤵PID:2732
-
\??\c:\7lllxrr.exec:\7lllxrr.exe75⤵PID:1308
-
\??\c:\hhnbhb.exec:\hhnbhb.exe76⤵PID:3584
-
\??\c:\hhhhhh.exec:\hhhhhh.exe77⤵PID:1852
-
\??\c:\pjjdd.exec:\pjjdd.exe78⤵PID:2220
-
\??\c:\lflfxxx.exec:\lflfxxx.exe79⤵PID:4912
-
\??\c:\bbhhbb.exec:\bbhhbb.exe80⤵PID:1492
-
\??\c:\tthhnn.exec:\tthhnn.exe81⤵PID:4244
-
\??\c:\tnhhhn.exec:\tnhhhn.exe82⤵PID:3736
-
\??\c:\9vjdd.exec:\9vjdd.exe83⤵PID:1360
-
\??\c:\3rxxrxx.exec:\3rxxrxx.exe84⤵PID:1860
-
\??\c:\5bnnnn.exec:\5bnnnn.exe85⤵PID:4568
-
\??\c:\tthhnn.exec:\tthhnn.exe86⤵PID:4496
-
\??\c:\1djjj.exec:\1djjj.exe87⤵PID:2360
-
\??\c:\5vpjv.exec:\5vpjv.exe88⤵PID:2312
-
\??\c:\rxrrflf.exec:\rxrrflf.exe89⤵PID:2864
-
\??\c:\tthhtt.exec:\tthhtt.exe90⤵PID:1744
-
\??\c:\rlfflxr.exec:\rlfflxr.exe91⤵PID:892
-
\??\c:\rxflfrf.exec:\rxflfrf.exe92⤵PID:3080
-
\??\c:\nthbbb.exec:\nthbbb.exe93⤵PID:1904
-
\??\c:\jvpvv.exec:\jvpvv.exe94⤵PID:3252
-
\??\c:\jdjjj.exec:\jdjjj.exe95⤵PID:2952
-
\??\c:\rlrxlrx.exec:\rlrxlrx.exe96⤵PID:2316
-
\??\c:\3bnnhh.exec:\3bnnhh.exe97⤵PID:1292
-
\??\c:\hnntnt.exec:\hnntnt.exe98⤵PID:4452
-
\??\c:\vpdvv.exec:\vpdvv.exe99⤵PID:2780
-
\??\c:\dpdpp.exec:\dpdpp.exe100⤵PID:1964
-
\??\c:\xrlxlrl.exec:\xrlxlrl.exe101⤵PID:2388
-
\??\c:\1hhhhn.exec:\1hhhhn.exe102⤵PID:3424
-
\??\c:\nntbtt.exec:\nntbtt.exe103⤵PID:1820
-
\??\c:\hbhntb.exec:\hbhntb.exe104⤵PID:4856
-
\??\c:\vdppj.exec:\vdppj.exe105⤵PID:4716
-
\??\c:\jjdvj.exec:\jjdvj.exe106⤵PID:3464
-
\??\c:\lxlllxx.exec:\lxlllxx.exe107⤵PID:4088
-
\??\c:\hntnbb.exec:\hntnbb.exe108⤵PID:4292
-
\??\c:\vvdjv.exec:\vvdjv.exe109⤵PID:2480
-
\??\c:\xffxllf.exec:\xffxllf.exe110⤵PID:2116
-
\??\c:\bnnhtb.exec:\bnnhtb.exe111⤵PID:556
-
\??\c:\djppj.exec:\djppj.exe112⤵PID:1696
-
\??\c:\rfllfll.exec:\rfllfll.exe113⤵PID:5068
-
\??\c:\jdpvv.exec:\jdpvv.exe114⤵PID:1212
-
\??\c:\fxffxrf.exec:\fxffxrf.exe115⤵PID:1640
-
\??\c:\hbhhbb.exec:\hbhhbb.exe116⤵PID:2012
-
\??\c:\bthhnb.exec:\bthhnb.exe117⤵PID:1020
-
\??\c:\3jjjd.exec:\3jjjd.exe118⤵PID:864
-
\??\c:\pdppv.exec:\pdppv.exe119⤵PID:4960
-
\??\c:\lfllfll.exec:\lfllfll.exe120⤵PID:3696
-
\??\c:\tnbhhn.exec:\tnbhhn.exe121⤵PID:3668
-
\??\c:\nntbnt.exec:\nntbnt.exe122⤵PID:2268
-
\??\c:\9djdj.exec:\9djdj.exe123⤵PID:3672
-
\??\c:\pjvpp.exec:\pjvpp.exe124⤵PID:1824
-
\??\c:\rrllfll.exec:\rrllfll.exe125⤵PID:5080
-
\??\c:\lxffllr.exec:\lxffllr.exe126⤵PID:4244
-
\??\c:\bhnnnt.exec:\bhnnnt.exe127⤵PID:3540
-
\??\c:\3tbbtt.exec:\3tbbtt.exe128⤵PID:2488
-
\??\c:\pppjj.exec:\pppjj.exe129⤵PID:3312
-
\??\c:\frrlfrl.exec:\frrlfrl.exe130⤵PID:3076
-
\??\c:\rllllll.exec:\rllllll.exe131⤵PID:2548
-
\??\c:\hnhhbh.exec:\hnhhbh.exe132⤵PID:1952
-
\??\c:\7tbbbh.exec:\7tbbbh.exe133⤵PID:2856
-
\??\c:\7hbttt.exec:\7hbttt.exe134⤵PID:4168
-
\??\c:\vjddv.exec:\vjddv.exe135⤵PID:1868
-
\??\c:\dvjjj.exec:\dvjjj.exe136⤵PID:3680
-
\??\c:\fllfxxx.exec:\fllfxxx.exe137⤵PID:2316
-
\??\c:\fxrrrrx.exec:\fxrrrrx.exe138⤵PID:4880
-
\??\c:\ntnhhh.exec:\ntnhhh.exe139⤵PID:4452
-
\??\c:\pvvvp.exec:\pvvvp.exe140⤵PID:1540
-
\??\c:\xrrrrfx.exec:\xrrrrfx.exe141⤵PID:1668
-
\??\c:\djpjj.exec:\djpjj.exe142⤵PID:1200
-
\??\c:\9dvdp.exec:\9dvdp.exe143⤵PID:1108
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe144⤵PID:3820
-
\??\c:\7htnhb.exec:\7htnhb.exe145⤵PID:4672
-
\??\c:\vvvpp.exec:\vvvpp.exe146⤵PID:4068
-
\??\c:\lllfffl.exec:\lllfffl.exe147⤵PID:1912
-
\??\c:\9bbttt.exec:\9bbttt.exe148⤵PID:2848
-
\??\c:\1ddpd.exec:\1ddpd.exe149⤵PID:4548
-
\??\c:\rrxrlrr.exec:\rrxrlrr.exe150⤵PID:4768
-
\??\c:\djddp.exec:\djddp.exe151⤵PID:3704
-
\??\c:\ntttth.exec:\ntttth.exe152⤵PID:2276
-
\??\c:\bbhnnn.exec:\bbhnnn.exe153⤵PID:3940
-
\??\c:\xxxfxff.exec:\xxxfxff.exe154⤵PID:2868
-
\??\c:\hbbhhn.exec:\hbbhhn.exe155⤵PID:3028
-
\??\c:\xxlfffl.exec:\xxlfffl.exe156⤵PID:2284
-
\??\c:\rrxflrx.exec:\rrxflrx.exe157⤵PID:4144
-
\??\c:\1htttb.exec:\1htttb.exe158⤵PID:4936
-
\??\c:\jpddp.exec:\jpddp.exe159⤵PID:2732
-
\??\c:\rlrrlrr.exec:\rlrrlrr.exe160⤵PID:4028
-
\??\c:\fxllxfl.exec:\fxllxfl.exe161⤵PID:3584
-
\??\c:\tthhnt.exec:\tthhnt.exe162⤵PID:2176
-
\??\c:\htbhbh.exec:\htbhbh.exe163⤵PID:2244
-
\??\c:\jjppv.exec:\jjppv.exe164⤵PID:4648
-
\??\c:\llfllrx.exec:\llfllrx.exe165⤵PID:2444
-
\??\c:\7flxfxx.exec:\7flxfxx.exe166⤵PID:4244
-
\??\c:\bbbttt.exec:\bbbttt.exe167⤵PID:4448
-
\??\c:\jdvpp.exec:\jdvpp.exe168⤵PID:2488
-
\??\c:\lfrxxlr.exec:\lfrxxlr.exe169⤵PID:3312
-
\??\c:\lrrrxfr.exec:\lrrrxfr.exe170⤵PID:4104
-
\??\c:\hhtttb.exec:\hhtttb.exe171⤵PID:2548
-
\??\c:\dvjjd.exec:\dvjjd.exe172⤵PID:1952
-
\??\c:\jpjjj.exec:\jpjjj.exe173⤵PID:2032
-
\??\c:\rxlrrff.exec:\rxlrrff.exe174⤵PID:2104
-
\??\c:\nbnnnb.exec:\nbnnnb.exe175⤵PID:2952
-
\??\c:\ppppj.exec:\ppppj.exe176⤵PID:1692
-
\??\c:\lfllrlx.exec:\lfllrlx.exe177⤵PID:3468
-
\??\c:\xlrxflr.exec:\xlrxflr.exe178⤵PID:1844
-
\??\c:\hhnnnt.exec:\hhnnnt.exe179⤵PID:5048
-
\??\c:\9vddd.exec:\9vddd.exe180⤵PID:4848
-
\??\c:\vdjjd.exec:\vdjjd.exe181⤵PID:5016
-
\??\c:\3llxxff.exec:\3llxxff.exe182⤵PID:1636
-
\??\c:\lrlrllx.exec:\lrlrllx.exe183⤵PID:868
-
\??\c:\bbttbn.exec:\bbttbn.exe184⤵PID:4152
-
\??\c:\vvdjd.exec:\vvdjd.exe185⤵PID:4172
-
\??\c:\rlflrlr.exec:\rlflrlr.exe186⤵PID:4788
-
\??\c:\xffllll.exec:\xffllll.exe187⤵PID:4376
-
\??\c:\tntnnn.exec:\tntnnn.exe188⤵PID:372
-
\??\c:\pjvvp.exec:\pjvvp.exe189⤵PID:4160
-
\??\c:\pvvvp.exec:\pvvvp.exe190⤵PID:1968
-
\??\c:\5fxfrrf.exec:\5fxfrrf.exe191⤵PID:3132
-
\??\c:\hhhbbb.exec:\hhhbbb.exe192⤵PID:2944
-
\??\c:\btnnhn.exec:\btnnhn.exe193⤵PID:5064
-
\??\c:\vvjdj.exec:\vvjdj.exe194⤵PID:1020
-
\??\c:\dddvd.exec:\dddvd.exe195⤵PID:864
-
\??\c:\frfffff.exec:\frfffff.exe196⤵PID:3516
-
\??\c:\xxxxxxx.exec:\xxxxxxx.exe197⤵PID:2732
-
\??\c:\hbbbbn.exec:\hbbbbn.exe198⤵PID:4008
-
\??\c:\dpddv.exec:\dpddv.exe199⤵PID:3888
-
\??\c:\jppjd.exec:\jppjd.exe200⤵PID:2696
-
\??\c:\7xlrllf.exec:\7xlrllf.exe201⤵PID:2348
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe202⤵PID:5080
-
\??\c:\hhthbh.exec:\hhthbh.exe203⤵PID:3024
-
\??\c:\bnthtt.exec:\bnthtt.exe204⤵PID:3540
-
\??\c:\dpddv.exec:\dpddv.exe205⤵PID:1548
-
\??\c:\djdvp.exec:\djdvp.exe206⤵PID:2360
-
\??\c:\xfxxrrr.exec:\xfxxrrr.exe207⤵PID:3312
-
\??\c:\7lllrxf.exec:\7lllrxf.exe208⤵PID:4744
-
\??\c:\hbbtnt.exec:\hbbtnt.exe209⤵PID:2548
-
\??\c:\3bhhbb.exec:\3bhhbb.exe210⤵PID:4304
-
\??\c:\vjppv.exec:\vjppv.exe211⤵PID:4188
-
\??\c:\flfffll.exec:\flfffll.exe212⤵PID:3344
-
\??\c:\frxrrrl.exec:\frxrrrl.exe213⤵PID:1692
-
\??\c:\fflllrl.exec:\fflllrl.exe214⤵PID:4216
-
\??\c:\hnbnhh.exec:\hnbnhh.exe215⤵PID:548
-
\??\c:\vvjjv.exec:\vvjjv.exe216⤵PID:4696
-
\??\c:\vdvdj.exec:\vdvdj.exe217⤵PID:640
-
\??\c:\rlrfxxf.exec:\rlrfxxf.exe218⤵PID:1972
-
\??\c:\nnttnh.exec:\nnttnh.exe219⤵PID:4228
-
\??\c:\5nbnnt.exec:\5nbnnt.exe220⤵PID:1856
-
\??\c:\vvpdp.exec:\vvpdp.exe221⤵PID:4088
-
\??\c:\pvdvp.exec:\pvdvp.exe222⤵PID:4292
-
\??\c:\rrxxxfl.exec:\rrxxxfl.exe223⤵PID:2248
-
\??\c:\xflffrl.exec:\xflffrl.exe224⤵PID:4392
-
\??\c:\nttnth.exec:\nttnth.exe225⤵PID:4796
-
\??\c:\3nbbbh.exec:\3nbbbh.exe226⤵PID:1044
-
\??\c:\vjjpj.exec:\vjjpj.exe227⤵PID:4128
-
\??\c:\vvjjj.exec:\vvjjj.exe228⤵PID:2164
-
\??\c:\lfffxfx.exec:\lfffxfx.exe229⤵PID:1168
-
\??\c:\1frxflf.exec:\1frxflf.exe230⤵PID:856
-
\??\c:\ttbbbh.exec:\ttbbbh.exe231⤵PID:1092
-
\??\c:\1ttttn.exec:\1ttttn.exe232⤵PID:4028
-
\??\c:\vvjpd.exec:\vvjpd.exe233⤵PID:1776
-
\??\c:\jvjdv.exec:\jvjdv.exe234⤵PID:2176
-
\??\c:\llfxxxr.exec:\llfxxxr.exe235⤵PID:3416
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe236⤵PID:2696
-
\??\c:\tnttbb.exec:\tnttbb.exe237⤵PID:2444
-
\??\c:\5pvpd.exec:\5pvpd.exe238⤵PID:4012
-
\??\c:\3vjdp.exec:\3vjdp.exe239⤵PID:3024
-
\??\c:\frlfflr.exec:\frlfflr.exe240⤵PID:2488
-
\??\c:\lxlxrlx.exec:\lxlxrlx.exe241⤵PID:2312
-