Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 09:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exe
-
Size
361KB
-
MD5
8a2bd3831513d8477c4acf61d2bf0c70
-
SHA1
668c84c854130bbb90ce016fa094646a21226573
-
SHA256
3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1
-
SHA512
707a270aaea949a5001ef4ea4861c437f4226cd0fe536f3ae18115af1005a425db39f716f6fdf27795699826d9780d12ac9f5e8dba85c4f6908d9fecd5a0eddb
-
SSDEEP
6144:n3C9BRIG0asYFm71m8+GdkB9yMu7N+8px7a:n3C9uYA71kSMu08px7a
Malware Config
Signatures
-
Detect Blackmoon payload 29 IoCs
Processes:
resource yara_rule behavioral2/memory/2284-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/992-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/460-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1760-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4316-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4332-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1104-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1104-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4652-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2960-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4228-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2448-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3968-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3660-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3488-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1040-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3996-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4184-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1500-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2564-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4880-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4292-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3132-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
lrrfxrl.exe3lrlllr.exejddvj.exefxlxffx.exe1frlrrf.exethnbtn.exeddppp.exehhhbbt.exexxrlllr.exe9ppjd.exexxrlxxl.exennnhbt.exedjpjj.exelxffffl.exethtnnn.exebnttnt.exepvvpj.exexlrxxfl.exetnhhhh.exedvppj.exe7thbbh.exehthbbt.exeffrlfxf.exevvppp.exelfrrrxf.exepjjjv.exerlrfxxx.exennnhbb.exevjvpj.exe3tnnhh.exedvpvj.exenhnhhh.exeddddd.exejpjjp.exerlrrrxx.exe9bbtnb.exebbhhhh.exe1pddd.exellrlfll.exexxxxflr.exetnttnn.exeppvpv.exerrxxrrr.exefffflrr.exebhtbbb.exe1dvvv.exexlrrxrl.exebhhhhb.exepdjjj.exe7jjdd.exefxlfllr.exebnnhtn.exejvdjj.exerxlrlrl.exethttbh.exettthhh.exedvddj.exelrrlxrf.exetbnnnt.exepjjdv.exedpvvv.exe3rflfff.exe7btnhh.exepjjvv.exepid process 992 lrrfxrl.exe 460 3lrlllr.exe 1760 jddvj.exe 5028 fxlxffx.exe 4660 1frlrrf.exe 4316 thnbtn.exe 4332 ddppp.exe 1104 hhhbbt.exe 4652 xxrlllr.exe 2252 9ppjd.exe 4736 xxrlxxl.exe 2960 nnnhbt.exe 4228 djpjj.exe 2448 lxffffl.exe 3968 thtnnn.exe 1040 bnttnt.exe 3488 pvvpj.exe 3660 xlrxxfl.exe 4616 tnhhhh.exe 4536 dvppj.exe 4184 7thbbh.exe 3996 hthbbt.exe 4732 ffrlfxf.exe 1500 vvppp.exe 1368 lfrrrxf.exe 2564 pjjjv.exe 4880 rlrfxxx.exe 4292 nnnhbb.exe 3556 vjvpj.exe 3132 3tnnhh.exe 1752 dvpvj.exe 3248 nhnhhh.exe 1772 ddddd.exe 4632 jpjjp.exe 3468 rlrrrxx.exe 4780 9bbtnb.exe 4360 bbhhhh.exe 1192 1pddd.exe 2508 llrlfll.exe 980 xxxxflr.exe 4916 tnttnn.exe 1668 ppvpv.exe 2136 rrxxrrr.exe 1532 fffflrr.exe 2844 bhtbbb.exe 2848 1dvvv.exe 4572 xlrrxrl.exe 5108 bhhhhb.exe 4280 pdjjj.exe 3852 7jjdd.exe 2952 fxlfllr.exe 764 bnnhtn.exe 2216 jvdjj.exe 4736 rxlrlrl.exe 2960 thttbh.exe 1548 ttthhh.exe 2836 dvddj.exe 2448 lrrlxrf.exe 3840 tbnnnt.exe 2580 pjjdv.exe 1464 dpvvv.exe 1928 3rflfff.exe 1080 7btnhh.exe 2788 pjjvv.exe -
Processes:
resource yara_rule behavioral2/memory/2284-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/992-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/460-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1760-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4660-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4316-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4332-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1104-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1104-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4652-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2960-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2448-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3968-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3660-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3488-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1040-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3996-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4184-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1500-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2564-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4880-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4292-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3132-197-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exelrrfxrl.exe3lrlllr.exejddvj.exefxlxffx.exe1frlrrf.exethnbtn.exeddppp.exehhhbbt.exexxrlllr.exe9ppjd.exexxrlxxl.exennnhbt.exedjpjj.exelxffffl.exethtnnn.exebnttnt.exepvvpj.exexlrxxfl.exetnhhhh.exedvppj.exe7thbbh.exedescription pid process target process PID 2284 wrote to memory of 992 2284 3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exe lrrfxrl.exe PID 2284 wrote to memory of 992 2284 3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exe lrrfxrl.exe PID 2284 wrote to memory of 992 2284 3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exe lrrfxrl.exe PID 992 wrote to memory of 460 992 lrrfxrl.exe 3lrlllr.exe PID 992 wrote to memory of 460 992 lrrfxrl.exe 3lrlllr.exe PID 992 wrote to memory of 460 992 lrrfxrl.exe 3lrlllr.exe PID 460 wrote to memory of 1760 460 3lrlllr.exe jddvj.exe PID 460 wrote to memory of 1760 460 3lrlllr.exe jddvj.exe PID 460 wrote to memory of 1760 460 3lrlllr.exe jddvj.exe PID 1760 wrote to memory of 5028 1760 jddvj.exe fxlxffx.exe PID 1760 wrote to memory of 5028 1760 jddvj.exe fxlxffx.exe PID 1760 wrote to memory of 5028 1760 jddvj.exe fxlxffx.exe PID 5028 wrote to memory of 4660 5028 fxlxffx.exe 1frlrrf.exe PID 5028 wrote to memory of 4660 5028 fxlxffx.exe 1frlrrf.exe PID 5028 wrote to memory of 4660 5028 fxlxffx.exe 1frlrrf.exe PID 4660 wrote to memory of 4316 4660 1frlrrf.exe thnbtn.exe PID 4660 wrote to memory of 4316 4660 1frlrrf.exe thnbtn.exe PID 4660 wrote to memory of 4316 4660 1frlrrf.exe thnbtn.exe PID 4316 wrote to memory of 4332 4316 thnbtn.exe ddppp.exe PID 4316 wrote to memory of 4332 4316 thnbtn.exe ddppp.exe PID 4316 wrote to memory of 4332 4316 thnbtn.exe ddppp.exe PID 4332 wrote to memory of 1104 4332 ddppp.exe hhhbbt.exe PID 4332 wrote to memory of 1104 4332 ddppp.exe hhhbbt.exe PID 4332 wrote to memory of 1104 4332 ddppp.exe hhhbbt.exe PID 1104 wrote to memory of 4652 1104 hhhbbt.exe xxrlllr.exe PID 1104 wrote to memory of 4652 1104 hhhbbt.exe xxrlllr.exe PID 1104 wrote to memory of 4652 1104 hhhbbt.exe xxrlllr.exe PID 4652 wrote to memory of 2252 4652 xxrlllr.exe 9ppjd.exe PID 4652 wrote to memory of 2252 4652 xxrlllr.exe 9ppjd.exe PID 4652 wrote to memory of 2252 4652 xxrlllr.exe 9ppjd.exe PID 2252 wrote to memory of 4736 2252 9ppjd.exe xxrlxxl.exe PID 2252 wrote to memory of 4736 2252 9ppjd.exe xxrlxxl.exe PID 2252 wrote to memory of 4736 2252 9ppjd.exe xxrlxxl.exe PID 4736 wrote to memory of 2960 4736 xxrlxxl.exe nnnhbt.exe PID 4736 wrote to memory of 2960 4736 xxrlxxl.exe nnnhbt.exe PID 4736 wrote to memory of 2960 4736 xxrlxxl.exe nnnhbt.exe PID 2960 wrote to memory of 4228 2960 nnnhbt.exe djpjj.exe PID 2960 wrote to memory of 4228 2960 nnnhbt.exe djpjj.exe PID 2960 wrote to memory of 4228 2960 nnnhbt.exe djpjj.exe PID 4228 wrote to memory of 2448 4228 djpjj.exe lxffffl.exe PID 4228 wrote to memory of 2448 4228 djpjj.exe lxffffl.exe PID 4228 wrote to memory of 2448 4228 djpjj.exe lxffffl.exe PID 2448 wrote to memory of 3968 2448 lxffffl.exe thtnnn.exe PID 2448 wrote to memory of 3968 2448 lxffffl.exe thtnnn.exe PID 2448 wrote to memory of 3968 2448 lxffffl.exe thtnnn.exe PID 3968 wrote to memory of 1040 3968 thtnnn.exe bnttnt.exe PID 3968 wrote to memory of 1040 3968 thtnnn.exe bnttnt.exe PID 3968 wrote to memory of 1040 3968 thtnnn.exe bnttnt.exe PID 1040 wrote to memory of 3488 1040 bnttnt.exe pvvpj.exe PID 1040 wrote to memory of 3488 1040 bnttnt.exe pvvpj.exe PID 1040 wrote to memory of 3488 1040 bnttnt.exe pvvpj.exe PID 3488 wrote to memory of 3660 3488 pvvpj.exe xlrxxfl.exe PID 3488 wrote to memory of 3660 3488 pvvpj.exe xlrxxfl.exe PID 3488 wrote to memory of 3660 3488 pvvpj.exe xlrxxfl.exe PID 3660 wrote to memory of 4616 3660 xlrxxfl.exe tnhhhh.exe PID 3660 wrote to memory of 4616 3660 xlrxxfl.exe tnhhhh.exe PID 3660 wrote to memory of 4616 3660 xlrxxfl.exe tnhhhh.exe PID 4616 wrote to memory of 4536 4616 tnhhhh.exe dvppj.exe PID 4616 wrote to memory of 4536 4616 tnhhhh.exe dvppj.exe PID 4616 wrote to memory of 4536 4616 tnhhhh.exe dvppj.exe PID 4536 wrote to memory of 4184 4536 dvppj.exe 7thbbh.exe PID 4536 wrote to memory of 4184 4536 dvppj.exe 7thbbh.exe PID 4536 wrote to memory of 4184 4536 dvppj.exe 7thbbh.exe PID 4184 wrote to memory of 3996 4184 7thbbh.exe hthbbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3139894665b6d7807050767a43b0650c16b12c611ef138bf06dc24c765b757c1_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\lrrfxrl.exec:\lrrfxrl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
\??\c:\3lrlllr.exec:\3lrlllr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:460 -
\??\c:\jddvj.exec:\jddvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
\??\c:\fxlxffx.exec:\fxlxffx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\1frlrrf.exec:\1frlrrf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\thnbtn.exec:\thnbtn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\ddppp.exec:\ddppp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332 -
\??\c:\hhhbbt.exec:\hhhbbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\xxrlllr.exec:\xxrlllr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
\??\c:\9ppjd.exec:\9ppjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\xxrlxxl.exec:\xxrlxxl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\nnnhbt.exec:\nnnhbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\djpjj.exec:\djpjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\lxffffl.exec:\lxffffl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\thtnnn.exec:\thtnnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\bnttnt.exec:\bnttnt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\pvvpj.exec:\pvvpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\xlrxxfl.exec:\xlrxxfl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
\??\c:\tnhhhh.exec:\tnhhhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\dvppj.exec:\dvppj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\7thbbh.exec:\7thbbh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
\??\c:\hthbbt.exec:\hthbbt.exe23⤵
- Executes dropped EXE
PID:3996 -
\??\c:\ffrlfxf.exec:\ffrlfxf.exe24⤵
- Executes dropped EXE
PID:4732 -
\??\c:\vvppp.exec:\vvppp.exe25⤵
- Executes dropped EXE
PID:1500 -
\??\c:\lfrrrxf.exec:\lfrrrxf.exe26⤵
- Executes dropped EXE
PID:1368 -
\??\c:\pjjjv.exec:\pjjjv.exe27⤵
- Executes dropped EXE
PID:2564 -
\??\c:\rlrfxxx.exec:\rlrfxxx.exe28⤵
- Executes dropped EXE
PID:4880 -
\??\c:\nnnhbb.exec:\nnnhbb.exe29⤵
- Executes dropped EXE
PID:4292 -
\??\c:\vjvpj.exec:\vjvpj.exe30⤵
- Executes dropped EXE
PID:3556 -
\??\c:\3tnnhh.exec:\3tnnhh.exe31⤵
- Executes dropped EXE
PID:3132 -
\??\c:\dvpvj.exec:\dvpvj.exe32⤵
- Executes dropped EXE
PID:1752 -
\??\c:\nhnhhh.exec:\nhnhhh.exe33⤵
- Executes dropped EXE
PID:3248 -
\??\c:\ddddd.exec:\ddddd.exe34⤵
- Executes dropped EXE
PID:1772 -
\??\c:\jpjjp.exec:\jpjjp.exe35⤵
- Executes dropped EXE
PID:4632 -
\??\c:\rlrrrxx.exec:\rlrrrxx.exe36⤵
- Executes dropped EXE
PID:3468 -
\??\c:\9bbtnb.exec:\9bbtnb.exe37⤵
- Executes dropped EXE
PID:4780 -
\??\c:\bbhhhh.exec:\bbhhhh.exe38⤵
- Executes dropped EXE
PID:4360 -
\??\c:\1pddd.exec:\1pddd.exe39⤵
- Executes dropped EXE
PID:1192 -
\??\c:\llrlfll.exec:\llrlfll.exe40⤵
- Executes dropped EXE
PID:2508 -
\??\c:\xxxxflr.exec:\xxxxflr.exe41⤵
- Executes dropped EXE
PID:980 -
\??\c:\tnttnn.exec:\tnttnn.exe42⤵
- Executes dropped EXE
PID:4916 -
\??\c:\ppvpv.exec:\ppvpv.exe43⤵
- Executes dropped EXE
PID:1668 -
\??\c:\rrxxrrr.exec:\rrxxrrr.exe44⤵
- Executes dropped EXE
PID:2136 -
\??\c:\fffflrr.exec:\fffflrr.exe45⤵
- Executes dropped EXE
PID:1532 -
\??\c:\bhtbbb.exec:\bhtbbb.exe46⤵
- Executes dropped EXE
PID:2844 -
\??\c:\1dvvv.exec:\1dvvv.exe47⤵
- Executes dropped EXE
PID:2848 -
\??\c:\xlrrxrl.exec:\xlrrxrl.exe48⤵
- Executes dropped EXE
PID:4572 -
\??\c:\bhhhhb.exec:\bhhhhb.exe49⤵
- Executes dropped EXE
PID:5108 -
\??\c:\pdjjj.exec:\pdjjj.exe50⤵
- Executes dropped EXE
PID:4280 -
\??\c:\7jjdd.exec:\7jjdd.exe51⤵
- Executes dropped EXE
PID:3852 -
\??\c:\fxlfllr.exec:\fxlfllr.exe52⤵
- Executes dropped EXE
PID:2952 -
\??\c:\bnnhtn.exec:\bnnhtn.exe53⤵
- Executes dropped EXE
PID:764 -
\??\c:\jvdjj.exec:\jvdjj.exe54⤵
- Executes dropped EXE
PID:2216 -
\??\c:\rxlrlrl.exec:\rxlrlrl.exe55⤵
- Executes dropped EXE
PID:4736 -
\??\c:\thttbh.exec:\thttbh.exe56⤵
- Executes dropped EXE
PID:2960 -
\??\c:\ttthhh.exec:\ttthhh.exe57⤵
- Executes dropped EXE
PID:1548 -
\??\c:\dvddj.exec:\dvddj.exe58⤵
- Executes dropped EXE
PID:2836 -
\??\c:\lrrlxrf.exec:\lrrlxrf.exe59⤵
- Executes dropped EXE
PID:2448 -
\??\c:\tbnnnt.exec:\tbnnnt.exe60⤵
- Executes dropped EXE
PID:3840 -
\??\c:\pjjdv.exec:\pjjdv.exe61⤵
- Executes dropped EXE
PID:2580 -
\??\c:\dpvvv.exec:\dpvvv.exe62⤵
- Executes dropped EXE
PID:1464 -
\??\c:\3rflfff.exec:\3rflfff.exe63⤵
- Executes dropped EXE
PID:1928 -
\??\c:\7btnhh.exec:\7btnhh.exe64⤵
- Executes dropped EXE
PID:1080 -
\??\c:\pjjvv.exec:\pjjvv.exe65⤵
- Executes dropped EXE
PID:2788 -
\??\c:\7ffxlfx.exec:\7ffxlfx.exe66⤵PID:4568
-
\??\c:\bbttnh.exec:\bbttnh.exe67⤵PID:620
-
\??\c:\vjjdv.exec:\vjjdv.exe68⤵PID:1764
-
\??\c:\ffxfxxf.exec:\ffxfxxf.exe69⤵PID:1652
-
\??\c:\htnhhb.exec:\htnhhb.exe70⤵PID:1820
-
\??\c:\vpdpv.exec:\vpdpv.exe71⤵PID:1612
-
\??\c:\3xllffx.exec:\3xllffx.exe72⤵PID:4396
-
\??\c:\btbnht.exec:\btbnht.exe73⤵PID:364
-
\??\c:\vvdvj.exec:\vvdvj.exe74⤵PID:3512
-
\??\c:\5frlxxl.exec:\5frlxxl.exe75⤵PID:4252
-
\??\c:\tnhtnh.exec:\tnhtnh.exe76⤵PID:2296
-
\??\c:\tbbnbt.exec:\tbbnbt.exe77⤵PID:492
-
\??\c:\ddjjp.exec:\ddjjp.exe78⤵PID:2812
-
\??\c:\xxxlllr.exec:\xxxlllr.exe79⤵PID:4740
-
\??\c:\dvpjd.exec:\dvpjd.exe80⤵PID:752
-
\??\c:\5vpdv.exec:\5vpdv.exe81⤵PID:2920
-
\??\c:\5rrfrrf.exec:\5rrfrrf.exe82⤵PID:4608
-
\??\c:\nnhbtt.exec:\nnhbtt.exe83⤵PID:4480
-
\??\c:\hthbhb.exec:\hthbhb.exe84⤵PID:4548
-
\??\c:\dppdv.exec:\dppdv.exe85⤵PID:5048
-
\??\c:\lffxrlf.exec:\lffxrlf.exe86⤵PID:4844
-
\??\c:\xxlfrrr.exec:\xxlfrrr.exe87⤵PID:4588
-
\??\c:\3hhbnn.exec:\3hhbnn.exe88⤵PID:1668
-
\??\c:\3vvpd.exec:\3vvpd.exe89⤵PID:5040
-
\??\c:\vjpjv.exec:\vjpjv.exe90⤵PID:4316
-
\??\c:\lfrfxrl.exec:\lfrfxrl.exe91⤵PID:3872
-
\??\c:\hhnnhh.exec:\hhnnhh.exe92⤵PID:2832
-
\??\c:\hbtnbt.exec:\hbtnbt.exe93⤵PID:1104
-
\??\c:\jppjv.exec:\jppjv.exe94⤵PID:4908
-
\??\c:\lrxrlfx.exec:\lrxrlfx.exe95⤵PID:4700
-
\??\c:\xlxllfl.exec:\xlxllfl.exe96⤵PID:2968
-
\??\c:\3nbthb.exec:\3nbthb.exe97⤵PID:3452
-
\??\c:\1pdvj.exec:\1pdvj.exe98⤵PID:1560
-
\??\c:\7ppdv.exec:\7ppdv.exe99⤵PID:2836
-
\??\c:\xxrfxrr.exec:\xxrfxrr.exe100⤵PID:2448
-
\??\c:\rffxrrr.exec:\rffxrrr.exe101⤵PID:4052
-
\??\c:\9nhbnn.exec:\9nhbnn.exe102⤵PID:2288
-
\??\c:\7ppjj.exec:\7ppjj.exe103⤵PID:4376
-
\??\c:\dppjv.exec:\dppjv.exe104⤵PID:4168
-
\??\c:\rlxrxrx.exec:\rlxrxrx.exe105⤵PID:4184
-
\??\c:\bttntb.exec:\bttntb.exe106⤵PID:496
-
\??\c:\vjjdp.exec:\vjjdp.exe107⤵PID:2108
-
\??\c:\dppjd.exec:\dppjd.exe108⤵PID:116
-
\??\c:\rrrlffx.exec:\rrrlffx.exe109⤵PID:4076
-
\??\c:\3nhbtn.exec:\3nhbtn.exe110⤵PID:572
-
\??\c:\jdpjj.exec:\jdpjj.exe111⤵PID:568
-
\??\c:\xlffrlf.exec:\xlffrlf.exe112⤵PID:544
-
\??\c:\1hbnhb.exec:\1hbnhb.exe113⤵PID:2564
-
\??\c:\dpvpd.exec:\dpvpd.exe114⤵PID:1636
-
\??\c:\frxlflf.exec:\frxlflf.exe115⤵PID:3920
-
\??\c:\9lfrfxr.exec:\9lfrfxr.exe116⤵PID:4704
-
\??\c:\nnbnht.exec:\nnbnht.exe117⤵PID:3144
-
\??\c:\hhtnbt.exec:\hhtnbt.exe118⤵PID:952
-
\??\c:\vjjdp.exec:\vjjdp.exe119⤵PID:4288
-
\??\c:\ffxrlll.exec:\ffxrlll.exe120⤵PID:956
-
\??\c:\hnthbh.exec:\hnthbh.exe121⤵PID:3464
-
\??\c:\jpvjv.exec:\jpvjv.exe122⤵PID:224
-
\??\c:\1pvjv.exec:\1pvjv.exe123⤵PID:4364
-
\??\c:\xrfrrlf.exec:\xrfrrlf.exe124⤵PID:1576
-
\??\c:\bnhtnh.exec:\bnhtnh.exe125⤵PID:4200
-
\??\c:\vpvpj.exec:\vpvpj.exe126⤵PID:5048
-
\??\c:\tnnhbt.exec:\tnnhbt.exe127⤵PID:964
-
\??\c:\7xxlllx.exec:\7xxlllx.exe128⤵PID:2136
-
\??\c:\rffxlfx.exec:\rffxlfx.exe129⤵PID:3932
-
\??\c:\3ttntn.exec:\3ttntn.exe130⤵PID:2840
-
\??\c:\pdvpp.exec:\pdvpp.exe131⤵PID:4972
-
\??\c:\vjjvj.exec:\vjjvj.exe132⤵PID:2748
-
\??\c:\frrlxrl.exec:\frrlxrl.exe133⤵PID:2832
-
\??\c:\ntbnnh.exec:\ntbnnh.exe134⤵PID:1524
-
\??\c:\bttnbt.exec:\bttnbt.exe135⤵PID:1912
-
\??\c:\jvpdd.exec:\jvpdd.exe136⤵PID:2916
-
\??\c:\xrllxrf.exec:\xrllxrf.exe137⤵PID:2960
-
\??\c:\3ffrfxr.exec:\3ffrfxr.exe138⤵PID:1180
-
\??\c:\nhthnh.exec:\nhthnh.exe139⤵PID:840
-
\??\c:\vvvpd.exec:\vvvpd.exe140⤵PID:3840
-
\??\c:\djpdp.exec:\djpdp.exe141⤵PID:3252
-
\??\c:\3rrfxrl.exec:\3rrfxrl.exe142⤵PID:1376
-
\??\c:\7hbtnh.exec:\7hbtnh.exe143⤵PID:1464
-
\??\c:\5htthh.exec:\5htthh.exe144⤵PID:448
-
\??\c:\pddvj.exec:\pddvj.exe145⤵PID:4912
-
\??\c:\flffrrf.exec:\flffrrf.exe146⤵PID:4268
-
\??\c:\fflfrfr.exec:\fflfrfr.exe147⤵PID:620
-
\??\c:\htthbb.exec:\htthbb.exe148⤵PID:64
-
\??\c:\ntbnhb.exec:\ntbnhb.exe149⤵PID:4712
-
\??\c:\vddvp.exec:\vddvp.exe150⤵PID:2684
-
\??\c:\5lrfxxl.exec:\5lrfxxl.exe151⤵PID:1612
-
\??\c:\fxxlfxf.exec:\fxxlfxf.exe152⤵PID:4396
-
\??\c:\5tnnhb.exec:\5tnnhb.exe153⤵PID:3504
-
\??\c:\1pppd.exec:\1pppd.exe154⤵PID:4252
-
\??\c:\dppdp.exec:\dppdp.exe155⤵PID:4292
-
\??\c:\xrxfrll.exec:\xrxfrll.exe156⤵PID:4792
-
\??\c:\rrxlxrx.exec:\rrxlxrx.exe157⤵PID:3184
-
\??\c:\bnhbhh.exec:\bnhbhh.exe158⤵PID:560
-
\??\c:\pddvv.exec:\pddvv.exe159⤵PID:912
-
\??\c:\pjppp.exec:\pjppp.exe160⤵PID:2920
-
\??\c:\tnnbtn.exec:\tnnbtn.exe161⤵PID:712
-
\??\c:\thnntt.exec:\thnntt.exe162⤵PID:2284
-
\??\c:\pdvjd.exec:\pdvjd.exe163⤵PID:2752
-
\??\c:\llxflrx.exec:\llxflrx.exe164⤵PID:1436
-
\??\c:\xrxflll.exec:\xrxflll.exe165⤵PID:992
-
\??\c:\tbnbhb.exec:\tbnbhb.exe166⤵PID:4916
-
\??\c:\3pvvj.exec:\3pvvj.exe167⤵PID:1532
-
\??\c:\ppvdv.exec:\ppvdv.exe168⤵PID:3156
-
\??\c:\5rfxxxf.exec:\5rfxxxf.exe169⤵PID:4744
-
\??\c:\nntnnn.exec:\nntnnn.exe170⤵PID:4072
-
\??\c:\hhhhbt.exec:\hhhhbt.exe171⤵PID:3972
-
\??\c:\jddvp.exec:\jddvp.exe172⤵PID:3440
-
\??\c:\7lllffx.exec:\7lllffx.exe173⤵PID:2984
-
\??\c:\lfxlfxr.exec:\lfxlfxr.exe174⤵PID:3924
-
\??\c:\tnbtbb.exec:\tnbtbb.exe175⤵PID:2968
-
\??\c:\bhtnnn.exec:\bhtnnn.exe176⤵PID:4508
-
\??\c:\jjjdj.exec:\jjjdj.exe177⤵PID:1480
-
\??\c:\frrfrlf.exec:\frrfrlf.exe178⤵PID:2204
-
\??\c:\1xfrffx.exec:\1xfrffx.exe179⤵PID:1720
-
\??\c:\7hhbnn.exec:\7hhbnn.exe180⤵PID:232
-
\??\c:\9pvjd.exec:\9pvjd.exe181⤵PID:4448
-
\??\c:\1jdvp.exec:\1jdvp.exe182⤵PID:4168
-
\??\c:\lxlxfrx.exec:\lxlxfrx.exe183⤵PID:2260
-
\??\c:\hhhbbb.exec:\hhhbbb.exe184⤵PID:552
-
\??\c:\bhtttn.exec:\bhtttn.exe185⤵PID:1764
-
\??\c:\vvvvp.exec:\vvvvp.exe186⤵PID:1500
-
\??\c:\7lfxrrr.exec:\7lfxrrr.exe187⤵PID:1368
-
\??\c:\xlffrxl.exec:\xlffrxl.exe188⤵PID:4712
-
\??\c:\nbnhbb.exec:\nbnhbb.exe189⤵PID:4356
-
\??\c:\tnntnn.exec:\tnntnn.exe190⤵PID:772
-
\??\c:\ppvpp.exec:\ppvpp.exe191⤵PID:4896
-
\??\c:\rfrrxxx.exec:\rfrrxxx.exe192⤵PID:2824
-
\??\c:\1frxrxx.exec:\1frxrxx.exe193⤵PID:4628
-
\??\c:\tbtttt.exec:\tbtttt.exe194⤵PID:4068
-
\??\c:\bhbttn.exec:\bhbttn.exe195⤵PID:3340
-
\??\c:\dpdvv.exec:\dpdvv.exe196⤵PID:1828
-
\??\c:\1pvvv.exec:\1pvvv.exe197⤵PID:1904
-
\??\c:\rrxrlll.exec:\rrxrlll.exe198⤵PID:752
-
\??\c:\hbhhhn.exec:\hbhhhn.exe199⤵PID:4540
-
\??\c:\hthnhh.exec:\hthnhh.exe200⤵PID:1476
-
\??\c:\9pjdj.exec:\9pjdj.exe201⤵PID:4364
-
\??\c:\5flfxxx.exec:\5flfxxx.exe202⤵PID:1236
-
\??\c:\ffllfll.exec:\ffllfll.exe203⤵PID:1204
-
\??\c:\9bbttt.exec:\9bbttt.exe204⤵PID:980
-
\??\c:\jjppd.exec:\jjppd.exe205⤵PID:3980
-
\??\c:\vpppj.exec:\vpppj.exe206⤵PID:4976
-
\??\c:\rrrrlll.exec:\rrrrlll.exe207⤵PID:1256
-
\??\c:\ffrxllr.exec:\ffrxllr.exe208⤵PID:3856
-
\??\c:\tnhhbb.exec:\tnhhbb.exe209⤵PID:3564
-
\??\c:\vvdvv.exec:\vvdvv.exe210⤵PID:4572
-
\??\c:\rrxrxrr.exec:\rrxrxrr.exe211⤵PID:1952
-
\??\c:\rfxrrxx.exec:\rfxrrxx.exe212⤵PID:1988
-
\??\c:\hhtttb.exec:\hhtttb.exe213⤵PID:3652
-
\??\c:\pdjdv.exec:\pdjdv.exe214⤵PID:1548
-
\??\c:\dpvvv.exec:\dpvvv.exe215⤵PID:2916
-
\??\c:\xrxrlrl.exec:\xrxrlrl.exe216⤵PID:3968
-
\??\c:\3hnhhn.exec:\3hnhhn.exe217⤵PID:4508
-
\??\c:\pdpjp.exec:\pdpjp.exe218⤵PID:2828
-
\??\c:\pjddj.exec:\pjddj.exe219⤵PID:4116
-
\??\c:\lffxllx.exec:\lffxllx.exe220⤵PID:3252
-
\??\c:\hnnntn.exec:\hnnntn.exe221⤵PID:1376
-
\??\c:\bhbbbb.exec:\bhbbbb.exe222⤵PID:1464
-
\??\c:\dpvpj.exec:\dpvpj.exe223⤵PID:556
-
\??\c:\5fffxrr.exec:\5fffxrr.exe224⤵PID:2260
-
\??\c:\lrxxxxf.exec:\lrxxxxf.exe225⤵PID:4268
-
\??\c:\tnnhhb.exec:\tnnhhb.exe226⤵PID:620
-
\??\c:\vvddd.exec:\vvddd.exe227⤵PID:3116
-
\??\c:\fxxrxff.exec:\fxxrxff.exe228⤵PID:3468
-
\??\c:\flrllrr.exec:\flrllrr.exe229⤵PID:1220
-
\??\c:\hnnnnh.exec:\hnnnnh.exe230⤵PID:572
-
\??\c:\9dpjp.exec:\9dpjp.exe231⤵PID:4248
-
\??\c:\frfxrll.exec:\frfxrll.exe232⤵PID:2756
-
\??\c:\ffxrrxr.exec:\ffxrrxr.exe233⤵PID:4880
-
\??\c:\ttbbbt.exec:\ttbbbt.exe234⤵PID:4600
-
\??\c:\pvpjd.exec:\pvpjd.exe235⤵PID:4064
-
\??\c:\xrxxrxr.exec:\xrxxrxr.exe236⤵PID:4120
-
\??\c:\tnhbhh.exec:\tnhbhh.exe237⤵PID:3320
-
\??\c:\hhnnnn.exec:\hhnnnn.exe238⤵PID:3412
-
\??\c:\9ddvp.exec:\9ddvp.exe239⤵PID:4596
-
\??\c:\xfrrffx.exec:\xfrrffx.exe240⤵PID:4780
-
\??\c:\7rrrlll.exec:\7rrrlll.exe241⤵PID:4900
-
\??\c:\nttbhh.exec:\nttbhh.exe242⤵PID:3696