Analysis
-
max time kernel
149s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 13:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exe
-
Size
63KB
-
MD5
253e3214d0f06ef4374eba8811696c30
-
SHA1
4d01b7cd8ab1ede7a7b43a74b4e8c7ac4b37284b
-
SHA256
57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae
-
SHA512
b2f4c785ee2ca566f884662ac3e2e4b87b223e205d44fb206ef4f90c9ab5e300efef4b6dc1412f173353fe3247ca287945624c1b96bc04e96cb6efaef22d0dc3
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6Mu/ePS3A1:ymb3NkkiQ3mdBjFI46TQ1
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/1780-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1840-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2180-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/884-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4344-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/348-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/744-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4064-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3664-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3944-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2032-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3524-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3060-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2096-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4812-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1788-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4648-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1584-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1088-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2104-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/764-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2660-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2308-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
rrxxrxx.exebntbbb.exehbbtnn.exevdvpj.exefxxxrxx.exerrxfxxl.exebbhhht.exe1ddvp.exe1lrrlll.exeffrrxfx.exehnbbbb.exedvjjd.exepdjjj.exexrlrxrf.exe5bhbbh.exebthbhh.exeppjjj.exe1jppp.exe9xxlfxl.exe9nnnnb.exevvvvj.exexxrlrrr.exerrrrrrr.exenbhhbb.exedjdjj.exelrfxfxx.exerlrrlrr.exetnnnhn.exennbnnn.exe5dddv.exelxrxfrx.exebbbbbh.exejvddv.exefllfxll.exehbtbbh.exetthbbb.exedvddd.exeppdjd.exerlffxxx.exellrrrll.exetnbbhn.exetbttbb.exevpjvp.exe1dpjd.exerflfrxx.exeffrrrxf.exetnnnhn.exettbhbn.exeddjjv.exepjjpj.exe9jddd.exexxlflll.exebbnnhn.exe3btbtb.exe5jjjd.exevpvvp.exeflrlrxr.exelrrrlrl.exebbbntt.exehttbtb.exeppjjj.exe3pdvp.exevpvpp.exerllxrrr.exepid process 1648 rrxxrxx.exe 1840 bntbbb.exe 2180 hbbtnn.exe 884 vdvpj.exe 4344 fxxxrxx.exe 348 rrxfxxl.exe 3268 bbhhht.exe 744 1ddvp.exe 4616 1lrrlll.exe 4064 ffrrxfx.exe 3664 hnbbbb.exe 3944 dvjjd.exe 2032 pdjjj.exe 3524 xrlrxrf.exe 3060 5bhbbh.exe 2096 bthbhh.exe 4812 ppjjj.exe 1788 1jppp.exe 2408 9xxlfxl.exe 4648 9nnnnb.exe 1584 vvvvj.exe 1088 xxrlrrr.exe 2552 rrrrrrr.exe 2104 nbhhbb.exe 2404 djdjj.exe 4652 lrfxfxx.exe 764 rlrrlrr.exe 2660 tnnnhn.exe 4612 nnbnnn.exe 2308 5dddv.exe 4524 lxrxfrx.exe 4824 bbbbbh.exe 1376 jvddv.exe 2432 fllfxll.exe 2852 hbtbbh.exe 4668 tthbbb.exe 4536 dvddd.exe 1720 ppdjd.exe 2188 rlffxxx.exe 3400 llrrrll.exe 208 tnbbhn.exe 2168 tbttbb.exe 4588 vpjvp.exe 2360 1dpjd.exe 4780 rflfrxx.exe 1316 ffrrrxf.exe 3860 tnnnhn.exe 2900 ttbhbn.exe 4296 ddjjv.exe 4356 pjjpj.exe 4416 9jddd.exe 2616 xxlflll.exe 3444 bbnnhn.exe 456 3btbtb.exe 4624 5jjjd.exe 3932 vpvvp.exe 3256 flrlrxr.exe 3016 lrrrlrl.exe 1640 bbbntt.exe 3728 httbtb.exe 1816 ppjjj.exe 3424 3pdvp.exe 760 vpvpp.exe 4168 rllxrrr.exe -
Processes:
resource yara_rule behavioral2/memory/1780-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1840-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2180-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/884-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/348-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/744-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4064-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3664-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3944-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2032-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3524-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3060-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1788-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4648-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1584-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1088-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2104-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/764-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2660-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2308-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exerrxxrxx.exebntbbb.exehbbtnn.exevdvpj.exefxxxrxx.exerrxfxxl.exebbhhht.exe1ddvp.exe1lrrlll.exeffrrxfx.exehnbbbb.exedvjjd.exepdjjj.exexrlrxrf.exe5bhbbh.exebthbhh.exeppjjj.exe1jppp.exe9xxlfxl.exe9nnnnb.exevvvvj.exedescription pid process target process PID 1780 wrote to memory of 1648 1780 57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exe rrxxrxx.exe PID 1780 wrote to memory of 1648 1780 57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exe rrxxrxx.exe PID 1780 wrote to memory of 1648 1780 57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exe rrxxrxx.exe PID 1648 wrote to memory of 1840 1648 rrxxrxx.exe bntbbb.exe PID 1648 wrote to memory of 1840 1648 rrxxrxx.exe bntbbb.exe PID 1648 wrote to memory of 1840 1648 rrxxrxx.exe bntbbb.exe PID 1840 wrote to memory of 2180 1840 bntbbb.exe hbbtnn.exe PID 1840 wrote to memory of 2180 1840 bntbbb.exe hbbtnn.exe PID 1840 wrote to memory of 2180 1840 bntbbb.exe hbbtnn.exe PID 2180 wrote to memory of 884 2180 hbbtnn.exe vdvpj.exe PID 2180 wrote to memory of 884 2180 hbbtnn.exe vdvpj.exe PID 2180 wrote to memory of 884 2180 hbbtnn.exe vdvpj.exe PID 884 wrote to memory of 4344 884 vdvpj.exe fxxxrxx.exe PID 884 wrote to memory of 4344 884 vdvpj.exe fxxxrxx.exe PID 884 wrote to memory of 4344 884 vdvpj.exe fxxxrxx.exe PID 4344 wrote to memory of 348 4344 fxxxrxx.exe rrxfxxl.exe PID 4344 wrote to memory of 348 4344 fxxxrxx.exe rrxfxxl.exe PID 4344 wrote to memory of 348 4344 fxxxrxx.exe rrxfxxl.exe PID 348 wrote to memory of 3268 348 rrxfxxl.exe bbhhht.exe PID 348 wrote to memory of 3268 348 rrxfxxl.exe bbhhht.exe PID 348 wrote to memory of 3268 348 rrxfxxl.exe bbhhht.exe PID 3268 wrote to memory of 744 3268 bbhhht.exe 1ddvp.exe PID 3268 wrote to memory of 744 3268 bbhhht.exe 1ddvp.exe PID 3268 wrote to memory of 744 3268 bbhhht.exe 1ddvp.exe PID 744 wrote to memory of 4616 744 1ddvp.exe 1lrrlll.exe PID 744 wrote to memory of 4616 744 1ddvp.exe 1lrrlll.exe PID 744 wrote to memory of 4616 744 1ddvp.exe 1lrrlll.exe PID 4616 wrote to memory of 4064 4616 1lrrlll.exe ffrrxfx.exe PID 4616 wrote to memory of 4064 4616 1lrrlll.exe ffrrxfx.exe PID 4616 wrote to memory of 4064 4616 1lrrlll.exe ffrrxfx.exe PID 4064 wrote to memory of 3664 4064 ffrrxfx.exe hnbbbb.exe PID 4064 wrote to memory of 3664 4064 ffrrxfx.exe hnbbbb.exe PID 4064 wrote to memory of 3664 4064 ffrrxfx.exe hnbbbb.exe PID 3664 wrote to memory of 3944 3664 hnbbbb.exe dvjjd.exe PID 3664 wrote to memory of 3944 3664 hnbbbb.exe dvjjd.exe PID 3664 wrote to memory of 3944 3664 hnbbbb.exe dvjjd.exe PID 3944 wrote to memory of 2032 3944 dvjjd.exe pdjjj.exe PID 3944 wrote to memory of 2032 3944 dvjjd.exe pdjjj.exe PID 3944 wrote to memory of 2032 3944 dvjjd.exe pdjjj.exe PID 2032 wrote to memory of 3524 2032 pdjjj.exe xrlrxrf.exe PID 2032 wrote to memory of 3524 2032 pdjjj.exe xrlrxrf.exe PID 2032 wrote to memory of 3524 2032 pdjjj.exe xrlrxrf.exe PID 3524 wrote to memory of 3060 3524 xrlrxrf.exe 5bhbbh.exe PID 3524 wrote to memory of 3060 3524 xrlrxrf.exe 5bhbbh.exe PID 3524 wrote to memory of 3060 3524 xrlrxrf.exe 5bhbbh.exe PID 3060 wrote to memory of 2096 3060 5bhbbh.exe bthbhh.exe PID 3060 wrote to memory of 2096 3060 5bhbbh.exe bthbhh.exe PID 3060 wrote to memory of 2096 3060 5bhbbh.exe bthbhh.exe PID 2096 wrote to memory of 4812 2096 bthbhh.exe ppjjj.exe PID 2096 wrote to memory of 4812 2096 bthbhh.exe ppjjj.exe PID 2096 wrote to memory of 4812 2096 bthbhh.exe ppjjj.exe PID 4812 wrote to memory of 1788 4812 ppjjj.exe 1jppp.exe PID 4812 wrote to memory of 1788 4812 ppjjj.exe 1jppp.exe PID 4812 wrote to memory of 1788 4812 ppjjj.exe 1jppp.exe PID 1788 wrote to memory of 2408 1788 1jppp.exe 9xxlfxl.exe PID 1788 wrote to memory of 2408 1788 1jppp.exe 9xxlfxl.exe PID 1788 wrote to memory of 2408 1788 1jppp.exe 9xxlfxl.exe PID 2408 wrote to memory of 4648 2408 9xxlfxl.exe 9nnnnb.exe PID 2408 wrote to memory of 4648 2408 9xxlfxl.exe 9nnnnb.exe PID 2408 wrote to memory of 4648 2408 9xxlfxl.exe 9nnnnb.exe PID 4648 wrote to memory of 1584 4648 9nnnnb.exe vvvvj.exe PID 4648 wrote to memory of 1584 4648 9nnnnb.exe vvvvj.exe PID 4648 wrote to memory of 1584 4648 9nnnnb.exe vvvvj.exe PID 1584 wrote to memory of 1088 1584 vvvvj.exe xxrlrrr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\57244ab2c66659f38d556926ec71cd045dbcce4813d3408566ae255f8376beae_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\rrxxrxx.exec:\rrxxrxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\bntbbb.exec:\bntbbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
\??\c:\hbbtnn.exec:\hbbtnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\vdvpj.exec:\vdvpj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
\??\c:\fxxxrxx.exec:\fxxxrxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
\??\c:\rrxfxxl.exec:\rrxfxxl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:348 -
\??\c:\bbhhht.exec:\bbhhht.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
\??\c:\1ddvp.exec:\1ddvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
\??\c:\1lrrlll.exec:\1lrrlll.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\ffrrxfx.exec:\ffrrxfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\hnbbbb.exec:\hnbbbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\dvjjd.exec:\dvjjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
\??\c:\pdjjj.exec:\pdjjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\xrlrxrf.exec:\xrlrxrf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
\??\c:\5bhbbh.exec:\5bhbbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\bthbhh.exec:\bthbhh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\ppjjj.exec:\ppjjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\1jppp.exec:\1jppp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\9xxlfxl.exec:\9xxlfxl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\9nnnnb.exec:\9nnnnb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
\??\c:\vvvvj.exec:\vvvvj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\xxrlrrr.exec:\xxrlrrr.exe23⤵
- Executes dropped EXE
PID:1088 -
\??\c:\rrrrrrr.exec:\rrrrrrr.exe24⤵
- Executes dropped EXE
PID:2552 -
\??\c:\nbhhbb.exec:\nbhhbb.exe25⤵
- Executes dropped EXE
PID:2104 -
\??\c:\djdjj.exec:\djdjj.exe26⤵
- Executes dropped EXE
PID:2404 -
\??\c:\lrfxfxx.exec:\lrfxfxx.exe27⤵
- Executes dropped EXE
PID:4652 -
\??\c:\rlrrlrr.exec:\rlrrlrr.exe28⤵
- Executes dropped EXE
PID:764 -
\??\c:\tnnnhn.exec:\tnnnhn.exe29⤵
- Executes dropped EXE
PID:2660 -
\??\c:\nnbnnn.exec:\nnbnnn.exe30⤵
- Executes dropped EXE
PID:4612 -
\??\c:\5dddv.exec:\5dddv.exe31⤵
- Executes dropped EXE
PID:2308 -
\??\c:\lxrxfrx.exec:\lxrxfrx.exe32⤵
- Executes dropped EXE
PID:4524 -
\??\c:\bbbbbh.exec:\bbbbbh.exe33⤵
- Executes dropped EXE
PID:4824 -
\??\c:\jvddv.exec:\jvddv.exe34⤵
- Executes dropped EXE
PID:1376 -
\??\c:\fllfxll.exec:\fllfxll.exe35⤵
- Executes dropped EXE
PID:2432 -
\??\c:\hbtbbh.exec:\hbtbbh.exe36⤵
- Executes dropped EXE
PID:2852 -
\??\c:\tthbbb.exec:\tthbbb.exe37⤵
- Executes dropped EXE
PID:4668 -
\??\c:\dvddd.exec:\dvddd.exe38⤵
- Executes dropped EXE
PID:4536 -
\??\c:\ppdjd.exec:\ppdjd.exe39⤵
- Executes dropped EXE
PID:1720 -
\??\c:\rlffxxx.exec:\rlffxxx.exe40⤵
- Executes dropped EXE
PID:2188 -
\??\c:\llrrrll.exec:\llrrrll.exe41⤵
- Executes dropped EXE
PID:3400 -
\??\c:\tnbbhn.exec:\tnbbhn.exe42⤵
- Executes dropped EXE
PID:208 -
\??\c:\tbttbb.exec:\tbttbb.exe43⤵
- Executes dropped EXE
PID:2168 -
\??\c:\vpjvp.exec:\vpjvp.exe44⤵
- Executes dropped EXE
PID:4588 -
\??\c:\1dpjd.exec:\1dpjd.exe45⤵
- Executes dropped EXE
PID:2360 -
\??\c:\rflfrxx.exec:\rflfrxx.exe46⤵
- Executes dropped EXE
PID:4780 -
\??\c:\ffrrrxf.exec:\ffrrrxf.exe47⤵
- Executes dropped EXE
PID:1316 -
\??\c:\tnnnhn.exec:\tnnnhn.exe48⤵
- Executes dropped EXE
PID:3860 -
\??\c:\ttbhbn.exec:\ttbhbn.exe49⤵
- Executes dropped EXE
PID:2900 -
\??\c:\ddjjv.exec:\ddjjv.exe50⤵
- Executes dropped EXE
PID:4296 -
\??\c:\pjjpj.exec:\pjjpj.exe51⤵
- Executes dropped EXE
PID:4356 -
\??\c:\9jddd.exec:\9jddd.exe52⤵
- Executes dropped EXE
PID:4416 -
\??\c:\xxlflll.exec:\xxlflll.exe53⤵
- Executes dropped EXE
PID:2616 -
\??\c:\bbnnhn.exec:\bbnnhn.exe54⤵
- Executes dropped EXE
PID:3444 -
\??\c:\3btbtb.exec:\3btbtb.exe55⤵
- Executes dropped EXE
PID:456 -
\??\c:\5jjjd.exec:\5jjjd.exe56⤵
- Executes dropped EXE
PID:4624 -
\??\c:\vpvvp.exec:\vpvvp.exe57⤵
- Executes dropped EXE
PID:3932 -
\??\c:\flrlrxr.exec:\flrlrxr.exe58⤵
- Executes dropped EXE
PID:3256 -
\??\c:\lrrrlrl.exec:\lrrrlrl.exe59⤵
- Executes dropped EXE
PID:3016 -
\??\c:\bbbntt.exec:\bbbntt.exe60⤵
- Executes dropped EXE
PID:1640 -
\??\c:\httbtb.exec:\httbtb.exe61⤵
- Executes dropped EXE
PID:3728 -
\??\c:\ppjjj.exec:\ppjjj.exe62⤵
- Executes dropped EXE
PID:1816 -
\??\c:\3pdvp.exec:\3pdvp.exe63⤵
- Executes dropped EXE
PID:3424 -
\??\c:\vpvpp.exec:\vpvpp.exe64⤵
- Executes dropped EXE
PID:760 -
\??\c:\rllxrrr.exec:\rllxrrr.exe65⤵
- Executes dropped EXE
PID:4168 -
\??\c:\ffffrrr.exec:\ffffrrr.exe66⤵PID:1856
-
\??\c:\hhntnb.exec:\hhntnb.exe67⤵PID:4640
-
\??\c:\3hnhhb.exec:\3hnhhb.exe68⤵PID:1828
-
\??\c:\pppjj.exec:\pppjj.exe69⤵PID:4336
-
\??\c:\7djjj.exec:\7djjj.exe70⤵PID:4752
-
\??\c:\5rffllx.exec:\5rffllx.exe71⤵PID:4676
-
\??\c:\5xrllll.exec:\5xrllll.exe72⤵PID:3208
-
\??\c:\bthhnh.exec:\bthhnh.exe73⤵PID:2568
-
\??\c:\nhtbbb.exec:\nhtbbb.exe74⤵PID:4116
-
\??\c:\jdddv.exec:\jdddv.exe75⤵PID:4460
-
\??\c:\rxlfrrl.exec:\rxlfrrl.exe76⤵PID:3260
-
\??\c:\rrlxrxr.exec:\rrlxrxr.exe77⤵PID:2112
-
\??\c:\ntnbtn.exec:\ntnbtn.exe78⤵PID:2236
-
\??\c:\nhbbnn.exec:\nhbbnn.exe79⤵PID:4408
-
\??\c:\pdjvj.exec:\pdjvj.exe80⤵PID:4472
-
\??\c:\dppdp.exec:\dppdp.exe81⤵PID:4400
-
\??\c:\1rlfxrl.exec:\1rlfxrl.exe82⤵PID:2204
-
\??\c:\tnhntb.exec:\tnhntb.exe83⤵PID:2008
-
\??\c:\httttb.exec:\httttb.exe84⤵PID:2468
-
\??\c:\vjvvv.exec:\vjvvv.exe85⤵PID:2740
-
\??\c:\vvpjj.exec:\vvpjj.exe86⤵PID:3476
-
\??\c:\rrllrrr.exec:\rrllrrr.exe87⤵PID:184
-
\??\c:\tnnnhb.exec:\tnnnhb.exe88⤵PID:3324
-
\??\c:\btnttb.exec:\btnttb.exe89⤵PID:1636
-
\??\c:\vdjpd.exec:\vdjpd.exe90⤵PID:3008
-
\??\c:\ppjdj.exec:\ppjdj.exe91⤵PID:3284
-
\??\c:\3llxrrl.exec:\3llxrrl.exe92⤵PID:4452
-
\??\c:\ppjdv.exec:\ppjdv.exe93⤵PID:1268
-
\??\c:\llxxxxx.exec:\llxxxxx.exe94⤵PID:2304
-
\??\c:\7lfxrrl.exec:\7lfxrrl.exe95⤵PID:4980
-
\??\c:\3hhbtt.exec:\3hhbtt.exe96⤵PID:4384
-
\??\c:\jppjd.exec:\jppjd.exe97⤵PID:3116
-
\??\c:\jdjdv.exec:\jdjdv.exe98⤵PID:2940
-
\??\c:\rlrrrxx.exec:\rlrrrxx.exe99⤵PID:384
-
\??\c:\lfxxrxr.exec:\lfxxrxr.exe100⤵PID:2292
-
\??\c:\5tnbtt.exec:\5tnbtt.exe101⤵PID:3936
-
\??\c:\nbtnhb.exec:\nbtnhb.exe102⤵PID:2420
-
\??\c:\jjjjj.exec:\jjjjj.exe103⤵PID:1424
-
\??\c:\xrxxxfl.exec:\xrxxxfl.exe104⤵PID:2880
-
\??\c:\fxxrffx.exec:\fxxrffx.exe105⤵PID:456
-
\??\c:\bttnhh.exec:\bttnhh.exe106⤵PID:1704
-
\??\c:\dpppj.exec:\dpppj.exe107⤵PID:4880
-
\??\c:\jvvjv.exec:\jvvjv.exe108⤵PID:3524
-
\??\c:\rlrlffl.exec:\rlrlffl.exe109⤵PID:3304
-
\??\c:\xxffrrr.exec:\xxffrrr.exe110⤵PID:2632
-
\??\c:\7lrlrlx.exec:\7lrlrlx.exe111⤵PID:4768
-
\??\c:\btnnnh.exec:\btnnnh.exe112⤵PID:3056
-
\??\c:\ddpvd.exec:\ddpvd.exe113⤵PID:920
-
\??\c:\ppdpj.exec:\ppdpj.exe114⤵PID:1788
-
\??\c:\lfxrflf.exec:\lfxrflf.exe115⤵PID:1076
-
\??\c:\bnhttn.exec:\bnhttn.exe116⤵PID:4328
-
\??\c:\djjdv.exec:\djjdv.exe117⤵PID:1060
-
\??\c:\fxlfrlf.exec:\fxlfrlf.exe118⤵PID:4336
-
\??\c:\1tbbhn.exec:\1tbbhn.exe119⤵PID:4752
-
\??\c:\3bhhhh.exec:\3bhhhh.exe120⤵PID:4676
-
\??\c:\jdvpp.exec:\jdvpp.exe121⤵PID:2104
-
\??\c:\7dvpj.exec:\7dvpj.exe122⤵PID:2568
-
\??\c:\rxfffff.exec:\rxfffff.exe123⤵PID:4116
-
\??\c:\frxxfll.exec:\frxxfll.exe124⤵PID:4460
-
\??\c:\1bnhbt.exec:\1bnhbt.exe125⤵PID:3260
-
\??\c:\pvvpd.exec:\pvvpd.exe126⤵PID:3276
-
\??\c:\xlfxrrf.exec:\xlfxrrf.exe127⤵PID:2956
-
\??\c:\rflffll.exec:\rflffll.exe128⤵PID:2308
-
\??\c:\hbhbbh.exec:\hbhbbh.exe129⤵PID:4472
-
\??\c:\nhhbtn.exec:\nhhbtn.exe130⤵PID:4400
-
\??\c:\jdjvp.exec:\jdjvp.exe131⤵PID:568
-
\??\c:\5ppjd.exec:\5ppjd.exe132⤵PID:2008
-
\??\c:\rlrflll.exec:\rlrflll.exe133⤵PID:2468
-
\??\c:\1fffxrl.exec:\1fffxrl.exe134⤵PID:1676
-
\??\c:\htthbb.exec:\htthbb.exe135⤵PID:3476
-
\??\c:\5hbbnt.exec:\5hbbnt.exe136⤵PID:184
-
\??\c:\jdpjj.exec:\jdpjj.exe137⤵PID:2188
-
\??\c:\5jddp.exec:\5jddp.exe138⤵PID:1636
-
\??\c:\fxllffx.exec:\fxllffx.exe139⤵PID:208
-
\??\c:\xlllfff.exec:\xlllfff.exe140⤵PID:876
-
\??\c:\jpdvp.exec:\jpdvp.exe141⤵PID:2284
-
\??\c:\jppdv.exec:\jppdv.exe142⤵PID:1648
-
\??\c:\xrfxfxx.exec:\xrfxfxx.exe143⤵PID:1432
-
\??\c:\9llxrrf.exec:\9llxrrf.exe144⤵PID:4128
-
\??\c:\7ttnbt.exec:\7ttnbt.exe145⤵PID:376
-
\??\c:\nhbhnn.exec:\nhbhnn.exe146⤵PID:4296
-
\??\c:\5jpjd.exec:\5jpjd.exe147⤵PID:1176
-
\??\c:\vjpdv.exec:\vjpdv.exe148⤵PID:2640
-
\??\c:\1llrfrl.exec:\1llrfrl.exe149⤵PID:1320
-
\??\c:\fxrrrff.exec:\fxrrrff.exe150⤵PID:2032
-
\??\c:\fxfxxlr.exec:\fxfxxlr.exe151⤵PID:1548
-
\??\c:\bntbtt.exec:\bntbtt.exe152⤵PID:4404
-
\??\c:\tnthtt.exec:\tnthtt.exe153⤵PID:1640
-
\??\c:\pvdjv.exec:\pvdjv.exe154⤵PID:1700
-
\??\c:\rfrlrrl.exec:\rfrlrrl.exe155⤵PID:2596
-
\??\c:\xffrlrl.exec:\xffrlrl.exe156⤵PID:3056
-
\??\c:\1ttntn.exec:\1ttntn.exe157⤵PID:920
-
\??\c:\pddvj.exec:\pddvj.exe158⤵PID:4576
-
\??\c:\vvpvp.exec:\vvpvp.exe159⤵PID:1076
-
\??\c:\tnnttt.exec:\tnnttt.exe160⤵PID:2052
-
\??\c:\1htnnn.exec:\1htnnn.exe161⤵PID:4548
-
\??\c:\dvpjv.exec:\dvpjv.exe162⤵PID:1088
-
\??\c:\rxxlxrl.exec:\rxxlxrl.exe163⤵PID:3748
-
\??\c:\xxxfxxr.exec:\xxxfxxr.exe164⤵PID:3408
-
\??\c:\5bbnbb.exec:\5bbnbb.exe165⤵PID:2276
-
\??\c:\vppdp.exec:\vppdp.exe166⤵PID:1360
-
\??\c:\9fxrffx.exec:\9fxrffx.exe167⤵PID:2256
-
\??\c:\thnhbt.exec:\thnhbt.exe168⤵PID:3084
-
\??\c:\5pppd.exec:\5pppd.exe169⤵PID:1992
-
\??\c:\lfllrrr.exec:\lfllrrr.exe170⤵PID:4612
-
\??\c:\5tnhbb.exec:\5tnhbb.exe171⤵PID:4620
-
\??\c:\9xllfxx.exec:\9xllfxx.exe172⤵PID:1880
-
\??\c:\hhbbnt.exec:\hhbbnt.exe173⤵PID:4084
-
\??\c:\pvpjv.exec:\pvpjv.exe174⤵PID:3584
-
\??\c:\ddpdj.exec:\ddpdj.exe175⤵PID:4644
-
\??\c:\3rxrxxf.exec:\3rxrxxf.exe176⤵PID:5076
-
\??\c:\jdvpj.exec:\jdvpj.exe177⤵PID:3288
-
\??\c:\1lrfrrl.exec:\1lrfrrl.exe178⤵PID:3856
-
\??\c:\jdvjd.exec:\jdvjd.exe179⤵PID:3956
-
\??\c:\9bnhbn.exec:\9bnhbn.exe180⤵PID:1104
-
\??\c:\dpjdp.exec:\dpjdp.exe181⤵PID:3248
-
\??\c:\rllfxff.exec:\rllfxff.exe182⤵PID:2508
-
\??\c:\rlfxrrx.exec:\rlfxrrx.exe183⤵PID:4320
-
\??\c:\httnnh.exec:\httnnh.exe184⤵PID:3148
-
\??\c:\jjjjv.exec:\jjjjv.exe185⤵PID:3272
-
\??\c:\5jpdp.exec:\5jpdp.exe186⤵PID:3952
-
\??\c:\lxxrllf.exec:\lxxrllf.exe187⤵PID:116
-
\??\c:\1tbtnn.exec:\1tbtnn.exe188⤵PID:2300
-
\??\c:\7nnhbt.exec:\7nnhbt.exe189⤵PID:1080
-
\??\c:\hntnbb.exec:\hntnbb.exe190⤵PID:2808
-
\??\c:\1pvvv.exec:\1pvvv.exe191⤵PID:3300
-
\??\c:\vpjdv.exec:\vpjdv.exe192⤵PID:2040
-
\??\c:\flfxllf.exec:\flfxllf.exe193⤵PID:5108
-
\??\c:\ttnntt.exec:\ttnntt.exe194⤵PID:1704
-
\??\c:\bnnhtt.exec:\bnnhtt.exe195⤵PID:4880
-
\??\c:\vvdvd.exec:\vvdvd.exe196⤵PID:1096
-
\??\c:\vpjdv.exec:\vpjdv.exe197⤵PID:224
-
\??\c:\rlrfxxr.exec:\rlrfxxr.exe198⤵PID:1416
-
\??\c:\nbhhbn.exec:\nbhhbn.exe199⤵PID:4844
-
\??\c:\jdjdd.exec:\jdjdd.exe200⤵PID:4168
-
\??\c:\3jjjv.exec:\3jjjv.exe201⤵PID:2408
-
\??\c:\3fxrrrx.exec:\3fxrrrx.exe202⤵PID:336
-
\??\c:\rfllffx.exec:\rfllffx.exe203⤵PID:3620
-
\??\c:\btbbbb.exec:\btbbbb.exe204⤵PID:1828
-
\??\c:\pjvpp.exec:\pjvpp.exe205⤵PID:3244
-
\??\c:\vpvjv.exec:\vpvjv.exe206⤵PID:692
-
\??\c:\flllffx.exec:\flllffx.exe207⤵PID:2444
-
\??\c:\bbbttn.exec:\bbbttn.exe208⤵PID:4632
-
\??\c:\nnttbb.exec:\nnttbb.exe209⤵PID:2276
-
\??\c:\5ddpv.exec:\5ddpv.exe210⤵PID:3080
-
\??\c:\5rxrlrr.exec:\5rxrlrr.exe211⤵PID:3264
-
\??\c:\3lxrlfx.exec:\3lxrlfx.exe212⤵PID:2660
-
\??\c:\nhthth.exec:\nhthth.exe213⤵PID:1588
-
\??\c:\nbbntt.exec:\nbbntt.exe214⤵PID:4408
-
\??\c:\dpdpj.exec:\dpdpj.exe215⤵PID:4272
-
\??\c:\vpvpd.exec:\vpvpd.exe216⤵PID:4872
-
\??\c:\rxrlxrl.exec:\rxrlxrl.exe217⤵PID:4800
-
\??\c:\nbtnhn.exec:\nbtnhn.exe218⤵PID:4552
-
\??\c:\tbbbtn.exec:\tbbbtn.exe219⤵PID:4464
-
\??\c:\dvvvv.exec:\dvvvv.exe220⤵PID:1256
-
\??\c:\flrlfff.exec:\flrlfff.exe221⤵PID:4952
-
\??\c:\7fffxxr.exec:\7fffxxr.exe222⤵PID:1172
-
\??\c:\bnnhbb.exec:\bnnhbb.exe223⤵PID:5080
-
\??\c:\tbhnhh.exec:\tbhnhh.exe224⤵PID:3288
-
\??\c:\1dddp.exec:\1dddp.exe225⤵PID:3856
-
\??\c:\frrlxrr.exec:\frrlxrr.exe226⤵PID:3956
-
\??\c:\xlxrlxr.exec:\xlxrlxr.exe227⤵PID:1104
-
\??\c:\bhhhhb.exec:\bhhhhb.exe228⤵PID:4432
-
\??\c:\1ddpj.exec:\1ddpj.exe229⤵PID:208
-
\??\c:\jdvvj.exec:\jdvvj.exe230⤵PID:1944
-
\??\c:\fffrffr.exec:\fffrffr.exe231⤵PID:4588
-
\??\c:\lxxlfff.exec:\lxxlfff.exe232⤵PID:2460
-
\??\c:\hbhhbb.exec:\hbhhbb.exe233⤵PID:1448
-
\??\c:\nhbtnn.exec:\nhbtnn.exe234⤵PID:656
-
\??\c:\dpdjj.exec:\dpdjj.exe235⤵PID:348
-
\??\c:\jvvdj.exec:\jvvdj.exe236⤵PID:3268
-
\??\c:\rffxxrr.exec:\rffxxrr.exe237⤵PID:744
-
\??\c:\rlxrrrx.exec:\rlxrrrx.exe238⤵PID:4616
-
\??\c:\3btnhb.exec:\3btnhb.exe239⤵PID:2004
-
\??\c:\nhhthh.exec:\nhhthh.exe240⤵PID:3440
-
\??\c:\vjdvp.exec:\vjdvp.exe241⤵PID:1548
-