Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 06:11
Behavioral task
behavioral1
Sample
cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe
Resource
win7-20240419-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe
-
Size
328KB
-
MD5
cf4be40fac405dcd18e6ed8b275a1a90
-
SHA1
3192ef205f9acf1f2decf30f0ae1671cccf80ee2
-
SHA256
1f9bc167ed974be8a2ceb5f488b74c8f6e88e6b8154cbca351541779590fd5a8
-
SHA512
2256bf70f44cdfe50ac8ca0a22773615fbb4dfc1da59c67841909084ba5dc55a18d36fed5e4b75dc8d58c86745777c7c7af79bec4ec3148cc5b2056978e3da98
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbe1:R4wFHoSHYHUrAwfMp3CD1
Malware Config
Signatures
-
Detect Blackmoon payload 42 IoCs
Processes:
resource yara_rule behavioral1/memory/1008-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1708-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2424-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2424-24-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2572-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2908-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2736-57-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2528-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2520-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3056-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/904-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2712-105-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1756-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1764-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/996-145-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2832-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2152-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2016-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/980-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/924-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/744-211-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/408-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1304-239-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/696-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1568-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/564-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/564-271-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3032-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3032-283-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2244-292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1636-319-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2632-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1312-420-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2860-452-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/572-474-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/448-496-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1356-705-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1612-822-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2612-864-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/292-1002-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/748-1046-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1864-9024-0x0000000076D20000-0x0000000076E3F000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jdppv.exerlrrffl.exeffrflrx.exe3nhnbb.exeppdjv.exexlxxxff.exehbnbbh.exejdjpd.exefffxffl.exetnbhbb.exe5xxrrlr.exe7nbhnh.exejdpvd.exexrxxfff.exe7jdjv.exefrxrxff.exenhbhtt.exedvjpv.exetnbttb.exe9vpdp.exe1thnnb.exevpdjj.exe7fxfrfr.exehtnhnt.exe9lrlxrx.exebbtttb.exejdjjj.exelxrrfxr.exehbnbhb.exe3pdvp.exe9frfllx.exe9dpvd.exerxxlfxx.exefxrrfrx.exe3bbhbh.exedvjjv.exelfllrrl.exelxffrrx.exetnhnnh.exe7pjpp.exevpddd.exeflfrxfx.exerrfrrxl.exehthhtt.exepdjvv.exe3vjdj.exexlxxllr.exehtbthh.exebthtbh.exeppddj.exelxllrrr.exexxlxfff.exehbtttb.exepvdjp.exe5dvvv.exe1rrxfxf.exe5btnnn.exetthnnt.exepjvdj.exexrxxrll.exellxlxxr.exenhhbtn.exehbnntn.exe1dpvv.exepid process 1708 jdppv.exe 2424 rlrrffl.exe 2572 ffrflrx.exe 2908 3nhnbb.exe 2688 ppdjv.exe 2736 xlxxxff.exe 2828 hbnbbh.exe 2520 jdjpd.exe 2528 fffxffl.exe 3056 tnbhbb.exe 904 5xxrrlr.exe 2712 7nbhnh.exe 2804 jdpvd.exe 1432 xrxxfff.exe 1756 7jdjv.exe 1764 frxrxff.exe 996 nhbhtt.exe 2832 dvjpv.exe 2152 tnbttb.exe 2016 9vpdp.exe 2968 1thnnb.exe 980 vpdjj.exe 924 7fxfrfr.exe 1172 htnhnt.exe 744 9lrlxrx.exe 408 bbtttb.exe 2088 jdjjj.exe 1208 lxrrfxr.exe 1304 hbnbhb.exe 1868 3pdvp.exe 696 9frfllx.exe 1568 9dpvd.exe 564 rxxlfxx.exe 2252 fxrrfrx.exe 3032 3bbhbh.exe 1588 dvjjv.exe 2244 lfllrrl.exe 3000 lxffrrx.exe 3044 tnhnnh.exe 1520 7pjpp.exe 1636 vpddd.exe 2700 flfrxfx.exe 2216 rrfrrxl.exe 2472 hthhtt.exe 2652 pdjvv.exe 2492 3vjdj.exe 2632 xlxxllr.exe 2828 htbthh.exe 2636 bthtbh.exe 2464 ppddj.exe 1976 lxllrrr.exe 1508 xxlxfff.exe 2724 hbtttb.exe 2800 pvdjp.exe 2812 5dvvv.exe 1352 1rrxfxf.exe 1752 5btnnn.exe 1712 tthnnt.exe 1772 pjvdj.exe 1268 xrxxrll.exe 1312 llxlxxr.exe 1192 nhhbtn.exe 2368 hbnntn.exe 2040 1dpvv.exe -
Processes:
resource yara_rule behavioral1/memory/1008-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdppv.exe upx behavioral1/memory/1008-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1708-10-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlrrffl.exe upx behavioral1/memory/2424-18-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ffrflrx.exe upx C:\3nhnbb.exe upx behavioral1/memory/2572-33-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ppdjv.exe upx behavioral1/memory/2908-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2688-42-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xlxxxff.exe upx C:\hbnbbh.exe upx behavioral1/memory/2736-57-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdjpd.exe upx C:\fffxffl.exe upx behavioral1/memory/2528-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2520-72-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnbhbb.exe upx C:\5xxrrlr.exe upx behavioral1/memory/3056-88-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7nbhnh.exe upx behavioral1/memory/904-95-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdpvd.exe upx behavioral1/memory/2712-104-0x00000000002E0000-0x0000000000307000-memory.dmp upx behavioral1/memory/2712-105-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xrxxfff.exe upx C:\7jdjv.exe upx behavioral1/memory/1756-120-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\frxrxff.exe upx behavioral1/memory/1756-128-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhbhtt.exe upx behavioral1/memory/1764-137-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvjpv.exe upx behavioral1/memory/2832-156-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnbttb.exe upx behavioral1/memory/2152-163-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9vpdp.exe upx behavioral1/memory/2016-171-0x00000000001B0000-0x00000000001D7000-memory.dmp upx behavioral1/memory/2016-173-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1thnnb.exe upx C:\vpdjj.exe upx behavioral1/memory/980-188-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7fxfrfr.exe upx behavioral1/memory/924-189-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\htnhnt.exe upx behavioral1/memory/924-196-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9lrlxrx.exe upx C:\bbtttb.exe upx behavioral1/memory/744-211-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/408-213-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdjjj.exe upx behavioral1/memory/408-220-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lxrrfxr.exe upx C:\hbnbhb.exe upx C:\3pdvp.exe upx behavioral1/memory/1868-244-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/696-252-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9frfllx.exe upx C:\9dpvd.exe upx behavioral1/memory/696-260-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1568-267-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/564-268-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exejdppv.exerlrrffl.exeffrflrx.exe3nhnbb.exeppdjv.exexlxxxff.exehbnbbh.exejdjpd.exefffxffl.exetnbhbb.exe5xxrrlr.exe7nbhnh.exejdpvd.exexrxxfff.exe7jdjv.exedescription pid process target process PID 1008 wrote to memory of 1708 1008 cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe jdppv.exe PID 1008 wrote to memory of 1708 1008 cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe jdppv.exe PID 1008 wrote to memory of 1708 1008 cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe jdppv.exe PID 1008 wrote to memory of 1708 1008 cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe jdppv.exe PID 1708 wrote to memory of 2424 1708 jdppv.exe rlrrffl.exe PID 1708 wrote to memory of 2424 1708 jdppv.exe rlrrffl.exe PID 1708 wrote to memory of 2424 1708 jdppv.exe rlrrffl.exe PID 1708 wrote to memory of 2424 1708 jdppv.exe rlrrffl.exe PID 2424 wrote to memory of 2572 2424 rlrrffl.exe ffrflrx.exe PID 2424 wrote to memory of 2572 2424 rlrrffl.exe ffrflrx.exe PID 2424 wrote to memory of 2572 2424 rlrrffl.exe ffrflrx.exe PID 2424 wrote to memory of 2572 2424 rlrrffl.exe ffrflrx.exe PID 2572 wrote to memory of 2908 2572 ffrflrx.exe 3nhnbb.exe PID 2572 wrote to memory of 2908 2572 ffrflrx.exe 3nhnbb.exe PID 2572 wrote to memory of 2908 2572 ffrflrx.exe 3nhnbb.exe PID 2572 wrote to memory of 2908 2572 ffrflrx.exe 3nhnbb.exe PID 2908 wrote to memory of 2688 2908 3nhnbb.exe ppdjv.exe PID 2908 wrote to memory of 2688 2908 3nhnbb.exe ppdjv.exe PID 2908 wrote to memory of 2688 2908 3nhnbb.exe ppdjv.exe PID 2908 wrote to memory of 2688 2908 3nhnbb.exe ppdjv.exe PID 2688 wrote to memory of 2736 2688 ppdjv.exe xlxxxff.exe PID 2688 wrote to memory of 2736 2688 ppdjv.exe xlxxxff.exe PID 2688 wrote to memory of 2736 2688 ppdjv.exe xlxxxff.exe PID 2688 wrote to memory of 2736 2688 ppdjv.exe xlxxxff.exe PID 2736 wrote to memory of 2828 2736 xlxxxff.exe hbnbbh.exe PID 2736 wrote to memory of 2828 2736 xlxxxff.exe hbnbbh.exe PID 2736 wrote to memory of 2828 2736 xlxxxff.exe hbnbbh.exe PID 2736 wrote to memory of 2828 2736 xlxxxff.exe hbnbbh.exe PID 2828 wrote to memory of 2520 2828 hbnbbh.exe jdjpd.exe PID 2828 wrote to memory of 2520 2828 hbnbbh.exe jdjpd.exe PID 2828 wrote to memory of 2520 2828 hbnbbh.exe jdjpd.exe PID 2828 wrote to memory of 2520 2828 hbnbbh.exe jdjpd.exe PID 2520 wrote to memory of 2528 2520 jdjpd.exe fffxffl.exe PID 2520 wrote to memory of 2528 2520 jdjpd.exe fffxffl.exe PID 2520 wrote to memory of 2528 2520 jdjpd.exe fffxffl.exe PID 2520 wrote to memory of 2528 2520 jdjpd.exe fffxffl.exe PID 2528 wrote to memory of 3056 2528 fffxffl.exe tnbhbb.exe PID 2528 wrote to memory of 3056 2528 fffxffl.exe tnbhbb.exe PID 2528 wrote to memory of 3056 2528 fffxffl.exe tnbhbb.exe PID 2528 wrote to memory of 3056 2528 fffxffl.exe tnbhbb.exe PID 3056 wrote to memory of 904 3056 tnbhbb.exe 5xxrrlr.exe PID 3056 wrote to memory of 904 3056 tnbhbb.exe 5xxrrlr.exe PID 3056 wrote to memory of 904 3056 tnbhbb.exe 5xxrrlr.exe PID 3056 wrote to memory of 904 3056 tnbhbb.exe 5xxrrlr.exe PID 904 wrote to memory of 2712 904 5xxrrlr.exe 7nbhnh.exe PID 904 wrote to memory of 2712 904 5xxrrlr.exe 7nbhnh.exe PID 904 wrote to memory of 2712 904 5xxrrlr.exe 7nbhnh.exe PID 904 wrote to memory of 2712 904 5xxrrlr.exe 7nbhnh.exe PID 2712 wrote to memory of 2804 2712 7nbhnh.exe jdpvd.exe PID 2712 wrote to memory of 2804 2712 7nbhnh.exe jdpvd.exe PID 2712 wrote to memory of 2804 2712 7nbhnh.exe jdpvd.exe PID 2712 wrote to memory of 2804 2712 7nbhnh.exe jdpvd.exe PID 2804 wrote to memory of 1432 2804 jdpvd.exe xrxxfff.exe PID 2804 wrote to memory of 1432 2804 jdpvd.exe xrxxfff.exe PID 2804 wrote to memory of 1432 2804 jdpvd.exe xrxxfff.exe PID 2804 wrote to memory of 1432 2804 jdpvd.exe xrxxfff.exe PID 1432 wrote to memory of 1756 1432 xrxxfff.exe 7jdjv.exe PID 1432 wrote to memory of 1756 1432 xrxxfff.exe 7jdjv.exe PID 1432 wrote to memory of 1756 1432 xrxxfff.exe 7jdjv.exe PID 1432 wrote to memory of 1756 1432 xrxxfff.exe 7jdjv.exe PID 1756 wrote to memory of 1764 1756 7jdjv.exe frxrxff.exe PID 1756 wrote to memory of 1764 1756 7jdjv.exe frxrxff.exe PID 1756 wrote to memory of 1764 1756 7jdjv.exe frxrxff.exe PID 1756 wrote to memory of 1764 1756 7jdjv.exe frxrxff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cf4be40fac405dcd18e6ed8b275a1a90_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\jdppv.exec:\jdppv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\rlrrffl.exec:\rlrrffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\ffrflrx.exec:\ffrflrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\3nhnbb.exec:\3nhnbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\ppdjv.exec:\ppdjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\xlxxxff.exec:\xlxxxff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\hbnbbh.exec:\hbnbbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\jdjpd.exec:\jdjpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\fffxffl.exec:\fffxffl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\tnbhbb.exec:\tnbhbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\5xxrrlr.exec:\5xxrrlr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:904 -
\??\c:\7nbhnh.exec:\7nbhnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\jdpvd.exec:\jdpvd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\xrxxfff.exec:\xrxxfff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
\??\c:\7jdjv.exec:\7jdjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
\??\c:\frxrxff.exec:\frxrxff.exe17⤵
- Executes dropped EXE
PID:1764 -
\??\c:\nhbhtt.exec:\nhbhtt.exe18⤵
- Executes dropped EXE
PID:996 -
\??\c:\dvjpv.exec:\dvjpv.exe19⤵
- Executes dropped EXE
PID:2832 -
\??\c:\tnbttb.exec:\tnbttb.exe20⤵
- Executes dropped EXE
PID:2152 -
\??\c:\9vpdp.exec:\9vpdp.exe21⤵
- Executes dropped EXE
PID:2016 -
\??\c:\1thnnb.exec:\1thnnb.exe22⤵
- Executes dropped EXE
PID:2968 -
\??\c:\vpdjj.exec:\vpdjj.exe23⤵
- Executes dropped EXE
PID:980 -
\??\c:\7fxfrfr.exec:\7fxfrfr.exe24⤵
- Executes dropped EXE
PID:924 -
\??\c:\htnhnt.exec:\htnhnt.exe25⤵
- Executes dropped EXE
PID:1172 -
\??\c:\9lrlxrx.exec:\9lrlxrx.exe26⤵
- Executes dropped EXE
PID:744 -
\??\c:\bbtttb.exec:\bbtttb.exe27⤵
- Executes dropped EXE
PID:408 -
\??\c:\jdjjj.exec:\jdjjj.exe28⤵
- Executes dropped EXE
PID:2088 -
\??\c:\lxrrfxr.exec:\lxrrfxr.exe29⤵
- Executes dropped EXE
PID:1208 -
\??\c:\hbnbhb.exec:\hbnbhb.exe30⤵
- Executes dropped EXE
PID:1304 -
\??\c:\3pdvp.exec:\3pdvp.exe31⤵
- Executes dropped EXE
PID:1868 -
\??\c:\9frfllx.exec:\9frfllx.exe32⤵
- Executes dropped EXE
PID:696 -
\??\c:\9dpvd.exec:\9dpvd.exe33⤵
- Executes dropped EXE
PID:1568 -
\??\c:\rxxlfxx.exec:\rxxlfxx.exe34⤵
- Executes dropped EXE
PID:564 -
\??\c:\fxrrfrx.exec:\fxrrfrx.exe35⤵
- Executes dropped EXE
PID:2252 -
\??\c:\3bbhbh.exec:\3bbhbh.exe36⤵
- Executes dropped EXE
PID:3032 -
\??\c:\dvjjv.exec:\dvjjv.exe37⤵
- Executes dropped EXE
PID:1588 -
\??\c:\lfllrrl.exec:\lfllrrl.exe38⤵
- Executes dropped EXE
PID:2244 -
\??\c:\lxffrrx.exec:\lxffrrx.exe39⤵
- Executes dropped EXE
PID:3000 -
\??\c:\tnhnnh.exec:\tnhnnh.exe40⤵
- Executes dropped EXE
PID:3044 -
\??\c:\7pjpp.exec:\7pjpp.exe41⤵
- Executes dropped EXE
PID:1520 -
\??\c:\vpddd.exec:\vpddd.exe42⤵
- Executes dropped EXE
PID:1636 -
\??\c:\flfrxfx.exec:\flfrxfx.exe43⤵
- Executes dropped EXE
PID:2700 -
\??\c:\rrfrrxl.exec:\rrfrrxl.exe44⤵
- Executes dropped EXE
PID:2216 -
\??\c:\hthhtt.exec:\hthhtt.exe45⤵
- Executes dropped EXE
PID:2472 -
\??\c:\pdjvv.exec:\pdjvv.exe46⤵
- Executes dropped EXE
PID:2652 -
\??\c:\3vjdj.exec:\3vjdj.exe47⤵
- Executes dropped EXE
PID:2492 -
\??\c:\xlxxllr.exec:\xlxxllr.exe48⤵
- Executes dropped EXE
PID:2632 -
\??\c:\htbthh.exec:\htbthh.exe49⤵
- Executes dropped EXE
PID:2828 -
\??\c:\bthtbh.exec:\bthtbh.exe50⤵
- Executes dropped EXE
PID:2636 -
\??\c:\ppddj.exec:\ppddj.exe51⤵
- Executes dropped EXE
PID:2464 -
\??\c:\lxllrrr.exec:\lxllrrr.exe52⤵
- Executes dropped EXE
PID:1976 -
\??\c:\xxlxfff.exec:\xxlxfff.exe53⤵
- Executes dropped EXE
PID:1508 -
\??\c:\hbtttb.exec:\hbtttb.exe54⤵
- Executes dropped EXE
PID:2724 -
\??\c:\pvdjp.exec:\pvdjp.exe55⤵
- Executes dropped EXE
PID:2800 -
\??\c:\5dvvv.exec:\5dvvv.exe56⤵
- Executes dropped EXE
PID:2812 -
\??\c:\1rrxfxf.exec:\1rrxfxf.exe57⤵
- Executes dropped EXE
PID:1352 -
\??\c:\5btnnn.exec:\5btnnn.exe58⤵
- Executes dropped EXE
PID:1752 -
\??\c:\tthnnt.exec:\tthnnt.exe59⤵
- Executes dropped EXE
PID:1712 -
\??\c:\pjvdj.exec:\pjvdj.exe60⤵
- Executes dropped EXE
PID:1772 -
\??\c:\xrxxrll.exec:\xrxxrll.exe61⤵
- Executes dropped EXE
PID:1268 -
\??\c:\llxlxxr.exec:\llxlxxr.exe62⤵
- Executes dropped EXE
PID:1312 -
\??\c:\nhhbtn.exec:\nhhbtn.exe63⤵
- Executes dropped EXE
PID:1192 -
\??\c:\hbnntn.exec:\hbnntn.exe64⤵
- Executes dropped EXE
PID:2368 -
\??\c:\1dpvv.exec:\1dpvv.exe65⤵
- Executes dropped EXE
PID:2040 -
\??\c:\7flfxlr.exec:\7flfxlr.exe66⤵PID:1240
-
\??\c:\xlrlrll.exec:\xlrlrll.exe67⤵PID:1620
-
\??\c:\tnbhth.exec:\tnbhth.exe68⤵PID:2860
-
\??\c:\nbnhtn.exec:\nbnhtn.exe69⤵PID:1400
-
\??\c:\dvvvd.exec:\dvvvd.exe70⤵PID:1296
-
\??\c:\xlfllfl.exec:\xlfllfl.exe71⤵PID:572
-
\??\c:\1xlrxlr.exec:\1xlrxlr.exe72⤵PID:1396
-
\??\c:\ttntnh.exec:\ttntnh.exe73⤵PID:2320
-
\??\c:\dvddd.exec:\dvddd.exe74⤵PID:2200
-
\??\c:\jdppp.exec:\jdppp.exe75⤵PID:492
-
\??\c:\lfrrrrf.exec:\lfrrrrf.exe76⤵PID:448
-
\??\c:\fxfrffl.exec:\fxfrffl.exe77⤵PID:1456
-
\??\c:\thbnbb.exec:\thbnbb.exe78⤵PID:956
-
\??\c:\vjppp.exec:\vjppp.exe79⤵PID:348
-
\??\c:\dvpdd.exec:\dvpdd.exe80⤵PID:280
-
\??\c:\9xffrrr.exec:\9xffrrr.exe81⤵PID:608
-
\??\c:\xrrxlxf.exec:\xrrxlxf.exe82⤵PID:2180
-
\??\c:\httthb.exec:\httthb.exe83⤵PID:696
-
\??\c:\thntbh.exec:\thntbh.exe84⤵PID:2208
-
\??\c:\vpddd.exec:\vpddd.exe85⤵PID:2920
-
\??\c:\frxxrxf.exec:\frxxrxf.exe86⤵PID:2160
-
\??\c:\9xlflfl.exec:\9xlflfl.exe87⤵PID:1420
-
\??\c:\tnthtt.exec:\tnthtt.exe88⤵PID:940
-
\??\c:\htbbhh.exec:\htbbhh.exe89⤵PID:2256
-
\??\c:\5vjpp.exec:\5vjpp.exe90⤵PID:2244
-
\??\c:\5llllrx.exec:\5llllrx.exe91⤵PID:2196
-
\??\c:\9rxrrrx.exec:\9rxrrrx.exe92⤵PID:1524
-
\??\c:\3hbhnn.exec:\3hbhnn.exe93⤵PID:2676
-
\??\c:\3tthnt.exec:\3tthnt.exe94⤵PID:2744
-
\??\c:\vvjjj.exec:\vvjjj.exe95⤵PID:2680
-
\??\c:\xxrxrfx.exec:\xxrxrfx.exe96⤵PID:2176
-
\??\c:\lxxrxrf.exec:\lxxrxrf.exe97⤵PID:2692
-
\??\c:\7hnhnb.exec:\7hnhnb.exe98⤵PID:2328
-
\??\c:\9ntnnt.exec:\9ntnnt.exe99⤵PID:2580
-
\??\c:\9djpv.exec:\9djpv.exe100⤵PID:2480
-
\??\c:\5lxxfxx.exec:\5lxxfxx.exe101⤵PID:2588
-
\??\c:\rlxlxfx.exec:\rlxlxfx.exe102⤵PID:2508
-
\??\c:\7bbhtb.exec:\7bbhtb.exe103⤵PID:3016
-
\??\c:\7tnntt.exec:\7tnntt.exe104⤵PID:2452
-
\??\c:\3dvdj.exec:\3dvdj.exe105⤵PID:2728
-
\??\c:\1vpjp.exec:\1vpjp.exe106⤵PID:2788
-
\??\c:\lfrflxl.exec:\lfrflxl.exe107⤵PID:2712
-
\??\c:\hbhhnn.exec:\hbhhnn.exe108⤵PID:1504
-
\??\c:\1nhtbt.exec:\1nhtbt.exe109⤵PID:1628
-
\??\c:\tnhthb.exec:\tnhthb.exe110⤵PID:2280
-
\??\c:\pdjjp.exec:\pdjjp.exe111⤵PID:1656
-
\??\c:\ffxrxxf.exec:\ffxrxxf.exe112⤵PID:1760
-
\??\c:\9fxxlfl.exec:\9fxxlfl.exe113⤵PID:624
-
\??\c:\tnbbhb.exec:\tnbbhb.exe114⤵PID:1248
-
\??\c:\hbnbbb.exec:\hbnbbb.exe115⤵PID:1356
-
\??\c:\ppdpd.exec:\ppdpd.exe116⤵PID:1204
-
\??\c:\dpdjj.exec:\dpdjj.exe117⤵PID:1680
-
\??\c:\frfxrrx.exec:\frfxrrx.exe118⤵PID:2036
-
\??\c:\hntnnh.exec:\hntnnh.exe119⤵PID:1908
-
\??\c:\hhhhbb.exec:\hhhhbb.exe120⤵PID:2968
-
\??\c:\vppvp.exec:\vppvp.exe121⤵PID:2844
-
\??\c:\xrlfllf.exec:\xrlfllf.exe122⤵PID:1920
-
\??\c:\lfxfxfl.exec:\lfxfxfl.exe123⤵PID:2660
-
\??\c:\btnhtt.exec:\btnhtt.exe124⤵PID:1172
-
\??\c:\hbbnbn.exec:\hbbnbn.exe125⤵PID:780
-
\??\c:\dpdpv.exec:\dpdpv.exe126⤵PID:1692
-
\??\c:\ffflrxr.exec:\ffflrxr.exe127⤵PID:2904
-
\??\c:\3ffrfrl.exec:\3ffrfrl.exe128⤵PID:1480
-
\??\c:\tbnhhh.exec:\tbnhhh.exe129⤵PID:1820
-
\??\c:\vpvvd.exec:\vpvvd.exe130⤵PID:1532
-
\??\c:\dvpvp.exec:\dvpvp.exe131⤵PID:2144
-
\??\c:\1rrrxrx.exec:\1rrrxrx.exe132⤵PID:344
-
\??\c:\5rflrfl.exec:\5rflrfl.exe133⤵PID:2140
-
\??\c:\3ntbnn.exec:\3ntbnn.exe134⤵PID:296
-
\??\c:\vpddp.exec:\vpddp.exe135⤵PID:1176
-
\??\c:\7vjjv.exec:\7vjjv.exe136⤵PID:1904
-
\??\c:\xxffllr.exec:\xxffllr.exe137⤵PID:1612
-
\??\c:\bthhtb.exec:\bthhtb.exe138⤵PID:2188
-
\??\c:\nhntbn.exec:\nhntbn.exe139⤵PID:2412
-
\??\c:\pjjjv.exec:\pjjjv.exe140⤵PID:2644
-
\??\c:\jvdjj.exec:\jvdjj.exe141⤵PID:1708
-
\??\c:\3xxlrxf.exec:\3xxlrxf.exe142⤵PID:3044
-
\??\c:\frflrlr.exec:\frflrlr.exe143⤵PID:2196
-
\??\c:\hbhhnn.exec:\hbhhnn.exe144⤵PID:2616
-
\??\c:\dpddp.exec:\dpddp.exe145⤵PID:2612
-
\??\c:\1frxflr.exec:\1frxflr.exe146⤵PID:2740
-
\??\c:\3nbntb.exec:\3nbntb.exe147⤵PID:2076
-
\??\c:\ththhh.exec:\ththhh.exe148⤵PID:2176
-
\??\c:\5jvdp.exec:\5jvdp.exe149⤵PID:2692
-
\??\c:\3jpvp.exec:\3jpvp.exe150⤵PID:2328
-
\??\c:\xlrlrrx.exec:\xlrlrrx.exe151⤵PID:2580
-
\??\c:\9flxfll.exec:\9flxfll.exe152⤵PID:2980
-
\??\c:\bhhbth.exec:\bhhbth.exe153⤵PID:2588
-
\??\c:\nthnnh.exec:\nthnnh.exe154⤵PID:2340
-
\??\c:\vdvpd.exec:\vdvpd.exe155⤵PID:2732
-
\??\c:\ffxxfxx.exec:\ffxxfxx.exe156⤵PID:2532
-
\??\c:\5rfflfl.exec:\5rfflfl.exe157⤵PID:904
-
\??\c:\hbbbnn.exec:\hbbbnn.exe158⤵PID:2796
-
\??\c:\nhtbhh.exec:\nhtbhh.exe159⤵PID:2804
-
\??\c:\pjdjp.exec:\pjdjp.exe160⤵PID:1784
-
\??\c:\llrrxxl.exec:\llrrxxl.exe161⤵PID:1584
-
\??\c:\frxfllx.exec:\frxfllx.exe162⤵PID:1780
-
\??\c:\tnnntt.exec:\tnnntt.exe163⤵PID:304
-
\??\c:\7bbhhn.exec:\7bbhhn.exe164⤵PID:1196
-
\??\c:\5jddd.exec:\5jddd.exe165⤵PID:1028
-
\??\c:\frfxflf.exec:\frfxflf.exe166⤵PID:2836
-
\??\c:\3fflxxf.exec:\3fflxxf.exe167⤵PID:1108
-
\??\c:\3hbhhh.exec:\3hbhhh.exe168⤵PID:2876
-
\??\c:\dpjpj.exec:\dpjpj.exe169⤵PID:2988
-
\??\c:\pjddj.exec:\pjddj.exe170⤵PID:1620
-
\??\c:\9flrxlx.exec:\9flrxlx.exe171⤵PID:2860
-
\??\c:\hbtbhh.exec:\hbtbhh.exe172⤵PID:292
-
\??\c:\nbbbbn.exec:\nbbbbn.exe173⤵PID:1812
-
\??\c:\pjvdv.exec:\pjvdv.exe174⤵PID:572
-
\??\c:\5vvdd.exec:\5vvdd.exe175⤵PID:924
-
\??\c:\rrrrlrl.exec:\rrrrlrl.exe176⤵PID:2100
-
\??\c:\hthhnh.exec:\hthhnh.exe177⤵PID:1900
-
\??\c:\tnhtth.exec:\tnhtth.exe178⤵PID:492
-
\??\c:\vpdjp.exec:\vpdjp.exe179⤵PID:2916
-
\??\c:\xlfxxfr.exec:\xlfxxfr.exe180⤵PID:748
-
\??\c:\flfrrrx.exec:\flfrrrx.exe181⤵PID:1292
-
\??\c:\9htnnt.exec:\9htnnt.exe182⤵PID:804
-
\??\c:\bttbbt.exec:\bttbbt.exe183⤵PID:656
-
\??\c:\9pjvd.exec:\9pjvd.exe184⤵PID:2228
-
\??\c:\lfxlflf.exec:\lfxlflf.exe185⤵PID:1816
-
\??\c:\fxlrffr.exec:\fxlrffr.exe186⤵PID:2120
-
\??\c:\hbnnbn.exec:\hbnnbn.exe187⤵PID:296
-
\??\c:\vpdjv.exec:\vpdjv.exe188⤵PID:2400
-
\??\c:\pdvpj.exec:\pdvpj.exe189⤵PID:2160
-
\??\c:\7ffrxfr.exec:\7ffrxfr.exe190⤵PID:1588
-
\??\c:\3nnhbh.exec:\3nnhbh.exe191⤵PID:2056
-
\??\c:\djvjv.exec:\djvjv.exe192⤵PID:2772
-
\??\c:\jpdjp.exec:\jpdjp.exe193⤵PID:1856
-
\??\c:\3flxflx.exec:\3flxflx.exe194⤵PID:1516
-
\??\c:\xxrrlxl.exec:\xxrrlxl.exe195⤵PID:2708
-
\??\c:\thbntt.exec:\thbntt.exe196⤵PID:2572
-
\??\c:\vpdjv.exec:\vpdjv.exe197⤵PID:2600
-
\??\c:\dvjjp.exec:\dvjjp.exe198⤵PID:2672
-
\??\c:\ffxllxl.exec:\ffxllxl.exe199⤵PID:2764
-
\??\c:\nnhhnn.exec:\nnhhnn.exe200⤵PID:2880
-
\??\c:\thbhhn.exec:\thbhhn.exe201⤵PID:1600
-
\??\c:\jvddj.exec:\jvddj.exe202⤵PID:2408
-
\??\c:\dvdjd.exec:\dvdjd.exe203⤵PID:2684
-
\??\c:\rfxlxxl.exec:\rfxlxxl.exe204⤵PID:2480
-
\??\c:\hhtnth.exec:\hhtnth.exe205⤵PID:2380
-
\??\c:\bthntt.exec:\bthntt.exe206⤵PID:2996
-
\??\c:\pdppv.exec:\pdppv.exe207⤵PID:3016
-
\??\c:\3jddj.exec:\3jddj.exe208⤵PID:1540
-
\??\c:\xxlxxxf.exec:\xxlxxxf.exe209⤵PID:2532
-
\??\c:\hbtbhb.exec:\hbtbhb.exe210⤵PID:2728
-
\??\c:\hbtnbh.exec:\hbtnbh.exe211⤵PID:1352
-
\??\c:\pdvvv.exec:\pdvvv.exe212⤵PID:2804
-
\??\c:\xrlllrx.exec:\xrlllrx.exe213⤵PID:1712
-
\??\c:\fffrxxf.exec:\fffrxxf.exe214⤵PID:1536
-
\??\c:\hbbnbh.exec:\hbbnbh.exe215⤵PID:1656
-
\??\c:\ttnbnn.exec:\ttnbnn.exe216⤵PID:304
-
\??\c:\pdvvj.exec:\pdvvj.exe217⤵PID:340
-
\??\c:\1pdpp.exec:\1pdpp.exe218⤵PID:1028
-
\??\c:\xlflxxl.exec:\xlflxxl.exe219⤵PID:2836
-
\??\c:\nhntbh.exec:\nhntbh.exe220⤵PID:3004
-
\??\c:\7nhnnn.exec:\7nhnnn.exe221⤵PID:2024
-
\??\c:\vjvdp.exec:\vjvdp.exe222⤵PID:2964
-
\??\c:\pjvjv.exec:\pjvjv.exe223⤵PID:584
-
\??\c:\3frxxfr.exec:\3frxxfr.exe224⤵PID:1032
-
\??\c:\hhthtt.exec:\hhthtt.exe225⤵PID:1720
-
\??\c:\tnbbbb.exec:\tnbbbb.exe226⤵PID:1812
-
\??\c:\jddjp.exec:\jddjp.exe227⤵PID:572
-
\??\c:\dvpvd.exec:\dvpvd.exe228⤵PID:2360
-
\??\c:\rlxxllx.exec:\rlxxllx.exe229⤵PID:744
-
\??\c:\tnhnbb.exec:\tnhnbb.exe230⤵PID:1440
-
\??\c:\hbntbh.exec:\hbntbh.exe231⤵PID:448
-
\??\c:\vjpjj.exec:\vjpjj.exe232⤵PID:2916
-
\??\c:\pdpvj.exec:\pdpvj.exe233⤵PID:1500
-
\??\c:\1lxxfff.exec:\1lxxfff.exe234⤵PID:1480
-
\??\c:\btnbhn.exec:\btnbhn.exe235⤵PID:1868
-
\??\c:\hbnnbh.exec:\hbnnbh.exe236⤵PID:280
-
\??\c:\5ppdj.exec:\5ppdj.exe237⤵PID:2228
-
\??\c:\dpjpd.exec:\dpjpd.exe238⤵PID:1568
-
\??\c:\fxlrxfr.exec:\fxlrxfr.exe239⤵PID:3060
-
\??\c:\rllxxxx.exec:\rllxxxx.exe240⤵PID:876
-
\??\c:\httbnh.exec:\httbnh.exe241⤵PID:1728
-