Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 09:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exe
-
Size
368KB
-
MD5
00bb4bbc69ab96227cb9b4ad7e376010
-
SHA1
a4e8af01ebc6bb78beda9ca256da8ab4fa8937d0
-
SHA256
490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570
-
SHA512
85f8a185b1cb000447a6250150343147c8fd2b835633269b31fe8a98400fc3a49530e6f15b83c084ad2f42e11bcabc226a476acd984966ba088da532a58a1c4c
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73tvn+Yp9FrHSwh/c/hdTWGIaxJ8TN005pWmjVwdSsyu:n3C9BRo7tvnJ9Fywhk/T7xyTpShZH
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/3936-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3140-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2876-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/948-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1668-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3644-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4484-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3892-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3440-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2748-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2824-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3104-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3164-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5092-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4516-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1616-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1140-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4596-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/464-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1176-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1676-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1936-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3980-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2996-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
frxxxxr.exebthbtb.exevvpvp.exejpdvv.exelfffllr.exejdvpd.exelxxfrrr.exe5tbbth.exexfxffll.exefxfxxxf.exettntht.exeddddv.exebnttbh.exe9dddd.exe7hhbhh.exejvjdd.exe3xfrllr.exentttbh.exeddjjj.exexflrxxl.exehntttt.exedddjj.exehnbbtt.exejjjjj.exepjvdj.exe9rrlfxx.exethtttb.exe1vjjv.exeflxrrxr.exenbbbtt.exe1ppjv.exexlfxfrr.exennnnhh.exe1btnhh.exejddjd.exexrlfxrr.exentbtnn.exehbhtbb.exepppjv.exelxxrlfx.exexxrlflf.exetnnbnh.exejjppp.exejjjdp.exelxxlxrl.exerfxxrrf.exehnnnhb.exehnhnbb.exe7vvdp.exe5fxlfxl.exerlfxlfx.exebbttnn.exetbthhh.exedvjdv.exexxfffff.exe1ntnbt.exerrrrxrr.exehbnbtn.exerflxfrl.exefffllfl.exeddjdv.exehnbbtt.exevvddd.exexlfxrfx.exepid process 3096 frxxxxr.exe 3140 bthbtb.exe 1796 vvpvp.exe 2876 jpdvv.exe 948 lfffllr.exe 3644 jdvpd.exe 1668 lxxfrrr.exe 2792 5tbbth.exe 4484 xfxffll.exe 3892 fxfxxxf.exe 3440 ttntht.exe 2748 ddddv.exe 3316 bnttbh.exe 2824 9dddd.exe 1780 7hhbhh.exe 2768 jvjdd.exe 3164 3xfrllr.exe 3104 ntttbh.exe 2996 ddjjj.exe 5092 xflrxxl.exe 4516 hntttt.exe 1616 dddjj.exe 3980 hnbbtt.exe 2092 jjjjj.exe 3448 pjvdj.exe 1936 9rrlfxx.exe 1140 thtttb.exe 4596 1vjjv.exe 1676 flxrrxr.exe 464 nbbbtt.exe 1176 1ppjv.exe 1300 xlfxfrr.exe 3124 nnnnhh.exe 4472 1btnhh.exe 4128 jddjd.exe 4476 xrlfxrr.exe 3056 ntbtnn.exe 3148 hbhtbb.exe 4316 pppjv.exe 4636 lxxrlfx.exe 3328 xxrlflf.exe 5020 tnnbnh.exe 2804 jjppp.exe 3572 jjjdp.exe 3312 lxxlxrl.exe 932 rfxxrrf.exe 1480 hnnnhb.exe 1396 hnhnbb.exe 4348 7vvdp.exe 1628 5fxlfxl.exe 1500 rlfxlfx.exe 3960 bbttnn.exe 2328 tbthhh.exe 4204 dvjdv.exe 548 xxfffff.exe 4716 1ntnbt.exe 4032 rrrrxrr.exe 2772 hbnbtn.exe 4040 rflxfrl.exe 4508 fffllfl.exe 1668 ddjdv.exe 564 hnbbtt.exe 924 vvddd.exe 4136 xlfxrfx.exe -
Processes:
resource yara_rule behavioral2/memory/3936-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3140-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2876-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/948-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1668-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3644-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3892-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3440-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2748-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2824-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3104-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3164-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5092-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4516-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1616-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1140-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4596-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/464-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1176-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1676-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1936-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3980-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2996-133-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exefrxxxxr.exebthbtb.exevvpvp.exejpdvv.exelfffllr.exejdvpd.exelxxfrrr.exe5tbbth.exexfxffll.exefxfxxxf.exettntht.exeddddv.exebnttbh.exe9dddd.exe7hhbhh.exejvjdd.exe3xfrllr.exentttbh.exeddjjj.exexflrxxl.exehntttt.exedescription pid process target process PID 3936 wrote to memory of 3096 3936 490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exe frxxxxr.exe PID 3936 wrote to memory of 3096 3936 490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exe frxxxxr.exe PID 3936 wrote to memory of 3096 3936 490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exe frxxxxr.exe PID 3096 wrote to memory of 3140 3096 frxxxxr.exe bthbtb.exe PID 3096 wrote to memory of 3140 3096 frxxxxr.exe bthbtb.exe PID 3096 wrote to memory of 3140 3096 frxxxxr.exe bthbtb.exe PID 3140 wrote to memory of 1796 3140 bthbtb.exe vvpvp.exe PID 3140 wrote to memory of 1796 3140 bthbtb.exe vvpvp.exe PID 3140 wrote to memory of 1796 3140 bthbtb.exe vvpvp.exe PID 1796 wrote to memory of 2876 1796 vvpvp.exe jpdvv.exe PID 1796 wrote to memory of 2876 1796 vvpvp.exe jpdvv.exe PID 1796 wrote to memory of 2876 1796 vvpvp.exe jpdvv.exe PID 2876 wrote to memory of 948 2876 jpdvv.exe lfffllr.exe PID 2876 wrote to memory of 948 2876 jpdvv.exe lfffllr.exe PID 2876 wrote to memory of 948 2876 jpdvv.exe lfffllr.exe PID 948 wrote to memory of 3644 948 lfffllr.exe jdvpd.exe PID 948 wrote to memory of 3644 948 lfffllr.exe jdvpd.exe PID 948 wrote to memory of 3644 948 lfffllr.exe jdvpd.exe PID 3644 wrote to memory of 1668 3644 jdvpd.exe lxxfrrr.exe PID 3644 wrote to memory of 1668 3644 jdvpd.exe lxxfrrr.exe PID 3644 wrote to memory of 1668 3644 jdvpd.exe lxxfrrr.exe PID 1668 wrote to memory of 2792 1668 lxxfrrr.exe 5tbbth.exe PID 1668 wrote to memory of 2792 1668 lxxfrrr.exe 5tbbth.exe PID 1668 wrote to memory of 2792 1668 lxxfrrr.exe 5tbbth.exe PID 2792 wrote to memory of 4484 2792 5tbbth.exe xfxffll.exe PID 2792 wrote to memory of 4484 2792 5tbbth.exe xfxffll.exe PID 2792 wrote to memory of 4484 2792 5tbbth.exe xfxffll.exe PID 4484 wrote to memory of 3892 4484 xfxffll.exe fxfxxxf.exe PID 4484 wrote to memory of 3892 4484 xfxffll.exe fxfxxxf.exe PID 4484 wrote to memory of 3892 4484 xfxffll.exe fxfxxxf.exe PID 3892 wrote to memory of 3440 3892 fxfxxxf.exe ttntht.exe PID 3892 wrote to memory of 3440 3892 fxfxxxf.exe ttntht.exe PID 3892 wrote to memory of 3440 3892 fxfxxxf.exe ttntht.exe PID 3440 wrote to memory of 2748 3440 ttntht.exe ddddv.exe PID 3440 wrote to memory of 2748 3440 ttntht.exe ddddv.exe PID 3440 wrote to memory of 2748 3440 ttntht.exe ddddv.exe PID 2748 wrote to memory of 3316 2748 ddddv.exe bnttbh.exe PID 2748 wrote to memory of 3316 2748 ddddv.exe bnttbh.exe PID 2748 wrote to memory of 3316 2748 ddddv.exe bnttbh.exe PID 3316 wrote to memory of 2824 3316 bnttbh.exe 9dddd.exe PID 3316 wrote to memory of 2824 3316 bnttbh.exe 9dddd.exe PID 3316 wrote to memory of 2824 3316 bnttbh.exe 9dddd.exe PID 2824 wrote to memory of 1780 2824 9dddd.exe 7hhbhh.exe PID 2824 wrote to memory of 1780 2824 9dddd.exe 7hhbhh.exe PID 2824 wrote to memory of 1780 2824 9dddd.exe 7hhbhh.exe PID 1780 wrote to memory of 2768 1780 7hhbhh.exe jvjdd.exe PID 1780 wrote to memory of 2768 1780 7hhbhh.exe jvjdd.exe PID 1780 wrote to memory of 2768 1780 7hhbhh.exe jvjdd.exe PID 2768 wrote to memory of 3164 2768 jvjdd.exe 3xfrllr.exe PID 2768 wrote to memory of 3164 2768 jvjdd.exe 3xfrllr.exe PID 2768 wrote to memory of 3164 2768 jvjdd.exe 3xfrllr.exe PID 3164 wrote to memory of 3104 3164 3xfrllr.exe ntttbh.exe PID 3164 wrote to memory of 3104 3164 3xfrllr.exe ntttbh.exe PID 3164 wrote to memory of 3104 3164 3xfrllr.exe ntttbh.exe PID 3104 wrote to memory of 2996 3104 ntttbh.exe ddjjj.exe PID 3104 wrote to memory of 2996 3104 ntttbh.exe ddjjj.exe PID 3104 wrote to memory of 2996 3104 ntttbh.exe ddjjj.exe PID 2996 wrote to memory of 5092 2996 ddjjj.exe xflrxxl.exe PID 2996 wrote to memory of 5092 2996 ddjjj.exe xflrxxl.exe PID 2996 wrote to memory of 5092 2996 ddjjj.exe xflrxxl.exe PID 5092 wrote to memory of 4516 5092 xflrxxl.exe hntttt.exe PID 5092 wrote to memory of 4516 5092 xflrxxl.exe hntttt.exe PID 5092 wrote to memory of 4516 5092 xflrxxl.exe hntttt.exe PID 4516 wrote to memory of 1616 4516 hntttt.exe dddjj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\490824f4a6f961b730b8d416cdc7681a369c9be94fea392d564af6f95a840570_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\frxxxxr.exec:\frxxxxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bthbtb.exec:\bthbtb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvpvp.exec:\vvpvp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpdvv.exec:\jpdvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfffllr.exec:\lfffllr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvpd.exec:\jdvpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxxfrrr.exec:\lxxfrrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5tbbth.exec:\5tbbth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfxffll.exec:\xfxffll.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxfxxxf.exec:\fxfxxxf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttntht.exec:\ttntht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddddv.exec:\ddddv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnttbh.exec:\bnttbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9dddd.exec:\9dddd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7hhbhh.exec:\7hhbhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvjdd.exec:\jvjdd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3xfrllr.exec:\3xfrllr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntttbh.exec:\ntttbh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddjjj.exec:\ddjjj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xflrxxl.exec:\xflrxxl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hntttt.exec:\hntttt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dddjj.exec:\dddjj.exe23⤵
- Executes dropped EXE
-
\??\c:\hnbbtt.exec:\hnbbtt.exe24⤵
- Executes dropped EXE
-
\??\c:\jjjjj.exec:\jjjjj.exe25⤵
- Executes dropped EXE
-
\??\c:\pjvdj.exec:\pjvdj.exe26⤵
- Executes dropped EXE
-
\??\c:\9rrlfxx.exec:\9rrlfxx.exe27⤵
- Executes dropped EXE
-
\??\c:\thtttb.exec:\thtttb.exe28⤵
- Executes dropped EXE
-
\??\c:\1vjjv.exec:\1vjjv.exe29⤵
- Executes dropped EXE
-
\??\c:\flxrrxr.exec:\flxrrxr.exe30⤵
- Executes dropped EXE
-
\??\c:\nbbbtt.exec:\nbbbtt.exe31⤵
- Executes dropped EXE
-
\??\c:\1ppjv.exec:\1ppjv.exe32⤵
- Executes dropped EXE
-
\??\c:\xlfxfrr.exec:\xlfxfrr.exe33⤵
- Executes dropped EXE
-
\??\c:\nnnnhh.exec:\nnnnhh.exe34⤵
- Executes dropped EXE
-
\??\c:\1btnhh.exec:\1btnhh.exe35⤵
- Executes dropped EXE
-
\??\c:\jddjd.exec:\jddjd.exe36⤵
- Executes dropped EXE
-
\??\c:\xrlfxrr.exec:\xrlfxrr.exe37⤵
- Executes dropped EXE
-
\??\c:\ntbtnn.exec:\ntbtnn.exe38⤵
- Executes dropped EXE
-
\??\c:\hbhtbb.exec:\hbhtbb.exe39⤵
- Executes dropped EXE
-
\??\c:\pppjv.exec:\pppjv.exe40⤵
- Executes dropped EXE
-
\??\c:\lxxrlfx.exec:\lxxrlfx.exe41⤵
- Executes dropped EXE
-
\??\c:\xxrlflf.exec:\xxrlflf.exe42⤵
- Executes dropped EXE
-
\??\c:\tnnbnh.exec:\tnnbnh.exe43⤵
- Executes dropped EXE
-
\??\c:\jjppp.exec:\jjppp.exe44⤵
- Executes dropped EXE
-
\??\c:\jjjdp.exec:\jjjdp.exe45⤵
- Executes dropped EXE
-
\??\c:\lxxlxrl.exec:\lxxlxrl.exe46⤵
- Executes dropped EXE
-
\??\c:\rfxxrrf.exec:\rfxxrrf.exe47⤵
- Executes dropped EXE
-
\??\c:\hnnnhb.exec:\hnnnhb.exe48⤵
- Executes dropped EXE
-
\??\c:\hnhnbb.exec:\hnhnbb.exe49⤵
- Executes dropped EXE
-
\??\c:\7vvdp.exec:\7vvdp.exe50⤵
- Executes dropped EXE
-
\??\c:\5fxlfxl.exec:\5fxlfxl.exe51⤵
- Executes dropped EXE
-
\??\c:\rlfxlfx.exec:\rlfxlfx.exe52⤵
- Executes dropped EXE
-
\??\c:\bbttnn.exec:\bbttnn.exe53⤵
- Executes dropped EXE
-
\??\c:\tbthhh.exec:\tbthhh.exe54⤵
- Executes dropped EXE
-
\??\c:\dvjdv.exec:\dvjdv.exe55⤵
- Executes dropped EXE
-
\??\c:\xxfffff.exec:\xxfffff.exe56⤵
- Executes dropped EXE
-
\??\c:\1ntnbt.exec:\1ntnbt.exe57⤵
- Executes dropped EXE
-
\??\c:\rrrrxrr.exec:\rrrrxrr.exe58⤵
- Executes dropped EXE
-
\??\c:\hbnbtn.exec:\hbnbtn.exe59⤵
- Executes dropped EXE
-
\??\c:\rflxfrl.exec:\rflxfrl.exe60⤵
- Executes dropped EXE
-
\??\c:\fffllfl.exec:\fffllfl.exe61⤵
- Executes dropped EXE
-
\??\c:\ddjdv.exec:\ddjdv.exe62⤵
- Executes dropped EXE
-
\??\c:\hnbbtt.exec:\hnbbtt.exe63⤵
- Executes dropped EXE
-
\??\c:\vvddd.exec:\vvddd.exe64⤵
- Executes dropped EXE
-
\??\c:\xlfxrfx.exec:\xlfxrfx.exe65⤵
- Executes dropped EXE
-
\??\c:\nnhbnn.exec:\nnhbnn.exe66⤵
-
\??\c:\7pjdd.exec:\7pjdd.exe67⤵
-
\??\c:\flflrxl.exec:\flflrxl.exe68⤵
-
\??\c:\5ttnnn.exec:\5ttnnn.exe69⤵
-
\??\c:\flxrllf.exec:\flxrllf.exe70⤵
-
\??\c:\rlfrxrf.exec:\rlfrxrf.exe71⤵
-
\??\c:\ntbthb.exec:\ntbthb.exe72⤵
-
\??\c:\jdpdp.exec:\jdpdp.exe73⤵
-
\??\c:\lfxrrlx.exec:\lfxrrlx.exe74⤵
-
\??\c:\lxrrlff.exec:\lxrrlff.exe75⤵
-
\??\c:\btbnnh.exec:\btbnnh.exe76⤵
-
\??\c:\vpjjv.exec:\vpjjv.exe77⤵
-
\??\c:\rxxrrll.exec:\rxxrrll.exe78⤵
-
\??\c:\rrxlxlx.exec:\rrxlxlx.exe79⤵
-
\??\c:\hnbbtn.exec:\hnbbtn.exe80⤵
-
\??\c:\ppvjd.exec:\ppvjd.exe81⤵
-
\??\c:\3jppd.exec:\3jppd.exe82⤵
-
\??\c:\rrxxrrl.exec:\rrxxrrl.exe83⤵
-
\??\c:\nbnnht.exec:\nbnnht.exe84⤵
-
\??\c:\bbhtbt.exec:\bbhtbt.exe85⤵
-
\??\c:\5jpvj.exec:\5jpvj.exe86⤵
-
\??\c:\xllxlfx.exec:\xllxlfx.exe87⤵
-
\??\c:\rxxxxxr.exec:\rxxxxxr.exe88⤵
-
\??\c:\3hbnhn.exec:\3hbnhn.exe89⤵
-
\??\c:\pvdpj.exec:\pvdpj.exe90⤵
-
\??\c:\pvjjj.exec:\pvjjj.exe91⤵
-
\??\c:\xrlllxx.exec:\xrlllxx.exe92⤵
-
\??\c:\bbhttt.exec:\bbhttt.exe93⤵
-
\??\c:\jvjdv.exec:\jvjdv.exe94⤵
-
\??\c:\7xfxrrr.exec:\7xfxrrr.exe95⤵
-
\??\c:\frfxrrr.exec:\frfxrrr.exe96⤵
-
\??\c:\bhhbnn.exec:\bhhbnn.exe97⤵
-
\??\c:\ppjjp.exec:\ppjjp.exe98⤵
-
\??\c:\xrfxfxf.exec:\xrfxfxf.exe99⤵
-
\??\c:\1lrfrfx.exec:\1lrfrfx.exe100⤵
-
\??\c:\hhnnnn.exec:\hhnnnn.exe101⤵
-
\??\c:\vdpvv.exec:\vdpvv.exe102⤵
-
\??\c:\5lrllll.exec:\5lrllll.exe103⤵
-
\??\c:\lxxrlff.exec:\lxxrlff.exe104⤵
-
\??\c:\nhnnhn.exec:\nhnnhn.exe105⤵
-
\??\c:\5vvpd.exec:\5vvpd.exe106⤵
-
\??\c:\vdjdj.exec:\vdjdj.exe107⤵
-
\??\c:\xrxrxrf.exec:\xrxrxrf.exe108⤵
-
\??\c:\3hnhhn.exec:\3hnhhn.exe109⤵
-
\??\c:\bnbnht.exec:\bnbnht.exe110⤵
-
\??\c:\jdjdj.exec:\jdjdj.exe111⤵
-
\??\c:\xlfxrlx.exec:\xlfxrlx.exe112⤵
-
\??\c:\xlfxflr.exec:\xlfxflr.exe113⤵
-
\??\c:\ttbthb.exec:\ttbthb.exe114⤵
-
\??\c:\thhbtn.exec:\thhbtn.exe115⤵
-
\??\c:\9jjjd.exec:\9jjjd.exe116⤵
-
\??\c:\xxllrlx.exec:\xxllrlx.exe117⤵
-
\??\c:\bbtttn.exec:\bbtttn.exe118⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe119⤵
-
\??\c:\xlrlfxr.exec:\xlrlfxr.exe120⤵
-
\??\c:\bbbntt.exec:\bbbntt.exe121⤵
-
\??\c:\vpddd.exec:\vpddd.exe122⤵
-
\??\c:\vvvvj.exec:\vvvvj.exe123⤵
-
\??\c:\xrxxfff.exec:\xrxxfff.exe124⤵
-
\??\c:\bbbbbb.exec:\bbbbbb.exe125⤵
-
\??\c:\nnbthb.exec:\nnbthb.exe126⤵
-
\??\c:\1dvpp.exec:\1dvpp.exe127⤵
-
\??\c:\rxfrffx.exec:\rxfrffx.exe128⤵
-
\??\c:\3hnnbn.exec:\3hnnbn.exe129⤵
-
\??\c:\vjvvv.exec:\vjvvv.exe130⤵
-
\??\c:\1fffrll.exec:\1fffrll.exe131⤵
-
\??\c:\5lrllfx.exec:\5lrllfx.exe132⤵
-
\??\c:\9nthtn.exec:\9nthtn.exe133⤵
-
\??\c:\jdvpp.exec:\jdvpp.exe134⤵
-
\??\c:\jdppd.exec:\jdppd.exe135⤵
-
\??\c:\lllllrl.exec:\lllllrl.exe136⤵
-
\??\c:\tbhhhb.exec:\tbhhhb.exe137⤵
-
\??\c:\3ttbbb.exec:\3ttbbb.exe138⤵
-
\??\c:\1ddjj.exec:\1ddjj.exe139⤵
-
\??\c:\pvvvp.exec:\pvvvp.exe140⤵
-
\??\c:\xlfxlll.exec:\xlfxlll.exe141⤵
-
\??\c:\httnbt.exec:\httnbt.exe142⤵
-
\??\c:\hhnbht.exec:\hhnbht.exe143⤵
-
\??\c:\vjjvd.exec:\vjjvd.exe144⤵
-
\??\c:\xrxfffx.exec:\xrxfffx.exe145⤵
-
\??\c:\hthbtt.exec:\hthbtt.exe146⤵
-
\??\c:\nhbnhh.exec:\nhbnhh.exe147⤵
-
\??\c:\dvjvv.exec:\dvjvv.exe148⤵
-
\??\c:\lfrfrff.exec:\lfrfrff.exe149⤵
-
\??\c:\nttttt.exec:\nttttt.exe150⤵
-
\??\c:\vvjjp.exec:\vvjjp.exe151⤵
-
\??\c:\dvjdj.exec:\dvjdj.exe152⤵
-
\??\c:\fflllll.exec:\fflllll.exe153⤵
-
\??\c:\xlrllff.exec:\xlrllff.exe154⤵
-
\??\c:\5tnhhh.exec:\5tnhhh.exe155⤵
-
\??\c:\djjvj.exec:\djjvj.exe156⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe157⤵
-
\??\c:\ffxrrrl.exec:\ffxrrrl.exe158⤵
-
\??\c:\bbtnbb.exec:\bbtnbb.exe159⤵
-
\??\c:\hbnhbt.exec:\hbnhbt.exe160⤵
-
\??\c:\dpvpp.exec:\dpvpp.exe161⤵
-
\??\c:\rflfrrr.exec:\rflfrrr.exe162⤵
-
\??\c:\3rfrfxf.exec:\3rfrfxf.exe163⤵
-
\??\c:\hbbtnn.exec:\hbbtnn.exe164⤵
-
\??\c:\jjdvv.exec:\jjdvv.exe165⤵
-
\??\c:\vdjdd.exec:\vdjdd.exe166⤵
-
\??\c:\lfxxllf.exec:\lfxxllf.exe167⤵
-
\??\c:\tbhhbt.exec:\tbhhbt.exe168⤵
-
\??\c:\nntnhh.exec:\nntnhh.exe169⤵
-
\??\c:\vdvpd.exec:\vdvpd.exe170⤵
-
\??\c:\frlllrl.exec:\frlllrl.exe171⤵
-
\??\c:\1lfxrxf.exec:\1lfxrxf.exe172⤵
-
\??\c:\tnhbtb.exec:\tnhbtb.exe173⤵
-
\??\c:\jvvvj.exec:\jvvvj.exe174⤵
-
\??\c:\9xrxrff.exec:\9xrxrff.exe175⤵
-
\??\c:\hbnhbb.exec:\hbnhbb.exe176⤵
-
\??\c:\nbbbth.exec:\nbbbth.exe177⤵
-
\??\c:\dppjj.exec:\dppjj.exe178⤵
-
\??\c:\llxrxxx.exec:\llxrxxx.exe179⤵
-
\??\c:\fffxrrl.exec:\fffxrrl.exe180⤵
-
\??\c:\bbbbtt.exec:\bbbbtt.exe181⤵
-
\??\c:\vjpjd.exec:\vjpjd.exe182⤵
-
\??\c:\flrrxxr.exec:\flrrxxr.exe183⤵
-
\??\c:\tnhnnn.exec:\tnhnnn.exe184⤵
-
\??\c:\pdvdd.exec:\pdvdd.exe185⤵
-
\??\c:\rlxrlll.exec:\rlxrlll.exe186⤵
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe187⤵
-
\??\c:\hhnbnn.exec:\hhnbnn.exe188⤵
-
\??\c:\htnhtn.exec:\htnhtn.exe189⤵
-
\??\c:\vvdvp.exec:\vvdvp.exe190⤵
-
\??\c:\llrxxll.exec:\llrxxll.exe191⤵
-
\??\c:\tntttb.exec:\tntttb.exe192⤵
-
\??\c:\bbbntn.exec:\bbbntn.exe193⤵
-
\??\c:\jjpjj.exec:\jjpjj.exe194⤵
-
\??\c:\rxrrllf.exec:\rxrrllf.exe195⤵
-
\??\c:\nntntt.exec:\nntntt.exe196⤵
-
\??\c:\tbbnhb.exec:\tbbnhb.exe197⤵
-
\??\c:\ppvvv.exec:\ppvvv.exe198⤵
-
\??\c:\5rfxrrr.exec:\5rfxrrr.exe199⤵
-
\??\c:\rrfxlfr.exec:\rrfxlfr.exe200⤵
-
\??\c:\nhnhhh.exec:\nhnhhh.exe201⤵
-
\??\c:\9pppp.exec:\9pppp.exe202⤵
-
\??\c:\pvdjj.exec:\pvdjj.exe203⤵
-
\??\c:\xxlrrxx.exec:\xxlrrxx.exe204⤵
-
\??\c:\ttnbbt.exec:\ttnbbt.exe205⤵
-
\??\c:\vvjjv.exec:\vvjjv.exe206⤵
-
\??\c:\dpvvv.exec:\dpvvv.exe207⤵
-
\??\c:\lrrxfxr.exec:\lrrxfxr.exe208⤵
-
\??\c:\3tthbb.exec:\3tthbb.exe209⤵
-
\??\c:\7djjj.exec:\7djjj.exe210⤵
-
\??\c:\lfrllff.exec:\lfrllff.exe211⤵
-
\??\c:\lfllffl.exec:\lfllffl.exe212⤵
-
\??\c:\tnbbnn.exec:\tnbbnn.exe213⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe214⤵
-
\??\c:\vdpvp.exec:\vdpvp.exe215⤵
-
\??\c:\rrrlrrr.exec:\rrrlrrr.exe216⤵
-
\??\c:\bnnhbb.exec:\bnnhbb.exe217⤵
-
\??\c:\ppdvj.exec:\ppdvj.exe218⤵
-
\??\c:\pvddv.exec:\pvddv.exe219⤵
-
\??\c:\rlrrlll.exec:\rlrrlll.exe220⤵
-
\??\c:\5nbttb.exec:\5nbttb.exe221⤵
-
\??\c:\bnbbnn.exec:\bnbbnn.exe222⤵
-
\??\c:\djjpp.exec:\djjpp.exe223⤵
-
\??\c:\lllllrr.exec:\lllllrr.exe224⤵
-
\??\c:\ttbtbt.exec:\ttbtbt.exe225⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe226⤵
-
\??\c:\dvppj.exec:\dvppj.exe227⤵
-
\??\c:\lrrlfff.exec:\lrrlfff.exe228⤵
-
\??\c:\ttbnhb.exec:\ttbnhb.exe229⤵
-
\??\c:\hbnnhh.exec:\hbnnhh.exe230⤵
-
\??\c:\pdjdv.exec:\pdjdv.exe231⤵
-
\??\c:\lfrxfll.exec:\lfrxfll.exe232⤵
-
\??\c:\ntbtnn.exec:\ntbtnn.exe233⤵
-
\??\c:\jpjvd.exec:\jpjvd.exe234⤵
-
\??\c:\lxfxrlf.exec:\lxfxrlf.exe235⤵
-
\??\c:\3rrrlrr.exec:\3rrrlrr.exe236⤵
-
\??\c:\3tbbtb.exec:\3tbbtb.exe237⤵
-
\??\c:\5pvdp.exec:\5pvdp.exe238⤵
-
\??\c:\xlxxxxl.exec:\xlxxxxl.exe239⤵
-
\??\c:\hhbhht.exec:\hhbhht.exe240⤵
-
\??\c:\thhnhh.exec:\thhnhh.exe241⤵