Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 18:53
Behavioral task
behavioral1
Sample
1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exe
-
Size
329KB
-
MD5
1b0d9c6ed23852de54ff9e18db778470
-
SHA1
b444e900fc5ab31a71564519bc3f00e84ebd9e9a
-
SHA256
9b256baffab58b009b05489e753e2c8aa8141411113c75d87fdc956a2070d87c
-
SHA512
ccd49b0566ed5ced043affcdbd8477883138406af7c7fc37dc0aae7be8e7a08a6c7f22211cbe00a6f3d65d6f400a4e374bca0716d8198256b191dc247413a337
-
SSDEEP
6144:3cm7ImGddXsJdJIjaRleL42bL37BoTPkhu9gX5yGsTshQc8R0nxA5ij8+RC7tPhh:F7Tc8JdSjylh2b77BoTMA9gX59sTsuTR
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4260-4-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2068-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1032-20-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4944-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4660-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2900-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1164-44-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1404-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/776-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3112-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2864-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1800-68-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/780-75-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2344-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1072-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4704-99-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3872-105-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2152-106-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4596-113-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3480-123-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2112-137-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2036-140-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3740-146-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3260-157-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4404-159-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1952-170-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5108-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1400-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4528-215-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3060-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4860-236-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5008-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2064-252-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2872-255-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4484-259-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5076-263-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2456-277-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2648-289-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3872-291-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1092-297-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/952-307-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1736-314-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4176-318-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4432-325-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2544-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/536-351-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3876-358-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3148-374-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3484-411-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4640-428-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4704-432-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2592-445-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1104-456-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4624-518-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3932-552-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/620-632-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5072-654-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2408-792-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2564-803-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3424-878-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/656-942-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1492-1002-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4792-1066-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3080-1082-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\nnbtbh.exe family_berbew \??\c:\xxxflfl.exe family_berbew C:\tbbtnn.exe family_berbew C:\bhtttb.exe family_berbew C:\rfxlfxr.exe family_berbew \??\c:\hnntbh.exe family_berbew \??\c:\3tnhbn.exe family_berbew C:\pddjj.exe family_berbew C:\vpppp.exe family_berbew C:\fxlfxff.exe family_berbew C:\flfflxx.exe family_berbew C:\nntnbb.exe family_berbew C:\hnhhtt.exe family_berbew C:\jvjjv.exe family_berbew C:\ntntnb.exe family_berbew \??\c:\jddvj.exe family_berbew \??\c:\jvjdd.exe family_berbew \??\c:\xrllxfl.exe family_berbew \??\c:\pdppd.exe family_berbew C:\hhhtbh.exe family_berbew C:\3jjjd.exe family_berbew C:\vpvdv.exe family_berbew \??\c:\lxxrxxl.exe family_berbew C:\ffllfff.exe family_berbew \??\c:\nbhtnn.exe family_berbew C:\ppppv.exe family_berbew C:\fxlllll.exe family_berbew \??\c:\hbbbth.exe family_berbew C:\thhbtt.exe family_berbew C:\djjpv.exe family_berbew \??\c:\bbhnhn.exe family_berbew C:\pjpvp.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
nnbtbh.exexxxflfl.exetbbtnn.exebhtttb.exerfxlfxr.exehnntbh.exe3tnhbn.exepddjj.exevpppp.exefxlfxff.exeflfflxx.exenntnbb.exehnhhtt.exejvjjv.exentntnb.exejddvj.exejvjdd.exexrllxfl.exepdppd.exehhhtbh.exe3jjjd.exevpvdv.exelxxrxxl.exeffllfff.exenbhtnn.exeppppv.exefxlllll.exehbbbth.exethhbtt.exedjjpv.exebbhnhn.exepjpvp.exetntnnn.exefffflll.exenbbbtt.exebnbttt.exejdjdd.exelxxxxrx.exentbbbb.exepdpjd.exerfxrlfx.exebnhtth.exejdvvv.exefrxllxf.exetnhhbt.exejpppj.exexlffrll.exenbnnnn.exeppddd.exexlrrrfl.exehnhbhn.exevdvdj.exerxlllxr.exenbtbbt.exeffrlxrl.exebtbbbb.exedvjdd.exelfrrllr.exevdppp.exerlxxrfl.exehhtbtb.exevdvpd.exejvdpj.exeflfxlll.exepid process 2068 nnbtbh.exe 1032 xxxflfl.exe 4944 tbbtnn.exe 4660 bhtttb.exe 2900 rfxlfxr.exe 1164 hnntbh.exe 1404 3tnhbn.exe 776 pddjj.exe 3112 vpppp.exe 1800 fxlfxff.exe 2864 flfflxx.exe 780 nntnbb.exe 2344 hnhhtt.exe 1072 jvjjv.exe 4704 ntntnb.exe 3872 jddvj.exe 2152 jvjdd.exe 4596 xrllxfl.exe 3480 pdppd.exe 1736 hhhtbh.exe 3012 3jjjd.exe 2112 vpvdv.exe 2036 lxxrxxl.exe 3740 ffllfff.exe 3260 nbhtnn.exe 4404 ppppv.exe 4820 fxlllll.exe 1952 hbbbth.exe 860 thhbtt.exe 3524 djjpv.exe 5108 bbhnhn.exe 2388 pjpvp.exe 3632 tntnnn.exe 1400 fffflll.exe 2060 nbbbtt.exe 2960 bnbttt.exe 4148 jdjdd.exe 4672 lxxxxrx.exe 4528 ntbbbb.exe 532 pdpjd.exe 620 rfxrlfx.exe 2000 bnhtth.exe 3060 jdvvv.exe 4860 frxllxf.exe 4780 tnhhbt.exe 5008 jpppj.exe 936 xlffrll.exe 2064 nbnnnn.exe 2872 ppddd.exe 4484 xlrrrfl.exe 5076 hnhbhn.exe 1628 vdvdj.exe 988 rxlllxr.exe 2604 nbtbbt.exe 4028 ffrlxrl.exe 2456 btbbbb.exe 4792 dvjdd.exe 4200 lfrrllr.exe 2648 vdppp.exe 3872 rlxxrfl.exe 1092 hhtbtb.exe 2440 vdvpd.exe 3464 jvdpj.exe 952 flfxlll.exe -
Processes:
resource yara_rule behavioral2/memory/4260-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1032-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2068-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1032-20-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4944-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4660-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4660-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2900-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1164-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1164-44-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1404-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/776-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3112-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2864-70-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1800-68-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/780-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2344-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1072-87-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1072-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4704-99-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3872-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2152-106-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4596-113-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3480-123-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2112-137-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2036-140-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3740-146-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3260-157-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4404-159-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1952-170-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5108-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1400-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2060-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4672-211-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4528-215-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3060-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4860-236-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5008-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/936-244-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2064-252-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-255-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4484-259-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5076-263-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2456-277-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2648-289-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3872-291-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1092-297-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/952-307-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1736-314-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4176-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4432-325-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2544-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/536-351-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-358-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3148-374-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4624-378-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2000-382-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3348-386-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3484-411-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1076-421-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4640-428-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4704-432-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2592-445-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1104-452-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exennbtbh.exexxxflfl.exetbbtnn.exebhtttb.exerfxlfxr.exehnntbh.exe3tnhbn.exepddjj.exevpppp.exefxlfxff.exeflfflxx.exenntnbb.exehnhhtt.exejvjjv.exentntnb.exejddvj.exejvjdd.exexrllxfl.exepdppd.exehhhtbh.exe3jjjd.exedescription pid process target process PID 4260 wrote to memory of 2068 4260 1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exe nnbtbh.exe PID 4260 wrote to memory of 2068 4260 1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exe nnbtbh.exe PID 4260 wrote to memory of 2068 4260 1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exe nnbtbh.exe PID 2068 wrote to memory of 1032 2068 nnbtbh.exe xxxflfl.exe PID 2068 wrote to memory of 1032 2068 nnbtbh.exe xxxflfl.exe PID 2068 wrote to memory of 1032 2068 nnbtbh.exe xxxflfl.exe PID 1032 wrote to memory of 4944 1032 xxxflfl.exe tbbtnn.exe PID 1032 wrote to memory of 4944 1032 xxxflfl.exe tbbtnn.exe PID 1032 wrote to memory of 4944 1032 xxxflfl.exe tbbtnn.exe PID 4944 wrote to memory of 4660 4944 tbbtnn.exe bhtttb.exe PID 4944 wrote to memory of 4660 4944 tbbtnn.exe bhtttb.exe PID 4944 wrote to memory of 4660 4944 tbbtnn.exe bhtttb.exe PID 4660 wrote to memory of 2900 4660 bhtttb.exe rfxlfxr.exe PID 4660 wrote to memory of 2900 4660 bhtttb.exe rfxlfxr.exe PID 4660 wrote to memory of 2900 4660 bhtttb.exe rfxlfxr.exe PID 2900 wrote to memory of 1164 2900 rfxlfxr.exe hnntbh.exe PID 2900 wrote to memory of 1164 2900 rfxlfxr.exe hnntbh.exe PID 2900 wrote to memory of 1164 2900 rfxlfxr.exe hnntbh.exe PID 1164 wrote to memory of 1404 1164 hnntbh.exe 3tnhbn.exe PID 1164 wrote to memory of 1404 1164 hnntbh.exe 3tnhbn.exe PID 1164 wrote to memory of 1404 1164 hnntbh.exe 3tnhbn.exe PID 1404 wrote to memory of 776 1404 3tnhbn.exe pddjj.exe PID 1404 wrote to memory of 776 1404 3tnhbn.exe pddjj.exe PID 1404 wrote to memory of 776 1404 3tnhbn.exe pddjj.exe PID 776 wrote to memory of 3112 776 pddjj.exe vpppp.exe PID 776 wrote to memory of 3112 776 pddjj.exe vpppp.exe PID 776 wrote to memory of 3112 776 pddjj.exe vpppp.exe PID 3112 wrote to memory of 1800 3112 vpppp.exe fxlfxff.exe PID 3112 wrote to memory of 1800 3112 vpppp.exe fxlfxff.exe PID 3112 wrote to memory of 1800 3112 vpppp.exe fxlfxff.exe PID 1800 wrote to memory of 2864 1800 fxlfxff.exe flfflxx.exe PID 1800 wrote to memory of 2864 1800 fxlfxff.exe flfflxx.exe PID 1800 wrote to memory of 2864 1800 fxlfxff.exe flfflxx.exe PID 2864 wrote to memory of 780 2864 flfflxx.exe nntnbb.exe PID 2864 wrote to memory of 780 2864 flfflxx.exe nntnbb.exe PID 2864 wrote to memory of 780 2864 flfflxx.exe nntnbb.exe PID 780 wrote to memory of 2344 780 nntnbb.exe hnhhtt.exe PID 780 wrote to memory of 2344 780 nntnbb.exe hnhhtt.exe PID 780 wrote to memory of 2344 780 nntnbb.exe hnhhtt.exe PID 2344 wrote to memory of 1072 2344 hnhhtt.exe jvjjv.exe PID 2344 wrote to memory of 1072 2344 hnhhtt.exe jvjjv.exe PID 2344 wrote to memory of 1072 2344 hnhhtt.exe jvjjv.exe PID 1072 wrote to memory of 4704 1072 jvjjv.exe ntntnb.exe PID 1072 wrote to memory of 4704 1072 jvjjv.exe ntntnb.exe PID 1072 wrote to memory of 4704 1072 jvjjv.exe ntntnb.exe PID 4704 wrote to memory of 3872 4704 ntntnb.exe jddvj.exe PID 4704 wrote to memory of 3872 4704 ntntnb.exe jddvj.exe PID 4704 wrote to memory of 3872 4704 ntntnb.exe jddvj.exe PID 3872 wrote to memory of 2152 3872 jddvj.exe jvjdd.exe PID 3872 wrote to memory of 2152 3872 jddvj.exe jvjdd.exe PID 3872 wrote to memory of 2152 3872 jddvj.exe jvjdd.exe PID 2152 wrote to memory of 4596 2152 jvjdd.exe xrllxfl.exe PID 2152 wrote to memory of 4596 2152 jvjdd.exe xrllxfl.exe PID 2152 wrote to memory of 4596 2152 jvjdd.exe xrllxfl.exe PID 4596 wrote to memory of 3480 4596 xrllxfl.exe pdppd.exe PID 4596 wrote to memory of 3480 4596 xrllxfl.exe pdppd.exe PID 4596 wrote to memory of 3480 4596 xrllxfl.exe pdppd.exe PID 3480 wrote to memory of 1736 3480 pdppd.exe hhhtbh.exe PID 3480 wrote to memory of 1736 3480 pdppd.exe hhhtbh.exe PID 3480 wrote to memory of 1736 3480 pdppd.exe hhhtbh.exe PID 1736 wrote to memory of 3012 1736 hhhtbh.exe 3jjjd.exe PID 1736 wrote to memory of 3012 1736 hhhtbh.exe 3jjjd.exe PID 1736 wrote to memory of 3012 1736 hhhtbh.exe 3jjjd.exe PID 3012 wrote to memory of 2112 3012 3jjjd.exe vpvdv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b0d9c6ed23852de54ff9e18db778470_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
\??\c:\nnbtbh.exec:\nnbtbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\xxxflfl.exec:\xxxflfl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\tbbtnn.exec:\tbbtnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\bhtttb.exec:\bhtttb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\rfxlfxr.exec:\rfxlfxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\hnntbh.exec:\hnntbh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
\??\c:\3tnhbn.exec:\3tnhbn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\pddjj.exec:\pddjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\vpppp.exec:\vpppp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
\??\c:\fxlfxff.exec:\fxlfxff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\flfflxx.exec:\flfflxx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\nntnbb.exec:\nntnbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
\??\c:\hnhhtt.exec:\hnhhtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\jvjjv.exec:\jvjjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\ntntnb.exec:\ntntnb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\jddvj.exec:\jddvj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
\??\c:\jvjdd.exec:\jvjdd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\xrllxfl.exec:\xrllxfl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\pdppd.exec:\pdppd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\hhhtbh.exec:\hhhtbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\3jjjd.exec:\3jjjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\vpvdv.exec:\vpvdv.exe23⤵
- Executes dropped EXE
PID:2112 -
\??\c:\lxxrxxl.exec:\lxxrxxl.exe24⤵
- Executes dropped EXE
PID:2036 -
\??\c:\ffllfff.exec:\ffllfff.exe25⤵
- Executes dropped EXE
PID:3740 -
\??\c:\nbhtnn.exec:\nbhtnn.exe26⤵
- Executes dropped EXE
PID:3260 -
\??\c:\ppppv.exec:\ppppv.exe27⤵
- Executes dropped EXE
PID:4404 -
\??\c:\fxlllll.exec:\fxlllll.exe28⤵
- Executes dropped EXE
PID:4820 -
\??\c:\hbbbth.exec:\hbbbth.exe29⤵
- Executes dropped EXE
PID:1952 -
\??\c:\thhbtt.exec:\thhbtt.exe30⤵
- Executes dropped EXE
PID:860 -
\??\c:\djjpv.exec:\djjpv.exe31⤵
- Executes dropped EXE
PID:3524 -
\??\c:\bbhnhn.exec:\bbhnhn.exe32⤵
- Executes dropped EXE
PID:5108 -
\??\c:\pjpvp.exec:\pjpvp.exe33⤵
- Executes dropped EXE
PID:2388 -
\??\c:\tntnnn.exec:\tntnnn.exe34⤵
- Executes dropped EXE
PID:3632 -
\??\c:\fffflll.exec:\fffflll.exe35⤵
- Executes dropped EXE
PID:1400 -
\??\c:\nbbbtt.exec:\nbbbtt.exe36⤵
- Executes dropped EXE
PID:2060 -
\??\c:\bnbttt.exec:\bnbttt.exe37⤵
- Executes dropped EXE
PID:2960 -
\??\c:\jdjdd.exec:\jdjdd.exe38⤵
- Executes dropped EXE
PID:4148 -
\??\c:\lxxxxrx.exec:\lxxxxrx.exe39⤵
- Executes dropped EXE
PID:4672 -
\??\c:\ntbbbb.exec:\ntbbbb.exe40⤵
- Executes dropped EXE
PID:4528 -
\??\c:\pdpjd.exec:\pdpjd.exe41⤵
- Executes dropped EXE
PID:532 -
\??\c:\rfxrlfx.exec:\rfxrlfx.exe42⤵
- Executes dropped EXE
PID:620 -
\??\c:\bnhtth.exec:\bnhtth.exe43⤵
- Executes dropped EXE
PID:2000 -
\??\c:\jdvvv.exec:\jdvvv.exe44⤵
- Executes dropped EXE
PID:3060 -
\??\c:\frxllxf.exec:\frxllxf.exe45⤵
- Executes dropped EXE
PID:4860 -
\??\c:\tnhhbt.exec:\tnhhbt.exe46⤵
- Executes dropped EXE
PID:4780 -
\??\c:\jpppj.exec:\jpppj.exe47⤵
- Executes dropped EXE
PID:5008 -
\??\c:\xlffrll.exec:\xlffrll.exe48⤵
- Executes dropped EXE
PID:936 -
\??\c:\nbnnnn.exec:\nbnnnn.exe49⤵
- Executes dropped EXE
PID:2064 -
\??\c:\ppddd.exec:\ppddd.exe50⤵
- Executes dropped EXE
PID:2872 -
\??\c:\xlrrrfl.exec:\xlrrrfl.exe51⤵
- Executes dropped EXE
PID:4484 -
\??\c:\hnhbhn.exec:\hnhbhn.exe52⤵
- Executes dropped EXE
PID:5076 -
\??\c:\vdvdj.exec:\vdvdj.exe53⤵
- Executes dropped EXE
PID:1628 -
\??\c:\rxlllxr.exec:\rxlllxr.exe54⤵
- Executes dropped EXE
PID:988 -
\??\c:\nbtbbt.exec:\nbtbbt.exe55⤵
- Executes dropped EXE
PID:2604 -
\??\c:\ffrlxrl.exec:\ffrlxrl.exe56⤵
- Executes dropped EXE
PID:4028 -
\??\c:\btbbbb.exec:\btbbbb.exe57⤵
- Executes dropped EXE
PID:2456 -
\??\c:\dvjdd.exec:\dvjdd.exe58⤵
- Executes dropped EXE
PID:4792 -
\??\c:\lfrrllr.exec:\lfrrllr.exe59⤵
- Executes dropped EXE
PID:4200 -
\??\c:\vdppp.exec:\vdppp.exe60⤵
- Executes dropped EXE
PID:2648 -
\??\c:\rlxxrfl.exec:\rlxxrfl.exe61⤵
- Executes dropped EXE
PID:3872 -
\??\c:\hhtbtb.exec:\hhtbtb.exe62⤵
- Executes dropped EXE
PID:1092 -
\??\c:\vdvpd.exec:\vdvpd.exe63⤵
- Executes dropped EXE
PID:2440 -
\??\c:\jvdpj.exec:\jvdpj.exe64⤵
- Executes dropped EXE
PID:3464 -
\??\c:\flfxlll.exec:\flfxlll.exe65⤵
- Executes dropped EXE
PID:952 -
\??\c:\hnhbhn.exec:\hnhbhn.exe66⤵PID:4304
-
\??\c:\llxrllf.exec:\llxrllf.exe67⤵PID:1736
-
\??\c:\hhhbnt.exec:\hhhbnt.exe68⤵PID:4176
-
\??\c:\3vvjj.exec:\3vvjj.exe69⤵PID:3980
-
\??\c:\thbhnh.exec:\thbhnh.exe70⤵PID:1616
-
\??\c:\jdvpp.exec:\jdvpp.exe71⤵PID:4432
-
\??\c:\pdpjd.exec:\pdpjd.exe72⤵PID:2544
-
\??\c:\7bttbn.exec:\7bttbn.exe73⤵PID:1364
-
\??\c:\5fllffl.exec:\5fllffl.exe74⤵PID:2248
-
\??\c:\hhbbbb.exec:\hhbbbb.exe75⤵PID:3504
-
\??\c:\vdvpp.exec:\vdvpp.exe76⤵PID:4084
-
\??\c:\pdpjj.exec:\pdpjj.exe77⤵PID:2600
-
\??\c:\xxlfrxx.exec:\xxlfrxx.exe78⤵PID:536
-
\??\c:\9nhhhh.exec:\9nhhhh.exe79⤵PID:3180
-
\??\c:\flrxfrr.exec:\flrxfrr.exe80⤵PID:3972
-
\??\c:\btnntb.exec:\btnntb.exe81⤵PID:3876
-
\??\c:\bnhhhb.exec:\bnhhhb.exe82⤵PID:4668
-
\??\c:\djppj.exec:\djppj.exe83⤵PID:3976
-
\??\c:\frlllrr.exec:\frlllrr.exe84⤵PID:4504
-
\??\c:\htbbhh.exec:\htbbhh.exe85⤵PID:3304
-
\??\c:\dvvpv.exec:\dvvpv.exe86⤵PID:3148
-
\??\c:\vvvpd.exec:\vvvpd.exe87⤵PID:4624
-
\??\c:\hnntth.exec:\hnntth.exe88⤵PID:2000
-
\??\c:\pdjvv.exec:\pdjvv.exe89⤵PID:3348
-
\??\c:\xfrrlrr.exec:\xfrrlrr.exe90⤵PID:1040
-
\??\c:\lfffffx.exec:\lfffffx.exe91⤵PID:4868
-
\??\c:\bhbttb.exec:\bhbttb.exe92⤵PID:3528
-
\??\c:\jjvvv.exec:\jjvvv.exe93⤵PID:1980
-
\??\c:\jvvpd.exec:\jvvpd.exe94⤵PID:4484
-
\??\c:\bbbbtt.exec:\bbbbtt.exe95⤵PID:3300
-
\??\c:\tbbhth.exec:\tbbhth.exe96⤵PID:3484
-
\??\c:\jvvvj.exec:\jvvvj.exe97⤵PID:1852
-
\??\c:\rrrfrlr.exec:\rrrfrlr.exe98⤵PID:3932
-
\??\c:\bbbttn.exec:\bbbttn.exe99⤵PID:1412
-
\??\c:\ddjjj.exec:\ddjjj.exe100⤵PID:1076
-
\??\c:\dpdvp.exec:\dpdvp.exe101⤵PID:4640
-
\??\c:\bttbhb.exec:\bttbhb.exe102⤵PID:4704
-
\??\c:\5xfxrff.exec:\5xfxrff.exe103⤵PID:4604
-
\??\c:\bbbnnn.exec:\bbbnnn.exe104⤵PID:216
-
\??\c:\pjjdp.exec:\pjjdp.exe105⤵PID:2508
-
\??\c:\vjjdv.exec:\vjjdv.exe106⤵PID:2592
-
\??\c:\bnntth.exec:\bnntth.exe107⤵PID:3208
-
\??\c:\jvddd.exec:\jvddd.exe108⤵PID:4076
-
\??\c:\frxxxxx.exec:\frxxxxx.exe109⤵PID:1104
-
\??\c:\rffllrx.exec:\rffllrx.exe110⤵PID:3012
-
\??\c:\bbtnhh.exec:\bbtnhh.exe111⤵PID:4520
-
\??\c:\djvpj.exec:\djvpj.exe112⤵PID:4240
-
\??\c:\xrrrrrr.exec:\xrrrrrr.exe113⤵PID:3264
-
\??\c:\hnbtht.exec:\hnbtht.exe114⤵PID:4840
-
\??\c:\tntnnn.exec:\tntnnn.exe115⤵PID:2004
-
\??\c:\9jvvv.exec:\9jvvv.exe116⤵PID:3504
-
\??\c:\llfxfff.exec:\llfxfff.exe117⤵PID:4084
-
\??\c:\bhtnnn.exec:\bhtnnn.exe118⤵PID:2600
-
\??\c:\tnbtbt.exec:\tnbtbt.exe119⤵PID:3984
-
\??\c:\ppvvp.exec:\ppvvp.exe120⤵PID:3180
-
\??\c:\frlrxlx.exec:\frlrxlx.exe121⤵PID:3972
-
\??\c:\nbhbhh.exec:\nbhbhh.exe122⤵PID:1400
-
\??\c:\9ppvj.exec:\9ppvj.exe123⤵PID:4668
-
\??\c:\rxfflfx.exec:\rxfflfx.exe124⤵PID:4148
-
\??\c:\xllflfr.exec:\xllflfr.exe125⤵PID:1932
-
\??\c:\bbtttn.exec:\bbtttn.exe126⤵PID:532
-
\??\c:\dpjdd.exec:\dpjdd.exe127⤵PID:4660
-
\??\c:\rxfxxff.exec:\rxfxxff.exe128⤵PID:4624
-
\??\c:\thbhhh.exec:\thbhhh.exe129⤵PID:1016
-
\??\c:\rfxxxrr.exec:\rfxxxrr.exe130⤵PID:5100
-
\??\c:\lfllfff.exec:\lfllfff.exe131⤵PID:1836
-
\??\c:\btbttt.exec:\btbttt.exe132⤵PID:2336
-
\??\c:\ppvdd.exec:\ppvdd.exe133⤵PID:3528
-
\??\c:\rxffxff.exec:\rxffxff.exe134⤵PID:1948
-
\??\c:\hhnhhn.exec:\hhnhhn.exe135⤵PID:1396
-
\??\c:\jppjd.exec:\jppjd.exe136⤵PID:3868
-
\??\c:\frxxxxf.exec:\frxxxxf.exe137⤵PID:2604
-
\??\c:\lxlxlfx.exec:\lxlxlfx.exe138⤵PID:3152
-
\??\c:\nhbhhh.exec:\nhbhhh.exe139⤵PID:3932
-
\??\c:\jpjdv.exec:\jpjdv.exe140⤵PID:4024
-
\??\c:\lfxxfff.exec:\lfxxfff.exe141⤵PID:1076
-
\??\c:\9hhhnn.exec:\9hhhnn.exe142⤵PID:224
-
\??\c:\vpvjj.exec:\vpvjj.exe143⤵PID:1524
-
\??\c:\frrrlll.exec:\frrrlll.exe144⤵PID:4604
-
\??\c:\9thbnn.exec:\9thbnn.exe145⤵PID:4596
-
\??\c:\ppppp.exec:\ppppp.exe146⤵PID:3616
-
\??\c:\7vvvd.exec:\7vvvd.exe147⤵PID:2108
-
\??\c:\fxrlfll.exec:\fxrlfll.exe148⤵PID:5096
-
\??\c:\nbnhbb.exec:\nbnhbb.exe149⤵PID:4076
-
\??\c:\jpddd.exec:\jpddd.exe150⤵PID:4636
-
\??\c:\pvppj.exec:\pvppj.exe151⤵PID:4644
-
\??\c:\lxfxxxf.exec:\lxfxxxf.exe152⤵PID:1616
-
\??\c:\nbhhhh.exec:\nbhhhh.exe153⤵PID:4912
-
\??\c:\vvpvp.exec:\vvpvp.exe154⤵PID:4380
-
\??\c:\xfrxxlx.exec:\xfrxxlx.exe155⤵PID:2820
-
\??\c:\fxllfll.exec:\fxllfll.exe156⤵PID:1952
-
\??\c:\nntntt.exec:\nntntt.exe157⤵PID:4932
-
\??\c:\1vjjj.exec:\1vjjj.exe158⤵PID:5108
-
\??\c:\pdpjd.exec:\pdpjd.exe159⤵PID:2580
-
\??\c:\rlxrlrl.exec:\rlxrlrl.exe160⤵PID:3180
-
\??\c:\3hbbbb.exec:\3hbbbb.exe161⤵PID:4688
-
\??\c:\bnbttb.exec:\bnbttb.exe162⤵PID:3976
-
\??\c:\jjdvj.exec:\jjdvj.exe163⤵PID:4504
-
\??\c:\ffrrrll.exec:\ffrrrll.exe164⤵PID:3304
-
\??\c:\rlrlrrl.exec:\rlrlrrl.exe165⤵PID:620
-
\??\c:\bthhht.exec:\bthhht.exe166⤵PID:3468
-
\??\c:\1jjdv.exec:\1jjdv.exe167⤵PID:1408
-
\??\c:\lxlfffl.exec:\lxlfffl.exe168⤵PID:3880
-
\??\c:\llflffr.exec:\llflffr.exe169⤵PID:3824
-
\??\c:\nhbtbt.exec:\nhbtbt.exe170⤵PID:3240
-
\??\c:\pppjp.exec:\pppjp.exe171⤵PID:5072
-
\??\c:\lxlllxf.exec:\lxlllxf.exe172⤵PID:3356
-
\??\c:\hnthbh.exec:\hnthbh.exe173⤵PID:3724
-
\??\c:\pvpdj.exec:\pvpdj.exe174⤵PID:1240
-
\??\c:\pvjvv.exec:\pvjvv.exe175⤵PID:3812
-
\??\c:\rrxrlff.exec:\rrxrlff.exe176⤵PID:4028
-
\??\c:\tbhtnn.exec:\tbhtnn.exe177⤵PID:4292
-
\??\c:\jppjv.exec:\jppjv.exe178⤵PID:3644
-
\??\c:\djppp.exec:\djppp.exe179⤵PID:2712
-
\??\c:\rrfxxrf.exec:\rrfxxrf.exe180⤵PID:3080
-
\??\c:\nntbnh.exec:\nntbnh.exe181⤵PID:3872
-
\??\c:\vdjdp.exec:\vdjdp.exe182⤵PID:4996
-
\??\c:\xllfffr.exec:\xllfffr.exe183⤵PID:1272
-
\??\c:\tttnhh.exec:\tttnhh.exe184⤵PID:4312
-
\??\c:\tnbttb.exec:\tnbttb.exe185⤵PID:4588
-
\??\c:\jjvvp.exec:\jjvvp.exe186⤵PID:3140
-
\??\c:\xxfffll.exec:\xxfffll.exe187⤵PID:1736
-
\??\c:\hbhhhb.exec:\hbhhhb.exe188⤵PID:1104
-
\??\c:\hnbbtb.exec:\hnbbtb.exe189⤵PID:4064
-
\??\c:\jpvjv.exec:\jpvjv.exe190⤵PID:2596
-
\??\c:\lxxxfff.exec:\lxxxfff.exe191⤵PID:2924
-
\??\c:\lxffxxf.exec:\lxffxxf.exe192⤵PID:2036
-
\??\c:\nntttn.exec:\nntttn.exe193⤵PID:5104
-
\??\c:\jdpjp.exec:\jdpjp.exe194⤵PID:508
-
\??\c:\lfxxrxl.exec:\lfxxrxl.exe195⤵PID:4428
-
\??\c:\5tntth.exec:\5tntth.exe196⤵PID:1404
-
\??\c:\pvjvj.exec:\pvjvj.exe197⤵PID:528
-
\??\c:\xxrrxxl.exec:\xxrrxxl.exe198⤵PID:856
-
\??\c:\pjddj.exec:\pjddj.exe199⤵PID:4696
-
\??\c:\lrrrffx.exec:\lrrrffx.exe200⤵PID:3996
-
\??\c:\tbhtnh.exec:\tbhtnh.exe201⤵PID:3180
-
\??\c:\vpvvj.exec:\vpvvj.exe202⤵PID:4688
-
\??\c:\1lrrlll.exec:\1lrrlll.exe203⤵PID:2360
-
\??\c:\lffffrx.exec:\lffffrx.exe204⤵PID:764
-
\??\c:\hnbbbt.exec:\hnbbbt.exe205⤵PID:2724
-
\??\c:\lrxxllx.exec:\lrxxllx.exe206⤵PID:3456
-
\??\c:\lfrrxfl.exec:\lfrrxfl.exe207⤵PID:3168
-
\??\c:\bhttbh.exec:\bhttbh.exe208⤵PID:4444
-
\??\c:\vjvvp.exec:\vjvvp.exe209⤵PID:4712
-
\??\c:\xxxrrxx.exec:\xxxrrxx.exe210⤵PID:3668
-
\??\c:\bhhtnn.exec:\bhhtnn.exe211⤵PID:2464
-
\??\c:\jdvdd.exec:\jdvdd.exe212⤵PID:4876
-
\??\c:\lfllrfr.exec:\lfllrfr.exe213⤵PID:4152
-
\??\c:\tntthn.exec:\tntthn.exe214⤵PID:1628
-
\??\c:\ppdpp.exec:\ppdpp.exe215⤵PID:3356
-
\??\c:\1ffrrll.exec:\1ffrrll.exe216⤵PID:2408
-
\??\c:\hnbnnn.exec:\hnbnnn.exe217⤵PID:2940
-
\??\c:\jjjdp.exec:\jjjdp.exe218⤵PID:2604
-
\??\c:\lrlrlrx.exec:\lrlrlrx.exe219⤵PID:2564
-
\??\c:\tbhhbn.exec:\tbhhbn.exe220⤵PID:3224
-
\??\c:\ppdpd.exec:\ppdpd.exe221⤵PID:2308
-
\??\c:\9rflrll.exec:\9rflrll.exe222⤵PID:4964
-
\??\c:\bhbbbt.exec:\bhbbbt.exe223⤵PID:216
-
\??\c:\bbhhhh.exec:\bbhhhh.exe224⤵PID:3472
-
\??\c:\pdppj.exec:\pdppj.exe225⤵PID:3388
-
\??\c:\nnnnnh.exec:\nnnnnh.exe226⤵PID:836
-
\??\c:\pdvpj.exec:\pdvpj.exe227⤵PID:5036
-
\??\c:\3lxrxxf.exec:\3lxrxxf.exe228⤵PID:3384
-
\??\c:\tnhbbb.exec:\tnhbbb.exe229⤵PID:1736
-
\??\c:\bthnht.exec:\bthnht.exe230⤵PID:1268
-
\??\c:\vpvvv.exec:\vpvvv.exe231⤵PID:4644
-
\??\c:\7tttth.exec:\7tttth.exe232⤵PID:1616
-
\??\c:\tthbbn.exec:\tthbbn.exe233⤵PID:4368
-
\??\c:\pvdpj.exec:\pvdpj.exe234⤵PID:4912
-
\??\c:\rrxrlll.exec:\rrxrlll.exe235⤵PID:2220
-
\??\c:\jdvpd.exec:\jdvpd.exe236⤵PID:1968
-
\??\c:\jdvjv.exec:\jdvjv.exe237⤵PID:4480
-
\??\c:\fxrlffl.exec:\fxrlffl.exe238⤵PID:3196
-
\??\c:\httthh.exec:\httthh.exe239⤵PID:884
-
\??\c:\jpjjp.exec:\jpjjp.exe240⤵PID:4916
-
\??\c:\flxlffx.exec:\flxlffx.exe241⤵PID:3584
-
\??\c:\ttbhbh.exec:\ttbhbh.exe242⤵PID:3684