Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 19:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exe
-
Size
179KB
-
MD5
1f1bf278207e145dac5d03b1c89651e0
-
SHA1
fd5b55be1bb1e777d6ed2b3a901a9a887b362e70
-
SHA256
ce35691196646771998ae93aae2f0b1e435c31c03f5cc7d43100d2f8856d5df9
-
SHA512
ffdbfba7f4e121c280f4ed0643c6a91fda3ecc58f2b6331ca014adeade96e0a0fdc3a997477d6b2236229a6fd814674429ab437c82809abe811b822e33d6413e
-
SSDEEP
3072:AhOmTsF93UYfwC6GIoutQ6M/Fpi8rY9AABa1YRMxgRP5ZXuxF:Acm4FmowdHoSCddWhR/Z+H
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/932-1-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4816-19-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/764-24-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3472-36-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/624-32-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/760-14-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4520-13-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1348-49-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1940-58-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1524-67-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4208-66-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2916-78-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1176-85-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/184-90-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1596-98-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3040-103-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2948-113-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1724-122-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3532-127-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1284-120-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2636-134-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1276-145-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/60-151-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4512-158-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3756-163-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3696-176-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/208-184-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3308-187-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2160-193-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4084-203-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/656-207-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2196-212-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4532-214-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4020-221-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4784-228-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4788-232-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2260-245-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3972-250-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3012-258-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4208-276-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2240-280-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4528-287-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/5032-305-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3236-306-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2808-313-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2164-332-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/60-344-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2816-363-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2160-376-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4640-383-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2196-396-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/656-394-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/3360-415-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4404-430-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1820-432-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1940-441-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2448-452-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1268-497-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2160-547-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/2796-581-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4800-588-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4600-616-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/1492-623-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon behavioral2/memory/4492-664-0x0000000000400000-0x0000000000431000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ddvpd.exe5fllfrx.exebhnnbb.exeppjvv.exevpjjv.exe9rlllfl.exennhhhh.exepjdvv.exe1rfllff.exerlfxrrx.exejpddj.exexlrrrrl.exepjppp.exejvvvd.exe7hhhhh.exejjjjj.exellrrrrf.exebtnnbt.exevddjj.exe1xrlxrx.exethnnnn.exelxfrlll.exefxxxxxx.exebththh.exethtnbb.exeppvpd.exexfrxflr.exe7thhnt.exejdddd.exerrfxflf.exe3nttbh.exedvjjd.exefllrrxl.exebbhhnn.exe9nnnnt.exepvdvv.exexxfffll.exettnnhn.exebhbbhb.exeppjjd.exellrrxxf.exebbhnnh.exexlffffl.exe1bhhbh.exetntnbh.exepdjpp.exe1ttbbb.exepvjjp.exevvdvd.exe9fffflr.exehbnnbh.exenbhhht.exe9ddvv.exerrxrrxx.exebbnntt.exehtbttb.exepjppp.exexxlrlrr.exebttnhh.exe5pddj.exellffflf.exenbtthb.exejpppj.exexlxxrlx.exepid process 4520 ddvpd.exe 760 5fllfrx.exe 4816 bhnnbb.exe 764 ppjvv.exe 624 vpjjv.exe 3472 9rlllfl.exe 4504 nnhhhh.exe 1348 pjdvv.exe 1940 1rfllff.exe 4208 rlfxrrx.exe 1524 jpddj.exe 2916 xlrrrrl.exe 1176 pjppp.exe 184 jvvvd.exe 1596 7hhhhh.exe 3040 jjjjj.exe 4836 llrrrrf.exe 2948 btnnbt.exe 1284 vddjj.exe 1724 1xrlxrx.exe 3532 thnnnn.exe 2636 lxfrlll.exe 2404 fxxxxxx.exe 1276 bththh.exe 60 thtnbb.exe 4512 ppvpd.exe 3756 xfrxflr.exe 2816 7thhnt.exe 3696 jdddd.exe 208 rrfxflf.exe 3308 3nttbh.exe 2160 dvjjd.exe 4640 fllrrxl.exe 1556 bbhhnn.exe 4084 9nnnnt.exe 656 pvdvv.exe 2196 xxfffll.exe 4532 ttnnhn.exe 4020 bhbbhb.exe 4284 ppjjd.exe 4784 llrrxxf.exe 4788 bbhnnh.exe 4476 xlffffl.exe 1180 1bhhbh.exe 4912 tntnbh.exe 2260 pdjpp.exe 4800 1ttbbb.exe 3972 pvjjp.exe 2248 vvdvd.exe 3012 9fffflr.exe 3440 hbnnbh.exe 2244 nbhhht.exe 4956 9ddvv.exe 2488 rrxrrxx.exe 4208 bbnntt.exe 2272 htbttb.exe 2240 pjppp.exe 4528 xxlrlrr.exe 3008 bttnhh.exe 4580 5pddj.exe 2480 llffflf.exe 2992 nbtthb.exe 5032 jpppj.exe 3236 xlxxrlx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exeddvpd.exe5fllfrx.exebhnnbb.exeppjvv.exevpjjv.exe9rlllfl.exennhhhh.exepjdvv.exe1rfllff.exerlfxrrx.exejpddj.exexlrrrrl.exepjppp.exejvvvd.exe7hhhhh.exejjjjj.exellrrrrf.exebtnnbt.exevddjj.exe1xrlxrx.exethnnnn.exedescription pid process target process PID 932 wrote to memory of 4520 932 1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exe ddvpd.exe PID 932 wrote to memory of 4520 932 1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exe ddvpd.exe PID 932 wrote to memory of 4520 932 1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exe ddvpd.exe PID 4520 wrote to memory of 760 4520 ddvpd.exe 5fllfrx.exe PID 4520 wrote to memory of 760 4520 ddvpd.exe 5fllfrx.exe PID 4520 wrote to memory of 760 4520 ddvpd.exe 5fllfrx.exe PID 760 wrote to memory of 4816 760 5fllfrx.exe bhnnbb.exe PID 760 wrote to memory of 4816 760 5fllfrx.exe bhnnbb.exe PID 760 wrote to memory of 4816 760 5fllfrx.exe bhnnbb.exe PID 4816 wrote to memory of 764 4816 bhnnbb.exe ppjvv.exe PID 4816 wrote to memory of 764 4816 bhnnbb.exe ppjvv.exe PID 4816 wrote to memory of 764 4816 bhnnbb.exe ppjvv.exe PID 764 wrote to memory of 624 764 ppjvv.exe vpjjv.exe PID 764 wrote to memory of 624 764 ppjvv.exe vpjjv.exe PID 764 wrote to memory of 624 764 ppjvv.exe vpjjv.exe PID 624 wrote to memory of 3472 624 vpjjv.exe 9rlllfl.exe PID 624 wrote to memory of 3472 624 vpjjv.exe 9rlllfl.exe PID 624 wrote to memory of 3472 624 vpjjv.exe 9rlllfl.exe PID 3472 wrote to memory of 4504 3472 9rlllfl.exe nnhhhh.exe PID 3472 wrote to memory of 4504 3472 9rlllfl.exe nnhhhh.exe PID 3472 wrote to memory of 4504 3472 9rlllfl.exe nnhhhh.exe PID 4504 wrote to memory of 1348 4504 nnhhhh.exe pjdvv.exe PID 4504 wrote to memory of 1348 4504 nnhhhh.exe pjdvv.exe PID 4504 wrote to memory of 1348 4504 nnhhhh.exe pjdvv.exe PID 1348 wrote to memory of 1940 1348 pjdvv.exe 1rfllff.exe PID 1348 wrote to memory of 1940 1348 pjdvv.exe 1rfllff.exe PID 1348 wrote to memory of 1940 1348 pjdvv.exe 1rfllff.exe PID 1940 wrote to memory of 4208 1940 1rfllff.exe rlfxrrx.exe PID 1940 wrote to memory of 4208 1940 1rfllff.exe rlfxrrx.exe PID 1940 wrote to memory of 4208 1940 1rfllff.exe rlfxrrx.exe PID 4208 wrote to memory of 1524 4208 rlfxrrx.exe jpddj.exe PID 4208 wrote to memory of 1524 4208 rlfxrrx.exe jpddj.exe PID 4208 wrote to memory of 1524 4208 rlfxrrx.exe jpddj.exe PID 1524 wrote to memory of 2916 1524 jpddj.exe xlrrrrl.exe PID 1524 wrote to memory of 2916 1524 jpddj.exe xlrrrrl.exe PID 1524 wrote to memory of 2916 1524 jpddj.exe xlrrrrl.exe PID 2916 wrote to memory of 1176 2916 xlrrrrl.exe pjppp.exe PID 2916 wrote to memory of 1176 2916 xlrrrrl.exe pjppp.exe PID 2916 wrote to memory of 1176 2916 xlrrrrl.exe pjppp.exe PID 1176 wrote to memory of 184 1176 pjppp.exe jvvvd.exe PID 1176 wrote to memory of 184 1176 pjppp.exe jvvvd.exe PID 1176 wrote to memory of 184 1176 pjppp.exe jvvvd.exe PID 184 wrote to memory of 1596 184 jvvvd.exe 7hhhhh.exe PID 184 wrote to memory of 1596 184 jvvvd.exe 7hhhhh.exe PID 184 wrote to memory of 1596 184 jvvvd.exe 7hhhhh.exe PID 1596 wrote to memory of 3040 1596 7hhhhh.exe jjjjj.exe PID 1596 wrote to memory of 3040 1596 7hhhhh.exe jjjjj.exe PID 1596 wrote to memory of 3040 1596 7hhhhh.exe jjjjj.exe PID 3040 wrote to memory of 4836 3040 jjjjj.exe llrrrrf.exe PID 3040 wrote to memory of 4836 3040 jjjjj.exe llrrrrf.exe PID 3040 wrote to memory of 4836 3040 jjjjj.exe llrrrrf.exe PID 4836 wrote to memory of 2948 4836 llrrrrf.exe btnnbt.exe PID 4836 wrote to memory of 2948 4836 llrrrrf.exe btnnbt.exe PID 4836 wrote to memory of 2948 4836 llrrrrf.exe btnnbt.exe PID 2948 wrote to memory of 1284 2948 btnnbt.exe vddjj.exe PID 2948 wrote to memory of 1284 2948 btnnbt.exe vddjj.exe PID 2948 wrote to memory of 1284 2948 btnnbt.exe vddjj.exe PID 1284 wrote to memory of 1724 1284 vddjj.exe 1xrlxrx.exe PID 1284 wrote to memory of 1724 1284 vddjj.exe 1xrlxrx.exe PID 1284 wrote to memory of 1724 1284 vddjj.exe 1xrlxrx.exe PID 1724 wrote to memory of 3532 1724 1xrlxrx.exe thnnnn.exe PID 1724 wrote to memory of 3532 1724 1xrlxrx.exe thnnnn.exe PID 1724 wrote to memory of 3532 1724 1xrlxrx.exe thnnnn.exe PID 3532 wrote to memory of 2636 3532 thnnnn.exe lxfrlll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1f1bf278207e145dac5d03b1c89651e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\ddvpd.exec:\ddvpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\5fllfrx.exec:\5fllfrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
\??\c:\bhnnbb.exec:\bhnnbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
\??\c:\ppjvv.exec:\ppjvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\vpjjv.exec:\vpjjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
\??\c:\9rlllfl.exec:\9rlllfl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
\??\c:\nnhhhh.exec:\nnhhhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\pjdvv.exec:\pjdvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\1rfllff.exec:\1rfllff.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\rlfxrrx.exec:\rlfxrrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
\??\c:\jpddj.exec:\jpddj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\xlrrrrl.exec:\xlrrrrl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\pjppp.exec:\pjppp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\jvvvd.exec:\jvvvd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:184 -
\??\c:\7hhhhh.exec:\7hhhhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\jjjjj.exec:\jjjjj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\llrrrrf.exec:\llrrrrf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\btnnbt.exec:\btnnbt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\vddjj.exec:\vddjj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\1xrlxrx.exec:\1xrlxrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\thnnnn.exec:\thnnnn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
\??\c:\lxfrlll.exec:\lxfrlll.exe23⤵
- Executes dropped EXE
PID:2636 -
\??\c:\fxxxxxx.exec:\fxxxxxx.exe24⤵
- Executes dropped EXE
PID:2404 -
\??\c:\bththh.exec:\bththh.exe25⤵
- Executes dropped EXE
PID:1276 -
\??\c:\thtnbb.exec:\thtnbb.exe26⤵
- Executes dropped EXE
PID:60 -
\??\c:\ppvpd.exec:\ppvpd.exe27⤵
- Executes dropped EXE
PID:4512 -
\??\c:\xfrxflr.exec:\xfrxflr.exe28⤵
- Executes dropped EXE
PID:3756 -
\??\c:\7thhnt.exec:\7thhnt.exe29⤵
- Executes dropped EXE
PID:2816 -
\??\c:\jdddd.exec:\jdddd.exe30⤵
- Executes dropped EXE
PID:3696 -
\??\c:\rrfxflf.exec:\rrfxflf.exe31⤵
- Executes dropped EXE
PID:208 -
\??\c:\3nttbh.exec:\3nttbh.exe32⤵
- Executes dropped EXE
PID:3308 -
\??\c:\dvjjd.exec:\dvjjd.exe33⤵
- Executes dropped EXE
PID:2160 -
\??\c:\fllrrxl.exec:\fllrrxl.exe34⤵
- Executes dropped EXE
PID:4640 -
\??\c:\bbhhnn.exec:\bbhhnn.exe35⤵
- Executes dropped EXE
PID:1556 -
\??\c:\9nnnnt.exec:\9nnnnt.exe36⤵
- Executes dropped EXE
PID:4084 -
\??\c:\pvdvv.exec:\pvdvv.exe37⤵
- Executes dropped EXE
PID:656 -
\??\c:\xxfffll.exec:\xxfffll.exe38⤵
- Executes dropped EXE
PID:2196 -
\??\c:\ttnnhn.exec:\ttnnhn.exe39⤵
- Executes dropped EXE
PID:4532 -
\??\c:\bhbbhb.exec:\bhbbhb.exe40⤵
- Executes dropped EXE
PID:4020 -
\??\c:\ppjjd.exec:\ppjjd.exe41⤵
- Executes dropped EXE
PID:4284 -
\??\c:\llrrxxf.exec:\llrrxxf.exe42⤵
- Executes dropped EXE
PID:4784 -
\??\c:\bbhnnh.exec:\bbhnnh.exe43⤵
- Executes dropped EXE
PID:4788 -
\??\c:\xlffffl.exec:\xlffffl.exe44⤵
- Executes dropped EXE
PID:4476 -
\??\c:\1bhhbh.exec:\1bhhbh.exe45⤵
- Executes dropped EXE
PID:1180 -
\??\c:\tntnbh.exec:\tntnbh.exe46⤵
- Executes dropped EXE
PID:4912 -
\??\c:\pdjpp.exec:\pdjpp.exe47⤵
- Executes dropped EXE
PID:2260 -
\??\c:\1ttbbb.exec:\1ttbbb.exe48⤵
- Executes dropped EXE
PID:4800 -
\??\c:\pvjjp.exec:\pvjjp.exe49⤵
- Executes dropped EXE
PID:3972 -
\??\c:\vvdvd.exec:\vvdvd.exe50⤵
- Executes dropped EXE
PID:2248 -
\??\c:\9fffflr.exec:\9fffflr.exe51⤵
- Executes dropped EXE
PID:3012 -
\??\c:\hbnnbh.exec:\hbnnbh.exe52⤵
- Executes dropped EXE
PID:3440 -
\??\c:\nbhhht.exec:\nbhhht.exe53⤵
- Executes dropped EXE
PID:2244 -
\??\c:\9ddvv.exec:\9ddvv.exe54⤵
- Executes dropped EXE
PID:4956 -
\??\c:\rrxrrxx.exec:\rrxrrxx.exe55⤵
- Executes dropped EXE
PID:2488 -
\??\c:\bbnntt.exec:\bbnntt.exe56⤵
- Executes dropped EXE
PID:4208 -
\??\c:\htbttb.exec:\htbttb.exe57⤵
- Executes dropped EXE
PID:2272 -
\??\c:\pjppp.exec:\pjppp.exe58⤵
- Executes dropped EXE
PID:2240 -
\??\c:\xxlrlrr.exec:\xxlrlrr.exe59⤵
- Executes dropped EXE
PID:4528 -
\??\c:\bttnhh.exec:\bttnhh.exe60⤵
- Executes dropped EXE
PID:3008 -
\??\c:\5pddj.exec:\5pddj.exe61⤵
- Executes dropped EXE
PID:4580 -
\??\c:\llffflf.exec:\llffflf.exe62⤵
- Executes dropped EXE
PID:2480 -
\??\c:\nbtthb.exec:\nbtthb.exe63⤵
- Executes dropped EXE
PID:2992 -
\??\c:\jpppj.exec:\jpppj.exe64⤵
- Executes dropped EXE
PID:5032 -
\??\c:\xlxxrlx.exec:\xlxxrlx.exe65⤵
- Executes dropped EXE
PID:3236 -
\??\c:\bnhbth.exec:\bnhbth.exe66⤵PID:1812
-
\??\c:\bhntnn.exec:\bhntnn.exe67⤵PID:2808
-
\??\c:\djjjv.exec:\djjjv.exe68⤵PID:4160
-
\??\c:\ffxrrrr.exec:\ffxrrrr.exe69⤵PID:4064
-
\??\c:\3bbhnt.exec:\3bbhnt.exe70⤵PID:4804
-
\??\c:\tnbtbn.exec:\tnbtbn.exe71⤵PID:1400
-
\??\c:\dvjpp.exec:\dvjpp.exe72⤵PID:1628
-
\??\c:\ffllllf.exec:\ffllllf.exe73⤵PID:2164
-
\??\c:\tbnhtn.exec:\tbnhtn.exe74⤵PID:4052
-
\??\c:\nhhbbt.exec:\nhhbbt.exe75⤵PID:1796
-
\??\c:\pvjvv.exec:\pvjvv.exe76⤵PID:4652
-
\??\c:\lrllffr.exec:\lrllffr.exe77⤵PID:60
-
\??\c:\hbbbbb.exec:\hbbbbb.exe78⤵PID:3556
-
\??\c:\bntnbt.exec:\bntnbt.exe79⤵PID:3356
-
\??\c:\pppjd.exec:\pppjd.exe80⤵PID:1412
-
\??\c:\xllllll.exec:\xllllll.exe81⤵PID:4548
-
\??\c:\xfrrrrr.exec:\xfrrrrr.exe82⤵PID:2816
-
\??\c:\vdjjp.exec:\vdjjp.exe83⤵PID:3232
-
\??\c:\pvvvv.exec:\pvvvv.exe84⤵PID:776
-
\??\c:\llfffll.exec:\llfffll.exe85⤵PID:4808
-
\??\c:\1tbbbb.exec:\1tbbbb.exe86⤵PID:3388
-
\??\c:\tbbbbn.exec:\tbbbbn.exe87⤵PID:2160
-
\??\c:\5vvvj.exec:\5vvvj.exe88⤵PID:4640
-
\??\c:\jvppv.exec:\jvppv.exe89⤵PID:1556
-
\??\c:\xxxxlll.exec:\xxxxlll.exe90⤵PID:4084
-
\??\c:\fflrllr.exec:\fflrllr.exe91⤵PID:656
-
\??\c:\ttbbbh.exec:\ttbbbh.exe92⤵PID:2196
-
\??\c:\nnttbn.exec:\nnttbn.exe93⤵PID:4292
-
\??\c:\jjvvv.exec:\jjvvv.exe94⤵PID:4020
-
\??\c:\nnttnh.exec:\nnttnh.exe95⤵PID:3452
-
\??\c:\vvvvd.exec:\vvvvd.exe96⤵PID:4192
-
\??\c:\nnnhht.exec:\nnnhht.exe97⤵PID:4788
-
\??\c:\pdppj.exec:\pdppj.exe98⤵PID:3360
-
\??\c:\pdjdd.exec:\pdjdd.exe99⤵PID:4380
-
\??\c:\ntttbb.exec:\ntttbb.exe100⤵PID:1252
-
\??\c:\nhhnht.exec:\nhhnht.exe101⤵PID:756
-
\??\c:\pjpdd.exec:\pjpdd.exe102⤵PID:4404
-
\??\c:\7rrlrrr.exec:\7rrlrrr.exe103⤵PID:1820
-
\??\c:\frrrrrl.exec:\frrrrrl.exe104⤵PID:1348
-
\??\c:\tttttb.exec:\tttttb.exe105⤵PID:1940
-
\??\c:\5bntbb.exec:\5bntbb.exe106⤵PID:4956
-
\??\c:\flxrrxr.exec:\flxrrxr.exe107⤵PID:4488
-
\??\c:\rffxxll.exec:\rffxxll.exe108⤵PID:2448
-
\??\c:\bnnttn.exec:\bnnttn.exe109⤵PID:1792
-
\??\c:\jjjjv.exec:\jjjjv.exe110⤵PID:5016
-
\??\c:\jdjpp.exec:\jdjpp.exe111⤵PID:5100
-
\??\c:\3fllrxf.exec:\3fllrxf.exe112⤵PID:2344
-
\??\c:\rxlrfrf.exec:\rxlrfrf.exe113⤵PID:2136
-
\??\c:\nntbtb.exec:\nntbtb.exe114⤵PID:4992
-
\??\c:\bnnbhb.exec:\bnnbhb.exe115⤵PID:2100
-
\??\c:\djdvv.exec:\djdvv.exe116⤵PID:4996
-
\??\c:\pvddd.exec:\pvddd.exe117⤵PID:3236
-
\??\c:\lxlllrr.exec:\lxlllrr.exe118⤵PID:4740
-
\??\c:\rrfffll.exec:\rrfffll.exe119⤵PID:2808
-
\??\c:\btthhn.exec:\btthhn.exe120⤵PID:444
-
\??\c:\thttnn.exec:\thttnn.exe121⤵PID:4896
-
\??\c:\3pddd.exec:\3pddd.exe122⤵PID:4636
-
\??\c:\jvddd.exec:\jvddd.exe123⤵PID:1268
-
\??\c:\xxxrrrr.exec:\xxxrrrr.exe124⤵PID:1704
-
\??\c:\btbtnn.exec:\btbtnn.exe125⤵PID:4052
-
\??\c:\pjjjj.exec:\pjjjj.exe126⤵PID:4644
-
\??\c:\pjjjj.exec:\pjjjj.exe127⤵PID:4848
-
\??\c:\rrlrrrr.exec:\rrlrrrr.exe128⤵PID:4856
-
\??\c:\rrrrrrl.exec:\rrrrrrl.exe129⤵PID:60
-
\??\c:\hbbbnt.exec:\hbbbnt.exe130⤵PID:4372
-
\??\c:\9vdvv.exec:\9vdvv.exe131⤵PID:1408
-
\??\c:\1pvpd.exec:\1pvpd.exe132⤵PID:1884
-
\??\c:\xrxllfr.exec:\xrxllfr.exe133⤵PID:4828
-
\??\c:\rrxxxrr.exec:\rrxxxrr.exe134⤵PID:3920
-
\??\c:\nbbbbh.exec:\nbbbbh.exe135⤵PID:4988
-
\??\c:\bbbhhn.exec:\bbbhhn.exe136⤵PID:1124
-
\??\c:\vvddd.exec:\vvddd.exe137⤵PID:2220
-
\??\c:\dddpv.exec:\dddpv.exe138⤵PID:1404
-
\??\c:\xxrllll.exec:\xxrllll.exe139⤵PID:2160
-
\??\c:\fffffll.exec:\fffffll.exe140⤵PID:940
-
\??\c:\hbhhhb.exec:\hbhhhb.exe141⤵PID:4084
-
\??\c:\1fffxxx.exec:\1fffxxx.exe142⤵PID:2280
-
\??\c:\7bnnhh.exec:\7bnnhh.exe143⤵PID:900
-
\??\c:\jjvpj.exec:\jjvpj.exe144⤵PID:2196
-
\??\c:\1pjjv.exec:\1pjjv.exe145⤵PID:4280
-
\??\c:\frrrrrl.exec:\frrrrrl.exe146⤵PID:3264
-
\??\c:\7rfxrrl.exec:\7rfxrrl.exe147⤵PID:4520
-
\??\c:\lflllll.exec:\lflllll.exe148⤵PID:760
-
\??\c:\hbnnnt.exec:\hbnnnt.exe149⤵PID:2940
-
\??\c:\vjvvd.exec:\vjvvd.exe150⤵PID:2980
-
\??\c:\jvdvj.exec:\jvdvj.exe151⤵PID:2796
-
\??\c:\rrrlfll.exec:\rrrlfll.exe152⤵PID:4800
-
\??\c:\hbbttb.exec:\hbbttb.exe153⤵PID:4820
-
\??\c:\bnbbtn.exec:\bnbbtn.exe154⤵PID:1140
-
\??\c:\jpjjd.exec:\jpjjd.exe155⤵PID:5004
-
\??\c:\rxfllll.exec:\rxfllll.exe156⤵PID:1820
-
\??\c:\fflffxx.exec:\fflffxx.exe157⤵PID:2408
-
\??\c:\5ttttb.exec:\5ttttb.exe158⤵PID:2488
-
\??\c:\tnttth.exec:\tnttth.exe159⤵PID:64
-
\??\c:\vdvvv.exec:\vdvvv.exe160⤵PID:3168
-
\??\c:\frfffff.exec:\frfffff.exe161⤵PID:4600
-
\??\c:\rlfxfrr.exec:\rlfxfrr.exe162⤵PID:2240
-
\??\c:\pjpjv.exec:\pjpjv.exe163⤵PID:3152
-
\??\c:\jpddv.exec:\jpddv.exe164⤵PID:1492
-
\??\c:\3llffff.exec:\3llffff.exe165⤵PID:1752
-
\??\c:\flfflll.exec:\flfflll.exe166⤵PID:2020
-
\??\c:\nhhhbh.exec:\nhhhbh.exe167⤵PID:1876
-
\??\c:\hnnnnt.exec:\hnnnnt.exe168⤵PID:4836
-
\??\c:\9djjd.exec:\9djjd.exe169⤵PID:2032
-
\??\c:\lrffffl.exec:\lrffffl.exe170⤵PID:4160
-
\??\c:\ffxlllr.exec:\ffxlllr.exe171⤵PID:1864
-
\??\c:\nbbbbb.exec:\nbbbbb.exe172⤵PID:964
-
\??\c:\bbhbbh.exec:\bbhbbh.exe173⤵PID:4896
-
\??\c:\jjdvv.exec:\jjdvv.exe174⤵PID:960
-
\??\c:\pdppj.exec:\pdppj.exe175⤵PID:1832
-
\??\c:\ffrrflr.exec:\ffrrflr.exe176⤵PID:1612
-
\??\c:\lfflfrl.exec:\lfflfrl.exe177⤵PID:4492
-
\??\c:\hbbtnn.exec:\hbbtnn.exe178⤵PID:4500
-
\??\c:\hbbnnn.exec:\hbbnnn.exe179⤵PID:4512
-
\??\c:\djjjj.exec:\djjjj.exe180⤵PID:2200
-
\??\c:\7lxrxxx.exec:\7lxrxxx.exe181⤵PID:3208
-
\??\c:\tthnnt.exec:\tthnnt.exe182⤵PID:2316
-
\??\c:\1bnntb.exec:\1bnntb.exe183⤵PID:3740
-
\??\c:\pjpjj.exec:\pjpjj.exe184⤵PID:3576
-
\??\c:\3ddvv.exec:\3ddvv.exe185⤵PID:3800
-
\??\c:\3xlxlrl.exec:\3xlxlrl.exe186⤵PID:2360
-
\??\c:\ntnhhh.exec:\ntnhhh.exe187⤵PID:3436
-
\??\c:\bhntnn.exec:\bhntnn.exe188⤵PID:2536
-
\??\c:\pjppj.exec:\pjppj.exe189⤵PID:556
-
\??\c:\lrrfrxx.exec:\lrrfrxx.exe190⤵PID:2888
-
\??\c:\xrrrllr.exec:\xrrrllr.exe191⤵PID:3764
-
\??\c:\bbttbh.exec:\bbttbh.exe192⤵PID:2280
-
\??\c:\ntbhbh.exec:\ntbhbh.exe193⤵PID:4276
-
\??\c:\pdppp.exec:\pdppp.exe194⤵PID:4292
-
\??\c:\3xlfxxx.exec:\3xlfxxx.exe195⤵PID:2868
-
\??\c:\xffllrr.exec:\xffllrr.exe196⤵PID:3708
-
\??\c:\7bnnth.exec:\7bnnth.exe197⤵PID:3348
-
\??\c:\5nhhhn.exec:\5nhhhn.exe198⤵PID:760
-
\??\c:\1vjjd.exec:\1vjjd.exe199⤵PID:2940
-
\??\c:\ppddv.exec:\ppddv.exe200⤵PID:2980
-
\??\c:\xrfxrff.exec:\xrfxrff.exe201⤵PID:2720
-
\??\c:\rrxxxxf.exec:\rrxxxxf.exe202⤵PID:1656
-
\??\c:\7hhbbn.exec:\7hhbbn.exe203⤵PID:2248
-
\??\c:\jjvvd.exec:\jjvvd.exe204⤵PID:4952
-
\??\c:\djpjd.exec:\djpjd.exe205⤵PID:2244
-
\??\c:\jjjdp.exec:\jjjdp.exe206⤵PID:4624
-
\??\c:\rllfllf.exec:\rllfllf.exe207⤵PID:2592
-
\??\c:\5nhnnn.exec:\5nhnnn.exe208⤵PID:4596
-
\??\c:\tntnnt.exec:\tntnnt.exe209⤵PID:1972
-
\??\c:\ddvvv.exec:\ddvvv.exe210⤵PID:4580
-
\??\c:\dppjj.exec:\dppjj.exe211⤵PID:3036
-
\??\c:\xrrxxrr.exec:\xrrxxrr.exe212⤵PID:2852
-
\??\c:\1ffxlrf.exec:\1ffxlrf.exe213⤵PID:4836
-
\??\c:\tnnhhn.exec:\tnnhhn.exe214⤵PID:2032
-
\??\c:\htbbbb.exec:\htbbbb.exe215⤵PID:444
-
\??\c:\vpppp.exec:\vpppp.exe216⤵PID:2636
-
\??\c:\pjddv.exec:\pjddv.exe217⤵PID:4796
-
\??\c:\5rxxlrr.exec:\5rxxlrr.exe218⤵PID:3088
-
\??\c:\xxfxlrf.exec:\xxfxlrf.exe219⤵PID:3192
-
\??\c:\thhtnn.exec:\thhtnn.exe220⤵PID:2124
-
\??\c:\nhhbbb.exec:\nhhbbb.exe221⤵PID:3944
-
\??\c:\ddvvd.exec:\ddvvd.exe222⤵PID:1556
-
\??\c:\5vjjd.exec:\5vjjd.exe223⤵PID:4052
-
\??\c:\7fxxxfl.exec:\7fxxxfl.exe224⤵PID:4500
-
\??\c:\rlrlrrx.exec:\rlrlrrx.exe225⤵PID:4512
-
\??\c:\btbbbb.exec:\btbbbb.exe226⤵PID:2200
-
\??\c:\btntnb.exec:\btntnb.exe227⤵PID:3208
-
\??\c:\djddv.exec:\djddv.exe228⤵PID:2316
-
\??\c:\xxlfllf.exec:\xxlfllf.exe229⤵PID:4840
-
\??\c:\ffffxff.exec:\ffffxff.exe230⤵PID:3576
-
\??\c:\bbnbbb.exec:\bbnbbb.exe231⤵PID:3800
-
\??\c:\hnnnnh.exec:\hnnnnh.exe232⤵PID:2360
-
\??\c:\pdjjj.exec:\pdjjj.exe233⤵PID:3436
-
\??\c:\ppddj.exec:\ppddj.exe234⤵PID:2536
-
\??\c:\lfrlllf.exec:\lfrlllf.exe235⤵PID:556
-
\??\c:\7xxfxrl.exec:\7xxfxrl.exe236⤵PID:2888
-
\??\c:\tbnnnt.exec:\tbnnnt.exe237⤵PID:1420
-
\??\c:\bbnnnb.exec:\bbnnnb.exe238⤵PID:3764
-
\??\c:\3djdv.exec:\3djdv.exe239⤵PID:4448
-
\??\c:\5djjj.exec:\5djjj.exe240⤵PID:3212
-
\??\c:\xxrrrrx.exec:\xxrrrrx.exe241⤵PID:1688
-
\??\c:\hbtnnt.exec:\hbtnnt.exe242⤵PID:3452