Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe
-
Size
68KB
-
MD5
ac39b289bc71770f5d7242c48f8dbb70
-
SHA1
b4c166e5426a153ba2f93aa86274c62e43915fe7
-
SHA256
1f76c0949280ad24a805d3631e3b521857e992b87218a234862b9e6976298f79
-
SHA512
99fcbcf24c77e66998a2dfdc4212b8d05571df9cf811531608510f2fc51a5954d06c3caccc5baf65cd977cd810f011c29855f80eff3cb651d98524d9f16e2991
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89+b:ymb3NkkiQ3mdBjFIvl358nLA89K
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/3024-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1176-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1176-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2344-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2596-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3260-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3792-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4196-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1028-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4732-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3204-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2168-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4500-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1068-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1568-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1800-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4272-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2016-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1980-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3448-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1180-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vddvv.exerfrrxrf.exethbntn.exe9rlffxx.exerxlrlfx.exebhtnhb.exejdvvd.exevpvpp.exexrfxrlf.exebnnhhb.exe1vvpj.exejjvvj.exennntht.exebbnhnn.exejjddd.exerlxflrf.exehbhtbt.exevdvpj.exedppjj.exelxlfffr.exehtbbtt.exenhtthn.exejvvjv.exellffrxr.exennbnbn.exevjvvd.exepvpdd.exexfrrffl.exetbbtnn.exepddvp.exe7pvpd.exexrxrfff.exebnhbbt.exeddjvp.exeppjjd.exelrrlxxr.exelffflfr.exenbhbnn.exevdddv.exelxfxxxx.exe3lxrxxf.exehtbhhb.exenhnntt.exeddppd.exelrrxlxl.exerxxrxlr.exebnbbbt.exe9pvpj.exe3dpdv.exe3lrxrrr.exennnnbb.exelfrxlff.exefrrfxxx.exebhhtht.exehhhbtn.exevjpjj.exevppjp.exe9flxxxr.exehhntbh.exebthttt.exe7dpjp.exerllxrxl.exefrlffff.exentnhhb.exepid process 4180 vddvv.exe 1176 rfrrxrf.exe 2344 thbntn.exe 4664 9rlffxx.exe 3260 rxlrlfx.exe 2596 bhtnhb.exe 3792 jdvvd.exe 4196 vpvpp.exe 4472 xrfxrlf.exe 1028 bnnhhb.exe 4004 1vvpj.exe 4732 jjvvj.exe 3204 nnntht.exe 2168 bbnhnn.exe 4500 jjddd.exe 1068 rlxflrf.exe 5084 hbhtbt.exe 1568 vdvpj.exe 4736 dppjj.exe 2936 lxlfffr.exe 1800 htbbtt.exe 3196 nhtthn.exe 2252 jvvjv.exe 4272 llffrxr.exe 532 nnbnbn.exe 2016 vjvvd.exe 1980 pvpdd.exe 1988 xfrrffl.exe 2756 tbbtnn.exe 3448 pddvp.exe 1180 7pvpd.exe 4740 xrxrfff.exe 4168 bnhbbt.exe 968 ddjvp.exe 2652 ppjjd.exe 3308 lrrlxxr.exe 4560 lffflfr.exe 4772 nbhbnn.exe 4224 vdddv.exe 4508 lxfxxxx.exe 748 3lxrxxf.exe 1564 htbhhb.exe 1504 nhnntt.exe 752 ddppd.exe 3364 lrrxlxl.exe 4588 rxxrxlr.exe 1680 bnbbbt.exe 3496 9pvpj.exe 4528 3dpdv.exe 3572 3lrxrrr.exe 1376 nnnnbb.exe 1724 lfrxlff.exe 1028 frrfxxx.exe 2304 bhhtht.exe 1792 hhhbtn.exe 1744 vjpjj.exe 3188 vppjp.exe 2168 9flxxxr.exe 3320 hhntbh.exe 3168 bthttt.exe 1496 7dpjp.exe 952 rllxrxl.exe 1568 frlffff.exe 2636 ntnhhb.exe -
Processes:
resource yara_rule behavioral2/memory/3024-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1176-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1176-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2344-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4664-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2596-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3260-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3792-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4196-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1028-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4732-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2168-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4500-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1068-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1568-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1800-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4272-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3448-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1180-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exevddvv.exerfrrxrf.exethbntn.exe9rlffxx.exerxlrlfx.exebhtnhb.exejdvvd.exevpvpp.exexrfxrlf.exebnnhhb.exe1vvpj.exejjvvj.exennntht.exebbnhnn.exejjddd.exerlxflrf.exehbhtbt.exevdvpj.exedppjj.exelxlfffr.exehtbbtt.exedescription pid process target process PID 3024 wrote to memory of 4180 3024 ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe vddvv.exe PID 3024 wrote to memory of 4180 3024 ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe vddvv.exe PID 3024 wrote to memory of 4180 3024 ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe vddvv.exe PID 4180 wrote to memory of 1176 4180 vddvv.exe rfrrxrf.exe PID 4180 wrote to memory of 1176 4180 vddvv.exe rfrrxrf.exe PID 4180 wrote to memory of 1176 4180 vddvv.exe rfrrxrf.exe PID 1176 wrote to memory of 2344 1176 rfrrxrf.exe thbntn.exe PID 1176 wrote to memory of 2344 1176 rfrrxrf.exe thbntn.exe PID 1176 wrote to memory of 2344 1176 rfrrxrf.exe thbntn.exe PID 2344 wrote to memory of 4664 2344 thbntn.exe 9rlffxx.exe PID 2344 wrote to memory of 4664 2344 thbntn.exe 9rlffxx.exe PID 2344 wrote to memory of 4664 2344 thbntn.exe 9rlffxx.exe PID 4664 wrote to memory of 3260 4664 9rlffxx.exe rxlrlfx.exe PID 4664 wrote to memory of 3260 4664 9rlffxx.exe rxlrlfx.exe PID 4664 wrote to memory of 3260 4664 9rlffxx.exe rxlrlfx.exe PID 3260 wrote to memory of 2596 3260 rxlrlfx.exe bhtnhb.exe PID 3260 wrote to memory of 2596 3260 rxlrlfx.exe bhtnhb.exe PID 3260 wrote to memory of 2596 3260 rxlrlfx.exe bhtnhb.exe PID 2596 wrote to memory of 3792 2596 bhtnhb.exe jdvvd.exe PID 2596 wrote to memory of 3792 2596 bhtnhb.exe jdvvd.exe PID 2596 wrote to memory of 3792 2596 bhtnhb.exe jdvvd.exe PID 3792 wrote to memory of 4196 3792 jdvvd.exe vpvpp.exe PID 3792 wrote to memory of 4196 3792 jdvvd.exe vpvpp.exe PID 3792 wrote to memory of 4196 3792 jdvvd.exe vpvpp.exe PID 4196 wrote to memory of 4472 4196 vpvpp.exe xrfxrlf.exe PID 4196 wrote to memory of 4472 4196 vpvpp.exe xrfxrlf.exe PID 4196 wrote to memory of 4472 4196 vpvpp.exe xrfxrlf.exe PID 4472 wrote to memory of 1028 4472 xrfxrlf.exe bnnhhb.exe PID 4472 wrote to memory of 1028 4472 xrfxrlf.exe bnnhhb.exe PID 4472 wrote to memory of 1028 4472 xrfxrlf.exe bnnhhb.exe PID 1028 wrote to memory of 4004 1028 bnnhhb.exe 1vvpj.exe PID 1028 wrote to memory of 4004 1028 bnnhhb.exe 1vvpj.exe PID 1028 wrote to memory of 4004 1028 bnnhhb.exe 1vvpj.exe PID 4004 wrote to memory of 4732 4004 1vvpj.exe jjvvj.exe PID 4004 wrote to memory of 4732 4004 1vvpj.exe jjvvj.exe PID 4004 wrote to memory of 4732 4004 1vvpj.exe jjvvj.exe PID 4732 wrote to memory of 3204 4732 jjvvj.exe nnntht.exe PID 4732 wrote to memory of 3204 4732 jjvvj.exe nnntht.exe PID 4732 wrote to memory of 3204 4732 jjvvj.exe nnntht.exe PID 3204 wrote to memory of 2168 3204 nnntht.exe bbnhnn.exe PID 3204 wrote to memory of 2168 3204 nnntht.exe bbnhnn.exe PID 3204 wrote to memory of 2168 3204 nnntht.exe bbnhnn.exe PID 2168 wrote to memory of 4500 2168 bbnhnn.exe jjddd.exe PID 2168 wrote to memory of 4500 2168 bbnhnn.exe jjddd.exe PID 2168 wrote to memory of 4500 2168 bbnhnn.exe jjddd.exe PID 4500 wrote to memory of 1068 4500 jjddd.exe rlxflrf.exe PID 4500 wrote to memory of 1068 4500 jjddd.exe rlxflrf.exe PID 4500 wrote to memory of 1068 4500 jjddd.exe rlxflrf.exe PID 1068 wrote to memory of 5084 1068 rlxflrf.exe hbhtbt.exe PID 1068 wrote to memory of 5084 1068 rlxflrf.exe hbhtbt.exe PID 1068 wrote to memory of 5084 1068 rlxflrf.exe hbhtbt.exe PID 5084 wrote to memory of 1568 5084 hbhtbt.exe vdvpj.exe PID 5084 wrote to memory of 1568 5084 hbhtbt.exe vdvpj.exe PID 5084 wrote to memory of 1568 5084 hbhtbt.exe vdvpj.exe PID 1568 wrote to memory of 4736 1568 vdvpj.exe dppjj.exe PID 1568 wrote to memory of 4736 1568 vdvpj.exe dppjj.exe PID 1568 wrote to memory of 4736 1568 vdvpj.exe dppjj.exe PID 4736 wrote to memory of 2936 4736 dppjj.exe lxlfffr.exe PID 4736 wrote to memory of 2936 4736 dppjj.exe lxlfffr.exe PID 4736 wrote to memory of 2936 4736 dppjj.exe lxlfffr.exe PID 2936 wrote to memory of 1800 2936 lxlfffr.exe htbbtt.exe PID 2936 wrote to memory of 1800 2936 lxlfffr.exe htbbtt.exe PID 2936 wrote to memory of 1800 2936 lxlfffr.exe htbbtt.exe PID 1800 wrote to memory of 3196 1800 htbbtt.exe nhtthn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\vddvv.exec:\vddvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\rfrrxrf.exec:\rfrrxrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\thbntn.exec:\thbntn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\9rlffxx.exec:\9rlffxx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\rxlrlfx.exec:\rxlrlfx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
\??\c:\bhtnhb.exec:\bhtnhb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\jdvvd.exec:\jdvvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
\??\c:\vpvpp.exec:\vpvpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
\??\c:\xrfxrlf.exec:\xrfxrlf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\bnnhhb.exec:\bnnhhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\1vvpj.exec:\1vvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\jjvvj.exec:\jjvvj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\nnntht.exec:\nnntht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
\??\c:\bbnhnn.exec:\bbnhnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\jjddd.exec:\jjddd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
\??\c:\rlxflrf.exec:\rlxflrf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\hbhtbt.exec:\hbhtbt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\vdvpj.exec:\vdvpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
\??\c:\dppjj.exec:\dppjj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\lxlfffr.exec:\lxlfffr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\htbbtt.exec:\htbbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\nhtthn.exec:\nhtthn.exe23⤵
- Executes dropped EXE
PID:3196 -
\??\c:\jvvjv.exec:\jvvjv.exe24⤵
- Executes dropped EXE
PID:2252 -
\??\c:\llffrxr.exec:\llffrxr.exe25⤵
- Executes dropped EXE
PID:4272 -
\??\c:\nnbnbn.exec:\nnbnbn.exe26⤵
- Executes dropped EXE
PID:532 -
\??\c:\vjvvd.exec:\vjvvd.exe27⤵
- Executes dropped EXE
PID:2016 -
\??\c:\pvpdd.exec:\pvpdd.exe28⤵
- Executes dropped EXE
PID:1980 -
\??\c:\xfrrffl.exec:\xfrrffl.exe29⤵
- Executes dropped EXE
PID:1988 -
\??\c:\tbbtnn.exec:\tbbtnn.exe30⤵
- Executes dropped EXE
PID:2756 -
\??\c:\pddvp.exec:\pddvp.exe31⤵
- Executes dropped EXE
PID:3448 -
\??\c:\7pvpd.exec:\7pvpd.exe32⤵
- Executes dropped EXE
PID:1180 -
\??\c:\xrxrfff.exec:\xrxrfff.exe33⤵
- Executes dropped EXE
PID:4740 -
\??\c:\bnhbbt.exec:\bnhbbt.exe34⤵
- Executes dropped EXE
PID:4168 -
\??\c:\ddjvp.exec:\ddjvp.exe35⤵
- Executes dropped EXE
PID:968 -
\??\c:\ppjjd.exec:\ppjjd.exe36⤵
- Executes dropped EXE
PID:2652 -
\??\c:\lrrlxxr.exec:\lrrlxxr.exe37⤵
- Executes dropped EXE
PID:3308 -
\??\c:\lffflfr.exec:\lffflfr.exe38⤵
- Executes dropped EXE
PID:4560 -
\??\c:\nbhbnn.exec:\nbhbnn.exe39⤵
- Executes dropped EXE
PID:4772 -
\??\c:\vdddv.exec:\vdddv.exe40⤵
- Executes dropped EXE
PID:4224 -
\??\c:\lxfxxxx.exec:\lxfxxxx.exe41⤵
- Executes dropped EXE
PID:4508 -
\??\c:\3lxrxxf.exec:\3lxrxxf.exe42⤵
- Executes dropped EXE
PID:748 -
\??\c:\htbhhb.exec:\htbhhb.exe43⤵
- Executes dropped EXE
PID:1564 -
\??\c:\nhnntt.exec:\nhnntt.exe44⤵
- Executes dropped EXE
PID:1504 -
\??\c:\ddppd.exec:\ddppd.exe45⤵
- Executes dropped EXE
PID:752 -
\??\c:\lrrxlxl.exec:\lrrxlxl.exe46⤵
- Executes dropped EXE
PID:3364 -
\??\c:\rxxrxlr.exec:\rxxrxlr.exe47⤵
- Executes dropped EXE
PID:4588 -
\??\c:\bnbbbt.exec:\bnbbbt.exe48⤵
- Executes dropped EXE
PID:1680 -
\??\c:\9pvpj.exec:\9pvpj.exe49⤵
- Executes dropped EXE
PID:3496 -
\??\c:\3dpdv.exec:\3dpdv.exe50⤵
- Executes dropped EXE
PID:4528 -
\??\c:\3lrxrrr.exec:\3lrxrrr.exe51⤵
- Executes dropped EXE
PID:3572 -
\??\c:\nnnnbb.exec:\nnnnbb.exe52⤵
- Executes dropped EXE
PID:1376 -
\??\c:\lfrxlff.exec:\lfrxlff.exe53⤵
- Executes dropped EXE
PID:1724 -
\??\c:\frrfxxx.exec:\frrfxxx.exe54⤵
- Executes dropped EXE
PID:1028 -
\??\c:\bhhtht.exec:\bhhtht.exe55⤵
- Executes dropped EXE
PID:2304 -
\??\c:\hhhbtn.exec:\hhhbtn.exe56⤵
- Executes dropped EXE
PID:1792 -
\??\c:\vjpjj.exec:\vjpjj.exe57⤵
- Executes dropped EXE
PID:1744 -
\??\c:\vppjp.exec:\vppjp.exe58⤵
- Executes dropped EXE
PID:3188 -
\??\c:\9flxxxr.exec:\9flxxxr.exe59⤵
- Executes dropped EXE
PID:2168 -
\??\c:\hhntbh.exec:\hhntbh.exe60⤵
- Executes dropped EXE
PID:3320 -
\??\c:\bthttt.exec:\bthttt.exe61⤵
- Executes dropped EXE
PID:3168 -
\??\c:\7dpjp.exec:\7dpjp.exe62⤵
- Executes dropped EXE
PID:1496 -
\??\c:\rllxrxl.exec:\rllxrxl.exe63⤵
- Executes dropped EXE
PID:952 -
\??\c:\frlffff.exec:\frlffff.exe64⤵
- Executes dropped EXE
PID:1568 -
\??\c:\ntnhhb.exec:\ntnhhb.exe65⤵
- Executes dropped EXE
PID:2636 -
\??\c:\ddpjd.exec:\ddpjd.exe66⤵PID:2936
-
\??\c:\rrrlfxl.exec:\rrrlfxl.exe67⤵PID:1800
-
\??\c:\lfxlffl.exec:\lfxlffl.exe68⤵PID:4080
-
\??\c:\9bhnhh.exec:\9bhnhh.exe69⤵PID:4996
-
\??\c:\thhbtn.exec:\thhbtn.exe70⤵PID:2292
-
\??\c:\dvvvv.exec:\dvvvv.exe71⤵PID:3868
-
\??\c:\rfrlxrx.exec:\rfrlxrx.exe72⤵PID:3800
-
\??\c:\hnntnb.exec:\hnntnb.exe73⤵PID:1860
-
\??\c:\7hhnhh.exec:\7hhnhh.exe74⤵PID:3140
-
\??\c:\1pvpv.exec:\1pvpv.exe75⤵PID:4008
-
\??\c:\pdjpj.exec:\pdjpj.exe76⤵PID:3128
-
\??\c:\xrrxxxf.exec:\xrrxxxf.exe77⤵PID:4160
-
\??\c:\7jvvv.exec:\7jvvv.exe78⤵PID:2436
-
\??\c:\5lrrrxr.exec:\5lrrrxr.exe79⤵PID:1500
-
\??\c:\rrxrlll.exec:\rrxrlll.exe80⤵PID:5072
-
\??\c:\bnhtht.exec:\bnhtht.exe81⤵PID:4740
-
\??\c:\pjpjv.exec:\pjpjv.exe82⤵PID:1968
-
\??\c:\7pvjd.exec:\7pvjd.exe83⤵PID:4576
-
\??\c:\7lfxrlx.exec:\7lfxrlx.exe84⤵PID:3308
-
\??\c:\xrlffrl.exec:\xrlffrl.exe85⤵PID:2972
-
\??\c:\3vvpp.exec:\3vvpp.exe86⤵PID:2492
-
\??\c:\1ppjj.exec:\1ppjj.exe87⤵PID:4660
-
\??\c:\frllxrr.exec:\frllxrr.exe88⤵PID:4508
-
\??\c:\tnnbhb.exec:\tnnbhb.exe89⤵PID:4048
-
\??\c:\bnhhbn.exec:\bnhhbn.exe90⤵PID:1176
-
\??\c:\pjvjp.exec:\pjvjp.exe91⤵PID:2604
-
\??\c:\lllrlll.exec:\lllrlll.exe92⤵PID:1444
-
\??\c:\lfxxrrl.exec:\lfxxrrl.exe93⤵PID:3692
-
\??\c:\9nhhhh.exec:\9nhhhh.exe94⤵PID:688
-
\??\c:\nbbnhh.exec:\nbbnhh.exe95⤵PID:2240
-
\??\c:\1jjdp.exec:\1jjdp.exe96⤵PID:4164
-
\??\c:\dvdvj.exec:\dvdvj.exe97⤵PID:3372
-
\??\c:\fxxrlff.exec:\fxxrlff.exe98⤵PID:2828
-
\??\c:\rlllfxx.exec:\rlllfxx.exe99⤵PID:3296
-
\??\c:\ntttnn.exec:\ntttnn.exe100⤵PID:4676
-
\??\c:\ttttnn.exec:\ttttnn.exe101⤵PID:624
-
\??\c:\ppppj.exec:\ppppj.exe102⤵PID:1672
-
\??\c:\pddvp.exec:\pddvp.exe103⤵PID:1344
-
\??\c:\lrfrrfx.exec:\lrfrrfx.exe104⤵PID:4500
-
\??\c:\tntbbb.exec:\tntbbb.exe105⤵PID:1216
-
\??\c:\5btnbb.exec:\5btnbb.exe106⤵PID:3264
-
\??\c:\dvvvv.exec:\dvvvv.exe107⤵PID:3540
-
\??\c:\9vdpd.exec:\9vdpd.exe108⤵PID:4544
-
\??\c:\rrrlfxr.exec:\rrrlfxr.exe109⤵PID:1608
-
\??\c:\3rrlfxr.exec:\3rrlfxr.exe110⤵PID:2704
-
\??\c:\hnttnh.exec:\hnttnh.exe111⤵PID:2692
-
\??\c:\jvjvj.exec:\jvjvj.exe112⤵PID:2936
-
\??\c:\vdjdp.exec:\vdjdp.exe113⤵PID:1800
-
\??\c:\rlrlrlf.exec:\rlrlrlf.exe114⤵PID:4080
-
\??\c:\ffffrrl.exec:\ffffrrl.exe115⤵PID:2580
-
\??\c:\tbbthh.exec:\tbbthh.exe116⤵PID:2588
-
\??\c:\jjjdj.exec:\jjjdj.exe117⤵PID:3836
-
\??\c:\xrlxrrl.exec:\xrlxrrl.exe118⤵PID:3376
-
\??\c:\bbtnhh.exec:\bbtnhh.exe119⤵PID:4184
-
\??\c:\3jdvj.exec:\3jdvj.exe120⤵PID:512
-
\??\c:\lflxxxf.exec:\lflxxxf.exe121⤵PID:3604
-
\??\c:\lrxrrrl.exec:\lrxrrrl.exe122⤵PID:3732
-
\??\c:\jjvdj.exec:\jjvdj.exe123⤵PID:5000
-
\??\c:\fllrffr.exec:\fllrffr.exe124⤵PID:2436
-
\??\c:\fflllll.exec:\fflllll.exe125⤵PID:4168
-
\??\c:\tnbbhn.exec:\tnbbhn.exe126⤵PID:2652
-
\??\c:\ddjjj.exec:\ddjjj.exe127⤵PID:2848
-
\??\c:\ddppj.exec:\ddppj.exe128⤵PID:4504
-
\??\c:\xrlrrff.exec:\xrlrrff.exe129⤵PID:4492
-
\??\c:\lrxxxff.exec:\lrxxxff.exe130⤵PID:1992
-
\??\c:\tbttnt.exec:\tbttnt.exe131⤵PID:3828
-
\??\c:\tthbbn.exec:\tthbbn.exe132⤵PID:4884
-
\??\c:\jdjdd.exec:\jdjdd.exe133⤵PID:1680
-
\??\c:\1dddv.exec:\1dddv.exe134⤵PID:4132
-
\??\c:\rflfxxr.exec:\rflfxxr.exe135⤵PID:4196
-
\??\c:\rflfxfr.exec:\rflfxfr.exe136⤵PID:2332
-
\??\c:\hhbbbb.exec:\hhbbbb.exe137⤵PID:1724
-
\??\c:\hnbhhn.exec:\hnbhhn.exe138⤵PID:3500
-
\??\c:\rllxxxr.exec:\rllxxxr.exe139⤵PID:3296
-
\??\c:\btnhhh.exec:\btnhhh.exe140⤵PID:2296
-
\??\c:\htbttb.exec:\htbttb.exe141⤵PID:624
-
\??\c:\3vpvj.exec:\3vpvj.exe142⤵PID:3188
-
\??\c:\dpdpp.exec:\dpdpp.exe143⤵PID:3720
-
\??\c:\xrlrrrr.exec:\xrlrrrr.exe144⤵PID:2584
-
\??\c:\thhthh.exec:\thhthh.exe145⤵PID:1216
-
\??\c:\pvjdp.exec:\pvjdp.exe146⤵PID:3264
-
\??\c:\xxlllrr.exec:\xxlllrr.exe147⤵PID:3540
-
\??\c:\hbnnnn.exec:\hbnnnn.exe148⤵PID:4544
-
\??\c:\nbbhht.exec:\nbbhht.exe149⤵PID:1608
-
\??\c:\1jvvv.exec:\1jvvv.exe150⤵PID:672
-
\??\c:\lxxxxll.exec:\lxxxxll.exe151⤵PID:1104
-
\??\c:\5frrxff.exec:\5frrxff.exe152⤵PID:4124
-
\??\c:\nhntnh.exec:\nhntnh.exe153⤵PID:4880
-
\??\c:\pvjjp.exec:\pvjjp.exe154⤵PID:4656
-
\??\c:\xrxrrrr.exec:\xrxrrrr.exe155⤵PID:3716
-
\??\c:\thhbnn.exec:\thhbnn.exe156⤵PID:2016
-
\??\c:\thhnhb.exec:\thhnhb.exe157⤵PID:1696
-
\??\c:\vvpjv.exec:\vvpjv.exe158⤵PID:4680
-
\??\c:\vjvpp.exec:\vjvpp.exe159⤵PID:1548
-
\??\c:\hbhnnb.exec:\hbhnnb.exe160⤵PID:4032
-
\??\c:\vppjj.exec:\vppjj.exe161⤵PID:4260
-
\??\c:\5fffxxx.exec:\5fffxxx.exe162⤵PID:428
-
\??\c:\hthbtb.exec:\hthbtb.exe163⤵PID:5004
-
\??\c:\bhnhhh.exec:\bhnhhh.exe164⤵PID:1588
-
\??\c:\vpdpp.exec:\vpdpp.exe165⤵PID:4832
-
\??\c:\llllxlx.exec:\llllxlx.exe166⤵PID:2652
-
\??\c:\fxlfxlf.exec:\fxlfxlf.exe167⤵PID:4560
-
\??\c:\ntnbnn.exec:\ntnbnn.exe168⤵PID:4812
-
\??\c:\vpvvp.exec:\vpvvp.exe169⤵PID:4492
-
\??\c:\llxrxxf.exec:\llxrxxf.exe170⤵PID:1684
-
\??\c:\1bbbtt.exec:\1bbbtt.exe171⤵PID:3828
-
\??\c:\tnnhbb.exec:\tnnhbb.exe172⤵PID:2484
-
\??\c:\ddvvd.exec:\ddvvd.exe173⤵PID:2852
-
\??\c:\xrrxxfl.exec:\xrrxxfl.exe174⤵PID:688
-
\??\c:\vjvpv.exec:\vjvpv.exe175⤵PID:4072
-
\??\c:\xrxxxll.exec:\xrxxxll.exe176⤵PID:4164
-
\??\c:\hntttb.exec:\hntttb.exe177⤵PID:4116
-
\??\c:\pvpvj.exec:\pvpvj.exe178⤵PID:4004
-
\??\c:\xflrrfx.exec:\xflrrfx.exe179⤵PID:4888
-
\??\c:\pjvvv.exec:\pjvvv.exe180⤵PID:4024
-
\??\c:\9ddjv.exec:\9ddjv.exe181⤵PID:624
-
\??\c:\9xfffxx.exec:\9xfffxx.exe182⤵PID:3792
-
\??\c:\ppdjd.exec:\ppdjd.exe183⤵PID:4580
-
\??\c:\vpdjj.exec:\vpdjj.exe184⤵PID:3320
-
\??\c:\xfxrxlf.exec:\xfxrxlf.exe185⤵PID:4036
-
\??\c:\ffrllrx.exec:\ffrllrx.exe186⤵PID:1496
-
\??\c:\bbhnhh.exec:\bbhnhh.exe187⤵PID:3540
-
\??\c:\pjpvp.exec:\pjpvp.exe188⤵PID:1568
-
\??\c:\5lrrrrr.exec:\5lrrrrr.exe189⤵PID:2704
-
\??\c:\7ntttt.exec:\7ntttt.exe190⤵PID:1936
-
\??\c:\jdjdd.exec:\jdjdd.exe191⤵PID:3812
-
\??\c:\5lfrlrx.exec:\5lfrlrx.exe192⤵PID:4152
-
\??\c:\thbnnb.exec:\thbnnb.exe193⤵PID:1800
-
\??\c:\thhtnt.exec:\thhtnt.exe194⤵PID:816
-
\??\c:\vdpdd.exec:\vdpdd.exe195⤵PID:1768
-
\??\c:\vddvp.exec:\vddvp.exe196⤵PID:4068
-
\??\c:\bttbtb.exec:\bttbtb.exe197⤵PID:3376
-
\??\c:\hbntnn.exec:\hbntnn.exe198⤵PID:3916
-
\??\c:\vjvvv.exec:\vjvvv.exe199⤵PID:1548
-
\??\c:\vdjdv.exec:\vdjdv.exe200⤵PID:1572
-
\??\c:\ffrrfll.exec:\ffrrfll.exe201⤵PID:1500
-
\??\c:\hthnnt.exec:\hthnnt.exe202⤵PID:2384
-
\??\c:\nhnhhh.exec:\nhnhhh.exe203⤵PID:5004
-
\??\c:\9jpjp.exec:\9jpjp.exe204⤵PID:1664
-
\??\c:\5llfxxr.exec:\5llfxxr.exe205⤵PID:4252
-
\??\c:\xllffrr.exec:\xllffrr.exe206⤵PID:4772
-
\??\c:\bthbtt.exec:\bthbtt.exe207⤵PID:4408
-
\??\c:\7thhbh.exec:\7thhbh.exe208⤵PID:4824
-
\??\c:\djpjj.exec:\djpjj.exe209⤵PID:3680
-
\??\c:\fffxxxr.exec:\fffxxxr.exe210⤵PID:1056
-
\??\c:\ffxxrxr.exec:\ffxxrxr.exe211⤵PID:2968
-
\??\c:\bbntbn.exec:\bbntbn.exe212⤵PID:2276
-
\??\c:\bhnhht.exec:\bhnhht.exe213⤵PID:1680
-
\??\c:\jvddd.exec:\jvddd.exe214⤵PID:700
-
\??\c:\vjdjd.exec:\vjdjd.exe215⤵PID:4496
-
\??\c:\lxlxxrl.exec:\lxlxxrl.exe216⤵PID:3500
-
\??\c:\pddvj.exec:\pddvj.exe217⤵PID:4864
-
\??\c:\9vddd.exec:\9vddd.exe218⤵PID:4000
-
\??\c:\xrllfll.exec:\xrllfll.exe219⤵PID:872
-
\??\c:\rrxxlrl.exec:\rrxxlrl.exe220⤵PID:3104
-
\??\c:\hbhtth.exec:\hbhtth.exe221⤵PID:3792
-
\??\c:\pjvpp.exec:\pjvpp.exe222⤵PID:3168
-
\??\c:\lxlxllx.exec:\lxlxllx.exe223⤵PID:1392
-
\??\c:\rllrrrr.exec:\rllrrrr.exe224⤵PID:2136
-
\??\c:\llxflrx.exec:\llxflrx.exe225⤵PID:1496
-
\??\c:\tbhtth.exec:\tbhtth.exe226⤵PID:3540
-
\??\c:\dvpjp.exec:\dvpjp.exe227⤵PID:1568
-
\??\c:\lllflrx.exec:\lllflrx.exe228⤵PID:2248
-
\??\c:\flrlrxl.exec:\flrlrxl.exe229⤵PID:4728
-
\??\c:\tnnnnn.exec:\tnnnnn.exe230⤵PID:2128
-
\??\c:\jpddv.exec:\jpddv.exe231⤵PID:3868
-
\??\c:\rxfxlrl.exec:\rxfxlrl.exe232⤵PID:1844
-
\??\c:\rffrrrf.exec:\rffrrrf.exe233⤵PID:3744
-
\??\c:\ntttnn.exec:\ntttnn.exe234⤵PID:2064
-
\??\c:\nnnnnn.exec:\nnnnnn.exe235⤵PID:2540
-
\??\c:\dvvpj.exec:\dvvpj.exe236⤵PID:3836
-
\??\c:\1rrrlfx.exec:\1rrrlfx.exe237⤵PID:2988
-
\??\c:\tthhhb.exec:\tthhhb.exe238⤵PID:2804
-
\??\c:\hnthnt.exec:\hnthnt.exe239⤵PID:4008
-
\??\c:\djppp.exec:\djppp.exe240⤵PID:1988
-
\??\c:\7xfffll.exec:\7xfffll.exe241⤵PID:2756
-
\??\c:\rllllll.exec:\rllllll.exe242⤵PID:4440