Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 03:51
Behavioral task
behavioral1
Sample
a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe
-
Size
327KB
-
MD5
a4f5360a0b6d03f1d37663a48a2c5050
-
SHA1
7f2f7546fa559b3c2b45fff3febf3055d4768058
-
SHA256
ee53314f21144865f362128ec1f658e793a5c05849a18aa7dcb22ee747f9572a
-
SHA512
f44b6de68f7592b8d61b5ff47a9163180e0b71f6e354f23d49cf1015bedcae01b266f0d9c23837f462fe04792aa196ce6010c745073e5ddd81b31fb21c1e1cd3
-
SSDEEP
6144:9cm4FmowdHoS4BftapTs8Hoo+6MjTVhRD3:/4wFHoS4d0G8HoljTVhRD3
Malware Config
Signatures
-
Detect Blackmoon payload 47 IoCs
Processes:
resource yara_rule behavioral1/memory/1276-8-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2192-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3008-27-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2388-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2580-47-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2580-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2580-45-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2668-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2724-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2812-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1972-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2480-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2088-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1644-119-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1644-118-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1660-144-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2036-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2028-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2232-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/324-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2928-191-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/764-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1896-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1480-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1676-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2896-294-0x0000000076FB0000-0x00000000770CF000-memory.dmp family_blackmoon behavioral1/memory/2840-303-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2968-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3024-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2612-348-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2932-374-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2572-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1180-395-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1644-408-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/768-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2836-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1752-572-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2896-573-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/584-769-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1944-813-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1052-877-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2128-1083-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/3024-1161-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3000-1181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3024-1188-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1912-1252-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1924-1265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
rrrllxr.exejvvdj.exe5rrrrrx.exenntnnb.exejdjdj.exelrrflrr.exevpjvj.exevpdvp.exexxrrflx.exetnbbnb.exeppvpv.exelrrxrfr.exerrxxlrf.exetthbbt.exelxrxlrl.exe3frlrxf.exe5htthn.exejjvdj.exexxlrfxl.exerfllffx.exedvvjv.exexfrrxff.exennbhtt.exennbthn.exeflxxxrl.exebttttb.exefflxrfx.exebbbhbn.exeddvjd.exexxfffrl.exethnbbb.exe9jvdp.exeffxlxrf.exebhttbt.exejjdpp.exenthtbn.exennntht.exevvpdv.exerrrrffr.exe9bbntn.exevjvdp.exevvvdd.exellxlxxl.exebnnhtt.exevjvjj.exevvpvj.exerllrxlr.exebbhtnb.exe1hnnhn.exedpjdj.exepdvpp.exelxffllr.exebhttnb.exebnntbb.exedvpdp.exevvdpp.exerxlflxl.exettthht.exebnnntn.exe9pvpp.exe5djvv.exexxxfrrf.exe1rrfrxl.exehnhbth.exepid process 2192 rrrllxr.exe 3008 jvvdj.exe 2388 5rrrrrx.exe 2580 nntnnb.exe 2668 jdjdj.exe 2724 lrrflrr.exe 2812 vpjvj.exe 1972 vpdvp.exe 2480 xxrrflx.exe 2928 tnbbnb.exe 2088 ppvpv.exe 1644 lrrxrfr.exe 2016 rrxxlrf.exe 1196 tthbbt.exe 1660 lxrxlrl.exe 2028 3frlrxf.exe 2036 5htthn.exe 764 jjvdj.exe 2232 xxlrfxl.exe 1888 rfllffx.exe 2312 dvvjv.exe 324 xfrrxff.exe 700 nnbhtt.exe 1480 nnbthn.exe 1896 flxxxrl.exe 1676 bttttb.exe 1436 fflxrfx.exe 1992 bbbhbn.exe 1720 ddvjd.exe 1772 xxfffrl.exe 2880 thnbbb.exe 1748 9jvdp.exe 2896 ffxlxrf.exe 2840 bhttbt.exe 2968 jjdpp.exe 3024 nthtbn.exe 2600 nnntht.exe 2540 vvpdv.exe 2608 rrrrffr.exe 2612 9bbntn.exe 2856 vjvdp.exe 2484 vvvdd.exe 2824 llxlxxl.exe 2672 bnnhtt.exe 2932 vjvjj.exe 2572 vvpvj.exe 1168 rllrxlr.exe 1180 bbhtnb.exe 1644 1hnnhn.exe 2016 dpjdj.exe 1620 pdvpp.exe 2032 lxffllr.exe 2780 bhttnb.exe 768 bnntbb.exe 960 dvpdp.exe 2536 vvdpp.exe 2152 rxlflxl.exe 1684 ttthht.exe 1628 bnnntn.exe 2836 9pvpp.exe 2312 5djvv.exe 2124 xxxfrrf.exe 784 1rrfrxl.exe 1484 hnhbth.exe -
Processes:
resource yara_rule behavioral1/memory/1276-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rrrllxr.exe upx behavioral1/memory/1276-8-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2192-17-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvvdj.exe upx behavioral1/memory/3008-18-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5rrrrrx.exe upx behavioral1/memory/3008-27-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nntnnb.exe upx behavioral1/memory/2388-36-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jdjdj.exe upx behavioral1/memory/2580-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2668-55-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lrrflrr.exe upx behavioral1/memory/2724-65-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpjvj.exe upx behavioral1/memory/2812-68-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpdvp.exe upx C:\xxrrflx.exe upx behavioral1/memory/1972-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2480-85-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnbbnb.exe upx \??\c:\ppvpv.exe upx behavioral1/memory/2088-109-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lrrxrfr.exe upx C:\rrxxlrf.exe upx behavioral1/memory/1196-128-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tthbbt.exe upx C:\lxrxlrl.exe upx \??\c:\3frlrxf.exe upx behavioral1/memory/1660-144-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jjvdj.exe upx behavioral1/memory/2036-156-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\5htthn.exe upx behavioral1/memory/2028-154-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rfllffx.exe upx behavioral1/memory/2232-181-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xxlrfxl.exe upx C:\xfrrxff.exe upx C:\nnbhtt.exe upx behavioral1/memory/324-208-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nnbthn.exe upx \??\c:\dvvjv.exe upx behavioral1/memory/2232-173-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/764-172-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\flxxxrl.exe upx behavioral1/memory/1896-227-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bttttb.exe upx behavioral1/memory/1480-224-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1676-243-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\fflxrfx.exe upx C:\bbbhbn.exe upx behavioral1/memory/1720-261-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ddvjd.exe upx C:\xxfffrl.exe upx \??\c:\thnbbb.exe upx \??\c:\9jvdp.exe upx behavioral1/memory/1748-285-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1616-296-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2840-303-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2968-316-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3024-317-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2612-348-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2856-349-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exerrrllxr.exejvvdj.exe5rrrrrx.exenntnnb.exejdjdj.exelrrflrr.exevpjvj.exevpdvp.exexxrrflx.exetnbbnb.exeppvpv.exelrrxrfr.exerrxxlrf.exetthbbt.exelxrxlrl.exedescription pid process target process PID 1276 wrote to memory of 2192 1276 a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe rrrllxr.exe PID 1276 wrote to memory of 2192 1276 a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe rrrllxr.exe PID 1276 wrote to memory of 2192 1276 a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe rrrllxr.exe PID 1276 wrote to memory of 2192 1276 a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe rrrllxr.exe PID 2192 wrote to memory of 3008 2192 rrrllxr.exe jvvdj.exe PID 2192 wrote to memory of 3008 2192 rrrllxr.exe jvvdj.exe PID 2192 wrote to memory of 3008 2192 rrrllxr.exe jvvdj.exe PID 2192 wrote to memory of 3008 2192 rrrllxr.exe jvvdj.exe PID 3008 wrote to memory of 2388 3008 jvvdj.exe 5rrrrrx.exe PID 3008 wrote to memory of 2388 3008 jvvdj.exe 5rrrrrx.exe PID 3008 wrote to memory of 2388 3008 jvvdj.exe 5rrrrrx.exe PID 3008 wrote to memory of 2388 3008 jvvdj.exe 5rrrrrx.exe PID 2388 wrote to memory of 2580 2388 5rrrrrx.exe nntnnb.exe PID 2388 wrote to memory of 2580 2388 5rrrrrx.exe nntnnb.exe PID 2388 wrote to memory of 2580 2388 5rrrrrx.exe nntnnb.exe PID 2388 wrote to memory of 2580 2388 5rrrrrx.exe nntnnb.exe PID 2580 wrote to memory of 2668 2580 nntnnb.exe jdjdj.exe PID 2580 wrote to memory of 2668 2580 nntnnb.exe jdjdj.exe PID 2580 wrote to memory of 2668 2580 nntnnb.exe jdjdj.exe PID 2580 wrote to memory of 2668 2580 nntnnb.exe jdjdj.exe PID 2668 wrote to memory of 2724 2668 jdjdj.exe lrrflrr.exe PID 2668 wrote to memory of 2724 2668 jdjdj.exe lrrflrr.exe PID 2668 wrote to memory of 2724 2668 jdjdj.exe lrrflrr.exe PID 2668 wrote to memory of 2724 2668 jdjdj.exe lrrflrr.exe PID 2724 wrote to memory of 2812 2724 lrrflrr.exe vpjvj.exe PID 2724 wrote to memory of 2812 2724 lrrflrr.exe vpjvj.exe PID 2724 wrote to memory of 2812 2724 lrrflrr.exe vpjvj.exe PID 2724 wrote to memory of 2812 2724 lrrflrr.exe vpjvj.exe PID 2812 wrote to memory of 1972 2812 vpjvj.exe vpdvp.exe PID 2812 wrote to memory of 1972 2812 vpjvj.exe vpdvp.exe PID 2812 wrote to memory of 1972 2812 vpjvj.exe vpdvp.exe PID 2812 wrote to memory of 1972 2812 vpjvj.exe vpdvp.exe PID 1972 wrote to memory of 2480 1972 vpdvp.exe xxrrflx.exe PID 1972 wrote to memory of 2480 1972 vpdvp.exe xxrrflx.exe PID 1972 wrote to memory of 2480 1972 vpdvp.exe xxrrflx.exe PID 1972 wrote to memory of 2480 1972 vpdvp.exe xxrrflx.exe PID 2480 wrote to memory of 2928 2480 xxrrflx.exe tnbbnb.exe PID 2480 wrote to memory of 2928 2480 xxrrflx.exe tnbbnb.exe PID 2480 wrote to memory of 2928 2480 xxrrflx.exe tnbbnb.exe PID 2480 wrote to memory of 2928 2480 xxrrflx.exe tnbbnb.exe PID 2928 wrote to memory of 2088 2928 tnbbnb.exe ppvpv.exe PID 2928 wrote to memory of 2088 2928 tnbbnb.exe ppvpv.exe PID 2928 wrote to memory of 2088 2928 tnbbnb.exe ppvpv.exe PID 2928 wrote to memory of 2088 2928 tnbbnb.exe ppvpv.exe PID 2088 wrote to memory of 1644 2088 ppvpv.exe lrrxrfr.exe PID 2088 wrote to memory of 1644 2088 ppvpv.exe lrrxrfr.exe PID 2088 wrote to memory of 1644 2088 ppvpv.exe lrrxrfr.exe PID 2088 wrote to memory of 1644 2088 ppvpv.exe lrrxrfr.exe PID 1644 wrote to memory of 2016 1644 lrrxrfr.exe rrxxlrf.exe PID 1644 wrote to memory of 2016 1644 lrrxrfr.exe rrxxlrf.exe PID 1644 wrote to memory of 2016 1644 lrrxrfr.exe rrxxlrf.exe PID 1644 wrote to memory of 2016 1644 lrrxrfr.exe rrxxlrf.exe PID 2016 wrote to memory of 1196 2016 rrxxlrf.exe tthbbt.exe PID 2016 wrote to memory of 1196 2016 rrxxlrf.exe tthbbt.exe PID 2016 wrote to memory of 1196 2016 rrxxlrf.exe tthbbt.exe PID 2016 wrote to memory of 1196 2016 rrxxlrf.exe tthbbt.exe PID 1196 wrote to memory of 1660 1196 tthbbt.exe lxrxlrl.exe PID 1196 wrote to memory of 1660 1196 tthbbt.exe lxrxlrl.exe PID 1196 wrote to memory of 1660 1196 tthbbt.exe lxrxlrl.exe PID 1196 wrote to memory of 1660 1196 tthbbt.exe lxrxlrl.exe PID 1660 wrote to memory of 2028 1660 lxrxlrl.exe 3frlrxf.exe PID 1660 wrote to memory of 2028 1660 lxrxlrl.exe 3frlrxf.exe PID 1660 wrote to memory of 2028 1660 lxrxlrl.exe 3frlrxf.exe PID 1660 wrote to memory of 2028 1660 lxrxlrl.exe 3frlrxf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a4f5360a0b6d03f1d37663a48a2c5050_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\rrrllxr.exec:\rrrllxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\jvvdj.exec:\jvvdj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\5rrrrrx.exec:\5rrrrrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\nntnnb.exec:\nntnnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\jdjdj.exec:\jdjdj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\lrrflrr.exec:\lrrflrr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\vpjvj.exec:\vpjvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\vpdvp.exec:\vpdvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\xxrrflx.exec:\xxrrflx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\tnbbnb.exec:\tnbbnb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\ppvpv.exec:\ppvpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\lrrxrfr.exec:\lrrxrfr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\rrxxlrf.exec:\rrxxlrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\tthbbt.exec:\tthbbt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\lxrxlrl.exec:\lxrxlrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\3frlrxf.exec:\3frlrxf.exe17⤵
- Executes dropped EXE
PID:2028 -
\??\c:\5htthn.exec:\5htthn.exe18⤵
- Executes dropped EXE
PID:2036 -
\??\c:\jjvdj.exec:\jjvdj.exe19⤵
- Executes dropped EXE
PID:764 -
\??\c:\xxlrfxl.exec:\xxlrfxl.exe20⤵
- Executes dropped EXE
PID:2232 -
\??\c:\rfllffx.exec:\rfllffx.exe21⤵
- Executes dropped EXE
PID:1888 -
\??\c:\dvvjv.exec:\dvvjv.exe22⤵
- Executes dropped EXE
PID:2312 -
\??\c:\xfrrxff.exec:\xfrrxff.exe23⤵
- Executes dropped EXE
PID:324 -
\??\c:\nnbhtt.exec:\nnbhtt.exe24⤵
- Executes dropped EXE
PID:700 -
\??\c:\nnbthn.exec:\nnbthn.exe25⤵
- Executes dropped EXE
PID:1480 -
\??\c:\flxxxrl.exec:\flxxxrl.exe26⤵
- Executes dropped EXE
PID:1896 -
\??\c:\bttttb.exec:\bttttb.exe27⤵
- Executes dropped EXE
PID:1676 -
\??\c:\fflxrfx.exec:\fflxrfx.exe28⤵
- Executes dropped EXE
PID:1436 -
\??\c:\bbbhbn.exec:\bbbhbn.exe29⤵
- Executes dropped EXE
PID:1992 -
\??\c:\ddvjd.exec:\ddvjd.exe30⤵
- Executes dropped EXE
PID:1720 -
\??\c:\xxfffrl.exec:\xxfffrl.exe31⤵
- Executes dropped EXE
PID:1772 -
\??\c:\thnbbb.exec:\thnbbb.exe32⤵
- Executes dropped EXE
PID:2880 -
\??\c:\9jvdp.exec:\9jvdp.exe33⤵
- Executes dropped EXE
PID:1748 -
\??\c:\ffxlxrf.exec:\ffxlxrf.exe34⤵
- Executes dropped EXE
PID:2896 -
\??\c:\hnhbbt.exec:\hnhbbt.exe35⤵PID:1616
-
\??\c:\bhttbt.exec:\bhttbt.exe36⤵
- Executes dropped EXE
PID:2840 -
\??\c:\jjdpp.exec:\jjdpp.exe37⤵
- Executes dropped EXE
PID:2968 -
\??\c:\nthtbn.exec:\nthtbn.exe38⤵
- Executes dropped EXE
PID:3024 -
\??\c:\nnntht.exec:\nnntht.exe39⤵
- Executes dropped EXE
PID:2600 -
\??\c:\vvpdv.exec:\vvpdv.exe40⤵
- Executes dropped EXE
PID:2540 -
\??\c:\rrrrffr.exec:\rrrrffr.exe41⤵
- Executes dropped EXE
PID:2608 -
\??\c:\9bbntn.exec:\9bbntn.exe42⤵
- Executes dropped EXE
PID:2612 -
\??\c:\vjvdp.exec:\vjvdp.exe43⤵
- Executes dropped EXE
PID:2856 -
\??\c:\vvvdd.exec:\vvvdd.exe44⤵
- Executes dropped EXE
PID:2484 -
\??\c:\llxlxxl.exec:\llxlxxl.exe45⤵
- Executes dropped EXE
PID:2824 -
\??\c:\bnnhtt.exec:\bnnhtt.exe46⤵
- Executes dropped EXE
PID:2672 -
\??\c:\vjvjj.exec:\vjvjj.exe47⤵
- Executes dropped EXE
PID:2932 -
\??\c:\vvpvj.exec:\vvpvj.exe48⤵
- Executes dropped EXE
PID:2572 -
\??\c:\rllrxlr.exec:\rllrxlr.exe49⤵
- Executes dropped EXE
PID:1168 -
\??\c:\bbhtnb.exec:\bbhtnb.exe50⤵
- Executes dropped EXE
PID:1180 -
\??\c:\1hnnhn.exec:\1hnnhn.exe51⤵
- Executes dropped EXE
PID:1644 -
\??\c:\dpjdj.exec:\dpjdj.exe52⤵
- Executes dropped EXE
PID:2016 -
\??\c:\pdvpp.exec:\pdvpp.exe53⤵
- Executes dropped EXE
PID:1620 -
\??\c:\lxffllr.exec:\lxffllr.exe54⤵
- Executes dropped EXE
PID:2032 -
\??\c:\bhttnb.exec:\bhttnb.exe55⤵
- Executes dropped EXE
PID:2780 -
\??\c:\bnntbb.exec:\bnntbb.exe56⤵
- Executes dropped EXE
PID:768 -
\??\c:\dvpdp.exec:\dvpdp.exe57⤵
- Executes dropped EXE
PID:960 -
\??\c:\vvdpp.exec:\vvdpp.exe58⤵
- Executes dropped EXE
PID:2536 -
\??\c:\rxlflxl.exec:\rxlflxl.exe59⤵
- Executes dropped EXE
PID:2152 -
\??\c:\ttthht.exec:\ttthht.exe60⤵
- Executes dropped EXE
PID:1684 -
\??\c:\bnnntn.exec:\bnnntn.exe61⤵
- Executes dropped EXE
PID:1628 -
\??\c:\9pvpp.exec:\9pvpp.exe62⤵
- Executes dropped EXE
PID:2836 -
\??\c:\5djvv.exec:\5djvv.exe63⤵
- Executes dropped EXE
PID:2312 -
\??\c:\xxxfrrf.exec:\xxxfrrf.exe64⤵
- Executes dropped EXE
PID:2124 -
\??\c:\1rrfrxl.exec:\1rrfrxl.exe65⤵
- Executes dropped EXE
PID:784 -
\??\c:\hnhbth.exec:\hnhbth.exe66⤵
- Executes dropped EXE
PID:1484 -
\??\c:\btnthh.exec:\btnthh.exe67⤵PID:2420
-
\??\c:\ddppp.exec:\ddppp.exe68⤵PID:1500
-
\??\c:\jppjd.exec:\jppjd.exe69⤵PID:2104
-
\??\c:\fxrrlxl.exec:\fxrrlxl.exe70⤵PID:2132
-
\??\c:\xllxffr.exec:\xllxffr.exe71⤵PID:1708
-
\??\c:\1nthth.exec:\1nthth.exe72⤵PID:1992
-
\??\c:\thbnbn.exec:\thbnbn.exe73⤵PID:1720
-
\??\c:\jjvpj.exec:\jjvpj.exe74⤵PID:320
-
\??\c:\ffflrrf.exec:\ffflrrf.exe75⤵PID:2216
-
\??\c:\7bthbh.exec:\7bthbh.exe76⤵PID:2136
-
\??\c:\tbttbh.exec:\tbttbh.exe77⤵PID:1752
-
\??\c:\3lrfrlx.exec:\3lrfrlx.exe78⤵PID:2896
-
\??\c:\bttnbh.exec:\bttnbh.exe79⤵PID:1872
-
\??\c:\vvjdd.exec:\vvjdd.exe80⤵PID:2952
-
\??\c:\vpvjj.exec:\vpvjj.exe81⤵PID:1052
-
\??\c:\rffrfrr.exec:\rffrfrr.exe82⤵PID:1940
-
\??\c:\flrlrrf.exec:\flrlrrf.exe83⤵PID:2632
-
\??\c:\hhhnbn.exec:\hhhnbn.exe84⤵PID:2580
-
\??\c:\3vjvj.exec:\3vjvj.exe85⤵PID:2852
-
\??\c:\nttbht.exec:\nttbht.exe86⤵PID:2712
-
\??\c:\jddpv.exec:\jddpv.exe87⤵PID:2716
-
\??\c:\rfrrrrx.exec:\rfrrrrx.exe88⤵PID:2444
-
\??\c:\1dvdd.exec:\1dvdd.exe89⤵PID:2496
-
\??\c:\htnnnn.exec:\htnnnn.exe90⤵PID:2684
-
\??\c:\bntttt.exec:\bntttt.exe91⤵PID:2460
-
\??\c:\vjjdd.exec:\vjjdd.exe92⤵PID:2800
-
\??\c:\1lffllr.exec:\1lffllr.exe93⤵PID:2784
-
\??\c:\tnhhnt.exec:\tnhhnt.exe94⤵PID:1344
-
\??\c:\bbtbnt.exec:\bbtbnt.exe95⤵PID:1920
-
\??\c:\vvjpp.exec:\vvjpp.exe96⤵PID:1668
-
\??\c:\rrfxfxf.exec:\rrfxfxf.exe97⤵PID:1924
-
\??\c:\nnbtnt.exec:\nnbtnt.exe98⤵PID:2820
-
\??\c:\vppvj.exec:\vppvj.exe99⤵PID:2548
-
\??\c:\7xllrrx.exec:\7xllrrx.exe100⤵PID:2752
-
\??\c:\nthhbh.exec:\nthhbh.exe101⤵PID:1764
-
\??\c:\btnhhh.exec:\btnhhh.exe102⤵PID:1200
-
\??\c:\5dvjv.exec:\5dvjv.exe103⤵PID:1776
-
\??\c:\xxlrllr.exec:\xxlrllr.exe104⤵PID:2948
-
\??\c:\rrrrfrl.exec:\rrrrfrl.exe105⤵PID:1888
-
\??\c:\htttbh.exec:\htttbh.exe106⤵PID:540
-
\??\c:\1bbhbn.exec:\1bbhbn.exe107⤵PID:2292
-
\??\c:\jjjdp.exec:\jjjdp.exe108⤵PID:584
-
\??\c:\5rrfrlf.exec:\5rrfrlf.exe109⤵PID:2272
-
\??\c:\rxrlxxl.exec:\rxrlxxl.exe110⤵PID:2704
-
\??\c:\7bthtb.exec:\7bthtb.exe111⤵PID:1484
-
\??\c:\vjvjj.exec:\vjvjj.exe112⤵PID:1172
-
\??\c:\rrlxlxl.exec:\rrlxlxl.exe113⤵PID:2128
-
\??\c:\rrffflx.exec:\rrffflx.exe114⤵PID:1436
-
\??\c:\bbnhth.exec:\bbnhth.exe115⤵PID:1944
-
\??\c:\7vpjv.exec:\7vpjv.exe116⤵PID:404
-
\??\c:\dvjpv.exec:\dvjpv.exe117⤵PID:1760
-
\??\c:\fffllxx.exec:\fffllxx.exe118⤵PID:384
-
\??\c:\xxrrflf.exec:\xxrrflf.exe119⤵PID:2528
-
\??\c:\9nhnbb.exec:\9nhnbb.exe120⤵PID:2884
-
\??\c:\vpjvj.exec:\vpjvj.exe121⤵PID:888
-
\??\c:\dvddp.exec:\dvddp.exe122⤵PID:2656
-
\??\c:\xxxlfxl.exec:\xxxlfxl.exe123⤵PID:2204
-
\??\c:\ttthht.exec:\ttthht.exe124⤵PID:2144
-
\??\c:\nhtbbt.exec:\nhtbbt.exe125⤵PID:1464
-
\??\c:\pvvjd.exec:\pvvjd.exe126⤵PID:1052
-
\??\c:\xlxrrff.exec:\xlxrrff.exe127⤵PID:2556
-
\??\c:\nhtthn.exec:\nhtthn.exe128⤵PID:2596
-
\??\c:\nnbhtb.exec:\nnbhtb.exe129⤵PID:2584
-
\??\c:\djpvv.exec:\djpvv.exe130⤵PID:2476
-
\??\c:\lrllrrr.exec:\lrllrrr.exe131⤵PID:2472
-
\??\c:\nhnbnb.exec:\nhnbnb.exe132⤵PID:2468
-
\??\c:\ntntnh.exec:\ntntnh.exe133⤵PID:2452
-
\??\c:\vjdvd.exec:\vjdvd.exe134⤵PID:2496
-
\??\c:\xlxxffl.exec:\xlxxffl.exe135⤵PID:2932
-
\??\c:\9nhhth.exec:\9nhhth.exe136⤵PID:2464
-
\??\c:\vjpjj.exec:\vjpjj.exe137⤵PID:1648
-
\??\c:\lfrrlxr.exec:\lfrrlxr.exe138⤵PID:1180
-
\??\c:\9tntth.exec:\9tntth.exe139⤵PID:2508
-
\??\c:\tnhntb.exec:\tnhntb.exe140⤵PID:2016
-
\??\c:\pjdjp.exec:\pjdjp.exe141⤵PID:1620
-
\??\c:\vvjdd.exec:\vvjdd.exe142⤵PID:1112
-
\??\c:\7rrxxlr.exec:\7rrxxlr.exe143⤵PID:1980
-
\??\c:\5thnbb.exec:\5thnbb.exe144⤵PID:808
-
\??\c:\nnhhnt.exec:\nnhhnt.exe145⤵PID:2156
-
\??\c:\9vppd.exec:\9vppd.exe146⤵PID:2536
-
\??\c:\vjvpd.exec:\vjvpd.exe147⤵PID:1532
-
\??\c:\fxllrrx.exec:\fxllrrx.exe148⤵PID:1092
-
\??\c:\btnbhb.exec:\btnbhb.exe149⤵PID:2056
-
\??\c:\3htbnt.exec:\3htbnt.exe150⤵PID:2836
-
\??\c:\3jjpv.exec:\3jjpv.exe151⤵PID:2312
-
\??\c:\rrlfrfx.exec:\rrlfrfx.exe152⤵PID:572
-
\??\c:\lfxxllx.exec:\lfxxllx.exe153⤵PID:748
-
\??\c:\9btthn.exec:\9btthn.exe154⤵PID:2272
-
\??\c:\nnttnh.exec:\nnttnh.exe155⤵PID:1896
-
\??\c:\vdpjp.exec:\vdpjp.exe156⤵PID:1676
-
\??\c:\frlfrxr.exec:\frlfrxr.exe157⤵PID:1172
-
\??\c:\lrllxlf.exec:\lrllxlf.exe158⤵PID:2128
-
\??\c:\bbhtnb.exec:\bbhtnb.exe159⤵PID:1436
-
\??\c:\vdjvj.exec:\vdjvj.exe160⤵PID:984
-
\??\c:\flrlxll.exec:\flrlxll.exe161⤵PID:2336
-
\??\c:\hhtbnt.exec:\hhtbnt.exe162⤵PID:2308
-
\??\c:\7tbhhh.exec:\7tbhhh.exe163⤵PID:948
-
\??\c:\jdjvj.exec:\jdjvj.exe164⤵PID:1276
-
\??\c:\vvjdd.exec:\vvjdd.exe165⤵PID:1688
-
\??\c:\lxrllfx.exec:\lxrllfx.exe166⤵PID:2332
-
\??\c:\htnnnn.exec:\htnnnn.exe167⤵PID:3048
-
\??\c:\jppdp.exec:\jppdp.exe168⤵PID:1468
-
\??\c:\vvdjd.exec:\vvdjd.exe169⤵PID:2652
-
\??\c:\rfffxxl.exec:\rfffxxl.exe170⤵PID:3024
-
\??\c:\7hthnn.exec:\7hthnn.exe171⤵PID:2676
-
\??\c:\ddddd.exec:\ddddd.exe172⤵PID:2668
-
\??\c:\ddvdp.exec:\ddvdp.exe173⤵PID:2568
-
\??\c:\9lrxflf.exec:\9lrxflf.exe174⤵PID:3000
-
\??\c:\thbhtt.exec:\thbhtt.exe175⤵PID:2716
-
\??\c:\ddjvv.exec:\ddjvv.exe176⤵PID:2520
-
\??\c:\7vjjj.exec:\7vjjj.exe177⤵PID:2824
-
\??\c:\3fxlflx.exec:\3fxlflx.exe178⤵PID:2672
-
\??\c:\hbthnb.exec:\hbthnb.exe179⤵PID:2940
-
\??\c:\hnnbht.exec:\hnnbht.exe180⤵PID:2436
-
\??\c:\3dvdp.exec:\3dvdp.exe181⤵PID:2800
-
\??\c:\ffrlxlx.exec:\ffrlxlx.exe182⤵PID:1344
-
\??\c:\llflrxf.exec:\llflrxf.exe183⤵PID:1224
-
\??\c:\1btthn.exec:\1btthn.exe184⤵PID:2396
-
\??\c:\nhnhnh.exec:\nhnhnh.exe185⤵PID:1912
-
\??\c:\5pjjp.exec:\5pjjp.exe186⤵PID:2772
-
\??\c:\rfxxxfr.exec:\rfxxxfr.exe187⤵PID:1924
-
\??\c:\xlxrlll.exec:\xlxrlll.exe188⤵PID:2548
-
\??\c:\1nbbhh.exec:\1nbbhh.exe189⤵PID:1452
-
\??\c:\tbttbb.exec:\tbttbb.exe190⤵PID:2700
-
\??\c:\dvddj.exec:\dvddj.exe191⤵PID:2052
-
\??\c:\5xlxrxl.exec:\5xlxrxl.exe192⤵PID:1776
-
\??\c:\lxrlfrr.exec:\lxrlfrr.exe193⤵PID:2268
-
\??\c:\btthnt.exec:\btthnt.exe194⤵PID:1888
-
\??\c:\djjjv.exec:\djjjv.exe195⤵PID:780
-
\??\c:\vvjjv.exec:\vvjjv.exe196⤵PID:592
-
\??\c:\fffrffr.exec:\fffrffr.exe197⤵PID:584
-
\??\c:\bbnbhn.exec:\bbnbhn.exe198⤵PID:1968
-
\??\c:\thntbt.exec:\thntbt.exe199⤵PID:1964
-
\??\c:\pjvdp.exec:\pjvdp.exe200⤵PID:2420
-
\??\c:\ddvdp.exec:\ddvdp.exe201⤵PID:1500
-
\??\c:\rrrfrfl.exec:\rrrfrfl.exe202⤵PID:616
-
\??\c:\bnntbb.exec:\bnntbb.exe203⤵PID:576
-
\??\c:\hhbtbh.exec:\hhbtbh.exe204⤵PID:2000
-
\??\c:\dpjvp.exec:\dpjvp.exe205⤵PID:2212
-
\??\c:\fxrfllx.exec:\fxrfllx.exe206⤵PID:968
-
\??\c:\lrfxffx.exec:\lrfxffx.exe207⤵PID:2336
-
\??\c:\9tttnn.exec:\9tttnn.exe208⤵PID:2304
-
\??\c:\jjpdp.exec:\jjpdp.exe209⤵PID:948
-
\??\c:\dvvdj.exec:\dvvdj.exe210⤵PID:1276
-
\??\c:\xrxfrrr.exec:\xrxfrrr.exe211⤵PID:1748
-
\??\c:\3hnntt.exec:\3hnntt.exe212⤵PID:3008
-
\??\c:\bnbbnt.exec:\bnbbnt.exe213⤵PID:3048
-
\??\c:\1jddv.exec:\1jddv.exe214⤵PID:2968
-
\??\c:\rlfrlrr.exec:\rlfrlrr.exe215⤵PID:1052
-
\??\c:\lfxlxxr.exec:\lfxlxxr.exe216⤵PID:3024
-
\??\c:\htbhnt.exec:\htbhnt.exe217⤵PID:2676
-
\??\c:\vvppv.exec:\vvppv.exe218⤵PID:2588
-
\??\c:\jjjvj.exec:\jjjvj.exe219⤵PID:2832
-
\??\c:\lxlrxfr.exec:\lxlrxfr.exe220⤵PID:2856
-
\??\c:\3btbnt.exec:\3btbnt.exe221⤵PID:2500
-
\??\c:\nhbhnt.exec:\nhbhnt.exe222⤵PID:2624
-
\??\c:\pjdpv.exec:\pjdpv.exe223⤵PID:3012
-
\??\c:\9vpdp.exec:\9vpdp.exe224⤵PID:1824
-
\??\c:\ffxrxfx.exec:\ffxrxfx.exe225⤵PID:2572
-
\??\c:\rlfrfrl.exec:\rlfrfrl.exe226⤵PID:2088
-
\??\c:\9bntbb.exec:\9bntbb.exe227⤵PID:2328
-
\??\c:\jppdp.exec:\jppdp.exe228⤵PID:2400
-
\??\c:\jjdjj.exec:\jjdjj.exe229⤵PID:1556
-
\??\c:\xrrfllx.exec:\xrrfllx.exe230⤵PID:2508
-
\??\c:\nhhbbb.exec:\nhhbbb.exe231⤵PID:2396
-
\??\c:\hbttbh.exec:\hbttbh.exe232⤵PID:1620
-
\??\c:\vjdvj.exec:\vjdvj.exe233⤵PID:2780
-
\??\c:\flfrrxx.exec:\flfrrxx.exe234⤵PID:2752
-
\??\c:\bbbthn.exec:\bbbthn.exe235⤵PID:2912
-
\??\c:\9bthnt.exec:\9bthnt.exe236⤵PID:1452
-
\??\c:\vppjv.exec:\vppjv.exe237⤵PID:2536
-
\??\c:\vjjjv.exec:\vjjjv.exe238⤵PID:1532
-
\??\c:\xrxffll.exec:\xrxffll.exe239⤵PID:1684
-
\??\c:\nnnhth.exec:\nnnhth.exe240⤵PID:1628
-
\??\c:\bththh.exec:\bththh.exe241⤵PID:2236
-
\??\c:\dvdjd.exec:\dvdjd.exe242⤵PID:884