Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exe
-
Size
393KB
-
MD5
a57a70b96a359232e2c6ab07934cfd90
-
SHA1
177f7d1696bcacf17af2a6a1f86c17247649967d
-
SHA256
a9e014f9f8620874f55144dca60b37424402c3275a53f53c7bb4598b739eb06c
-
SHA512
93a21c5228d6ae762e1e395e412c389671119008f003ec4259859c75d7559f78f2fda64370658aff884dec1c7006b8cce85a1ac292f2826fc550098690759694
-
SSDEEP
6144:n3C9BRIG0asYFm71mPfkVB8dKwaO5CVwOwX:n3C9uYA7okVqdKwaO5CVCX
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/1616-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/396-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3372-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2492-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/260-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3964-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/692-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1744-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1052-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1392-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4876-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4648-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4200-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3364-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2984-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2040-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2336-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2740-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3856-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1092-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2360-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1992-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vjvpj.exejdpdd.exelffxrrl.exetnnhhh.exevvvvv.exerrxffff.exexfllrlx.exethntth.exejdvpv.exelxxrlll.exerxrlrxx.exettnhbb.exepdjjd.exebthbbb.exevjpjj.exevpddd.exehbnnnn.exejvjdd.exe7nthbb.exenhtnnn.exejpddp.exe3tnnhb.exerrllxxx.exefxfffll.exepvdvv.exetbbthh.exelflrfxl.exebhhhhb.exellxlfxr.exebhbtbb.exexllffxf.exelfffxxx.exebbbbth.exejdjdv.exerrllflf.exebtnhbh.exedjvvp.exerlfxrrf.exebnbtnn.exehhthnh.exe9jppp.exefxfxrxf.exebhnbtn.exevppdv.exelfxlxrf.exettbbbb.exeddppd.exexxrlxrr.exettbbtt.exebhbtbh.exepppjj.exe9ffxrrr.exe9ttnnn.exepvdpv.exerfllfff.exenntthh.exe1ppdj.exexflfffl.exebtnhtn.exejdvdd.exellrrxxf.exetthbbt.exedjddd.exexrfxxlf.exepid process 396 vjvpj.exe 2492 jdpdd.exe 3372 lffxrrl.exe 260 tnnhhh.exe 3964 vvvvv.exe 5052 rrxffff.exe 692 xfllrlx.exe 3700 thntth.exe 1744 jdvpv.exe 1052 lxxrlll.exe 1392 rxrlrxx.exe 4876 ttnhbb.exe 932 pdjjd.exe 4648 bthbbb.exe 4200 vjpjj.exe 2408 vpddd.exe 3364 hbnnnn.exe 2040 jvjdd.exe 2984 7nthbb.exe 3168 nhtnnn.exe 2336 jpddp.exe 2740 3tnnhb.exe 3736 rrllxxx.exe 3856 fxfffll.exe 2676 pvdvv.exe 1092 tbbthh.exe 4568 lflrfxl.exe 2360 bhhhhb.exe 1992 llxlfxr.exe 2892 bhbtbb.exe 4504 xllffxf.exe 4676 lfffxxx.exe 3548 bbbbth.exe 2304 jdjdv.exe 4460 rrllflf.exe 4228 btnhbh.exe 1924 djvvp.exe 4916 rlfxrrf.exe 1528 bnbtnn.exe 2380 hhthnh.exe 4356 9jppp.exe 260 fxfxrxf.exe 616 bhnbtn.exe 3784 vppdv.exe 4024 lfxlxrf.exe 2456 ttbbbb.exe 1540 ddppd.exe 3700 xxrlxrr.exe 1744 ttbbtt.exe 2528 bhbtbh.exe 3344 pppjj.exe 3528 9ffxrrr.exe 3044 9ttnnn.exe 4628 pvdpv.exe 2192 rfllfff.exe 4412 nntthh.exe 4856 1ppdj.exe 4200 xflfffl.exe 2672 btnhtn.exe 808 jdvdd.exe 2808 llrrxxf.exe 1368 tthbbt.exe 3324 djddd.exe 2884 xrfxxlf.exe -
Processes:
resource yara_rule behavioral2/memory/1616-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/396-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2492-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3372-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2492-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/260-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/692-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1744-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1052-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1392-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4876-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4648-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4200-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3364-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2040-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2336-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2740-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3856-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1092-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2360-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1992-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-197-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exevjvpj.exejdpdd.exelffxrrl.exetnnhhh.exevvvvv.exerrxffff.exexfllrlx.exethntth.exejdvpv.exelxxrlll.exerxrlrxx.exettnhbb.exepdjjd.exebthbbb.exevjpjj.exevpddd.exehbnnnn.exejvjdd.exe7nthbb.exenhtnnn.exejpddp.exedescription pid process target process PID 1616 wrote to memory of 396 1616 a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exe vjvpj.exe PID 1616 wrote to memory of 396 1616 a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exe vjvpj.exe PID 1616 wrote to memory of 396 1616 a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exe vjvpj.exe PID 396 wrote to memory of 2492 396 vjvpj.exe jdpdd.exe PID 396 wrote to memory of 2492 396 vjvpj.exe jdpdd.exe PID 396 wrote to memory of 2492 396 vjvpj.exe jdpdd.exe PID 2492 wrote to memory of 3372 2492 jdpdd.exe lffxrrl.exe PID 2492 wrote to memory of 3372 2492 jdpdd.exe lffxrrl.exe PID 2492 wrote to memory of 3372 2492 jdpdd.exe lffxrrl.exe PID 3372 wrote to memory of 260 3372 lffxrrl.exe tnnhhh.exe PID 3372 wrote to memory of 260 3372 lffxrrl.exe tnnhhh.exe PID 3372 wrote to memory of 260 3372 lffxrrl.exe tnnhhh.exe PID 260 wrote to memory of 3964 260 tnnhhh.exe vvvvv.exe PID 260 wrote to memory of 3964 260 tnnhhh.exe vvvvv.exe PID 260 wrote to memory of 3964 260 tnnhhh.exe vvvvv.exe PID 3964 wrote to memory of 5052 3964 vvvvv.exe rrxffff.exe PID 3964 wrote to memory of 5052 3964 vvvvv.exe rrxffff.exe PID 3964 wrote to memory of 5052 3964 vvvvv.exe rrxffff.exe PID 5052 wrote to memory of 692 5052 rrxffff.exe xfllrlx.exe PID 5052 wrote to memory of 692 5052 rrxffff.exe xfllrlx.exe PID 5052 wrote to memory of 692 5052 rrxffff.exe xfllrlx.exe PID 692 wrote to memory of 3700 692 xfllrlx.exe thntth.exe PID 692 wrote to memory of 3700 692 xfllrlx.exe thntth.exe PID 692 wrote to memory of 3700 692 xfllrlx.exe thntth.exe PID 3700 wrote to memory of 1744 3700 thntth.exe jdvpv.exe PID 3700 wrote to memory of 1744 3700 thntth.exe jdvpv.exe PID 3700 wrote to memory of 1744 3700 thntth.exe jdvpv.exe PID 1744 wrote to memory of 1052 1744 jdvpv.exe lxxrlll.exe PID 1744 wrote to memory of 1052 1744 jdvpv.exe lxxrlll.exe PID 1744 wrote to memory of 1052 1744 jdvpv.exe lxxrlll.exe PID 1052 wrote to memory of 1392 1052 lxxrlll.exe rxrlrxx.exe PID 1052 wrote to memory of 1392 1052 lxxrlll.exe rxrlrxx.exe PID 1052 wrote to memory of 1392 1052 lxxrlll.exe rxrlrxx.exe PID 1392 wrote to memory of 4876 1392 rxrlrxx.exe ttnhbb.exe PID 1392 wrote to memory of 4876 1392 rxrlrxx.exe ttnhbb.exe PID 1392 wrote to memory of 4876 1392 rxrlrxx.exe ttnhbb.exe PID 4876 wrote to memory of 932 4876 ttnhbb.exe pdjjd.exe PID 4876 wrote to memory of 932 4876 ttnhbb.exe pdjjd.exe PID 4876 wrote to memory of 932 4876 ttnhbb.exe pdjjd.exe PID 932 wrote to memory of 4648 932 pdjjd.exe bthbbb.exe PID 932 wrote to memory of 4648 932 pdjjd.exe bthbbb.exe PID 932 wrote to memory of 4648 932 pdjjd.exe bthbbb.exe PID 4648 wrote to memory of 4200 4648 bthbbb.exe vjpjj.exe PID 4648 wrote to memory of 4200 4648 bthbbb.exe vjpjj.exe PID 4648 wrote to memory of 4200 4648 bthbbb.exe vjpjj.exe PID 4200 wrote to memory of 2408 4200 vjpjj.exe vpddd.exe PID 4200 wrote to memory of 2408 4200 vjpjj.exe vpddd.exe PID 4200 wrote to memory of 2408 4200 vjpjj.exe vpddd.exe PID 2408 wrote to memory of 3364 2408 vpddd.exe hbnnnn.exe PID 2408 wrote to memory of 3364 2408 vpddd.exe hbnnnn.exe PID 2408 wrote to memory of 3364 2408 vpddd.exe hbnnnn.exe PID 3364 wrote to memory of 2040 3364 hbnnnn.exe jvjdd.exe PID 3364 wrote to memory of 2040 3364 hbnnnn.exe jvjdd.exe PID 3364 wrote to memory of 2040 3364 hbnnnn.exe jvjdd.exe PID 2040 wrote to memory of 2984 2040 jvjdd.exe 7nthbb.exe PID 2040 wrote to memory of 2984 2040 jvjdd.exe 7nthbb.exe PID 2040 wrote to memory of 2984 2040 jvjdd.exe 7nthbb.exe PID 2984 wrote to memory of 3168 2984 7nthbb.exe nhtnnn.exe PID 2984 wrote to memory of 3168 2984 7nthbb.exe nhtnnn.exe PID 2984 wrote to memory of 3168 2984 7nthbb.exe nhtnnn.exe PID 3168 wrote to memory of 2336 3168 nhtnnn.exe jpddp.exe PID 3168 wrote to memory of 2336 3168 nhtnnn.exe jpddp.exe PID 3168 wrote to memory of 2336 3168 nhtnnn.exe jpddp.exe PID 2336 wrote to memory of 2740 2336 jpddp.exe 3tnnhb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a57a70b96a359232e2c6ab07934cfd90_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\vjvpj.exec:\vjvpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\jdpdd.exec:\jdpdd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\lffxrrl.exec:\lffxrrl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
\??\c:\tnnhhh.exec:\tnnhhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:260 -
\??\c:\vvvvv.exec:\vvvvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\rrxffff.exec:\rrxffff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\xfllrlx.exec:\xfllrlx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
\??\c:\thntth.exec:\thntth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
\??\c:\jdvpv.exec:\jdvpv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\lxxrlll.exec:\lxxrlll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\rxrlrxx.exec:\rxrlrxx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
\??\c:\ttnhbb.exec:\ttnhbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\pdjjd.exec:\pdjjd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\bthbbb.exec:\bthbbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
\??\c:\vjpjj.exec:\vjpjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\vpddd.exec:\vpddd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\hbnnnn.exec:\hbnnnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
\??\c:\jvjdd.exec:\jvjdd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\7nthbb.exec:\7nthbb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\nhtnnn.exec:\nhtnnn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\jpddp.exec:\jpddp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\3tnnhb.exec:\3tnnhb.exe23⤵
- Executes dropped EXE
PID:2740 -
\??\c:\rrllxxx.exec:\rrllxxx.exe24⤵
- Executes dropped EXE
PID:3736 -
\??\c:\fxfffll.exec:\fxfffll.exe25⤵
- Executes dropped EXE
PID:3856 -
\??\c:\pvdvv.exec:\pvdvv.exe26⤵
- Executes dropped EXE
PID:2676 -
\??\c:\tbbthh.exec:\tbbthh.exe27⤵
- Executes dropped EXE
PID:1092 -
\??\c:\lflrfxl.exec:\lflrfxl.exe28⤵
- Executes dropped EXE
PID:4568 -
\??\c:\bhhhhb.exec:\bhhhhb.exe29⤵
- Executes dropped EXE
PID:2360 -
\??\c:\llxlfxr.exec:\llxlfxr.exe30⤵
- Executes dropped EXE
PID:1992 -
\??\c:\bhbtbb.exec:\bhbtbb.exe31⤵
- Executes dropped EXE
PID:2892 -
\??\c:\xllffxf.exec:\xllffxf.exe32⤵
- Executes dropped EXE
PID:4504 -
\??\c:\lfffxxx.exec:\lfffxxx.exe33⤵
- Executes dropped EXE
PID:4676 -
\??\c:\bbbbth.exec:\bbbbth.exe34⤵
- Executes dropped EXE
PID:3548 -
\??\c:\jdjdv.exec:\jdjdv.exe35⤵
- Executes dropped EXE
PID:2304 -
\??\c:\rrllflf.exec:\rrllflf.exe36⤵
- Executes dropped EXE
PID:4460 -
\??\c:\btnhbh.exec:\btnhbh.exe37⤵
- Executes dropped EXE
PID:4228 -
\??\c:\djvvp.exec:\djvvp.exe38⤵
- Executes dropped EXE
PID:1924 -
\??\c:\rlfxrrf.exec:\rlfxrrf.exe39⤵
- Executes dropped EXE
PID:4916 -
\??\c:\bnbtnn.exec:\bnbtnn.exe40⤵
- Executes dropped EXE
PID:1528 -
\??\c:\hhthnh.exec:\hhthnh.exe41⤵
- Executes dropped EXE
PID:2380 -
\??\c:\9jppp.exec:\9jppp.exe42⤵
- Executes dropped EXE
PID:4356 -
\??\c:\fxfxrxf.exec:\fxfxrxf.exe43⤵
- Executes dropped EXE
PID:260 -
\??\c:\bhnbtn.exec:\bhnbtn.exe44⤵
- Executes dropped EXE
PID:616 -
\??\c:\vppdv.exec:\vppdv.exe45⤵
- Executes dropped EXE
PID:3784 -
\??\c:\lfxlxrf.exec:\lfxlxrf.exe46⤵
- Executes dropped EXE
PID:4024 -
\??\c:\ttbbbb.exec:\ttbbbb.exe47⤵
- Executes dropped EXE
PID:2456 -
\??\c:\ddppd.exec:\ddppd.exe48⤵
- Executes dropped EXE
PID:1540 -
\??\c:\xxrlxrr.exec:\xxrlxrr.exe49⤵
- Executes dropped EXE
PID:3700 -
\??\c:\ttbbtt.exec:\ttbbtt.exe50⤵
- Executes dropped EXE
PID:1744 -
\??\c:\bhbtbh.exec:\bhbtbh.exe51⤵
- Executes dropped EXE
PID:2528 -
\??\c:\pppjj.exec:\pppjj.exe52⤵
- Executes dropped EXE
PID:3344 -
\??\c:\9ffxrrr.exec:\9ffxrrr.exe53⤵
- Executes dropped EXE
PID:3528 -
\??\c:\9ttnnn.exec:\9ttnnn.exe54⤵
- Executes dropped EXE
PID:3044 -
\??\c:\pvdpv.exec:\pvdpv.exe55⤵
- Executes dropped EXE
PID:4628 -
\??\c:\rfllfff.exec:\rfllfff.exe56⤵
- Executes dropped EXE
PID:2192 -
\??\c:\nntthh.exec:\nntthh.exe57⤵
- Executes dropped EXE
PID:4412 -
\??\c:\1ppdj.exec:\1ppdj.exe58⤵
- Executes dropped EXE
PID:4856 -
\??\c:\xflfffl.exec:\xflfffl.exe59⤵
- Executes dropped EXE
PID:4200 -
\??\c:\btnhtn.exec:\btnhtn.exe60⤵
- Executes dropped EXE
PID:2672 -
\??\c:\jdvdd.exec:\jdvdd.exe61⤵
- Executes dropped EXE
PID:808 -
\??\c:\llrrxxf.exec:\llrrxxf.exe62⤵
- Executes dropped EXE
PID:2808 -
\??\c:\tthbbt.exec:\tthbbt.exe63⤵
- Executes dropped EXE
PID:1368 -
\??\c:\djddd.exec:\djddd.exe64⤵
- Executes dropped EXE
PID:3324 -
\??\c:\xrfxxlf.exec:\xrfxxlf.exe65⤵
- Executes dropped EXE
PID:2884 -
\??\c:\bbbtnn.exec:\bbbtnn.exe66⤵PID:3020
-
\??\c:\bhnhhb.exec:\bhnhhb.exe67⤵PID:3240
-
\??\c:\lxlfxxx.exec:\lxlfxxx.exe68⤵PID:4832
-
\??\c:\httttt.exec:\httttt.exe69⤵PID:3496
-
\??\c:\ddddv.exec:\ddddv.exe70⤵PID:1212
-
\??\c:\lfrllrx.exec:\lfrllrx.exe71⤵PID:1000
-
\??\c:\htttbh.exec:\htttbh.exe72⤵PID:1740
-
\??\c:\vppjv.exec:\vppjv.exe73⤵PID:3904
-
\??\c:\lxrllll.exec:\lxrllll.exe74⤵PID:2792
-
\??\c:\httnhh.exec:\httnhh.exe75⤵PID:2712
-
\??\c:\7vpjp.exec:\7vpjp.exe76⤵PID:4836
-
\??\c:\flrllll.exec:\flrllll.exe77⤵PID:4676
-
\??\c:\rlrrlll.exec:\rlrrlll.exe78⤵PID:3748
-
\??\c:\3vvvp.exec:\3vvvp.exe79⤵PID:4472
-
\??\c:\xxrllll.exec:\xxrllll.exe80⤵PID:832
-
\??\c:\hhhbbb.exec:\hhhbbb.exe81⤵PID:3128
-
\??\c:\jjjjj.exec:\jjjjj.exe82⤵PID:2860
-
\??\c:\7rxxxfl.exec:\7rxxxfl.exe83⤵PID:664
-
\??\c:\1bnhnh.exec:\1bnhnh.exe84⤵PID:4052
-
\??\c:\pvpjj.exec:\pvpjj.exe85⤵PID:2868
-
\??\c:\pjjjj.exec:\pjjjj.exe86⤵PID:4356
-
\??\c:\5llfffl.exec:\5llfffl.exe87⤵PID:260
-
\??\c:\ttnbnt.exec:\ttnbnt.exe88⤵PID:908
-
\??\c:\vjdvv.exec:\vjdvv.exe89⤵PID:2180
-
\??\c:\fflrxxx.exec:\fflrxxx.exe90⤵PID:3232
-
\??\c:\tnntnn.exec:\tnntnn.exe91⤵PID:2768
-
\??\c:\ppvpv.exec:\ppvpv.exe92⤵PID:1276
-
\??\c:\fxxxrfx.exec:\fxxxrfx.exe93⤵PID:4904
-
\??\c:\hhhbtn.exec:\hhhbtn.exe94⤵PID:4480
-
\??\c:\dvdvv.exec:\dvdvv.exe95⤵PID:1880
-
\??\c:\rfllfll.exec:\rfllfll.exe96⤵PID:4524
-
\??\c:\tttnhb.exec:\tttnhb.exe97⤵PID:3308
-
\??\c:\5bnhbb.exec:\5bnhbb.exe98⤵PID:3488
-
\??\c:\djpvv.exec:\djpvv.exe99⤵PID:2408
-
\??\c:\rlrffll.exec:\rlrffll.exe100⤵PID:432
-
\??\c:\lllfxxx.exec:\lllfxxx.exe101⤵PID:1912
-
\??\c:\nbbtnt.exec:\nbbtnt.exe102⤵PID:1508
-
\??\c:\jddvp.exec:\jddvp.exe103⤵PID:5024
-
\??\c:\lfxxxff.exec:\lfxxxff.exe104⤵PID:3312
-
\??\c:\nbhbbb.exec:\nbhbbb.exe105⤵PID:1856
-
\??\c:\rrxfxlr.exec:\rrxfxlr.exe106⤵PID:5076
-
\??\c:\nhttnt.exec:\nhttnt.exe107⤵PID:3732
-
\??\c:\hhhhnt.exec:\hhhhnt.exe108⤵PID:4516
-
\??\c:\fflfffx.exec:\fflfffx.exe109⤵PID:4568
-
\??\c:\nhtttt.exec:\nhtttt.exe110⤵PID:1448
-
\??\c:\pjvvj.exec:\pjvvj.exe111⤵PID:4820
-
\??\c:\fxrrrrx.exec:\fxrrrrx.exe112⤵PID:3284
-
\??\c:\btthhb.exec:\btthhb.exe113⤵PID:4908
-
\??\c:\7dddd.exec:\7dddd.exe114⤵PID:3660
-
\??\c:\xlxlrfl.exec:\xlxlrfl.exe115⤵PID:1268
-
\??\c:\hnhnbt.exec:\hnhnbt.exe116⤵PID:3116
-
\??\c:\frlfxff.exec:\frlfxff.exe117⤵PID:4460
-
\??\c:\xlxfxlf.exec:\xlxfxlf.exe118⤵PID:4228
-
\??\c:\tnbbth.exec:\tnbbth.exe119⤵PID:2452
-
\??\c:\vpddj.exec:\vpddj.exe120⤵PID:3960
-
\??\c:\rrxrfff.exec:\rrxrfff.exe121⤵PID:2564
-
\??\c:\hhbnth.exec:\hhbnth.exe122⤵PID:4556
-
\??\c:\xxxxrxl.exec:\xxxxrxl.exe123⤵PID:3864
-
\??\c:\htbbhb.exec:\htbbhb.exe124⤵PID:2184
-
\??\c:\3jpjp.exec:\3jpjp.exe125⤵PID:848
-
\??\c:\rrlxlxf.exec:\rrlxlxf.exe126⤵PID:1764
-
\??\c:\nhhttt.exec:\nhhttt.exe127⤵PID:4076
-
\??\c:\djdvp.exec:\djdvp.exe128⤵PID:1428
-
\??\c:\xrxxfxx.exec:\xrxxfxx.exe129⤵PID:5096
-
\??\c:\htbhnb.exec:\htbhnb.exe130⤵PID:3112
-
\??\c:\vvdjd.exec:\vvdjd.exe131⤵PID:5116
-
\??\c:\fxlfxxr.exec:\fxlfxxr.exe132⤵PID:3528
-
\??\c:\hbbbbt.exec:\hbbbbt.exe133⤵PID:4840
-
\??\c:\jjpjd.exec:\jjpjd.exe134⤵PID:1080
-
\??\c:\pjpdv.exec:\pjpdv.exe135⤵PID:3552
-
\??\c:\xrxrllf.exec:\xrxrllf.exe136⤵PID:2744
-
\??\c:\nhbbbh.exec:\nhbbbh.exe137⤵PID:2396
-
\??\c:\vpppj.exec:\vpppj.exe138⤵PID:3772
-
\??\c:\llffxxx.exec:\llffxxx.exe139⤵PID:2800
-
\??\c:\nthttn.exec:\nthttn.exe140⤵PID:1576
-
\??\c:\jvjjj.exec:\jvjjj.exe141⤵PID:5024
-
\??\c:\xxxlrfl.exec:\xxxlrfl.exe142⤵PID:3856
-
\??\c:\xxfrrrl.exec:\xxfrrrl.exe143⤵PID:3948
-
\??\c:\nbnhbn.exec:\nbnhbn.exe144⤵PID:3732
-
\??\c:\dvdjd.exec:\dvdjd.exe145⤵PID:1828
-
\??\c:\rlxrrrl.exec:\rlxrrrl.exe146⤵PID:2620
-
\??\c:\lfffxfx.exec:\lfffxfx.exe147⤵PID:760
-
\??\c:\bttnhh.exec:\bttnhh.exe148⤵PID:1804
-
\??\c:\vppjd.exec:\vppjd.exe149⤵PID:4656
-
\??\c:\vppjd.exec:\vppjd.exe150⤵PID:2840
-
\??\c:\rfxxfff.exec:\rfxxfff.exe151⤵PID:3068
-
\??\c:\7hnnbt.exec:\7hnnbt.exe152⤵PID:4464
-
\??\c:\vvvpj.exec:\vvvpj.exe153⤵PID:1608
-
\??\c:\lrxlrlr.exec:\lrxlrlr.exe154⤵PID:1924
-
\??\c:\rlxxffx.exec:\rlxxffx.exe155⤵PID:4228
-
\??\c:\tbnhbt.exec:\tbnhbt.exe156⤵PID:1916
-
\??\c:\pvjpp.exec:\pvjpp.exe157⤵PID:2380
-
\??\c:\lxrrflr.exec:\lxrrflr.exe158⤵PID:1888
-
\??\c:\hbbhhh.exec:\hbbhhh.exe159⤵PID:2384
-
\??\c:\jvjvj.exec:\jvjvj.exe160⤵PID:4160
-
\??\c:\lfllrrl.exec:\lfllrrl.exe161⤵PID:848
-
\??\c:\nnhhbh.exec:\nnhhbh.exe162⤵PID:3160
-
\??\c:\vpdvp.exec:\vpdvp.exe163⤵PID:3868
-
\??\c:\3bnnnt.exec:\3bnnnt.exe164⤵PID:3700
-
\??\c:\pjjdd.exec:\pjjdd.exe165⤵PID:2436
-
\??\c:\xllrrxr.exec:\xllrrxr.exe166⤵PID:4668
-
\??\c:\nbhhth.exec:\nbhhth.exe167⤵PID:1116
-
\??\c:\pjpjd.exec:\pjpjd.exe168⤵PID:4200
-
\??\c:\bbbbth.exec:\bbbbth.exe169⤵PID:3436
-
\??\c:\9dvpj.exec:\9dvpj.exe170⤵PID:808
-
\??\c:\fxllflf.exec:\fxllflf.exe171⤵PID:1672
-
\??\c:\pdvpv.exec:\pdvpv.exe172⤵PID:2488
-
\??\c:\rllfflr.exec:\rllfflr.exe173⤵PID:1508
-
\??\c:\3hhnhb.exec:\3hhnhb.exe174⤵PID:2740
-
\??\c:\vdpjj.exec:\vdpjj.exe175⤵PID:2508
-
\??\c:\xxlrlxx.exec:\xxlrlxx.exe176⤵PID:60
-
\??\c:\bttnbb.exec:\bttnbb.exe177⤵PID:3336
-
\??\c:\dpppj.exec:\dpppj.exe178⤵PID:532
-
\??\c:\xlllllr.exec:\xlllllr.exe179⤵PID:1604
-
\??\c:\tnnttb.exec:\tnnttb.exe180⤵PID:2892
-
\??\c:\bhbtnn.exec:\bhbtnn.exe181⤵PID:436
-
\??\c:\7ddjj.exec:\7ddjj.exe182⤵PID:2720
-
\??\c:\flrlfff.exec:\flrlfff.exe183⤵PID:4548
-
\??\c:\bntttb.exec:\bntttb.exe184⤵PID:5112
-
\??\c:\jvdvv.exec:\jvdvv.exe185⤵PID:1956
-
\??\c:\rlffrrr.exec:\rlffrrr.exe186⤵PID:3748
-
\??\c:\bbbbbh.exec:\bbbbbh.exe187⤵PID:396
-
\??\c:\dvvvp.exec:\dvvvp.exe188⤵PID:3128
-
\??\c:\rrfxxxl.exec:\rrfxxxl.exe189⤵PID:5040
-
\??\c:\lfllfff.exec:\lfllfff.exe190⤵PID:3440
-
\??\c:\bnhbtt.exec:\bnhbtt.exe191⤵PID:4652
-
\??\c:\vpppj.exec:\vpppj.exe192⤵PID:2968
-
\??\c:\lffffff.exec:\lffffff.exe193⤵PID:3972
-
\??\c:\hbbtbb.exec:\hbbtbb.exe194⤵PID:2868
-
\??\c:\thhbhh.exec:\thhbhh.exe195⤵PID:2904
-
\??\c:\pvjdj.exec:\pvjdj.exe196⤵PID:2568
-
\??\c:\llllfll.exec:\llllfll.exe197⤵PID:3232
-
\??\c:\tnnhbb.exec:\tnnhbb.exe198⤵PID:3056
-
\??\c:\djpjj.exec:\djpjj.exe199⤵PID:3700
-
\??\c:\lrxrffx.exec:\lrxrffx.exe200⤵PID:1880
-
\??\c:\xxrxflf.exec:\xxrxflf.exe201⤵PID:4668
-
\??\c:\djjdv.exec:\djjdv.exe202⤵PID:5060
-
\??\c:\vdppv.exec:\vdppv.exe203⤵PID:2408
-
\??\c:\3xlfrxr.exec:\3xlfrxr.exe204⤵PID:2372
-
\??\c:\thhhbh.exec:\thhhbh.exe205⤵PID:4316
-
\??\c:\pdvjd.exec:\pdvjd.exe206⤵PID:4108
-
\??\c:\fflfxfx.exec:\fflfxfx.exe207⤵PID:3312
-
\??\c:\3tttnt.exec:\3tttnt.exe208⤵PID:1188
-
\??\c:\jdjdv.exec:\jdjdv.exe209⤵PID:3856
-
\??\c:\jjddv.exec:\jjddv.exe210⤵PID:1212
-
\??\c:\nnbbnb.exec:\nnbbnb.exe211⤵PID:3872
-
\??\c:\bthhhb.exec:\bthhhb.exe212⤵PID:4612
-
\??\c:\vpvdp.exec:\vpvdp.exe213⤵PID:4972
-
\??\c:\bhhhnn.exec:\bhhhnn.exe214⤵PID:3164
-
\??\c:\dvddv.exec:\dvddv.exe215⤵PID:4504
-
\??\c:\lrxrllf.exec:\lrxrllf.exe216⤵PID:4656
-
\??\c:\htbtnn.exec:\htbtnn.exe217⤵PID:4836
-
\??\c:\dvddv.exec:\dvddv.exe218⤵PID:4720
-
\??\c:\vvjpv.exec:\vvjpv.exe219⤵PID:4756
-
\??\c:\fxrxlxx.exec:\fxrxlxx.exe220⤵PID:3984
-
\??\c:\tbhtbb.exec:\tbhtbb.exe221⤵PID:1924
-
\??\c:\vjvpj.exec:\vjvpj.exe222⤵PID:5104
-
\??\c:\rlfxxxr.exec:\rlfxxxr.exe223⤵PID:4468
-
\??\c:\lflfxlx.exec:\lflfxlx.exe224⤵PID:3372
-
\??\c:\bnbhbn.exec:\bnbhbn.exe225⤵PID:1704
-
\??\c:\pdvpp.exec:\pdvpp.exe226⤵PID:4088
-
\??\c:\rlxfxfx.exec:\rlxfxfx.exe227⤵PID:4452
-
\??\c:\nhhbbt.exec:\nhhbbt.exe228⤵PID:616
-
\??\c:\1pppj.exec:\1pppj.exe229⤵PID:4416
-
\??\c:\djjpj.exec:\djjpj.exe230⤵PID:3704
-
\??\c:\rfrxrrr.exec:\rfrxrrr.exe231⤵PID:2456
-
\??\c:\tbtnnb.exec:\tbtnnb.exe232⤵PID:2128
-
\??\c:\7jpjj.exec:\7jpjj.exe233⤵PID:8
-
\??\c:\pjppj.exec:\pjppj.exe234⤵PID:1760
-
\??\c:\9bbbbh.exec:\9bbbbh.exe235⤵PID:336
-
\??\c:\jvpjv.exec:\jvpjv.exe236⤵PID:2496
-
\??\c:\fllfllx.exec:\fllfllx.exe237⤵PID:3436
-
\??\c:\bttnhh.exec:\bttnhh.exe238⤵PID:1672
-
\??\c:\djjjv.exec:\djjjv.exe239⤵PID:2808
-
\??\c:\vvdvd.exec:\vvdvd.exe240⤵PID:2800
-
\??\c:\bbntbt.exec:\bbntbt.exe241⤵PID:2740
-
\??\c:\bbtttt.exec:\bbtttt.exe242⤵PID:1856