Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 10:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe
-
Size
116KB
-
MD5
e54ae86212c2e30aef9435df2ff7e7e0
-
SHA1
95ef366dadebc8ca9ae9c316f2075d7039ba03bc
-
SHA256
08fbc2cdc276b6d5edc3b66e8b59dd9e41b2ddbd3824f8c8a273073cdf4991b6
-
SHA512
bfe4fcb87bd0a24c2f24420f01c6876e07327f8275e693373d344cf7059737d065d7ae3db3ae3c306888ddbaf361f12ae93c4a412ee81c7aa77f89e9848f6a15
-
SSDEEP
3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmjlkFn:n3C9BRosxW8MFHLMWvlm
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1048-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2712-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2812-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-76-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2512-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2440-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/560-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1872-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1196-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1320-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/484-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1864-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2944-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-284-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
fxrfrlf.exetnnntt.exejdppd.exexlrxxxl.exejdvjp.exexrflffr.exettbbnt.exe1bbbtt.exe1jdpd.exefxffflx.exexrflxlf.exepjjpd.exe9pddj.exerrlrflx.exebbtthh.exevjvdp.exexxxlxlr.exe9lxrrrf.exebthtbh.exevppdv.exefxlrxll.exexrfxllf.exetnhhtt.exeppjvj.exejjdjd.exexxflllx.exe7ntttt.exevjvjp.exefxllrrl.exexlrrrxr.exehbnntt.exevpdpj.exepppvj.exefflrxxf.exexllrxrx.exehthhtt.exe1nbbbh.exe5dvvj.exejdpvv.exerfrxrxx.exe3lxfllx.exehbthnn.exenhtbnt.exejdpdj.exejdpvd.exevjppv.exelfrlrrx.exexrfflrx.exehhhttt.exehbthnn.exevjppv.exe1pjjj.exexlxxffl.exe5rxxxxl.exerlfxffr.exebnhhtn.exe9hnntb.exeddjjp.exejvddd.exexrffrxl.exe9lxllrx.exe7nbnbb.exetnbttt.exe3pvvd.exepid process 1048 fxrfrlf.exe 2832 tnnntt.exe 1804 jdppd.exe 2712 xlrxxxl.exe 2812 jdvjp.exe 2432 xrflffr.exe 2512 ttbbnt.exe 2440 1bbbtt.exe 2528 1jdpd.exe 2600 fxffflx.exe 2988 xrflxlf.exe 560 pjjpd.exe 1940 9pddj.exe 1872 rrlrflx.exe 1196 bbtthh.exe 2788 vjvdp.exe 1640 xxxlxlr.exe 1320 9lxrrrf.exe 484 bthtbh.exe 2244 vppdv.exe 2240 fxlrxll.exe 2948 xrfxllf.exe 1344 tnhhtt.exe 1864 ppjvj.exe 1792 jjdjd.exe 796 xxflllx.exe 2944 7ntttt.exe 548 vjvjp.exe 1768 fxllrrl.exe 2136 xlrrrxr.exe 2980 hbnntt.exe 3048 vpdpj.exe 1964 pppvj.exe 1036 fflrxxf.exe 2128 xllrxrx.exe 2652 hthhtt.exe 3016 1nbbbh.exe 2932 5dvvj.exe 2916 jdpvv.exe 2808 rfrxrxx.exe 2804 3lxfllx.exe 2744 hbthnn.exe 2576 nhtbnt.exe 2556 jdpdj.exe 1820 jdpvd.exe 2848 vjppv.exe 2888 lfrlrrx.exe 2844 xrfflrx.exe 1304 hhhttt.exe 1616 hbthnn.exe 1940 vjppv.exe 1684 1pjjj.exe 1632 xlxxffl.exe 2792 5rxxxxl.exe 2064 rlfxffr.exe 1296 bnhhtn.exe 684 9hnntb.exe 2280 ddjjp.exe 564 jvddd.exe 2244 xrffrxl.exe 2332 9lxllrx.exe 776 7nbnbb.exe 1488 tnbttt.exe 2312 3pvvd.exe -
Processes:
resource yara_rule behavioral1/memory/1692-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1048-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/560-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1872-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1196-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1640-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1320-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/484-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-213-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1864-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2944-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-284-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-302-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exefxrfrlf.exetnnntt.exejdppd.exexlrxxxl.exejdvjp.exexrflffr.exettbbnt.exe1bbbtt.exe1jdpd.exefxffflx.exexrflxlf.exepjjpd.exe9pddj.exerrlrflx.exebbtthh.exedescription pid process target process PID 1692 wrote to memory of 1048 1692 e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe fxrfrlf.exe PID 1692 wrote to memory of 1048 1692 e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe fxrfrlf.exe PID 1692 wrote to memory of 1048 1692 e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe fxrfrlf.exe PID 1692 wrote to memory of 1048 1692 e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe fxrfrlf.exe PID 1048 wrote to memory of 2832 1048 fxrfrlf.exe tnnntt.exe PID 1048 wrote to memory of 2832 1048 fxrfrlf.exe tnnntt.exe PID 1048 wrote to memory of 2832 1048 fxrfrlf.exe tnnntt.exe PID 1048 wrote to memory of 2832 1048 fxrfrlf.exe tnnntt.exe PID 2832 wrote to memory of 1804 2832 tnnntt.exe jdppd.exe PID 2832 wrote to memory of 1804 2832 tnnntt.exe jdppd.exe PID 2832 wrote to memory of 1804 2832 tnnntt.exe jdppd.exe PID 2832 wrote to memory of 1804 2832 tnnntt.exe jdppd.exe PID 1804 wrote to memory of 2712 1804 jdppd.exe xlrxxxl.exe PID 1804 wrote to memory of 2712 1804 jdppd.exe xlrxxxl.exe PID 1804 wrote to memory of 2712 1804 jdppd.exe xlrxxxl.exe PID 1804 wrote to memory of 2712 1804 jdppd.exe xlrxxxl.exe PID 2712 wrote to memory of 2812 2712 xlrxxxl.exe jdvjp.exe PID 2712 wrote to memory of 2812 2712 xlrxxxl.exe jdvjp.exe PID 2712 wrote to memory of 2812 2712 xlrxxxl.exe jdvjp.exe PID 2712 wrote to memory of 2812 2712 xlrxxxl.exe jdvjp.exe PID 2812 wrote to memory of 2432 2812 jdvjp.exe xrflffr.exe PID 2812 wrote to memory of 2432 2812 jdvjp.exe xrflffr.exe PID 2812 wrote to memory of 2432 2812 jdvjp.exe xrflffr.exe PID 2812 wrote to memory of 2432 2812 jdvjp.exe xrflffr.exe PID 2432 wrote to memory of 2512 2432 xrflffr.exe ttbbnt.exe PID 2432 wrote to memory of 2512 2432 xrflffr.exe ttbbnt.exe PID 2432 wrote to memory of 2512 2432 xrflffr.exe ttbbnt.exe PID 2432 wrote to memory of 2512 2432 xrflffr.exe ttbbnt.exe PID 2512 wrote to memory of 2440 2512 ttbbnt.exe 1bbbtt.exe PID 2512 wrote to memory of 2440 2512 ttbbnt.exe 1bbbtt.exe PID 2512 wrote to memory of 2440 2512 ttbbnt.exe 1bbbtt.exe PID 2512 wrote to memory of 2440 2512 ttbbnt.exe 1bbbtt.exe PID 2440 wrote to memory of 2528 2440 1bbbtt.exe 1jdpd.exe PID 2440 wrote to memory of 2528 2440 1bbbtt.exe 1jdpd.exe PID 2440 wrote to memory of 2528 2440 1bbbtt.exe 1jdpd.exe PID 2440 wrote to memory of 2528 2440 1bbbtt.exe 1jdpd.exe PID 2528 wrote to memory of 2600 2528 1jdpd.exe fxffflx.exe PID 2528 wrote to memory of 2600 2528 1jdpd.exe fxffflx.exe PID 2528 wrote to memory of 2600 2528 1jdpd.exe fxffflx.exe PID 2528 wrote to memory of 2600 2528 1jdpd.exe fxffflx.exe PID 2600 wrote to memory of 2988 2600 fxffflx.exe xrflxlf.exe PID 2600 wrote to memory of 2988 2600 fxffflx.exe xrflxlf.exe PID 2600 wrote to memory of 2988 2600 fxffflx.exe xrflxlf.exe PID 2600 wrote to memory of 2988 2600 fxffflx.exe xrflxlf.exe PID 2988 wrote to memory of 560 2988 xrflxlf.exe pjjpd.exe PID 2988 wrote to memory of 560 2988 xrflxlf.exe pjjpd.exe PID 2988 wrote to memory of 560 2988 xrflxlf.exe pjjpd.exe PID 2988 wrote to memory of 560 2988 xrflxlf.exe pjjpd.exe PID 560 wrote to memory of 1940 560 pjjpd.exe 9pddj.exe PID 560 wrote to memory of 1940 560 pjjpd.exe 9pddj.exe PID 560 wrote to memory of 1940 560 pjjpd.exe 9pddj.exe PID 560 wrote to memory of 1940 560 pjjpd.exe 9pddj.exe PID 1940 wrote to memory of 1872 1940 9pddj.exe rrlrflx.exe PID 1940 wrote to memory of 1872 1940 9pddj.exe rrlrflx.exe PID 1940 wrote to memory of 1872 1940 9pddj.exe rrlrflx.exe PID 1940 wrote to memory of 1872 1940 9pddj.exe rrlrflx.exe PID 1872 wrote to memory of 1196 1872 rrlrflx.exe bbtthh.exe PID 1872 wrote to memory of 1196 1872 rrlrflx.exe bbtthh.exe PID 1872 wrote to memory of 1196 1872 rrlrflx.exe bbtthh.exe PID 1872 wrote to memory of 1196 1872 rrlrflx.exe bbtthh.exe PID 1196 wrote to memory of 2788 1196 bbtthh.exe vjvdp.exe PID 1196 wrote to memory of 2788 1196 bbtthh.exe vjvdp.exe PID 1196 wrote to memory of 2788 1196 bbtthh.exe vjvdp.exe PID 1196 wrote to memory of 2788 1196 bbtthh.exe vjvdp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e54ae86212c2e30aef9435df2ff7e7e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\fxrfrlf.exec:\fxrfrlf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\tnnntt.exec:\tnnntt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\jdppd.exec:\jdppd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\xlrxxxl.exec:\xlrxxxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\jdvjp.exec:\jdvjp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\xrflffr.exec:\xrflffr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\ttbbnt.exec:\ttbbnt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\1bbbtt.exec:\1bbbtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\1jdpd.exec:\1jdpd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\fxffflx.exec:\fxffflx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\xrflxlf.exec:\xrflxlf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\pjjpd.exec:\pjjpd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
\??\c:\9pddj.exec:\9pddj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\rrlrflx.exec:\rrlrflx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\bbtthh.exec:\bbtthh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\vjvdp.exec:\vjvdp.exe17⤵
- Executes dropped EXE
PID:2788 -
\??\c:\xxxlxlr.exec:\xxxlxlr.exe18⤵
- Executes dropped EXE
PID:1640 -
\??\c:\9lxrrrf.exec:\9lxrrrf.exe19⤵
- Executes dropped EXE
PID:1320 -
\??\c:\bthtbh.exec:\bthtbh.exe20⤵
- Executes dropped EXE
PID:484 -
\??\c:\vppdv.exec:\vppdv.exe21⤵
- Executes dropped EXE
PID:2244 -
\??\c:\fxlrxll.exec:\fxlrxll.exe22⤵
- Executes dropped EXE
PID:2240 -
\??\c:\xrfxllf.exec:\xrfxllf.exe23⤵
- Executes dropped EXE
PID:2948 -
\??\c:\tnhhtt.exec:\tnhhtt.exe24⤵
- Executes dropped EXE
PID:1344 -
\??\c:\ppjvj.exec:\ppjvj.exe25⤵
- Executes dropped EXE
PID:1864 -
\??\c:\jjdjd.exec:\jjdjd.exe26⤵
- Executes dropped EXE
PID:1792 -
\??\c:\xxflllx.exec:\xxflllx.exe27⤵
- Executes dropped EXE
PID:796 -
\??\c:\7ntttt.exec:\7ntttt.exe28⤵
- Executes dropped EXE
PID:2944 -
\??\c:\vjvjp.exec:\vjvjp.exe29⤵
- Executes dropped EXE
PID:548 -
\??\c:\fxllrrl.exec:\fxllrrl.exe30⤵
- Executes dropped EXE
PID:1768 -
\??\c:\xlrrrxr.exec:\xlrrrxr.exe31⤵
- Executes dropped EXE
PID:2136 -
\??\c:\hbnntt.exec:\hbnntt.exe32⤵
- Executes dropped EXE
PID:2980 -
\??\c:\vpdpj.exec:\vpdpj.exe33⤵
- Executes dropped EXE
PID:3048 -
\??\c:\pppvj.exec:\pppvj.exe34⤵
- Executes dropped EXE
PID:1964 -
\??\c:\fflrxxf.exec:\fflrxxf.exe35⤵
- Executes dropped EXE
PID:1036 -
\??\c:\xllrxrx.exec:\xllrxrx.exe36⤵
- Executes dropped EXE
PID:2128 -
\??\c:\hthhtt.exec:\hthhtt.exe37⤵
- Executes dropped EXE
PID:2652 -
\??\c:\1nbbbh.exec:\1nbbbh.exe38⤵
- Executes dropped EXE
PID:3016 -
\??\c:\5dvvj.exec:\5dvvj.exe39⤵
- Executes dropped EXE
PID:2932 -
\??\c:\jdpvv.exec:\jdpvv.exe40⤵
- Executes dropped EXE
PID:2916 -
\??\c:\rfrxrxx.exec:\rfrxrxx.exe41⤵
- Executes dropped EXE
PID:2808 -
\??\c:\3lxfllx.exec:\3lxfllx.exe42⤵
- Executes dropped EXE
PID:2804 -
\??\c:\hbthnn.exec:\hbthnn.exe43⤵
- Executes dropped EXE
PID:2744 -
\??\c:\nhtbnt.exec:\nhtbnt.exe44⤵
- Executes dropped EXE
PID:2576 -
\??\c:\jdpdj.exec:\jdpdj.exe45⤵
- Executes dropped EXE
PID:2556 -
\??\c:\jdpvd.exec:\jdpvd.exe46⤵
- Executes dropped EXE
PID:1820 -
\??\c:\vjppv.exec:\vjppv.exe47⤵
- Executes dropped EXE
PID:2848 -
\??\c:\lfrlrrx.exec:\lfrlrrx.exe48⤵
- Executes dropped EXE
PID:2888 -
\??\c:\xrfflrx.exec:\xrfflrx.exe49⤵
- Executes dropped EXE
PID:2844 -
\??\c:\hhhttt.exec:\hhhttt.exe50⤵
- Executes dropped EXE
PID:1304 -
\??\c:\hbthnn.exec:\hbthnn.exe51⤵
- Executes dropped EXE
PID:1616 -
\??\c:\vjppv.exec:\vjppv.exe52⤵
- Executes dropped EXE
PID:1940 -
\??\c:\1pjjj.exec:\1pjjj.exe53⤵
- Executes dropped EXE
PID:1684 -
\??\c:\xlxxffl.exec:\xlxxffl.exe54⤵
- Executes dropped EXE
PID:1632 -
\??\c:\5rxxxxl.exec:\5rxxxxl.exe55⤵
- Executes dropped EXE
PID:2792 -
\??\c:\rlfxffr.exec:\rlfxffr.exe56⤵
- Executes dropped EXE
PID:2064 -
\??\c:\bnhhtn.exec:\bnhhtn.exe57⤵
- Executes dropped EXE
PID:1296 -
\??\c:\9hnntb.exec:\9hnntb.exe58⤵
- Executes dropped EXE
PID:684 -
\??\c:\ddjjp.exec:\ddjjp.exe59⤵
- Executes dropped EXE
PID:2280 -
\??\c:\jvddd.exec:\jvddd.exe60⤵
- Executes dropped EXE
PID:564 -
\??\c:\xrffrxl.exec:\xrffrxl.exe61⤵
- Executes dropped EXE
PID:2244 -
\??\c:\9lxllrx.exec:\9lxllrx.exe62⤵
- Executes dropped EXE
PID:2332 -
\??\c:\7nbnbb.exec:\7nbnbb.exe63⤵
- Executes dropped EXE
PID:776 -
\??\c:\tnbttt.exec:\tnbttt.exe64⤵
- Executes dropped EXE
PID:1488 -
\??\c:\3pvvd.exec:\3pvvd.exe65⤵
- Executes dropped EXE
PID:2312 -
\??\c:\dvjjv.exec:\dvjjv.exe66⤵PID:448
-
\??\c:\xrlxfrf.exec:\xrlxfrf.exe67⤵PID:1268
-
\??\c:\nnbbhh.exec:\nnbbhh.exe68⤵PID:3044
-
\??\c:\bthntt.exec:\bthntt.exe69⤵PID:964
-
\??\c:\1ppjp.exec:\1ppjp.exe70⤵PID:1028
-
\??\c:\7pdpd.exec:\7pdpd.exe71⤵PID:548
-
\??\c:\xxlrxff.exec:\xxlrxff.exe72⤵PID:1768
-
\??\c:\ffrlfrl.exec:\ffrlfrl.exe73⤵PID:2120
-
\??\c:\tnnntt.exec:\tnnntt.exe74⤵PID:2200
-
\??\c:\bbnhtt.exec:\bbnhtt.exe75⤵PID:2984
-
\??\c:\7ddjp.exec:\7ddjp.exe76⤵PID:3028
-
\??\c:\dvdvj.exec:\dvdvj.exe77⤵PID:2216
-
\??\c:\fxrrffx.exec:\fxrrffx.exe78⤵PID:1716
-
\??\c:\frlrxrx.exec:\frlrxrx.exe79⤵PID:2228
-
\??\c:\hbnnhn.exec:\hbnnhn.exe80⤵PID:2720
-
\??\c:\btbntt.exec:\btbntt.exe81⤵PID:2664
-
\??\c:\jvjpv.exec:\jvjpv.exe82⤵PID:2824
-
\??\c:\vpvdp.exec:\vpvdp.exe83⤵PID:2016
-
\??\c:\5frlrrx.exec:\5frlrrx.exe84⤵PID:2560
-
\??\c:\rrlxfff.exec:\rrlxfff.exe85⤵PID:2684
-
\??\c:\bthnth.exec:\bthnth.exe86⤵PID:2516
-
\??\c:\9tbnbh.exec:\9tbnbh.exe87⤵PID:3000
-
\??\c:\dppvd.exec:\dppvd.exe88⤵PID:2416
-
\??\c:\3dpvd.exec:\3dpvd.exe89⤵PID:1676
-
\??\c:\rlxfrlf.exec:\rlxfrlf.exe90⤵PID:2840
-
\??\c:\fxffffl.exec:\fxffffl.exe91⤵PID:2876
-
\??\c:\3hhthn.exec:\3hhthn.exe92⤵PID:1516
-
\??\c:\btnhnn.exec:\btnhnn.exe93⤵PID:560
-
\??\c:\pjvvv.exec:\pjvvv.exe94⤵PID:2304
-
\??\c:\9rlfllr.exec:\9rlfllr.exe95⤵PID:2160
-
\??\c:\rlxxlfr.exec:\rlxxlfr.exe96⤵PID:2768
-
\??\c:\nhnnbt.exec:\nhnnbt.exe97⤵PID:2400
-
\??\c:\1ttbhn.exec:\1ttbhn.exe98⤵PID:2788
-
\??\c:\vpvpd.exec:\vpvpd.exe99⤵PID:2760
-
\??\c:\pjvdp.exec:\pjvdp.exe100⤵PID:784
-
\??\c:\9frrrfl.exec:\9frrrfl.exe101⤵PID:684
-
\??\c:\lfllffl.exec:\lfllffl.exe102⤵PID:2492
-
\??\c:\tnbhnt.exec:\tnbhnt.exe103⤵PID:2084
-
\??\c:\tnbnhb.exec:\tnbnhb.exe104⤵PID:2896
-
\??\c:\jdpvp.exec:\jdpvp.exe105⤵PID:1956
-
\??\c:\jdpjp.exec:\jdpjp.exe106⤵PID:1812
-
\??\c:\xrrxllx.exec:\xrrxllx.exe107⤵PID:3064
-
\??\c:\xrrxxfr.exec:\xrrxxfr.exe108⤵PID:2468
-
\??\c:\hhbnbh.exec:\hhbnbh.exe109⤵PID:2472
-
\??\c:\5btbhh.exec:\5btbhh.exe110⤵PID:816
-
\??\c:\vpjpv.exec:\vpjpv.exe111⤵PID:1648
-
\??\c:\vdpdv.exec:\vdpdv.exe112⤵PID:3052
-
\??\c:\fxrrrrl.exec:\fxrrrrl.exe113⤵PID:2596
-
\??\c:\3lfflrx.exec:\3lfflrx.exe114⤵PID:2256
-
\??\c:\tththn.exec:\tththn.exe115⤵PID:896
-
\??\c:\9htbnn.exec:\9htbnn.exe116⤵PID:2192
-
\??\c:\dvvjv.exec:\dvvjv.exe117⤵PID:1692
-
\??\c:\dvppd.exec:\dvppd.exe118⤵PID:2236
-
\??\c:\rlrrrxl.exec:\rlrrrxl.exe119⤵PID:2696
-
\??\c:\9rxlrxr.exec:\9rxlrxr.exe120⤵PID:2616
-
\??\c:\hbtbhn.exec:\hbtbhn.exe121⤵PID:2112
-
\??\c:\htbhhb.exec:\htbhhb.exe122⤵PID:2652
-
\??\c:\jdjpd.exec:\jdjpd.exe123⤵PID:2636
-
\??\c:\jdvvd.exec:\jdvvd.exe124⤵PID:2628
-
\??\c:\xlffrlr.exec:\xlffrlr.exe125⤵PID:2872
-
\??\c:\7frxxxr.exec:\7frxxxr.exe126⤵PID:2536
-
\??\c:\nbttbn.exec:\nbttbn.exe127⤵PID:2524
-
\??\c:\bthhtt.exec:\bthhtt.exe128⤵PID:2680
-
\??\c:\dvjpj.exec:\dvjpj.exe129⤵PID:2632
-
\??\c:\jvppv.exec:\jvppv.exe130⤵PID:2440
-
\??\c:\bthhnt.exec:\bthhnt.exe131⤵PID:2880
-
\??\c:\tnhthn.exec:\tnhthn.exe132⤵PID:3012
-
\??\c:\jvvdj.exec:\jvvdj.exe133⤵PID:2988
-
\??\c:\1dpjj.exec:\1dpjj.exe134⤵PID:1576
-
\??\c:\5frxrxf.exec:\5frxrxf.exe135⤵PID:2600
-
\??\c:\9fxlfrx.exec:\9fxlfrx.exe136⤵PID:2008
-
\??\c:\3tnbth.exec:\3tnbth.exe137⤵PID:640
-
\??\c:\nnbbhh.exec:\nnbbhh.exe138⤵PID:2316
-
\??\c:\jjvvj.exec:\jjvvj.exe139⤵PID:604
-
\??\c:\vjddd.exec:\vjddd.exe140⤵PID:1264
-
\??\c:\7lfxrrf.exec:\7lfxrrf.exe141⤵PID:1816
-
\??\c:\llllxll.exec:\llllxll.exe142⤵PID:1320
-
\??\c:\3hhntb.exec:\3hhntb.exe143⤵PID:784
-
\??\c:\tthnbh.exec:\tthnbh.exe144⤵PID:596
-
\??\c:\pjdjv.exec:\pjdjv.exe145⤵PID:2060
-
\??\c:\5vppp.exec:\5vppp.exe146⤵PID:2084
-
\??\c:\9lxrlrl.exec:\9lxrlrl.exe147⤵PID:2232
-
\??\c:\frfllrf.exec:\frfllrf.exe148⤵PID:1984
-
\??\c:\3nbbhh.exec:\3nbbhh.exe149⤵PID:1812
-
\??\c:\nbbhnn.exec:\nbbhnn.exe150⤵PID:1784
-
\??\c:\7pddj.exec:\7pddj.exe151⤵PID:2972
-
\??\c:\jddvp.exec:\jddvp.exe152⤵PID:796
-
\??\c:\fxllrrx.exec:\fxllrrx.exe153⤵PID:1152
-
\??\c:\9fxlflf.exec:\9fxlflf.exe154⤵PID:964
-
\??\c:\bthhnt.exec:\bthhnt.exe155⤵PID:2420
-
\??\c:\1btthh.exec:\1btthh.exe156⤵PID:2964
-
\??\c:\3jvdj.exec:\3jvdj.exe157⤵PID:2264
-
\??\c:\jdvdv.exec:\jdvdv.exe158⤵PID:296
-
\??\c:\rlffrxl.exec:\rlffrxl.exe159⤵PID:2408
-
\??\c:\lxlrfxl.exec:\lxlrfxl.exe160⤵PID:1608
-
\??\c:\hbtbhn.exec:\hbtbhn.exe161⤵PID:2168
-
\??\c:\tnbhtn.exec:\tnbhtn.exe162⤵PID:2088
-
\??\c:\3jddj.exec:\3jddj.exe163⤵PID:2640
-
\??\c:\3jppp.exec:\3jppp.exe164⤵PID:2728
-
\??\c:\3fxxfff.exec:\3fxxfff.exe165⤵PID:2816
-
\??\c:\lfffxfl.exec:\lfffxfl.exe166⤵PID:2672
-
\??\c:\nbhnbt.exec:\nbhnbt.exe167⤵PID:2756
-
\??\c:\5nhnnt.exec:\5nhnnt.exe168⤵PID:2540
-
\??\c:\5vjjj.exec:\5vjjj.exe169⤵PID:2552
-
\??\c:\lfrrxff.exec:\lfrrxff.exe170⤵PID:2996
-
\??\c:\fxrxfrx.exec:\fxrxfrx.exe171⤵PID:3024
-
\??\c:\hhhbnt.exec:\hhhbnt.exe172⤵PID:2776
-
\??\c:\bbntbn.exec:\bbntbn.exe173⤵PID:2748
-
\??\c:\djdjp.exec:\djdjp.exe174⤵PID:2384
-
\??\c:\pdpvp.exec:\pdpvp.exe175⤵PID:1284
-
\??\c:\llxxlll.exec:\llxxlll.exe176⤵PID:2988
-
\??\c:\xxffllx.exec:\xxffllx.exe177⤵PID:2580
-
\??\c:\7thhnh.exec:\7thhnh.exe178⤵PID:2012
-
\??\c:\jdvjd.exec:\jdvjd.exe179⤵PID:1408
-
\??\c:\jdvvd.exec:\jdvvd.exe180⤵PID:2688
-
\??\c:\xrfxllf.exec:\xrfxllf.exe181⤵PID:1744
-
\??\c:\lxllrrl.exec:\lxllrrl.exe182⤵PID:1460
-
\??\c:\httthn.exec:\httthn.exe183⤵PID:1124
-
\??\c:\thbbhb.exec:\thbbhb.exe184⤵PID:1252
-
\??\c:\vvjpj.exec:\vvjpj.exe185⤵PID:2056
-
\??\c:\fxlrxxf.exec:\fxlrxxf.exe186⤵PID:2864
-
\??\c:\xrxfrfr.exec:\xrxfrfr.exe187⤵PID:2928
-
\??\c:\9tnbtb.exec:\9tnbtb.exe188⤵PID:2060
-
\??\c:\ttthth.exec:\ttthth.exe189⤵PID:1492
-
\??\c:\7pjpv.exec:\7pjpv.exe190⤵PID:2232
-
\??\c:\vpvdd.exec:\vpvdd.exe191⤵PID:1788
-
\??\c:\fxllxfx.exec:\fxllxfx.exe192⤵PID:1012
-
\??\c:\5ttbhh.exec:\5ttbhh.exe193⤵PID:1272
-
\??\c:\jvjpv.exec:\jvjpv.exe194⤵PID:1876
-
\??\c:\pjdjv.exec:\pjdjv.exe195⤵PID:2944
-
\??\c:\xrfflxx.exec:\xrfflxx.exe196⤵PID:2908
-
\??\c:\fxxxrxl.exec:\fxxxrxl.exe197⤵PID:2912
-
\??\c:\hhnhnn.exec:\hhnhnn.exe198⤵PID:2136
-
\??\c:\nntbnt.exec:\nntbnt.exe199⤵PID:2196
-
\??\c:\vpdjj.exec:\vpdjj.exe200⤵PID:2480
-
\??\c:\1jdpv.exec:\1jdpv.exe201⤵PID:2444
-
\??\c:\rlflflr.exec:\rlflflr.exe202⤵PID:3028
-
\??\c:\xlxlxfx.exec:\xlxlxfx.exe203⤵PID:1964
-
\??\c:\hhbhnn.exec:\hhbhnn.exe204⤵PID:1036
-
\??\c:\tnbhhn.exec:\tnbhhn.exe205⤵PID:2128
-
\??\c:\vjpvv.exec:\vjpvv.exe206⤵PID:2732
-
\??\c:\jdpdp.exec:\jdpdp.exe207⤵PID:2832
-
\??\c:\lfxxxxf.exec:\lfxxxxf.exe208⤵PID:2868
-
\??\c:\tnnbbh.exec:\tnnbbh.exe209⤵PID:2916
-
\??\c:\3httbh.exec:\3httbh.exe210⤵PID:2488
-
\??\c:\1dpvv.exec:\1dpvv.exe211⤵PID:2588
-
\??\c:\ddddv.exec:\ddddv.exe212⤵PID:2516
-
\??\c:\lflfrxl.exec:\lflfrxl.exe213⤵PID:2584
-
\??\c:\rrfflff.exec:\rrfflff.exe214⤵PID:2860
-
\??\c:\1bnthn.exec:\1bnthn.exe215⤵PID:2856
-
\??\c:\thtbtb.exec:\thtbtb.exe216⤵PID:2840
-
\??\c:\ddddj.exec:\ddddj.exe217⤵PID:2888
-
\??\c:\ppjvd.exec:\ppjvd.exe218⤵PID:1308
-
\??\c:\xrllxfl.exec:\xrllxfl.exe219⤵PID:1656
-
\??\c:\1htbbh.exec:\1htbbh.exe220⤵PID:2300
-
\??\c:\5tnttb.exec:\5tnttb.exe221⤵PID:2160
-
\??\c:\ddvpd.exec:\ddvpd.exe222⤵PID:1444
-
\??\c:\pjvdd.exec:\pjvdd.exe223⤵PID:1632
-
\??\c:\lfrrxfx.exec:\lfrrxfx.exe224⤵PID:2788
-
\??\c:\llffllx.exec:\llffllx.exe225⤵PID:1460
-
\??\c:\ttnhbt.exec:\ttnhbt.exe226⤵PID:2100
-
\??\c:\nhnnnb.exec:\nhnnnb.exe227⤵PID:1192
-
\??\c:\vvpdj.exec:\vvpdj.exe228⤵PID:2248
-
\??\c:\7jdpp.exec:\7jdpp.exe229⤵PID:2244
-
\??\c:\fxrxlrf.exec:\fxrxlrf.exe230⤵PID:2928
-
\??\c:\7rrxrxr.exec:\7rrxrxr.exe231⤵PID:1008
-
\??\c:\hbtbhh.exec:\hbtbhh.exe232⤵PID:696
-
\??\c:\vvpdp.exec:\vvpdp.exe233⤵PID:1488
-
\??\c:\5vpdd.exec:\5vpdd.exe234⤵PID:1868
-
\??\c:\5fxlxxf.exec:\5fxlxxf.exe235⤵PID:1268
-
\??\c:\7rfrfrf.exec:\7rfrfrf.exe236⤵PID:3044
-
\??\c:\bthtbb.exec:\bthtbb.exe237⤵PID:1648
-
\??\c:\bbtbtb.exec:\bbtbtb.exe238⤵PID:1028
-
\??\c:\1vvvj.exec:\1vvvj.exe239⤵PID:1660
-
\??\c:\pjpjp.exec:\pjpjp.exe240⤵PID:1512
-
\??\c:\fxxfffx.exec:\fxxfffx.exe241⤵PID:2256
-
\??\c:\fxlrffl.exec:\fxlrffl.exe242⤵PID:3040