Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 10:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe
-
Size
141KB
-
MD5
12277aee2204e24c4f61cbafca1ba7c0
-
SHA1
1bebc74c9419303f3ff6edea27120e1f76ee5fc9
-
SHA256
31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d
-
SHA512
63f7eb37ef6d14880428bda4a411cd2eb7ef00671a62df5c23f5d95335e33ed3f848432369fdb781cd75143ddb6bbbaaec3bfc1b249d810f55e4765eb632fb67
-
SSDEEP
3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmm8mzuFli55p1502:n3C9BRIG0asYFm71mm8flii2
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2884-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1152-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2504-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1820-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1020-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/900-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1876-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1300-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1488-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2000-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
hbnhth.exejdjjp.exelfxxfrx.exetnhhnn.exejvjpp.exeddjpd.exetnbhnb.exehbhbhn.exejvjpj.exefxlflfl.exenhbbhb.exejvppv.exe9pddd.exelxrrllr.exebtbbnn.exenbtttb.exepjvdj.exe5rlllrf.exe3thbht.exennbnnn.exevvjvj.exexrflffl.exefxllrrf.exenbnttt.exe9vvpv.exerlflffr.exe5tthnt.exevpddd.exejvdvd.exelfrrlrx.exe7nnntb.exepjjpv.exevpjpp.exethtntn.exe7nttnn.exevddvp.exejdppv.exelxffrrx.exerlfrfrx.exehbhhtt.exe1nhbht.exe3vdpv.exevpddd.exexlrxfxf.exellxlrrf.exenbntbb.exehbnntb.exejdvjd.exedvpvv.exelfrlxxl.exe5thhnb.exennbnbh.exevvpvd.exedvpvj.exexrxxxff.exe3xfxfrx.exe1bbbhh.exetnttbb.exepjppv.exejvjdj.exelfxrllx.exe3lxflfl.exehbhhhb.exetnbbth.exepid process 2836 hbnhth.exe 2772 jdjjp.exe 2640 lfxxfrx.exe 1152 tnhhnn.exe 2176 jvjpp.exe 2604 ddjpd.exe 2612 tnbhnb.exe 2868 hbhbhn.exe 2504 jvjpj.exe 2628 fxlflfl.exe 1820 nhbbhb.exe 1020 jvppv.exe 2320 9pddd.exe 900 lxrrllr.exe 1636 btbbnn.exe 1876 nbtttb.exe 1300 pjvdj.exe 2256 5rlllrf.exe 2424 3thbht.exe 2800 nnbnnn.exe 268 vvjvj.exe 1488 xrflffl.exe 644 fxllrrf.exe 1508 nbnttt.exe 1132 9vvpv.exe 1648 rlflffr.exe 2820 5tthnt.exe 2936 vpddd.exe 2000 jvdvd.exe 2368 lfrrlrx.exe 2900 7nnntb.exe 2344 pjjpv.exe 2152 vpjpp.exe 3004 thtntn.exe 2652 7nttnn.exe 2640 vddvp.exe 2948 jdppv.exe 2720 lxffrrx.exe 2176 rlfrfrx.exe 2576 hbhhtt.exe 2436 1nhbht.exe 2360 3vdpv.exe 3032 vpddd.exe 2676 xlrxfxf.exe 2748 llxlrrf.exe 2972 nbntbb.exe 1032 hbnntb.exe 1944 jdvjd.exe 556 dvpvv.exe 2324 lfrlxxl.exe 2080 5thhnb.exe 1640 nnbnbh.exe 2260 vvpvd.exe 1876 dvpvj.exe 2272 xrxxxff.exe 2532 3xfxfrx.exe 2036 1bbbhh.exe 2052 tnttbb.exe 2808 pjppv.exe 268 jvjdj.exe 1868 lfxrllx.exe 2312 3lxflfl.exe 692 hbhhhb.exe 2412 tnbbth.exe -
Processes:
resource yara_rule behavioral1/memory/2884-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2504-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1820-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1020-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/900-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1876-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1488-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2000-294-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exehbnhth.exejdjjp.exelfxxfrx.exetnhhnn.exejvjpp.exeddjpd.exetnbhnb.exehbhbhn.exejvjpj.exefxlflfl.exenhbbhb.exejvppv.exe9pddd.exelxrrllr.exebtbbnn.exedescription pid process target process PID 2884 wrote to memory of 2836 2884 31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe hbnhth.exe PID 2884 wrote to memory of 2836 2884 31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe hbnhth.exe PID 2884 wrote to memory of 2836 2884 31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe hbnhth.exe PID 2884 wrote to memory of 2836 2884 31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe hbnhth.exe PID 2836 wrote to memory of 2772 2836 hbnhth.exe jdjjp.exe PID 2836 wrote to memory of 2772 2836 hbnhth.exe jdjjp.exe PID 2836 wrote to memory of 2772 2836 hbnhth.exe jdjjp.exe PID 2836 wrote to memory of 2772 2836 hbnhth.exe jdjjp.exe PID 2772 wrote to memory of 2640 2772 jdjjp.exe lfxxfrx.exe PID 2772 wrote to memory of 2640 2772 jdjjp.exe lfxxfrx.exe PID 2772 wrote to memory of 2640 2772 jdjjp.exe lfxxfrx.exe PID 2772 wrote to memory of 2640 2772 jdjjp.exe lfxxfrx.exe PID 2640 wrote to memory of 1152 2640 lfxxfrx.exe tnhhnn.exe PID 2640 wrote to memory of 1152 2640 lfxxfrx.exe tnhhnn.exe PID 2640 wrote to memory of 1152 2640 lfxxfrx.exe tnhhnn.exe PID 2640 wrote to memory of 1152 2640 lfxxfrx.exe tnhhnn.exe PID 1152 wrote to memory of 2176 1152 tnhhnn.exe jvjpp.exe PID 1152 wrote to memory of 2176 1152 tnhhnn.exe jvjpp.exe PID 1152 wrote to memory of 2176 1152 tnhhnn.exe jvjpp.exe PID 1152 wrote to memory of 2176 1152 tnhhnn.exe jvjpp.exe PID 2176 wrote to memory of 2604 2176 jvjpp.exe ddjpd.exe PID 2176 wrote to memory of 2604 2176 jvjpp.exe ddjpd.exe PID 2176 wrote to memory of 2604 2176 jvjpp.exe ddjpd.exe PID 2176 wrote to memory of 2604 2176 jvjpp.exe ddjpd.exe PID 2604 wrote to memory of 2612 2604 ddjpd.exe tnbhnb.exe PID 2604 wrote to memory of 2612 2604 ddjpd.exe tnbhnb.exe PID 2604 wrote to memory of 2612 2604 ddjpd.exe tnbhnb.exe PID 2604 wrote to memory of 2612 2604 ddjpd.exe tnbhnb.exe PID 2612 wrote to memory of 2868 2612 tnbhnb.exe hbhbhn.exe PID 2612 wrote to memory of 2868 2612 tnbhnb.exe hbhbhn.exe PID 2612 wrote to memory of 2868 2612 tnbhnb.exe hbhbhn.exe PID 2612 wrote to memory of 2868 2612 tnbhnb.exe hbhbhn.exe PID 2868 wrote to memory of 2504 2868 hbhbhn.exe jvjpj.exe PID 2868 wrote to memory of 2504 2868 hbhbhn.exe jvjpj.exe PID 2868 wrote to memory of 2504 2868 hbhbhn.exe jvjpj.exe PID 2868 wrote to memory of 2504 2868 hbhbhn.exe jvjpj.exe PID 2504 wrote to memory of 2628 2504 jvjpj.exe fxlflfl.exe PID 2504 wrote to memory of 2628 2504 jvjpj.exe fxlflfl.exe PID 2504 wrote to memory of 2628 2504 jvjpj.exe fxlflfl.exe PID 2504 wrote to memory of 2628 2504 jvjpj.exe fxlflfl.exe PID 2628 wrote to memory of 1820 2628 fxlflfl.exe nhbbhb.exe PID 2628 wrote to memory of 1820 2628 fxlflfl.exe nhbbhb.exe PID 2628 wrote to memory of 1820 2628 fxlflfl.exe nhbbhb.exe PID 2628 wrote to memory of 1820 2628 fxlflfl.exe nhbbhb.exe PID 1820 wrote to memory of 1020 1820 nhbbhb.exe jvppv.exe PID 1820 wrote to memory of 1020 1820 nhbbhb.exe jvppv.exe PID 1820 wrote to memory of 1020 1820 nhbbhb.exe jvppv.exe PID 1820 wrote to memory of 1020 1820 nhbbhb.exe jvppv.exe PID 1020 wrote to memory of 2320 1020 jvppv.exe 9pddd.exe PID 1020 wrote to memory of 2320 1020 jvppv.exe 9pddd.exe PID 1020 wrote to memory of 2320 1020 jvppv.exe 9pddd.exe PID 1020 wrote to memory of 2320 1020 jvppv.exe 9pddd.exe PID 2320 wrote to memory of 900 2320 9pddd.exe lxrrllr.exe PID 2320 wrote to memory of 900 2320 9pddd.exe lxrrllr.exe PID 2320 wrote to memory of 900 2320 9pddd.exe lxrrllr.exe PID 2320 wrote to memory of 900 2320 9pddd.exe lxrrllr.exe PID 900 wrote to memory of 1636 900 lxrrllr.exe btbbnn.exe PID 900 wrote to memory of 1636 900 lxrrllr.exe btbbnn.exe PID 900 wrote to memory of 1636 900 lxrrllr.exe btbbnn.exe PID 900 wrote to memory of 1636 900 lxrrllr.exe btbbnn.exe PID 1636 wrote to memory of 1876 1636 btbbnn.exe nbtttb.exe PID 1636 wrote to memory of 1876 1636 btbbnn.exe nbtttb.exe PID 1636 wrote to memory of 1876 1636 btbbnn.exe nbtttb.exe PID 1636 wrote to memory of 1876 1636 btbbnn.exe nbtttb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\31d6526738b269c15160dcfc3fd136d5622f7cef0c50611f4cf4e5ec8716933d_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\hbnhth.exec:\hbnhth.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\jdjjp.exec:\jdjjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\lfxxfrx.exec:\lfxxfrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\tnhhnn.exec:\tnhhnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\jvjpp.exec:\jvjpp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\ddjpd.exec:\ddjpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\tnbhnb.exec:\tnbhnb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\hbhbhn.exec:\hbhbhn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\jvjpj.exec:\jvjpj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\fxlflfl.exec:\fxlflfl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\nhbbhb.exec:\nhbbhb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\jvppv.exec:\jvppv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
\??\c:\9pddd.exec:\9pddd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\lxrrllr.exec:\lxrrllr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:900 -
\??\c:\btbbnn.exec:\btbbnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\nbtttb.exec:\nbtttb.exe17⤵
- Executes dropped EXE
PID:1876 -
\??\c:\pjvdj.exec:\pjvdj.exe18⤵
- Executes dropped EXE
PID:1300 -
\??\c:\5rlllrf.exec:\5rlllrf.exe19⤵
- Executes dropped EXE
PID:2256 -
\??\c:\3thbht.exec:\3thbht.exe20⤵
- Executes dropped EXE
PID:2424 -
\??\c:\nnbnnn.exec:\nnbnnn.exe21⤵
- Executes dropped EXE
PID:2800 -
\??\c:\vvjvj.exec:\vvjvj.exe22⤵
- Executes dropped EXE
PID:268 -
\??\c:\xrflffl.exec:\xrflffl.exe23⤵
- Executes dropped EXE
PID:1488 -
\??\c:\fxllrrf.exec:\fxllrrf.exe24⤵
- Executes dropped EXE
PID:644 -
\??\c:\nbnttt.exec:\nbnttt.exe25⤵
- Executes dropped EXE
PID:1508 -
\??\c:\9vvpv.exec:\9vvpv.exe26⤵
- Executes dropped EXE
PID:1132 -
\??\c:\rlflffr.exec:\rlflffr.exe27⤵
- Executes dropped EXE
PID:1648 -
\??\c:\5tthnt.exec:\5tthnt.exe28⤵
- Executes dropped EXE
PID:2820 -
\??\c:\vpddd.exec:\vpddd.exe29⤵
- Executes dropped EXE
PID:2936 -
\??\c:\jvdvd.exec:\jvdvd.exe30⤵
- Executes dropped EXE
PID:2000 -
\??\c:\lfrrlrx.exec:\lfrrlrx.exe31⤵
- Executes dropped EXE
PID:2368 -
\??\c:\7nnntb.exec:\7nnntb.exe32⤵
- Executes dropped EXE
PID:2900 -
\??\c:\pjjpv.exec:\pjjpv.exe33⤵
- Executes dropped EXE
PID:2344 -
\??\c:\vpjpp.exec:\vpjpp.exe34⤵
- Executes dropped EXE
PID:2152 -
\??\c:\thtntn.exec:\thtntn.exe35⤵
- Executes dropped EXE
PID:3004 -
\??\c:\7nttnn.exec:\7nttnn.exe36⤵
- Executes dropped EXE
PID:2652 -
\??\c:\vddvp.exec:\vddvp.exe37⤵
- Executes dropped EXE
PID:2640 -
\??\c:\jdppv.exec:\jdppv.exe38⤵
- Executes dropped EXE
PID:2948 -
\??\c:\lxffrrx.exec:\lxffrrx.exe39⤵
- Executes dropped EXE
PID:2720 -
\??\c:\rlfrfrx.exec:\rlfrfrx.exe40⤵
- Executes dropped EXE
PID:2176 -
\??\c:\hbhhtt.exec:\hbhhtt.exe41⤵
- Executes dropped EXE
PID:2576 -
\??\c:\1nhbht.exec:\1nhbht.exe42⤵
- Executes dropped EXE
PID:2436 -
\??\c:\3vdpv.exec:\3vdpv.exe43⤵
- Executes dropped EXE
PID:2360 -
\??\c:\vpddd.exec:\vpddd.exe44⤵
- Executes dropped EXE
PID:3032 -
\??\c:\xlrxfxf.exec:\xlrxfxf.exe45⤵
- Executes dropped EXE
PID:2676 -
\??\c:\llxlrrf.exec:\llxlrrf.exe46⤵
- Executes dropped EXE
PID:2748 -
\??\c:\nbntbb.exec:\nbntbb.exe47⤵
- Executes dropped EXE
PID:2972 -
\??\c:\hbnntb.exec:\hbnntb.exe48⤵
- Executes dropped EXE
PID:1032 -
\??\c:\jdvjd.exec:\jdvjd.exe49⤵
- Executes dropped EXE
PID:1944 -
\??\c:\dvpvv.exec:\dvpvv.exe50⤵
- Executes dropped EXE
PID:556 -
\??\c:\lfrlxxl.exec:\lfrlxxl.exe51⤵
- Executes dropped EXE
PID:2324 -
\??\c:\5thhnb.exec:\5thhnb.exe52⤵
- Executes dropped EXE
PID:2080 -
\??\c:\nnbnbh.exec:\nnbnbh.exe53⤵
- Executes dropped EXE
PID:1640 -
\??\c:\vvpvd.exec:\vvpvd.exe54⤵
- Executes dropped EXE
PID:2260 -
\??\c:\dvpvj.exec:\dvpvj.exe55⤵
- Executes dropped EXE
PID:1876 -
\??\c:\xrxxxff.exec:\xrxxxff.exe56⤵
- Executes dropped EXE
PID:2272 -
\??\c:\3xfxfrx.exec:\3xfxfrx.exe57⤵
- Executes dropped EXE
PID:2532 -
\??\c:\1bbbhh.exec:\1bbbhh.exe58⤵
- Executes dropped EXE
PID:2036 -
\??\c:\tnttbb.exec:\tnttbb.exe59⤵
- Executes dropped EXE
PID:2052 -
\??\c:\pjppv.exec:\pjppv.exe60⤵
- Executes dropped EXE
PID:2808 -
\??\c:\jvjdj.exec:\jvjdj.exe61⤵
- Executes dropped EXE
PID:268 -
\??\c:\lfxrllx.exec:\lfxrllx.exe62⤵
- Executes dropped EXE
PID:1868 -
\??\c:\3lxflfl.exec:\3lxflfl.exe63⤵
- Executes dropped EXE
PID:2312 -
\??\c:\hbhhhb.exec:\hbhhhb.exe64⤵
- Executes dropped EXE
PID:692 -
\??\c:\tnbbth.exec:\tnbbth.exe65⤵
- Executes dropped EXE
PID:2412 -
\??\c:\jvvpp.exec:\jvvpp.exe66⤵PID:1700
-
\??\c:\vjvvp.exec:\vjvvp.exe67⤵PID:2016
-
\??\c:\xflxrlr.exec:\xflxrlr.exe68⤵PID:2916
-
\??\c:\fxxxfxl.exec:\fxxxfxl.exe69⤵PID:3064
-
\??\c:\nhnhnh.exec:\nhnhnh.exe70⤵PID:896
-
\??\c:\hthbbb.exec:\hthbbb.exe71⤵PID:2000
-
\??\c:\jvjjp.exec:\jvjjp.exe72⤵PID:2008
-
\??\c:\pdjjj.exec:\pdjjj.exe73⤵PID:1580
-
\??\c:\9xlrlfl.exec:\9xlrlfl.exe74⤵PID:2536
-
\??\c:\lfrlxxf.exec:\lfrlxxf.exe75⤵PID:2344
-
\??\c:\hbhhhh.exec:\hbhhhh.exe76⤵PID:2548
-
\??\c:\thhtbb.exec:\thhtbb.exe77⤵PID:2684
-
\??\c:\nhtbhh.exec:\nhtbhh.exe78⤵PID:1328
-
\??\c:\3pddd.exec:\3pddd.exe79⤵PID:2468
-
\??\c:\dpdjd.exec:\dpdjd.exe80⤵PID:2552
-
\??\c:\rffrrlr.exec:\rffrrlr.exe81⤵PID:2672
-
\??\c:\lffflfx.exec:\lffflfx.exe82⤵PID:2472
-
\??\c:\bnbbhh.exec:\bnbbhh.exe83⤵PID:2440
-
\??\c:\1nthnb.exec:\1nthnb.exe84⤵PID:2612
-
\??\c:\9dppp.exec:\9dppp.exe85⤵PID:2864
-
\??\c:\5vvjd.exec:\5vvjd.exe86⤵PID:1688
-
\??\c:\jvjjj.exec:\jvjjj.exe87⤵PID:2856
-
\??\c:\1xlllff.exec:\1xlllff.exe88⤵PID:2888
-
\??\c:\7lrxrll.exec:\7lrxrll.exe89⤵PID:320
-
\??\c:\thnnht.exec:\thnnht.exe90⤵PID:1668
-
\??\c:\bnthnn.exec:\bnthnn.exe91⤵PID:2180
-
\??\c:\jdjjv.exec:\jdjjv.exe92⤵PID:1564
-
\??\c:\1vdvp.exec:\1vdvp.exe93⤵PID:900
-
\??\c:\jvpvp.exec:\jvpvp.exe94⤵PID:856
-
\??\c:\rrxrxfl.exec:\rrxrxfl.exe95⤵PID:2328
-
\??\c:\rfrrxff.exec:\rfrrxff.exe96⤵PID:2120
-
\??\c:\hnthbt.exec:\hnthbt.exe97⤵PID:2076
-
\??\c:\htbbtn.exec:\htbbtn.exe98⤵PID:2264
-
\??\c:\jdddj.exec:\jdddj.exe99⤵PID:1232
-
\??\c:\vpdvv.exec:\vpdvv.exe100⤵PID:536
-
\??\c:\fxxlxlf.exec:\fxxlxlf.exe101⤵PID:592
-
\??\c:\7xlrrrl.exec:\7xlrrrl.exe102⤵PID:2800
-
\??\c:\1nnntb.exec:\1nnntb.exe103⤵PID:3068
-
\??\c:\thbbhh.exec:\thbbhh.exe104⤵PID:1008
-
\??\c:\jvvjd.exec:\jvvjd.exe105⤵PID:2388
-
\??\c:\jdvvp.exec:\jdvvp.exe106⤵PID:1704
-
\??\c:\frfxxll.exec:\frfxxll.exe107⤵PID:708
-
\??\c:\3fxxfxx.exec:\3fxxfxx.exe108⤵PID:2824
-
\??\c:\btbbhh.exec:\btbbhh.exe109⤵PID:1376
-
\??\c:\bhhhhh.exec:\bhhhhh.exe110⤵PID:2920
-
\??\c:\ntntnb.exec:\ntntnb.exe111⤵PID:1796
-
\??\c:\1pvvv.exec:\1pvvv.exe112⤵PID:896
-
\??\c:\9vppj.exec:\9vppj.exe113⤵PID:2000
-
\??\c:\rllxrfx.exec:\rllxrfx.exe114⤵PID:2008
-
\??\c:\1ntnhb.exec:\1ntnhb.exe115⤵PID:2084
-
\??\c:\1htnnb.exec:\1htnnb.exe116⤵PID:2340
-
\??\c:\nbbnhb.exec:\nbbnhb.exe117⤵PID:2696
-
\??\c:\jdpjj.exec:\jdpjj.exe118⤵PID:2788
-
\??\c:\pvdvd.exec:\pvdvd.exe119⤵PID:2644
-
\??\c:\1lxxxfl.exec:\1lxxxfl.exe120⤵PID:2600
-
\??\c:\9xlrxrx.exec:\9xlrxrx.exe121⤵PID:2500
-
\??\c:\bnnnnn.exec:\bnnnnn.exe122⤵PID:2464
-
\??\c:\9bnhnb.exec:\9bnhnb.exe123⤵PID:2520
-
\??\c:\jvjpp.exec:\jvjpp.exe124⤵PID:2880
-
\??\c:\vjvpp.exec:\vjvpp.exe125⤵PID:1628
-
\??\c:\rxffxff.exec:\rxffxff.exe126⤵PID:308
-
\??\c:\rxlflfx.exec:\rxlflfx.exe127⤵PID:2864
-
\??\c:\hbhhtb.exec:\hbhhtb.exe128⤵PID:2764
-
\??\c:\nhbnhh.exec:\nhbnhh.exe129⤵PID:2760
-
\??\c:\ppvpp.exec:\ppvpp.exe130⤵PID:1820
-
\??\c:\vjvvv.exec:\vjvvv.exe131⤵PID:1252
-
\??\c:\rlxxxrr.exec:\rlxxxrr.exe132⤵PID:2208
-
\??\c:\3frlrrx.exec:\3frlrrx.exe133⤵PID:2180
-
\??\c:\3hthht.exec:\3hthht.exe134⤵PID:304
-
\??\c:\bnttnh.exec:\bnttnh.exe135⤵PID:900
-
\??\c:\pjdjv.exec:\pjdjv.exe136⤵PID:1220
-
\??\c:\pjvpv.exec:\pjvpv.exe137⤵PID:2252
-
\??\c:\vjvvv.exec:\vjvvv.exe138⤵PID:2064
-
\??\c:\rlrxrll.exec:\rlrxrll.exe139⤵PID:2816
-
\??\c:\frxffff.exec:\frxffff.exe140⤵PID:2256
-
\??\c:\tnttnh.exec:\tnttnh.exe141⤵PID:1832
-
\??\c:\pjpvv.exec:\pjpvv.exe142⤵PID:1476
-
\??\c:\djpdv.exec:\djpdv.exe143⤵PID:3000
-
\??\c:\pdpdv.exec:\pdpdv.exe144⤵PID:1488
-
\??\c:\rflxxrx.exec:\rflxxrx.exe145⤵PID:548
-
\??\c:\fxffllx.exec:\fxffllx.exe146⤵PID:1804
-
\??\c:\hthntt.exec:\hthntt.exe147⤵PID:3040
-
\??\c:\5nnnth.exec:\5nnnth.exe148⤵PID:1056
-
\??\c:\9jddp.exec:\9jddp.exe149⤵PID:1540
-
\??\c:\vjpjj.exec:\vjpjj.exe150⤵PID:868
-
\??\c:\5fxflrf.exec:\5fxflrf.exe151⤵PID:2936
-
\??\c:\lxlrfrx.exec:\lxlrfrx.exe152⤵PID:3012
-
\??\c:\5htbhb.exec:\5htbhb.exe153⤵PID:2884
-
\??\c:\7dppv.exec:\7dppv.exe154⤵PID:1608
-
\??\c:\3pjjv.exec:\3pjjv.exe155⤵PID:2664
-
\??\c:\jdvdd.exec:\jdvdd.exe156⤵PID:2956
-
\??\c:\9rrrrxl.exec:\9rrrrxl.exe157⤵PID:2928
-
\??\c:\fxfrxxl.exec:\fxfrxxl.exe158⤵PID:3004
-
\??\c:\hbhnhn.exec:\hbhnhn.exe159⤵PID:2784
-
\??\c:\9tbhhh.exec:\9tbhhh.exe160⤵PID:2648
-
\??\c:\jjddp.exec:\jjddp.exe161⤵PID:1152
-
\??\c:\jjpdv.exec:\jjpdv.exe162⤵PID:2720
-
\??\c:\5rrlrrx.exec:\5rrlrrx.exe163⤵PID:2700
-
\??\c:\5xlllfl.exec:\5xlllfl.exe164⤵PID:2604
-
\??\c:\ttnhtt.exec:\ttnhtt.exe165⤵PID:2520
-
\??\c:\tbbhhh.exec:\tbbhhh.exe166⤵PID:2872
-
\??\c:\5jdvv.exec:\5jdvv.exe167⤵PID:2892
-
\??\c:\ppdjp.exec:\ppdjp.exe168⤵PID:2624
-
\??\c:\ddppv.exec:\ddppv.exe169⤵PID:2748
-
\??\c:\xlxxlff.exec:\xlxxlff.exe170⤵PID:2724
-
\??\c:\bbtbnb.exec:\bbtbnb.exe171⤵PID:380
-
\??\c:\tnttnn.exec:\tnttnn.exe172⤵PID:1940
-
\??\c:\hbnbtb.exec:\hbnbtb.exe173⤵PID:828
-
\??\c:\vpvvd.exec:\vpvvd.exe174⤵PID:2216
-
\??\c:\lxllrxf.exec:\lxllrxf.exe175⤵PID:2400
-
\??\c:\3lffllx.exec:\3lffllx.exe176⤵PID:304
-
\??\c:\9hbthn.exec:\9hbthn.exe177⤵PID:1684
-
\??\c:\hbtbnn.exec:\hbtbnn.exe178⤵PID:2088
-
\??\c:\dvjpv.exec:\dvjpv.exe179⤵PID:2244
-
\??\c:\vvjjp.exec:\vvjjp.exe180⤵PID:2352
-
\??\c:\5rfrxfr.exec:\5rfrxfr.exe181⤵PID:2036
-
\??\c:\9xlffxx.exec:\9xlffxx.exe182⤵PID:484
-
\??\c:\llfrxfr.exec:\llfrxfr.exe183⤵PID:936
-
\??\c:\tnnntt.exec:\tnnntt.exe184⤵PID:1752
-
\??\c:\btbhtt.exec:\btbhtt.exe185⤵PID:3000
-
\??\c:\pjpjv.exec:\pjpjv.exe186⤵PID:2156
-
\??\c:\dvddp.exec:\dvddp.exe187⤵PID:2132
-
\??\c:\5xllllr.exec:\5xllllr.exe188⤵PID:1132
-
\??\c:\fxflfff.exec:\fxflfff.exe189⤵PID:920
-
\??\c:\nhbhtn.exec:\nhbhtn.exe190⤵PID:916
-
\??\c:\htbnnb.exec:\htbnnb.exe191⤵PID:564
-
\??\c:\ddpjv.exec:\ddpjv.exe192⤵PID:2140
-
\??\c:\pjppp.exec:\pjppp.exe193⤵PID:2336
-
\??\c:\rlfflll.exec:\rlfflll.exe194⤵PID:2020
-
\??\c:\lxllrrr.exec:\lxllrrr.exe195⤵PID:2832
-
\??\c:\hhthnh.exec:\hhthnh.exe196⤵PID:1608
-
\??\c:\tthbhh.exec:\tthbhh.exe197⤵PID:1720
-
\??\c:\jdvvj.exec:\jdvvj.exe198⤵PID:2584
-
\??\c:\1pddd.exec:\1pddd.exe199⤵PID:2656
-
\??\c:\fxxxllr.exec:\fxxxllr.exe200⤵PID:2772
-
\??\c:\nhthtn.exec:\nhthtn.exe201⤵PID:2692
-
\??\c:\vpvvj.exec:\vpvvj.exe202⤵PID:2712
-
\??\c:\ddvpv.exec:\ddvpv.exe203⤵PID:2636
-
\??\c:\xfrrflr.exec:\xfrrflr.exe204⤵PID:2488
-
\??\c:\fxlfrrl.exec:\fxlfrrl.exe205⤵PID:2508
-
\??\c:\thhbbt.exec:\thhbbt.exe206⤵PID:2576
-
\??\c:\jjvvj.exec:\jjvvj.exe207⤵PID:2632
-
\??\c:\1vjjd.exec:\1vjjd.exe208⤵PID:1528
-
\??\c:\xxlrlxl.exec:\xxlrlxl.exe209⤵PID:1896
-
\??\c:\lfxlxxf.exec:\lfxlxxf.exe210⤵PID:2616
-
\??\c:\3pjjp.exec:\3pjjp.exe211⤵PID:2888
-
\??\c:\vpdvd.exec:\vpdvd.exe212⤵PID:1040
-
\??\c:\5lflrrf.exec:\5lflrrf.exe213⤵PID:1964
-
\??\c:\rlrfrrf.exec:\rlrfrrf.exe214⤵PID:1552
-
\??\c:\bbnbnt.exec:\bbnbnt.exe215⤵PID:2188
-
\??\c:\5nhhbb.exec:\5nhhbb.exe216⤵PID:1632
-
\??\c:\pjpvd.exec:\pjpvd.exe217⤵PID:1420
-
\??\c:\lfrxrrr.exec:\lfrxrrr.exe218⤵PID:1640
-
\??\c:\frxlxxf.exec:\frxlxxf.exe219⤵PID:2804
-
\??\c:\bthntt.exec:\bthntt.exe220⤵PID:2228
-
\??\c:\3htntt.exec:\3htntt.exe221⤵PID:1984
-
\??\c:\jvjdd.exec:\jvjdd.exe222⤵PID:2424
-
\??\c:\1jppp.exec:\1jppp.exe223⤵PID:984
-
\??\c:\pdpjp.exec:\pdpjp.exe224⤵PID:1324
-
\??\c:\rlfrfrf.exec:\rlfrfrf.exe225⤵PID:584
-
\??\c:\ntbnnt.exec:\ntbnnt.exe226⤵PID:644
-
\??\c:\nbbbhb.exec:\nbbbhb.exe227⤵PID:1332
-
\??\c:\1dvpp.exec:\1dvpp.exe228⤵PID:692
-
\??\c:\5vdvj.exec:\5vdvj.exe229⤵PID:2044
-
\??\c:\lfxffll.exec:\lfxffll.exe230⤵PID:1828
-
\??\c:\fxlllfl.exec:\fxlllfl.exe231⤵PID:2824
-
\??\c:\nbnthb.exec:\nbnthb.exe232⤵PID:2952
-
\??\c:\hthnbb.exec:\hthnbb.exe233⤵PID:2072
-
\??\c:\pjvpv.exec:\pjvpv.exe234⤵PID:2140
-
\??\c:\dpdjj.exec:\dpdjj.exe235⤵PID:1724
-
\??\c:\rlfxrrr.exec:\rlfxrrr.exe236⤵PID:2900
-
\??\c:\3rlrxxl.exec:\3rlrxxl.exe237⤵PID:2008
-
\??\c:\tnhnbb.exec:\tnhnbb.exe238⤵PID:2852
-
\??\c:\bthhnn.exec:\bthhnn.exe239⤵PID:1856
-
\??\c:\1djjj.exec:\1djjj.exe240⤵PID:2344
-
\??\c:\vvjjv.exec:\vvjjv.exe241⤵PID:2544
-
\??\c:\lfrlfxf.exec:\lfrlfxf.exe242⤵PID:2556