Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe
-
Size
78KB
-
MD5
b53ca77d93aa375e784b1c829c81bc20
-
SHA1
72db479b258cac152c3733bb88ed8d04d0e4c624
-
SHA256
52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482
-
SHA512
3f3a82b4ce5b7c9776c01790c81714f1eaea8a943972940d089dd808c937a493850a43f5feaddab331e72a75c5b4de2c5117b0ca34b9ad00825f566dcdc14d44
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wVEJjOBoo:ymb3NkkiQ3mdBjF+3TU2KEJjE/
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2428-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2296-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2204-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3060-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2512-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1620-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1084-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1252-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pjvdj.exerlrfxlr.exehbtnnn.exe3pdjp.exerlfrfrl.exerffxxrx.exeddjpv.exe9xrrxxl.exe5xxrflx.exe1thhbb.exe1dvvv.exedpddd.exe1lllfxl.exehbhtbb.exevpjdp.exe3vjdv.exe9lflrxl.exerrfxflr.exehtnbhh.exe3bbhnh.exe1dpjj.exevvjjp.exerlxlrrx.exe1hbthh.exebtnbhn.exe5pdpp.exelflxffr.exebbnhtb.exenhtbhh.exepjdpp.exe3llfrxl.exellxlxfr.exehbntbh.exejdvdd.exe9jvpv.exexrxxrxx.exelxfxxrl.exenhhntt.exe7bttbb.exedppvd.exejvjjj.exerlffrrf.exelfrlrlr.exehbhntb.exebtnbnn.exeppjdp.exejvdjp.exexrfrlfr.exexrflrxf.exetnbbhh.exe9nbhnt.exe7btntt.exeppjdd.exefxxrxlf.exexrfrfll.exeffxrrrr.exenhhbhh.exetnbbnn.exejdvjv.exejvvdj.exefrffffl.exelfxrxxf.exe5bntbb.exe7nhbhb.exepid process 2296 pjvdj.exe 2216 rlrfxlr.exe 2204 hbtnnn.exe 3060 3pdjp.exe 2704 rlfrfrl.exe 2672 rffxxrx.exe 2552 ddjpv.exe 2652 9xrrxxl.exe 2512 5xxrflx.exe 2948 1thhbb.exe 2964 1dvvv.exe 1796 dpddd.exe 1952 1lllfxl.exe 2016 hbhtbb.exe 1832 vpjdp.exe 2492 3vjdv.exe 1620 9lflrxl.exe 1532 rrfxflr.exe 2844 htnbhh.exe 2268 3bbhnh.exe 1084 1dpjj.exe 484 vvjjp.exe 1268 rlxlrrx.exe 592 1hbthh.exe 1784 btnbhn.exe 1600 5pdpp.exe 1616 lflxffr.exe 1252 bbnhtb.exe 3008 nhtbhh.exe 976 pjdpp.exe 1704 3llfrxl.exe 3012 llxlxfr.exe 2424 hbntbh.exe 1584 jdvdd.exe 2984 9jvpv.exe 2188 xrxxrxx.exe 2212 lxfxxrl.exe 2796 nhhntt.exe 2656 7bttbb.exe 2724 dppvd.exe 2704 jvjjj.exe 2788 rlffrrf.exe 2616 lfrlrlr.exe 2680 hbhntb.exe 2516 btnbnn.exe 2592 ppjdp.exe 2512 jvdjp.exe 2948 xrfrlfr.exe 1316 xrflrxf.exe 1652 tnbbhh.exe 1772 9nbhnt.exe 1720 7btntt.exe 1456 ppjdd.exe 1724 fxxrxlf.exe 2820 xrfrfll.exe 1544 ffxrrrr.exe 2940 nhhbhh.exe 1264 tnbbnn.exe 1260 jdvjv.exe 2316 jvvdj.exe 780 frffffl.exe 1164 lfxrxxf.exe 356 5bntbb.exe 632 7nhbhb.exe -
Processes:
resource yara_rule behavioral1/memory/2428-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1620-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1084-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1252-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-304-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exepjvdj.exerlrfxlr.exehbtnnn.exe3pdjp.exerlfrfrl.exerffxxrx.exeddjpv.exe9xrrxxl.exe5xxrflx.exe1thhbb.exe1dvvv.exedpddd.exe1lllfxl.exehbhtbb.exevpjdp.exedescription pid process target process PID 2428 wrote to memory of 2296 2428 52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe pjvdj.exe PID 2428 wrote to memory of 2296 2428 52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe pjvdj.exe PID 2428 wrote to memory of 2296 2428 52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe pjvdj.exe PID 2428 wrote to memory of 2296 2428 52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe pjvdj.exe PID 2296 wrote to memory of 2216 2296 pjvdj.exe rlrfxlr.exe PID 2296 wrote to memory of 2216 2296 pjvdj.exe rlrfxlr.exe PID 2296 wrote to memory of 2216 2296 pjvdj.exe rlrfxlr.exe PID 2296 wrote to memory of 2216 2296 pjvdj.exe rlrfxlr.exe PID 2216 wrote to memory of 2204 2216 rlrfxlr.exe hbtnnn.exe PID 2216 wrote to memory of 2204 2216 rlrfxlr.exe hbtnnn.exe PID 2216 wrote to memory of 2204 2216 rlrfxlr.exe hbtnnn.exe PID 2216 wrote to memory of 2204 2216 rlrfxlr.exe hbtnnn.exe PID 2204 wrote to memory of 3060 2204 hbtnnn.exe 3pdjp.exe PID 2204 wrote to memory of 3060 2204 hbtnnn.exe 3pdjp.exe PID 2204 wrote to memory of 3060 2204 hbtnnn.exe 3pdjp.exe PID 2204 wrote to memory of 3060 2204 hbtnnn.exe 3pdjp.exe PID 3060 wrote to memory of 2704 3060 3pdjp.exe rlfrfrl.exe PID 3060 wrote to memory of 2704 3060 3pdjp.exe rlfrfrl.exe PID 3060 wrote to memory of 2704 3060 3pdjp.exe rlfrfrl.exe PID 3060 wrote to memory of 2704 3060 3pdjp.exe rlfrfrl.exe PID 2704 wrote to memory of 2672 2704 rlfrfrl.exe rffxxrx.exe PID 2704 wrote to memory of 2672 2704 rlfrfrl.exe rffxxrx.exe PID 2704 wrote to memory of 2672 2704 rlfrfrl.exe rffxxrx.exe PID 2704 wrote to memory of 2672 2704 rlfrfrl.exe rffxxrx.exe PID 2672 wrote to memory of 2552 2672 rffxxrx.exe ddjpv.exe PID 2672 wrote to memory of 2552 2672 rffxxrx.exe ddjpv.exe PID 2672 wrote to memory of 2552 2672 rffxxrx.exe ddjpv.exe PID 2672 wrote to memory of 2552 2672 rffxxrx.exe ddjpv.exe PID 2552 wrote to memory of 2652 2552 ddjpv.exe 9xrrxxl.exe PID 2552 wrote to memory of 2652 2552 ddjpv.exe 9xrrxxl.exe PID 2552 wrote to memory of 2652 2552 ddjpv.exe 9xrrxxl.exe PID 2552 wrote to memory of 2652 2552 ddjpv.exe 9xrrxxl.exe PID 2652 wrote to memory of 2512 2652 9xrrxxl.exe 5xxrflx.exe PID 2652 wrote to memory of 2512 2652 9xrrxxl.exe 5xxrflx.exe PID 2652 wrote to memory of 2512 2652 9xrrxxl.exe 5xxrflx.exe PID 2652 wrote to memory of 2512 2652 9xrrxxl.exe 5xxrflx.exe PID 2512 wrote to memory of 2948 2512 5xxrflx.exe 1thhbb.exe PID 2512 wrote to memory of 2948 2512 5xxrflx.exe 1thhbb.exe PID 2512 wrote to memory of 2948 2512 5xxrflx.exe 1thhbb.exe PID 2512 wrote to memory of 2948 2512 5xxrflx.exe 1thhbb.exe PID 2948 wrote to memory of 2964 2948 1thhbb.exe 1dvvv.exe PID 2948 wrote to memory of 2964 2948 1thhbb.exe 1dvvv.exe PID 2948 wrote to memory of 2964 2948 1thhbb.exe 1dvvv.exe PID 2948 wrote to memory of 2964 2948 1thhbb.exe 1dvvv.exe PID 2964 wrote to memory of 1796 2964 1dvvv.exe dpddd.exe PID 2964 wrote to memory of 1796 2964 1dvvv.exe dpddd.exe PID 2964 wrote to memory of 1796 2964 1dvvv.exe dpddd.exe PID 2964 wrote to memory of 1796 2964 1dvvv.exe dpddd.exe PID 1796 wrote to memory of 1952 1796 dpddd.exe 1lllfxl.exe PID 1796 wrote to memory of 1952 1796 dpddd.exe 1lllfxl.exe PID 1796 wrote to memory of 1952 1796 dpddd.exe 1lllfxl.exe PID 1796 wrote to memory of 1952 1796 dpddd.exe 1lllfxl.exe PID 1952 wrote to memory of 2016 1952 1lllfxl.exe hbhtbb.exe PID 1952 wrote to memory of 2016 1952 1lllfxl.exe hbhtbb.exe PID 1952 wrote to memory of 2016 1952 1lllfxl.exe hbhtbb.exe PID 1952 wrote to memory of 2016 1952 1lllfxl.exe hbhtbb.exe PID 2016 wrote to memory of 1832 2016 hbhtbb.exe vpjdp.exe PID 2016 wrote to memory of 1832 2016 hbhtbb.exe vpjdp.exe PID 2016 wrote to memory of 1832 2016 hbhtbb.exe vpjdp.exe PID 2016 wrote to memory of 1832 2016 hbhtbb.exe vpjdp.exe PID 1832 wrote to memory of 2492 1832 vpjdp.exe 3vjdv.exe PID 1832 wrote to memory of 2492 1832 vpjdp.exe 3vjdv.exe PID 1832 wrote to memory of 2492 1832 vpjdp.exe 3vjdv.exe PID 1832 wrote to memory of 2492 1832 vpjdp.exe 3vjdv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\52b86466f88d2dd6b14f25da7f11a12fbe02f5b2368d6e777acb4799eb88f482_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\pjvdj.exec:\pjvdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
\??\c:\rlrfxlr.exec:\rlrfxlr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\hbtnnn.exec:\hbtnnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\3pdjp.exec:\3pdjp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\rlfrfrl.exec:\rlfrfrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\rffxxrx.exec:\rffxxrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\ddjpv.exec:\ddjpv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\9xrrxxl.exec:\9xrrxxl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\5xxrflx.exec:\5xxrflx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\1thhbb.exec:\1thhbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\1dvvv.exec:\1dvvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\dpddd.exec:\dpddd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\1lllfxl.exec:\1lllfxl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\hbhtbb.exec:\hbhtbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\vpjdp.exec:\vpjdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\3vjdv.exec:\3vjdv.exe17⤵
- Executes dropped EXE
PID:2492 -
\??\c:\9lflrxl.exec:\9lflrxl.exe18⤵
- Executes dropped EXE
PID:1620 -
\??\c:\rrfxflr.exec:\rrfxflr.exe19⤵
- Executes dropped EXE
PID:1532 -
\??\c:\htnbhh.exec:\htnbhh.exe20⤵
- Executes dropped EXE
PID:2844 -
\??\c:\3bbhnh.exec:\3bbhnh.exe21⤵
- Executes dropped EXE
PID:2268 -
\??\c:\1dpjj.exec:\1dpjj.exe22⤵
- Executes dropped EXE
PID:1084 -
\??\c:\vvjjp.exec:\vvjjp.exe23⤵
- Executes dropped EXE
PID:484 -
\??\c:\rlxlrrx.exec:\rlxlrrx.exe24⤵
- Executes dropped EXE
PID:1268 -
\??\c:\1hbthh.exec:\1hbthh.exe25⤵
- Executes dropped EXE
PID:592 -
\??\c:\btnbhn.exec:\btnbhn.exe26⤵
- Executes dropped EXE
PID:1784 -
\??\c:\5pdpp.exec:\5pdpp.exe27⤵
- Executes dropped EXE
PID:1600 -
\??\c:\lflxffr.exec:\lflxffr.exe28⤵
- Executes dropped EXE
PID:1616 -
\??\c:\bbnhtb.exec:\bbnhtb.exe29⤵
- Executes dropped EXE
PID:1252 -
\??\c:\nhtbhh.exec:\nhtbhh.exe30⤵
- Executes dropped EXE
PID:3008 -
\??\c:\pjdpp.exec:\pjdpp.exe31⤵
- Executes dropped EXE
PID:976 -
\??\c:\3llfrxl.exec:\3llfrxl.exe32⤵
- Executes dropped EXE
PID:1704 -
\??\c:\llxlxfr.exec:\llxlxfr.exe33⤵
- Executes dropped EXE
PID:3012 -
\??\c:\hbntbh.exec:\hbntbh.exe34⤵
- Executes dropped EXE
PID:2424 -
\??\c:\jdvdd.exec:\jdvdd.exe35⤵
- Executes dropped EXE
PID:1584 -
\??\c:\9jvpv.exec:\9jvpv.exe36⤵
- Executes dropped EXE
PID:2984 -
\??\c:\xrxxrxx.exec:\xrxxrxx.exe37⤵
- Executes dropped EXE
PID:2188 -
\??\c:\lxfxxrl.exec:\lxfxxrl.exe38⤵
- Executes dropped EXE
PID:2212 -
\??\c:\nhhntt.exec:\nhhntt.exe39⤵
- Executes dropped EXE
PID:2796 -
\??\c:\7bttbb.exec:\7bttbb.exe40⤵
- Executes dropped EXE
PID:2656 -
\??\c:\dppvd.exec:\dppvd.exe41⤵
- Executes dropped EXE
PID:2724 -
\??\c:\jvjjj.exec:\jvjjj.exe42⤵
- Executes dropped EXE
PID:2704 -
\??\c:\rlffrrf.exec:\rlffrrf.exe43⤵
- Executes dropped EXE
PID:2788 -
\??\c:\lfrlrlr.exec:\lfrlrlr.exe44⤵
- Executes dropped EXE
PID:2616 -
\??\c:\hbhntb.exec:\hbhntb.exe45⤵
- Executes dropped EXE
PID:2680 -
\??\c:\btnbnn.exec:\btnbnn.exe46⤵
- Executes dropped EXE
PID:2516 -
\??\c:\ppjdp.exec:\ppjdp.exe47⤵
- Executes dropped EXE
PID:2592 -
\??\c:\jvdjp.exec:\jvdjp.exe48⤵
- Executes dropped EXE
PID:2512 -
\??\c:\xrfrlfr.exec:\xrfrlfr.exe49⤵
- Executes dropped EXE
PID:2948 -
\??\c:\xrflrxf.exec:\xrflrxf.exe50⤵
- Executes dropped EXE
PID:1316 -
\??\c:\tnbbhh.exec:\tnbbhh.exe51⤵
- Executes dropped EXE
PID:1652 -
\??\c:\9nbhnt.exec:\9nbhnt.exe52⤵
- Executes dropped EXE
PID:1772 -
\??\c:\7btntt.exec:\7btntt.exe53⤵
- Executes dropped EXE
PID:1720 -
\??\c:\ppjdd.exec:\ppjdd.exe54⤵
- Executes dropped EXE
PID:1456 -
\??\c:\fxxrxlf.exec:\fxxrxlf.exe55⤵
- Executes dropped EXE
PID:1724 -
\??\c:\xrfrfll.exec:\xrfrfll.exe56⤵
- Executes dropped EXE
PID:2820 -
\??\c:\ffxrrrr.exec:\ffxrrrr.exe57⤵
- Executes dropped EXE
PID:1544 -
\??\c:\nhhbhh.exec:\nhhbhh.exe58⤵
- Executes dropped EXE
PID:2940 -
\??\c:\tnbbnn.exec:\tnbbnn.exe59⤵
- Executes dropped EXE
PID:1264 -
\??\c:\jdvjv.exec:\jdvjv.exe60⤵
- Executes dropped EXE
PID:1260 -
\??\c:\jvvdj.exec:\jvvdj.exe61⤵
- Executes dropped EXE
PID:2316 -
\??\c:\frffffl.exec:\frffffl.exe62⤵
- Executes dropped EXE
PID:780 -
\??\c:\lfxrxxf.exec:\lfxrxxf.exe63⤵
- Executes dropped EXE
PID:1164 -
\??\c:\5bntbb.exec:\5bntbb.exe64⤵
- Executes dropped EXE
PID:356 -
\??\c:\7nhbhb.exec:\7nhbhb.exe65⤵
- Executes dropped EXE
PID:632 -
\??\c:\pjdvd.exec:\pjdvd.exe66⤵PID:2312
-
\??\c:\vjdvp.exec:\vjdvp.exe67⤵PID:1404
-
\??\c:\1xrflll.exec:\1xrflll.exe68⤵PID:1848
-
\??\c:\xxxrlfx.exec:\xxxrlfx.exe69⤵PID:892
-
\??\c:\hhbtbb.exec:\hhbtbb.exe70⤵PID:3056
-
\??\c:\thtnbt.exec:\thtnbt.exe71⤵PID:2392
-
\??\c:\jdpjj.exec:\jdpjj.exe72⤵PID:604
-
\??\c:\jdjjp.exec:\jdjjp.exe73⤵PID:1000
-
\??\c:\3xffrxf.exec:\3xffrxf.exe74⤵PID:1056
-
\??\c:\5llxfll.exec:\5llxfll.exe75⤵PID:2160
-
\??\c:\bnbhhh.exec:\bnbhhh.exe76⤵PID:2148
-
\??\c:\nnbbnh.exec:\nnbbnh.exe77⤵PID:2424
-
\??\c:\vpdvv.exec:\vpdvv.exe78⤵PID:2988
-
\??\c:\vvjjp.exec:\vvjjp.exe79⤵PID:2984
-
\??\c:\fxrlllr.exec:\fxrlllr.exe80⤵PID:2440
-
\??\c:\9xxfxfr.exec:\9xxfxfr.exe81⤵PID:2212
-
\??\c:\tnnnbh.exec:\tnnnbh.exe82⤵PID:2176
-
\??\c:\nhbbnn.exec:\nhbbnn.exe83⤵PID:2656
-
\??\c:\9vvvv.exec:\9vvvv.exe84⤵PID:2748
-
\??\c:\9vjdj.exec:\9vjdj.exe85⤵PID:2800
-
\??\c:\fxlxrxx.exec:\fxlxrxx.exe86⤵PID:2632
-
\??\c:\xrfrxlf.exec:\xrfrxlf.exe87⤵PID:2616
-
\??\c:\5rllllr.exec:\5rllllr.exe88⤵PID:2564
-
\??\c:\1htntt.exec:\1htntt.exe89⤵PID:2520
-
\??\c:\bnbbhb.exec:\bnbbhb.exe90⤵PID:2588
-
\??\c:\dvvdv.exec:\dvvdv.exe91⤵PID:2512
-
\??\c:\3pjjp.exec:\3pjjp.exe92⤵PID:1984
-
\??\c:\xxllrfl.exec:\xxllrfl.exe93⤵PID:544
-
\??\c:\xxffllr.exec:\xxffllr.exe94⤵PID:344
-
\??\c:\tnbhtt.exec:\tnbhtt.exe95⤵PID:1772
-
\??\c:\9bbnnn.exec:\9bbnnn.exe96⤵PID:2256
-
\??\c:\7jdpv.exec:\7jdpv.exe97⤵PID:1456
-
\??\c:\vjvdd.exec:\vjvdd.exe98⤵PID:304
-
\??\c:\3xlfffr.exec:\3xlfffr.exe99⤵PID:2820
-
\??\c:\rlrllfl.exec:\rlrllfl.exe100⤵PID:1572
-
\??\c:\bntbnt.exec:\bntbnt.exe101⤵PID:2836
-
\??\c:\hhbhnn.exec:\hhbhnn.exe102⤵PID:3064
-
\??\c:\3jddd.exec:\3jddd.exe103⤵PID:2556
-
\??\c:\5pddj.exec:\5pddj.exe104⤵PID:2056
-
\??\c:\rlxrrrl.exec:\rlxrrrl.exe105⤵PID:780
-
\??\c:\xlrrlrr.exec:\xlrrlrr.exe106⤵PID:988
-
\??\c:\nntthh.exec:\nntthh.exe107⤵PID:356
-
\??\c:\9bnhhn.exec:\9bnhhn.exe108⤵PID:1676
-
\??\c:\btbbtt.exec:\btbbtt.exe109⤵PID:2312
-
\??\c:\3jpjv.exec:\3jpjv.exe110⤵PID:944
-
\??\c:\dvjpv.exec:\dvjpv.exe111⤵PID:1640
-
\??\c:\xrlrffl.exec:\xrlrffl.exe112⤵PID:828
-
\??\c:\5xfxfxf.exec:\5xfxfxf.exe113⤵PID:3056
-
\??\c:\nhthhh.exec:\nhthhh.exe114⤵PID:1252
-
\??\c:\bttttb.exec:\bttttb.exe115⤵PID:2280
-
\??\c:\dvdpp.exec:\dvdpp.exe116⤵PID:2896
-
\??\c:\vjppp.exec:\vjppp.exe117⤵PID:1040
-
\??\c:\frrrxxf.exec:\frrrxxf.exe118⤵PID:2160
-
\??\c:\lfxxrxx.exec:\lfxxrxx.exe119⤵PID:2132
-
\??\c:\tbntth.exec:\tbntth.exe120⤵PID:2916
-
\??\c:\nhtnnh.exec:\nhtnnh.exe121⤵PID:2988
-
\??\c:\tnhbtn.exec:\tnhbtn.exe122⤵PID:2448
-
\??\c:\pdppv.exec:\pdppv.exe123⤵PID:2188
-
\??\c:\dpdvv.exec:\dpdvv.exe124⤵PID:2204
-
\??\c:\7rfrlfl.exec:\7rfrlfl.exe125⤵PID:2796
-
\??\c:\7xlxxlr.exec:\7xlxxlr.exe126⤵PID:2868
-
\??\c:\htbntn.exec:\htbntn.exe127⤵PID:2748
-
\??\c:\hbnnbh.exec:\hbnnbh.exe128⤵PID:2800
-
\??\c:\dvpdj.exec:\dvpdj.exe129⤵PID:2632
-
\??\c:\vjpvv.exec:\vjpvv.exe130⤵PID:2772
-
\??\c:\jjdjv.exec:\jjdjv.exe131⤵PID:2564
-
\??\c:\1lxxffl.exec:\1lxxffl.exe132⤵PID:2516
-
\??\c:\lxrflfl.exec:\lxrflfl.exe133⤵PID:812
-
\??\c:\bnnnbb.exec:\bnnnbb.exe134⤵PID:1996
-
\??\c:\9ntbbb.exec:\9ntbbb.exe135⤵PID:2948
-
\??\c:\vppvv.exec:\vppvv.exe136⤵PID:2700
-
\??\c:\vpddp.exec:\vpddp.exe137⤵PID:2252
-
\??\c:\fxfllll.exec:\fxfllll.exe138⤵PID:624
-
\??\c:\9xxfllr.exec:\9xxfllr.exe139⤵PID:1716
-
\??\c:\3bnhnn.exec:\3bnhnn.exe140⤵PID:1440
-
\??\c:\nhtbtb.exec:\nhtbtb.exe141⤵PID:304
-
\??\c:\9djjd.exec:\9djjd.exe142⤵PID:1624
-
\??\c:\dpjdd.exec:\dpjdd.exe143⤵PID:1572
-
\??\c:\1djjd.exec:\1djjd.exe144⤵PID:2328
-
\??\c:\xrxfxrr.exec:\xrxfxrr.exe145⤵PID:3064
-
\??\c:\5rfffff.exec:\5rfffff.exe146⤵PID:1260
-
\??\c:\5htbtt.exec:\5htbtt.exe147⤵PID:2056
-
\??\c:\thbbbt.exec:\thbbbt.exe148⤵PID:1144
-
\??\c:\vppvp.exec:\vppvp.exe149⤵PID:988
-
\??\c:\pjvdd.exec:\pjvdd.exe150⤵PID:1808
-
\??\c:\lxfffxf.exec:\lxfffxf.exe151⤵PID:1784
-
\??\c:\7rlflrx.exec:\7rlflrx.exe152⤵PID:1608
-
\??\c:\bnbhhh.exec:\bnbhhh.exe153⤵PID:1404
-
\??\c:\hbntnt.exec:\hbntnt.exe154⤵PID:940
-
\??\c:\7dvpp.exec:\7dvpp.exe155⤵PID:828
-
\??\c:\fxxxfll.exec:\fxxxfll.exe156⤵PID:1496
-
\??\c:\lxfflrr.exec:\lxfflrr.exe157⤵PID:1252
-
\??\c:\xrlrxfx.exec:\xrlrxfx.exe158⤵PID:604
-
\??\c:\1htttt.exec:\1htttt.exe159⤵PID:2428
-
\??\c:\nhttbt.exec:\nhttbt.exe160⤵PID:2920
-
\??\c:\ddvjp.exec:\ddvjp.exe161⤵PID:2160
-
\??\c:\pdjdd.exec:\pdjdd.exe162⤵PID:1288
-
\??\c:\xrrlllr.exec:\xrrlllr.exe163⤵PID:2200
-
\??\c:\1xrlrll.exec:\1xrlrll.exe164⤵PID:2412
-
\??\c:\bnbnnn.exec:\bnbnnn.exe165⤵PID:1284
-
\??\c:\hbhnhn.exec:\hbhnhn.exe166⤵PID:2440
-
\??\c:\ppdjj.exec:\ppdjj.exe167⤵PID:2204
-
\??\c:\jjdjp.exec:\jjdjp.exe168⤵PID:2176
-
\??\c:\xrxflfl.exec:\xrxflfl.exe169⤵PID:2868
-
\??\c:\rlrlllr.exec:\rlrlllr.exe170⤵PID:2872
-
\??\c:\htbnnn.exec:\htbnnn.exe171⤵PID:1736
-
\??\c:\9htbnt.exec:\9htbnt.exe172⤵PID:2552
-
\??\c:\7vjpp.exec:\7vjpp.exe173⤵PID:2684
-
\??\c:\dvpjp.exec:\dvpjp.exe174⤵PID:2952
-
\??\c:\7fxfrrr.exec:\7fxfrrr.exe175⤵PID:2516
-
\??\c:\fxllrrl.exec:\fxllrrl.exe176⤵PID:1696
-
\??\c:\nbnntt.exec:\nbnntt.exe177⤵PID:1796
-
\??\c:\9htntn.exec:\9htntn.exe178⤵PID:1984
-
\??\c:\vpjpp.exec:\vpjpp.exe179⤵PID:2024
-
\??\c:\vpjjv.exec:\vpjjv.exe180⤵PID:1652
-
\??\c:\rlrrxxl.exec:\rlrrxxl.exe181⤵PID:624
-
\??\c:\llxffll.exec:\llxffll.exe182⤵PID:1932
-
\??\c:\hththb.exec:\hththb.exe183⤵PID:1568
-
\??\c:\hbhhnh.exec:\hbhhnh.exe184⤵PID:1620
-
\??\c:\9pddd.exec:\9pddd.exe185⤵PID:2304
-
\??\c:\5dpdd.exec:\5dpdd.exe186⤵PID:2308
-
\??\c:\dpvvj.exec:\dpvvj.exe187⤵PID:2324
-
\??\c:\1llrrrx.exec:\1llrrrx.exe188⤵PID:536
-
\??\c:\5fxxffl.exec:\5fxxffl.exe189⤵PID:1260
-
\??\c:\nbnntn.exec:\nbnntn.exe190⤵PID:1076
-
\??\c:\tthhtn.exec:\tthhtn.exe191⤵PID:1144
-
\??\c:\dvjpv.exec:\dvjpv.exe192⤵PID:2500
-
\??\c:\dppvv.exec:\dppvv.exe193⤵PID:356
-
\??\c:\xrfxfxr.exec:\xrfxfxr.exe194⤵PID:1628
-
\??\c:\1lrrrrl.exec:\1lrrrrl.exe195⤵PID:1608
-
\??\c:\xxrfrxf.exec:\xxrfrxf.exe196⤵PID:944
-
\??\c:\hhtbth.exec:\hhtbth.exe197⤵PID:1640
-
\??\c:\3tbbtt.exec:\3tbbtt.exe198⤵PID:2192
-
\??\c:\ddjpv.exec:\ddjpv.exe199⤵PID:3056
-
\??\c:\ppjpv.exec:\ppjpv.exe200⤵PID:1700
-
\??\c:\xlrffxx.exec:\xlrffxx.exe201⤵PID:2280
-
\??\c:\1xfffxr.exec:\1xfffxr.exe202⤵PID:1948
-
\??\c:\hhhnnt.exec:\hhhnnt.exe203⤵PID:2920
-
\??\c:\7thbbb.exec:\7thbbb.exe204⤵PID:1560
-
\??\c:\thnnnh.exec:\thnnnh.exe205⤵PID:1288
-
\??\c:\jdjvv.exec:\jdjvv.exe206⤵PID:2480
-
\??\c:\3dvpp.exec:\3dvpp.exe207⤵PID:2988
-
\??\c:\xlxrxrx.exec:\xlxrxrx.exe208⤵PID:2720
-
\??\c:\lflrrlr.exec:\lflrrlr.exe209⤵PID:2188
-
\??\c:\3thnnt.exec:\3thnnt.exe210⤵PID:2876
-
\??\c:\thhhnh.exec:\thhhnh.exe211⤵PID:2176
-
\??\c:\pdddd.exec:\pdddd.exe212⤵PID:2704
-
\??\c:\vjpjj.exec:\vjpjj.exe213⤵PID:2872
-
\??\c:\jvpvj.exec:\jvpvj.exe214⤵PID:2628
-
\??\c:\5fxxxxx.exec:\5fxxxxx.exe215⤵PID:2616
-
\??\c:\rlxfrrf.exec:\rlxfrrf.exe216⤵PID:2684
-
\??\c:\3bnhhb.exec:\3bnhhb.exe217⤵PID:2564
-
\??\c:\thnnnt.exec:\thnnnt.exe218⤵PID:2516
-
\??\c:\pjvvv.exec:\pjvvv.exe219⤵PID:2512
-
\??\c:\7lxxxxr.exec:\7lxxxxr.exe220⤵PID:1796
-
\??\c:\rflxllr.exec:\rflxllr.exe221⤵PID:2948
-
\??\c:\rlrxxxf.exec:\rlrxxxf.exe222⤵PID:2024
-
\??\c:\7nhhhb.exec:\7nhhhb.exe223⤵PID:2256
-
\??\c:\htbbtn.exec:\htbbtn.exe224⤵PID:624
-
\??\c:\3dvpv.exec:\3dvpv.exe225⤵PID:1932
-
\??\c:\pdpjp.exec:\pdpjp.exe226⤵PID:1568
-
\??\c:\lxlfllr.exec:\lxlfllr.exe227⤵PID:2820
-
\??\c:\xffffxr.exec:\xffffxr.exe228⤵PID:2320
-
\??\c:\frxxffx.exec:\frxxffx.exe229⤵PID:2308
-
\??\c:\7tbnnn.exec:\7tbnnn.exe230⤵PID:2324
-
\??\c:\thbbnh.exec:\thbbnh.exe231⤵PID:572
-
\??\c:\9jvdp.exec:\9jvdp.exe232⤵PID:1488
-
\??\c:\5vvvd.exec:\5vvvd.exe233⤵PID:1860
-
\??\c:\lxrlfff.exec:\lxrlfff.exe234⤵PID:1144
-
\??\c:\rfllflr.exec:\rfllflr.exe235⤵PID:1924
-
\??\c:\bnnhnh.exec:\bnnhnh.exe236⤵PID:356
-
\??\c:\9bhnth.exec:\9bhnth.exe237⤵PID:844
-
\??\c:\tnbtbn.exec:\tnbtbn.exe238⤵PID:1608
-
\??\c:\pdvjp.exec:\pdvjp.exe239⤵PID:3036
-
\??\c:\vpjjj.exec:\vpjjj.exe240⤵PID:1640
-
\??\c:\1lrrrxl.exec:\1lrrrxl.exe241⤵PID:2192
-