Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 04:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exe
-
Size
75KB
-
MD5
ad46eef0f9632d6717ab0d088e2e9a40
-
SHA1
f256ce48e1b5e5732b0787c0f21f69f00483f09f
-
SHA256
051e2b017c6540f89a007a0459d023232c28076d332cd9e6ecc27ca3428c2f88
-
SHA512
d412051cd89a56f6ac502bf4b8a7c890b4092efacc2d102485cfb1991492d15eec4163f3803b9b8b40f38971099b2e30456754cc705030fea4efedb8e91581fb
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIoAh2QpUnX1AP5:ymb3NkkiQ3mdBjFIsIVbpUO5
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/1332-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5016-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4424-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4304-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/644-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3780-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/532-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/860-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4432-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3972-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3136-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1068-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3384-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4592-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4836-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/892-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1212-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1268-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3568-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3748-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/592-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2240-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jjjdd.exerrffffl.exehhhhtt.exe9tnbtn.exepvpdd.exevdjjp.exefrfxrrr.exehhbbbb.exebbtnhh.exe1jjdd.exe1fffxxx.exehtbbhh.exetntnhh.exevdddd.exejvjdd.exerllfxxx.exe1hnnhh.exedjjjp.exedjvdv.exexfffffx.exe3ntthb.exenthhtt.exevpvpj.exe5lllflf.exexffffff.exenhbthb.exejddvp.exelxxfrrl.exerxxxllx.exe5htntn.exevpdvp.exerlrrrrx.exebhnnnn.exe1nnntt.exe1vdvd.exellllflf.exexrxxxxf.exetbhbht.exe1tbbtt.exejddpd.exexlrlfxr.exerlrlffr.exehbttnh.exejvvvp.exedpddj.exefffrllx.exerlrlxrl.exethhbtt.exeddvvp.exerrffrxl.exelxrllfr.exebttthb.exe5pjdj.exejjpjj.exexllfrxl.exe5ffrffx.exetnhbnn.exebnbnhb.exeddjdv.exevjdvd.exerfffrlx.exelfrlxrl.exe7tnbtt.exepdpjd.exepid process 5016 jjjdd.exe 4424 rrffffl.exe 4304 hhhhtt.exe 644 9tnbtn.exe 3780 pvpdd.exe 532 vdjjp.exe 1480 frfxrrr.exe 860 hhbbbb.exe 4432 bbtnhh.exe 3972 1jjdd.exe 3480 1fffxxx.exe 3136 htbbhh.exe 1068 tntnhh.exe 4848 vdddd.exe 3384 jvjdd.exe 5076 rllfxxx.exe 2780 1hnnhh.exe 4592 djjjp.exe 212 djvdv.exe 4836 xfffffx.exe 3088 3ntthb.exe 892 nthhtt.exe 3624 vpvpj.exe 1212 5lllflf.exe 1268 xffffff.exe 2836 nhbthb.exe 3568 jddvp.exe 3748 lxxfrrl.exe 592 rxxxllx.exe 2556 5htntn.exe 2240 vpdvp.exe 3076 rlrrrrx.exe 232 bhnnnn.exe 184 1nnntt.exe 1888 1vdvd.exe 1640 llllflf.exe 2308 xrxxxxf.exe 4144 tbhbht.exe 4404 1tbbtt.exe 448 jddpd.exe 376 xlrlfxr.exe 972 rlrlffr.exe 2160 hbttnh.exe 644 jvvvp.exe 3780 dpddj.exe 4568 fffrllx.exe 4888 rlrlxrl.exe 912 thhbtt.exe 632 ddvvp.exe 3420 rrffrxl.exe 1476 lxrllfr.exe 3424 bttthb.exe 1364 5pjdj.exe 1976 jjpjj.exe 1532 xllfrxl.exe 556 5ffrffx.exe 2996 tnhbnn.exe 2952 bnbnhb.exe 4416 ddjdv.exe 3012 vjdvd.exe 3656 rfffrlx.exe 1580 lfrlxrl.exe 1892 7tnbtt.exe 2812 pdpjd.exe -
Processes:
resource yara_rule behavioral2/memory/1332-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5016-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4304-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/644-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3780-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/644-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/644-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/532-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/860-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4432-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3136-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1068-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3384-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4592-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/892-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1212-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1268-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3568-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3748-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/592-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2240-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exejjjdd.exerrffffl.exehhhhtt.exe9tnbtn.exepvpdd.exevdjjp.exefrfxrrr.exehhbbbb.exebbtnhh.exe1jjdd.exe1fffxxx.exehtbbhh.exetntnhh.exevdddd.exejvjdd.exerllfxxx.exe1hnnhh.exedjjjp.exedjvdv.exexfffffx.exe3ntthb.exedescription pid process target process PID 1332 wrote to memory of 5016 1332 ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exe jjjdd.exe PID 1332 wrote to memory of 5016 1332 ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exe jjjdd.exe PID 1332 wrote to memory of 5016 1332 ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exe jjjdd.exe PID 5016 wrote to memory of 4424 5016 jjjdd.exe rrffffl.exe PID 5016 wrote to memory of 4424 5016 jjjdd.exe rrffffl.exe PID 5016 wrote to memory of 4424 5016 jjjdd.exe rrffffl.exe PID 4424 wrote to memory of 4304 4424 rrffffl.exe hhhhtt.exe PID 4424 wrote to memory of 4304 4424 rrffffl.exe hhhhtt.exe PID 4424 wrote to memory of 4304 4424 rrffffl.exe hhhhtt.exe PID 4304 wrote to memory of 644 4304 hhhhtt.exe 9tnbtn.exe PID 4304 wrote to memory of 644 4304 hhhhtt.exe 9tnbtn.exe PID 4304 wrote to memory of 644 4304 hhhhtt.exe 9tnbtn.exe PID 644 wrote to memory of 3780 644 9tnbtn.exe pvpdd.exe PID 644 wrote to memory of 3780 644 9tnbtn.exe pvpdd.exe PID 644 wrote to memory of 3780 644 9tnbtn.exe pvpdd.exe PID 3780 wrote to memory of 532 3780 pvpdd.exe vdjjp.exe PID 3780 wrote to memory of 532 3780 pvpdd.exe vdjjp.exe PID 3780 wrote to memory of 532 3780 pvpdd.exe vdjjp.exe PID 532 wrote to memory of 1480 532 vdjjp.exe frfxrrr.exe PID 532 wrote to memory of 1480 532 vdjjp.exe frfxrrr.exe PID 532 wrote to memory of 1480 532 vdjjp.exe frfxrrr.exe PID 1480 wrote to memory of 860 1480 frfxrrr.exe hhbbbb.exe PID 1480 wrote to memory of 860 1480 frfxrrr.exe hhbbbb.exe PID 1480 wrote to memory of 860 1480 frfxrrr.exe hhbbbb.exe PID 860 wrote to memory of 4432 860 hhbbbb.exe bbtnhh.exe PID 860 wrote to memory of 4432 860 hhbbbb.exe bbtnhh.exe PID 860 wrote to memory of 4432 860 hhbbbb.exe bbtnhh.exe PID 4432 wrote to memory of 3972 4432 bbtnhh.exe 1jjdd.exe PID 4432 wrote to memory of 3972 4432 bbtnhh.exe 1jjdd.exe PID 4432 wrote to memory of 3972 4432 bbtnhh.exe 1jjdd.exe PID 3972 wrote to memory of 3480 3972 1jjdd.exe 1fffxxx.exe PID 3972 wrote to memory of 3480 3972 1jjdd.exe 1fffxxx.exe PID 3972 wrote to memory of 3480 3972 1jjdd.exe 1fffxxx.exe PID 3480 wrote to memory of 3136 3480 1fffxxx.exe htbbhh.exe PID 3480 wrote to memory of 3136 3480 1fffxxx.exe htbbhh.exe PID 3480 wrote to memory of 3136 3480 1fffxxx.exe htbbhh.exe PID 3136 wrote to memory of 1068 3136 htbbhh.exe tntnhh.exe PID 3136 wrote to memory of 1068 3136 htbbhh.exe tntnhh.exe PID 3136 wrote to memory of 1068 3136 htbbhh.exe tntnhh.exe PID 1068 wrote to memory of 4848 1068 tntnhh.exe vdddd.exe PID 1068 wrote to memory of 4848 1068 tntnhh.exe vdddd.exe PID 1068 wrote to memory of 4848 1068 tntnhh.exe vdddd.exe PID 4848 wrote to memory of 3384 4848 vdddd.exe jvjdd.exe PID 4848 wrote to memory of 3384 4848 vdddd.exe jvjdd.exe PID 4848 wrote to memory of 3384 4848 vdddd.exe jvjdd.exe PID 3384 wrote to memory of 5076 3384 jvjdd.exe rllfxxx.exe PID 3384 wrote to memory of 5076 3384 jvjdd.exe rllfxxx.exe PID 3384 wrote to memory of 5076 3384 jvjdd.exe rllfxxx.exe PID 5076 wrote to memory of 2780 5076 rllfxxx.exe 1hnnhh.exe PID 5076 wrote to memory of 2780 5076 rllfxxx.exe 1hnnhh.exe PID 5076 wrote to memory of 2780 5076 rllfxxx.exe 1hnnhh.exe PID 2780 wrote to memory of 4592 2780 1hnnhh.exe djjjp.exe PID 2780 wrote to memory of 4592 2780 1hnnhh.exe djjjp.exe PID 2780 wrote to memory of 4592 2780 1hnnhh.exe djjjp.exe PID 4592 wrote to memory of 212 4592 djjjp.exe djvdv.exe PID 4592 wrote to memory of 212 4592 djjjp.exe djvdv.exe PID 4592 wrote to memory of 212 4592 djjjp.exe djvdv.exe PID 212 wrote to memory of 4836 212 djvdv.exe xfffffx.exe PID 212 wrote to memory of 4836 212 djvdv.exe xfffffx.exe PID 212 wrote to memory of 4836 212 djvdv.exe xfffffx.exe PID 4836 wrote to memory of 3088 4836 xfffffx.exe 3ntthb.exe PID 4836 wrote to memory of 3088 4836 xfffffx.exe 3ntthb.exe PID 4836 wrote to memory of 3088 4836 xfffffx.exe 3ntthb.exe PID 3088 wrote to memory of 892 3088 3ntthb.exe nthhtt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ad46eef0f9632d6717ab0d088e2e9a40_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\jjjdd.exec:\jjjdd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\rrffffl.exec:\rrffffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\hhhhtt.exec:\hhhhtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
\??\c:\9tnbtn.exec:\9tnbtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\pvpdd.exec:\pvpdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
\??\c:\vdjjp.exec:\vdjjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\frfxrrr.exec:\frfxrrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
\??\c:\hhbbbb.exec:\hhbbbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
\??\c:\bbtnhh.exec:\bbtnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
\??\c:\1jjdd.exec:\1jjdd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\1fffxxx.exec:\1fffxxx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\htbbhh.exec:\htbbhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
\??\c:\tntnhh.exec:\tntnhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\vdddd.exec:\vdddd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\jvjdd.exec:\jvjdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\rllfxxx.exec:\rllfxxx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
\??\c:\1hnnhh.exec:\1hnnhh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\djjjp.exec:\djjjp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\djvdv.exec:\djvdv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\xfffffx.exec:\xfffffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\3ntthb.exec:\3ntthb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\nthhtt.exec:\nthhtt.exe23⤵
- Executes dropped EXE
PID:892 -
\??\c:\vpvpj.exec:\vpvpj.exe24⤵
- Executes dropped EXE
PID:3624 -
\??\c:\5lllflf.exec:\5lllflf.exe25⤵
- Executes dropped EXE
PID:1212 -
\??\c:\xffffff.exec:\xffffff.exe26⤵
- Executes dropped EXE
PID:1268 -
\??\c:\nhbthb.exec:\nhbthb.exe27⤵
- Executes dropped EXE
PID:2836 -
\??\c:\jddvp.exec:\jddvp.exe28⤵
- Executes dropped EXE
PID:3568 -
\??\c:\lxxfrrl.exec:\lxxfrrl.exe29⤵
- Executes dropped EXE
PID:3748 -
\??\c:\rxxxllx.exec:\rxxxllx.exe30⤵
- Executes dropped EXE
PID:592 -
\??\c:\5htntn.exec:\5htntn.exe31⤵
- Executes dropped EXE
PID:2556 -
\??\c:\vpdvp.exec:\vpdvp.exe32⤵
- Executes dropped EXE
PID:2240 -
\??\c:\rlrrrrx.exec:\rlrrrrx.exe33⤵
- Executes dropped EXE
PID:3076 -
\??\c:\bhnnnn.exec:\bhnnnn.exe34⤵
- Executes dropped EXE
PID:232 -
\??\c:\1nnntt.exec:\1nnntt.exe35⤵
- Executes dropped EXE
PID:184 -
\??\c:\1vdvd.exec:\1vdvd.exe36⤵
- Executes dropped EXE
PID:1888 -
\??\c:\llllflf.exec:\llllflf.exe37⤵
- Executes dropped EXE
PID:1640 -
\??\c:\xrxxxxf.exec:\xrxxxxf.exe38⤵
- Executes dropped EXE
PID:2308 -
\??\c:\tbhbht.exec:\tbhbht.exe39⤵
- Executes dropped EXE
PID:4144 -
\??\c:\1tbbtt.exec:\1tbbtt.exe40⤵
- Executes dropped EXE
PID:4404 -
\??\c:\jddpd.exec:\jddpd.exe41⤵
- Executes dropped EXE
PID:448 -
\??\c:\xlrlfxr.exec:\xlrlfxr.exe42⤵
- Executes dropped EXE
PID:376 -
\??\c:\rlrlffr.exec:\rlrlffr.exe43⤵
- Executes dropped EXE
PID:972 -
\??\c:\hbttnh.exec:\hbttnh.exe44⤵
- Executes dropped EXE
PID:2160 -
\??\c:\jvvvp.exec:\jvvvp.exe45⤵
- Executes dropped EXE
PID:644 -
\??\c:\dpddj.exec:\dpddj.exe46⤵
- Executes dropped EXE
PID:3780 -
\??\c:\fffrllx.exec:\fffrllx.exe47⤵
- Executes dropped EXE
PID:4568 -
\??\c:\rlrlxrl.exec:\rlrlxrl.exe48⤵
- Executes dropped EXE
PID:4888 -
\??\c:\thhbtt.exec:\thhbtt.exe49⤵
- Executes dropped EXE
PID:912 -
\??\c:\ddvvp.exec:\ddvvp.exe50⤵
- Executes dropped EXE
PID:632 -
\??\c:\rrffrxl.exec:\rrffrxl.exe51⤵
- Executes dropped EXE
PID:3420 -
\??\c:\lxrllfr.exec:\lxrllfr.exe52⤵
- Executes dropped EXE
PID:1476 -
\??\c:\bttthb.exec:\bttthb.exe53⤵
- Executes dropped EXE
PID:3424 -
\??\c:\5pjdj.exec:\5pjdj.exe54⤵
- Executes dropped EXE
PID:1364 -
\??\c:\jjpjj.exec:\jjpjj.exe55⤵
- Executes dropped EXE
PID:1976 -
\??\c:\xllfrxl.exec:\xllfrxl.exe56⤵
- Executes dropped EXE
PID:1532 -
\??\c:\5ffrffx.exec:\5ffrffx.exe57⤵
- Executes dropped EXE
PID:556 -
\??\c:\tnhbnn.exec:\tnhbnn.exe58⤵
- Executes dropped EXE
PID:2996 -
\??\c:\bnbnhb.exec:\bnbnhb.exe59⤵
- Executes dropped EXE
PID:2952 -
\??\c:\ddjdv.exec:\ddjdv.exe60⤵
- Executes dropped EXE
PID:4416 -
\??\c:\vjdvd.exec:\vjdvd.exe61⤵
- Executes dropped EXE
PID:3012 -
\??\c:\rfffrlx.exec:\rfffrlx.exe62⤵
- Executes dropped EXE
PID:3656 -
\??\c:\lfrlxrl.exec:\lfrlxrl.exe63⤵
- Executes dropped EXE
PID:1580 -
\??\c:\7tnbtt.exec:\7tnbtt.exe64⤵
- Executes dropped EXE
PID:1892 -
\??\c:\pdpjd.exec:\pdpjd.exe65⤵
- Executes dropped EXE
PID:2812 -
\??\c:\3ddvp.exec:\3ddvp.exe66⤵PID:4704
-
\??\c:\rxflxxl.exec:\rxflxxl.exe67⤵PID:4088
-
\??\c:\xlrrrxr.exec:\xlrrrxr.exe68⤵PID:2688
-
\??\c:\nntnbb.exec:\nntnbb.exe69⤵PID:5116
-
\??\c:\3pdvp.exec:\3pdvp.exe70⤵PID:4052
-
\??\c:\jdpvp.exec:\jdpvp.exe71⤵PID:3360
-
\??\c:\flrllrl.exec:\flrllrl.exe72⤵PID:2948
-
\??\c:\1fxrlfx.exec:\1fxrlfx.exe73⤵PID:3392
-
\??\c:\btttnh.exec:\btttnh.exe74⤵PID:224
-
\??\c:\dddjv.exec:\dddjv.exe75⤵PID:2800
-
\??\c:\lfxrffx.exec:\lfxrffx.exe76⤵PID:2556
-
\??\c:\xxfrxlr.exec:\xxfrxlr.exe77⤵PID:2240
-
\??\c:\nhbbtt.exec:\nhbbtt.exe78⤵PID:2808
-
\??\c:\ttbtbb.exec:\ttbtbb.exe79⤵PID:1540
-
\??\c:\jjvpj.exec:\jjvpj.exe80⤵PID:5056
-
\??\c:\1jpdd.exec:\1jpdd.exe81⤵PID:4508
-
\??\c:\rrrlxrl.exec:\rrrlxrl.exe82⤵PID:2308
-
\??\c:\fxrlxrl.exec:\fxrlxrl.exe83⤵PID:4336
-
\??\c:\btthtt.exec:\btthtt.exe84⤵PID:3060
-
\??\c:\tthbnb.exec:\tthbnb.exe85⤵PID:3068
-
\??\c:\nhhthb.exec:\nhhthb.exe86⤵PID:1336
-
\??\c:\jdvpp.exec:\jdvpp.exe87⤵PID:3052
-
\??\c:\5vdvj.exec:\5vdvj.exe88⤵PID:5068
-
\??\c:\llxfxlr.exec:\llxfxlr.exe89⤵PID:2752
-
\??\c:\rllxffx.exec:\rllxffx.exe90⤵PID:3780
-
\??\c:\hnthtt.exec:\hnthtt.exe91⤵PID:4076
-
\??\c:\nntnnn.exec:\nntnnn.exe92⤵PID:4888
-
\??\c:\jdjdp.exec:\jdjdp.exe93⤵PID:1464
-
\??\c:\vpjvj.exec:\vpjvj.exe94⤵PID:2252
-
\??\c:\jvvpp.exec:\jvvpp.exe95⤵PID:3996
-
\??\c:\xfxrllx.exec:\xfxrllx.exe96⤵PID:2224
-
\??\c:\xfrrllx.exec:\xfrrllx.exe97⤵PID:1092
-
\??\c:\tnhthb.exec:\tnhthb.exe98⤵PID:3136
-
\??\c:\tnnhbh.exec:\tnnhbh.exe99⤵PID:544
-
\??\c:\tnnhtn.exec:\tnnhtn.exe100⤵PID:2572
-
\??\c:\dvpdv.exec:\dvpdv.exe101⤵PID:3336
-
\??\c:\jjjdv.exec:\jjjdv.exe102⤵PID:3528
-
\??\c:\fxlxlfx.exec:\fxlxlfx.exe103⤵PID:2780
-
\??\c:\htttbb.exec:\htttbb.exe104⤵PID:3564
-
\??\c:\hbbnbt.exec:\hbbnbt.exe105⤵PID:4592
-
\??\c:\ddpdp.exec:\ddpdp.exe106⤵PID:2376
-
\??\c:\9dpvj.exec:\9dpvj.exe107⤵PID:4256
-
\??\c:\xrllxxl.exec:\xrllxxl.exe108⤵PID:3444
-
\??\c:\lfxrfxl.exec:\lfxrfxl.exe109⤵PID:4292
-
\??\c:\bththh.exec:\bththh.exe110⤵PID:3696
-
\??\c:\pdjvj.exec:\pdjvj.exe111⤵PID:1212
-
\??\c:\jdvvd.exec:\jdvvd.exe112⤵PID:3460
-
\??\c:\rfxlfxl.exec:\rfxlfxl.exe113⤵PID:4344
-
\??\c:\xfxrfxl.exec:\xfxrfxl.exe114⤵PID:2836
-
\??\c:\nhtnhb.exec:\nhtnhb.exe115⤵PID:4064
-
\??\c:\ttnhbt.exec:\ttnhbt.exe116⤵PID:1920
-
\??\c:\hnbnhb.exec:\hnbnhb.exe117⤵PID:2568
-
\??\c:\5jvpp.exec:\5jvpp.exe118⤵PID:2624
-
\??\c:\pddvd.exec:\pddvd.exe119⤵PID:2556
-
\??\c:\ffxflxx.exec:\ffxflxx.exe120⤵PID:1124
-
\??\c:\rxxxrxl.exec:\rxxxrxl.exe121⤵PID:4860
-
\??\c:\btnbtb.exec:\btnbtb.exe122⤵PID:400
-
\??\c:\vvvjj.exec:\vvvjj.exe123⤵PID:3492
-
\??\c:\vvvdp.exec:\vvvdp.exe124⤵PID:4352
-
\??\c:\llxlffx.exec:\llxlffx.exe125⤵PID:4144
-
\??\c:\lxlxlff.exec:\lxlxlff.exe126⤵PID:4684
-
\??\c:\nbbthb.exec:\nbbthb.exe127⤵PID:376
-
\??\c:\7btnnh.exec:\7btnnh.exe128⤵PID:4992
-
\??\c:\djjjd.exec:\djjjd.exe129⤵PID:2320
-
\??\c:\xxxrfrf.exec:\xxxrfrf.exe130⤵PID:4984
-
\??\c:\rfrfxlx.exec:\rfrfxlx.exe131⤵PID:4568
-
\??\c:\5nnhtn.exec:\5nnhtn.exe132⤵PID:4464
-
\??\c:\bbhbbb.exec:\bbhbbb.exe133⤵PID:1972
-
\??\c:\hhhttb.exec:\hhhttb.exe134⤵PID:2524
-
\??\c:\vvvjd.exec:\vvvjd.exe135⤵PID:4580
-
\??\c:\dvjjv.exec:\dvjjv.exe136⤵PID:4312
-
\??\c:\3lfxlfx.exec:\3lfxlfx.exe137⤵PID:4520
-
\??\c:\fxlxrlx.exec:\fxlxrlx.exe138⤵PID:2188
-
\??\c:\nttnhh.exec:\nttnhh.exe139⤵PID:2540
-
\??\c:\ttnhtn.exec:\ttnhtn.exe140⤵PID:3056
-
\??\c:\vppjp.exec:\vppjp.exe141⤵PID:3920
-
\??\c:\5jjvp.exec:\5jjvp.exe142⤵PID:3820
-
\??\c:\5xflxrf.exec:\5xflxrf.exe143⤵PID:4836
-
\??\c:\frxrlfx.exec:\frxrlfx.exe144⤵PID:456
-
\??\c:\hbhbbt.exec:\hbhbbt.exe145⤵PID:1264
-
\??\c:\nbbtbt.exec:\nbbtbt.exe146⤵PID:2356
-
\??\c:\jjvvd.exec:\jjvvd.exe147⤵PID:2840
-
\??\c:\pppdd.exec:\pppdd.exe148⤵PID:3696
-
\??\c:\lxlfllr.exec:\lxlfllr.exe149⤵PID:2688
-
\??\c:\frlfrlx.exec:\frlfrlx.exe150⤵PID:60
-
\??\c:\hbhtnh.exec:\hbhtnh.exe151⤵PID:2676
-
\??\c:\dpjdd.exec:\dpjdd.exe152⤵PID:4736
-
\??\c:\5jdjd.exec:\5jdjd.exe153⤵PID:4044
-
\??\c:\lllffxr.exec:\lllffxr.exe154⤵PID:4680
-
\??\c:\5lflxrl.exec:\5lflxrl.exe155⤵PID:3764
-
\??\c:\9nhbnh.exec:\9nhbnh.exe156⤵PID:3296
-
\??\c:\9bthth.exec:\9bthth.exe157⤵PID:2588
-
\??\c:\jdvpd.exec:\jdvpd.exe158⤵PID:3952
-
\??\c:\vvdpd.exec:\vvdpd.exe159⤵PID:1916
-
\??\c:\9flrlfr.exec:\9flrlfr.exe160⤵PID:1004
-
\??\c:\rrxrffr.exec:\rrxrffr.exe161⤵PID:2856
-
\??\c:\nbtnbn.exec:\nbtnbn.exe162⤵PID:3048
-
\??\c:\hbbttb.exec:\hbbttb.exe163⤵PID:2184
-
\??\c:\djddv.exec:\djddv.exe164⤵PID:4240
-
\??\c:\vpdpd.exec:\vpdpd.exe165⤵PID:4528
-
\??\c:\5lfxrrl.exec:\5lfxrrl.exe166⤵PID:376
-
\??\c:\hbbtnh.exec:\hbbtnh.exe167⤵PID:3036
-
\??\c:\pjddv.exec:\pjddv.exe168⤵PID:4952
-
\??\c:\vjjvp.exec:\vjjvp.exe169⤵PID:3780
-
\??\c:\xffrlfx.exec:\xffrlfx.exe170⤵PID:3388
-
\??\c:\3llfxxl.exec:\3llfxxl.exe171⤵PID:2000
-
\??\c:\7hbhtt.exec:\7hbhtt.exe172⤵PID:2252
-
\??\c:\7bnbbb.exec:\7bnbbb.exe173⤵PID:2304
-
\??\c:\vdjdv.exec:\vdjdv.exe174⤵PID:3136
-
\??\c:\fffxlxf.exec:\fffxlxf.exe175⤵PID:4312
-
\??\c:\xlfrlrf.exec:\xlfrlrf.exe176⤵PID:4520
-
\??\c:\bnhnbt.exec:\bnhnbt.exe177⤵PID:2188
-
\??\c:\tnnhtn.exec:\tnnhtn.exe178⤵PID:2336
-
\??\c:\ttnbtn.exec:\ttnbtn.exe179⤵PID:3056
-
\??\c:\djppd.exec:\djppd.exe180⤵PID:3920
-
\??\c:\7rlrfrl.exec:\7rlrfrl.exe181⤵PID:212
-
\??\c:\vdppp.exec:\vdppp.exe182⤵PID:2796
-
\??\c:\pdpdp.exec:\pdpdp.exe183⤵PID:3088
-
\??\c:\lfrrfxl.exec:\lfrrfxl.exe184⤵PID:1264
-
\??\c:\tbttth.exec:\tbttth.exe185⤵PID:4856
-
\??\c:\nbtbth.exec:\nbtbth.exe186⤵PID:2760
-
\??\c:\dppdp.exec:\dppdp.exe187⤵PID:1412
-
\??\c:\ddvjv.exec:\ddvjv.exe188⤵PID:1664
-
\??\c:\1vpdp.exec:\1vpdp.exe189⤵PID:2748
-
\??\c:\xxlflfx.exec:\xxlflfx.exe190⤵PID:2312
-
\??\c:\lfrlllf.exec:\lfrlllf.exe191⤵PID:4064
-
\??\c:\nbtttn.exec:\nbtttn.exe192⤵PID:224
-
\??\c:\bhnnbt.exec:\bhnnbt.exe193⤵PID:2116
-
\??\c:\jppjj.exec:\jppjj.exe194⤵PID:3764
-
\??\c:\vjjpp.exec:\vjjpp.exe195⤵PID:4408
-
\??\c:\lxfxfxr.exec:\lxfxfxr.exe196⤵PID:2588
-
\??\c:\llrrlfl.exec:\llrrlfl.exe197⤵PID:1912
-
\??\c:\hbtbtt.exec:\hbtbtt.exe198⤵PID:4860
-
\??\c:\tbbtnn.exec:\tbbtnn.exe199⤵PID:2028
-
\??\c:\pjpjp.exec:\pjpjp.exe200⤵PID:3872
-
\??\c:\5rlxrlf.exec:\5rlxrlf.exe201⤵PID:4356
-
\??\c:\btbtbn.exec:\btbtbn.exe202⤵PID:2184
-
\??\c:\jpdpj.exec:\jpdpj.exe203⤵PID:3644
-
\??\c:\xfxlxrf.exec:\xfxlxrf.exe204⤵PID:3436
-
\??\c:\3fxrllx.exec:\3fxrllx.exe205⤵PID:824
-
\??\c:\ddvpj.exec:\ddvpj.exe206⤵PID:696
-
\??\c:\3dvjv.exec:\3dvjv.exe207⤵PID:1176
-
\??\c:\fflflfx.exec:\fflflfx.exe208⤵PID:3516
-
\??\c:\ddjdd.exec:\ddjdd.exe209⤵PID:2848
-
\??\c:\lllfxrl.exec:\lllfxrl.exe210⤵PID:852
-
\??\c:\5bbntt.exec:\5bbntt.exe211⤵PID:3996
-
\??\c:\1nnhtn.exec:\1nnhtn.exe212⤵PID:396
-
\??\c:\pdvpj.exec:\pdvpj.exe213⤵PID:4700
-
\??\c:\vpppv.exec:\vpppv.exe214⤵PID:1996
-
\??\c:\lfxffrx.exec:\lfxffrx.exe215⤵PID:5076
-
\??\c:\rlrfxrr.exec:\rlrfxrr.exe216⤵PID:4456
-
\??\c:\3ntttb.exec:\3ntttb.exe217⤵PID:4136
-
\??\c:\btthtn.exec:\btthtn.exe218⤵PID:4416
-
\??\c:\tnnbnh.exec:\tnnbnh.exe219⤵PID:1292
-
\??\c:\vvdpv.exec:\vvdpv.exe220⤵PID:1168
-
\??\c:\xffrxlr.exec:\xffrxlr.exe221⤵PID:1980
-
\??\c:\xrlxfxf.exec:\xrlxfxf.exe222⤵PID:2332
-
\??\c:\fflxlfl.exec:\fflxlfl.exe223⤵PID:3624
-
\??\c:\nhnhbb.exec:\nhnhbb.exe224⤵PID:4908
-
\??\c:\hbttnn.exec:\hbttnn.exe225⤵PID:5116
-
\??\c:\1jpjj.exec:\1jpjj.exe226⤵PID:3172
-
\??\c:\pddpp.exec:\pddpp.exe227⤵PID:4052
-
\??\c:\xrxrrrl.exec:\xrxrrrl.exe228⤵PID:2676
-
\??\c:\xrrrrlf.exec:\xrrrrlf.exe229⤵PID:3264
-
\??\c:\bntnbt.exec:\bntnbt.exe230⤵PID:3576
-
\??\c:\5hnntb.exec:\5hnntb.exe231⤵PID:2136
-
\??\c:\dvvpv.exec:\dvvpv.exe232⤵PID:2624
-
\??\c:\9pvjd.exec:\9pvjd.exe233⤵PID:4692
-
\??\c:\rlxrrrf.exec:\rlxrrrf.exe234⤵PID:2556
-
\??\c:\frlxlfx.exec:\frlxlfx.exe235⤵PID:3944
-
\??\c:\thhhbb.exec:\thhhbb.exe236⤵PID:3132
-
\??\c:\hnnnhb.exec:\hnnnhb.exe237⤵PID:4780
-
\??\c:\jppvv.exec:\jppvv.exe238⤵PID:4576
-
\??\c:\dvpdv.exec:\dvpdv.exe239⤵PID:4636
-
\??\c:\xlllfxx.exec:\xlllfxx.exe240⤵PID:4308
-
\??\c:\5rlflll.exec:\5rlflll.exe241⤵PID:4424
-