Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 22:15
Behavioral task
behavioral1
Sample
44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe
-
Size
75KB
-
MD5
44153139a223464d69a2f4a23f536b50
-
SHA1
f146b433e637acfc7f42979d6f049f977e3ed3d4
-
SHA256
3ee522c1ede0c41360b74f9a33e9dd829b501ab7110facdeca505d5042da787e
-
SHA512
15c603b10d1bc9f3a442d91dfaccb2208186a4726959e775ebcaee6c444b5c4df0d6857816fdeede3e083845f3a3330a9fd02fd0a1eb88ce58a4b9883ca5cab5
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8PbhnyLFWoFLAxZhMDzE8a:9hOmTsF93UYfwC6GIoutz5yLpOSD0
Malware Config
Signatures
-
Detect Blackmoon payload 57 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2904-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2812-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2484-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2508-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2652-64-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2396-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2376-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1872-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2180-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/772-103-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2180-114-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2632-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2284-135-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1948-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2312-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1608-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1252-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2144-170-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1408-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2240-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2984-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2984-205-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2968-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2196-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2104-266-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2104-265-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/320-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1212-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/876-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1292-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1292-315-0x00000000002A0000-0x00000000002C7000-memory.dmp family_blackmoon behavioral1/memory/2616-347-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2500-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2548-375-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2436-401-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1200-414-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2436-434-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1980-460-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2296-473-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/852-486-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1980-487-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1308-550-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/820-588-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/820-587-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1572-627-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2956-644-0x0000000000430000-0x0000000000457000-memory.dmp family_blackmoon behavioral1/memory/2408-665-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1696-679-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1800-747-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2896-768-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2896-796-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2708-883-0x0000000000270000-0x0000000000297000-memory.dmp family_blackmoon behavioral1/memory/1212-888-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1496-908-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2500-966-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2488-992-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pbdrv.exevnjvhfj.exejlvtll.exejplnvvj.exenljjvlf.exejvtnxdf.exeddddd.exebnnpbtn.exevxrlttx.exebhrrxh.exevbjtj.exebbpvv.exenhpdn.exehtthhtt.exehrrjrt.exebndtbt.exernhxvjh.exexdpjdhd.exefhpprt.exerfrxt.exerhphp.exeffdrjxh.exehbljh.exetdtffr.exexvfrdr.exetndfr.exeftbpbf.exeflbvxl.exejhbnt.exervlvpjv.exefllxrjl.exenjlblv.exejnpdpl.exejnnbt.exerxhpddp.exefjrprvl.exerhbbxh.exenjbxrj.exenlxrdrr.exexppdrrr.exedbhtjbf.exeldhbxd.exehdplxrr.exedrdrjtl.exebndvfrx.exendbbx.exefvxbtdd.exehjbvnlp.exebdnhrvb.exeflhjdv.exenfvtr.exetdhvv.exebrrjll.exethrnnx.exexjfxlhr.exebxhdhpd.exebfxhn.exehnrfjdb.exedtlxbxh.exeljhbflj.exendtpx.exepdhvxvv.exelnxhdjp.exejtfbjph.exepid process 2904 pbdrv.exe 2812 vnjvhfj.exe 2484 jlvtll.exe 2648 jplnvvj.exe 2508 nljjvlf.exe 2652 jvtnxdf.exe 2396 ddddd.exe 2376 bnnpbtn.exe 1872 vxrlttx.exe 772 bhrrxh.exe 2180 vbjtj.exe 2632 bbpvv.exe 1948 nhpdn.exe 2284 htthhtt.exe 2312 hrrjrt.exe 1608 bndtbt.exe 2144 rnhxvjh.exe 1252 xdpjdhd.exe 1408 fhpprt.exe 2240 rfrxt.exe 2984 rhphp.exe 2116 ffdrjxh.exe 2916 hbljh.exe 2968 tdtffr.exe 2196 xvfrdr.exe 1660 tndfr.exe 1104 ftbpbf.exe 2104 flbvxl.exe 320 jhbnt.exe 820 rvlvpjv.exe 1212 fllxrjl.exe 1912 njlblv.exe 876 jnpdpl.exe 1292 jnnbt.exe 2892 rxhpddp.exe 1572 fjrprvl.exe 2564 rhbbxh.exe 2920 njbxrj.exe 2616 nlxrdrr.exe 2572 xppdrrr.exe 2656 dbhtjbf.exe 2500 ldhbxd.exe 2548 hdplxrr.exe 3048 drdrjtl.exe 2372 bndvfrx.exe 2404 ndbbx.exe 2436 fvxbtdd.exe 2324 hjbvnlp.exe 1016 bdnhrvb.exe 1200 flhjdv.exe 2672 nfvtr.exe 2632 tdhvv.exe 2636 brrjll.exe 2296 thrnnx.exe 1848 xjfxlhr.exe 1980 bxhdhpd.exe 1656 bfxhn.exe 1576 hnrfjdb.exe 1064 dtlxbxh.exe 852 ljhbflj.exe 1524 ndtpx.exe 2260 pdhvxvv.exe 2736 lnxhdjp.exe 2932 jtfbjph.exe -
Processes:
resource yara_rule behavioral1/memory/1708-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pbdrv.exe upx behavioral1/memory/1708-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-18-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\vnjvhfj.exe upx behavioral1/memory/2904-16-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jlvtll.exe upx behavioral1/memory/2484-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2812-26-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jplnvvj.exe upx behavioral1/memory/2648-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2484-37-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nljjvlf.exe upx behavioral1/memory/2508-55-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvtnxdf.exe upx behavioral1/memory/2652-64-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ddddd.exe upx behavioral1/memory/2396-71-0x00000000002C0000-0x00000000002E7000-memory.dmp upx \??\c:\bnnpbtn.exe upx behavioral1/memory/2376-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2396-74-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vxrlttx.exe upx behavioral1/memory/2376-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1872-85-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bhrrxh.exe upx behavioral1/memory/1872-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/772-95-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2180-107-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\vbjtj.exe upx behavioral1/memory/772-103-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhpdn.exe upx behavioral1/memory/2632-118-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bbpvv.exe upx behavioral1/memory/2284-135-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\htthhtt.exe upx behavioral1/memory/1948-133-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hrrjrt.exe upx behavioral1/memory/2312-143-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2312-151-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rnhxvjh.exe upx behavioral1/memory/1608-160-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bndtbt.exe upx C:\xdpjdhd.exe upx behavioral1/memory/1252-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2144-170-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\fhpprt.exe upx behavioral1/memory/1408-187-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rfrxt.exe upx behavioral1/memory/2240-197-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rhphp.exe upx C:\ffdrjxh.exe upx behavioral1/memory/2984-206-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbljh.exe upx C:\tdtffr.exe upx behavioral1/memory/2968-225-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xvfrdr.exe upx behavioral1/memory/2968-232-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2196-241-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tndfr.exe upx C:\ftbpbf.exe upx C:\flbvxl.exe upx C:\jhbnt.exe upx C:\rvlvpjv.exe upx behavioral1/memory/320-276-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exepbdrv.exevnjvhfj.exejlvtll.exejplnvvj.exenljjvlf.exejvtnxdf.exeddddd.exebnnpbtn.exevxrlttx.exebhrrxh.exevbjtj.exebbpvv.exenhpdn.exehtthhtt.exehrrjrt.exedescription pid process target process PID 1708 wrote to memory of 2904 1708 44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe pbdrv.exe PID 1708 wrote to memory of 2904 1708 44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe pbdrv.exe PID 1708 wrote to memory of 2904 1708 44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe pbdrv.exe PID 1708 wrote to memory of 2904 1708 44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe pbdrv.exe PID 2904 wrote to memory of 2812 2904 pbdrv.exe vnjvhfj.exe PID 2904 wrote to memory of 2812 2904 pbdrv.exe vnjvhfj.exe PID 2904 wrote to memory of 2812 2904 pbdrv.exe vnjvhfj.exe PID 2904 wrote to memory of 2812 2904 pbdrv.exe vnjvhfj.exe PID 2812 wrote to memory of 2484 2812 vnjvhfj.exe jlvtll.exe PID 2812 wrote to memory of 2484 2812 vnjvhfj.exe jlvtll.exe PID 2812 wrote to memory of 2484 2812 vnjvhfj.exe jlvtll.exe PID 2812 wrote to memory of 2484 2812 vnjvhfj.exe jlvtll.exe PID 2484 wrote to memory of 2648 2484 jlvtll.exe jplnvvj.exe PID 2484 wrote to memory of 2648 2484 jlvtll.exe jplnvvj.exe PID 2484 wrote to memory of 2648 2484 jlvtll.exe jplnvvj.exe PID 2484 wrote to memory of 2648 2484 jlvtll.exe jplnvvj.exe PID 2648 wrote to memory of 2508 2648 jplnvvj.exe nljjvlf.exe PID 2648 wrote to memory of 2508 2648 jplnvvj.exe nljjvlf.exe PID 2648 wrote to memory of 2508 2648 jplnvvj.exe nljjvlf.exe PID 2648 wrote to memory of 2508 2648 jplnvvj.exe nljjvlf.exe PID 2508 wrote to memory of 2652 2508 nljjvlf.exe jvtnxdf.exe PID 2508 wrote to memory of 2652 2508 nljjvlf.exe jvtnxdf.exe PID 2508 wrote to memory of 2652 2508 nljjvlf.exe jvtnxdf.exe PID 2508 wrote to memory of 2652 2508 nljjvlf.exe jvtnxdf.exe PID 2652 wrote to memory of 2396 2652 jvtnxdf.exe ddddd.exe PID 2652 wrote to memory of 2396 2652 jvtnxdf.exe ddddd.exe PID 2652 wrote to memory of 2396 2652 jvtnxdf.exe ddddd.exe PID 2652 wrote to memory of 2396 2652 jvtnxdf.exe ddddd.exe PID 2396 wrote to memory of 2376 2396 ddddd.exe bnnpbtn.exe PID 2396 wrote to memory of 2376 2396 ddddd.exe bnnpbtn.exe PID 2396 wrote to memory of 2376 2396 ddddd.exe bnnpbtn.exe PID 2396 wrote to memory of 2376 2396 ddddd.exe bnnpbtn.exe PID 2376 wrote to memory of 1872 2376 bnnpbtn.exe vxrlttx.exe PID 2376 wrote to memory of 1872 2376 bnnpbtn.exe vxrlttx.exe PID 2376 wrote to memory of 1872 2376 bnnpbtn.exe vxrlttx.exe PID 2376 wrote to memory of 1872 2376 bnnpbtn.exe vxrlttx.exe PID 1872 wrote to memory of 772 1872 vxrlttx.exe bhrrxh.exe PID 1872 wrote to memory of 772 1872 vxrlttx.exe bhrrxh.exe PID 1872 wrote to memory of 772 1872 vxrlttx.exe bhrrxh.exe PID 1872 wrote to memory of 772 1872 vxrlttx.exe bhrrxh.exe PID 772 wrote to memory of 2180 772 bhrrxh.exe vbjtj.exe PID 772 wrote to memory of 2180 772 bhrrxh.exe vbjtj.exe PID 772 wrote to memory of 2180 772 bhrrxh.exe vbjtj.exe PID 772 wrote to memory of 2180 772 bhrrxh.exe vbjtj.exe PID 2180 wrote to memory of 2632 2180 vbjtj.exe bbpvv.exe PID 2180 wrote to memory of 2632 2180 vbjtj.exe bbpvv.exe PID 2180 wrote to memory of 2632 2180 vbjtj.exe bbpvv.exe PID 2180 wrote to memory of 2632 2180 vbjtj.exe bbpvv.exe PID 2632 wrote to memory of 1948 2632 bbpvv.exe nhpdn.exe PID 2632 wrote to memory of 1948 2632 bbpvv.exe nhpdn.exe PID 2632 wrote to memory of 1948 2632 bbpvv.exe nhpdn.exe PID 2632 wrote to memory of 1948 2632 bbpvv.exe nhpdn.exe PID 1948 wrote to memory of 2284 1948 nhpdn.exe htthhtt.exe PID 1948 wrote to memory of 2284 1948 nhpdn.exe htthhtt.exe PID 1948 wrote to memory of 2284 1948 nhpdn.exe htthhtt.exe PID 1948 wrote to memory of 2284 1948 nhpdn.exe htthhtt.exe PID 2284 wrote to memory of 2312 2284 htthhtt.exe hrrjrt.exe PID 2284 wrote to memory of 2312 2284 htthhtt.exe hrrjrt.exe PID 2284 wrote to memory of 2312 2284 htthhtt.exe hrrjrt.exe PID 2284 wrote to memory of 2312 2284 htthhtt.exe hrrjrt.exe PID 2312 wrote to memory of 1608 2312 hrrjrt.exe bndtbt.exe PID 2312 wrote to memory of 1608 2312 hrrjrt.exe bndtbt.exe PID 2312 wrote to memory of 1608 2312 hrrjrt.exe bndtbt.exe PID 2312 wrote to memory of 1608 2312 hrrjrt.exe bndtbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\44153139a223464d69a2f4a23f536b50_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\pbdrv.exec:\pbdrv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\vnjvhfj.exec:\vnjvhfj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\jlvtll.exec:\jlvtll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\jplnvvj.exec:\jplnvvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\nljjvlf.exec:\nljjvlf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\jvtnxdf.exec:\jvtnxdf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\ddddd.exec:\ddddd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\bnnpbtn.exec:\bnnpbtn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\vxrlttx.exec:\vxrlttx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\bhrrxh.exec:\bhrrxh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\vbjtj.exec:\vbjtj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\bbpvv.exec:\bbpvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\nhpdn.exec:\nhpdn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\htthhtt.exec:\htthhtt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\hrrjrt.exec:\hrrjrt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\bndtbt.exec:\bndtbt.exe17⤵
- Executes dropped EXE
PID:1608 -
\??\c:\rnhxvjh.exec:\rnhxvjh.exe18⤵
- Executes dropped EXE
PID:2144 -
\??\c:\xdpjdhd.exec:\xdpjdhd.exe19⤵
- Executes dropped EXE
PID:1252 -
\??\c:\fhpprt.exec:\fhpprt.exe20⤵
- Executes dropped EXE
PID:1408 -
\??\c:\rfrxt.exec:\rfrxt.exe21⤵
- Executes dropped EXE
PID:2240 -
\??\c:\rhphp.exec:\rhphp.exe22⤵
- Executes dropped EXE
PID:2984 -
\??\c:\ffdrjxh.exec:\ffdrjxh.exe23⤵
- Executes dropped EXE
PID:2116 -
\??\c:\hbljh.exec:\hbljh.exe24⤵
- Executes dropped EXE
PID:2916 -
\??\c:\tdtffr.exec:\tdtffr.exe25⤵
- Executes dropped EXE
PID:2968 -
\??\c:\xvfrdr.exec:\xvfrdr.exe26⤵
- Executes dropped EXE
PID:2196 -
\??\c:\tndfr.exec:\tndfr.exe27⤵
- Executes dropped EXE
PID:1660 -
\??\c:\ftbpbf.exec:\ftbpbf.exe28⤵
- Executes dropped EXE
PID:1104 -
\??\c:\flbvxl.exec:\flbvxl.exe29⤵
- Executes dropped EXE
PID:2104 -
\??\c:\jhbnt.exec:\jhbnt.exe30⤵
- Executes dropped EXE
PID:320 -
\??\c:\rvlvpjv.exec:\rvlvpjv.exe31⤵
- Executes dropped EXE
PID:820 -
\??\c:\fllxrjl.exec:\fllxrjl.exe32⤵
- Executes dropped EXE
PID:1212 -
\??\c:\njlblv.exec:\njlblv.exe33⤵
- Executes dropped EXE
PID:1912 -
\??\c:\jnpdpl.exec:\jnpdpl.exe34⤵
- Executes dropped EXE
PID:876 -
\??\c:\jnnbt.exec:\jnnbt.exe35⤵
- Executes dropped EXE
PID:1292 -
\??\c:\rxhpddp.exec:\rxhpddp.exe36⤵
- Executes dropped EXE
PID:2892 -
\??\c:\fjrprvl.exec:\fjrprvl.exe37⤵
- Executes dropped EXE
PID:1572 -
\??\c:\rhbbxh.exec:\rhbbxh.exe38⤵
- Executes dropped EXE
PID:2564 -
\??\c:\njbxrj.exec:\njbxrj.exe39⤵
- Executes dropped EXE
PID:2920 -
\??\c:\nlxrdrr.exec:\nlxrdrr.exe40⤵
- Executes dropped EXE
PID:2616 -
\??\c:\xppdrrr.exec:\xppdrrr.exe41⤵
- Executes dropped EXE
PID:2572 -
\??\c:\dbhtjbf.exec:\dbhtjbf.exe42⤵
- Executes dropped EXE
PID:2656 -
\??\c:\ldhbxd.exec:\ldhbxd.exe43⤵
- Executes dropped EXE
PID:2500 -
\??\c:\hdplxrr.exec:\hdplxrr.exe44⤵
- Executes dropped EXE
PID:2548 -
\??\c:\drdrjtl.exec:\drdrjtl.exe45⤵
- Executes dropped EXE
PID:3048 -
\??\c:\bndvfrx.exec:\bndvfrx.exe46⤵
- Executes dropped EXE
PID:2372 -
\??\c:\ndbbx.exec:\ndbbx.exe47⤵
- Executes dropped EXE
PID:2404 -
\??\c:\fvxbtdd.exec:\fvxbtdd.exe48⤵
- Executes dropped EXE
PID:2436 -
\??\c:\hjbvnlp.exec:\hjbvnlp.exe49⤵
- Executes dropped EXE
PID:2324 -
\??\c:\bdnhrvb.exec:\bdnhrvb.exe50⤵
- Executes dropped EXE
PID:1016 -
\??\c:\flhjdv.exec:\flhjdv.exe51⤵
- Executes dropped EXE
PID:1200 -
\??\c:\nfvtr.exec:\nfvtr.exe52⤵
- Executes dropped EXE
PID:2672 -
\??\c:\tdhvv.exec:\tdhvv.exe53⤵
- Executes dropped EXE
PID:2632 -
\??\c:\brrjll.exec:\brrjll.exe54⤵
- Executes dropped EXE
PID:2636 -
\??\c:\thrnnx.exec:\thrnnx.exe55⤵
- Executes dropped EXE
PID:2296 -
\??\c:\xjfxlhr.exec:\xjfxlhr.exe56⤵
- Executes dropped EXE
PID:1848 -
\??\c:\bxhdhpd.exec:\bxhdhpd.exe57⤵
- Executes dropped EXE
PID:1980 -
\??\c:\bfxhn.exec:\bfxhn.exe58⤵
- Executes dropped EXE
PID:1656 -
\??\c:\hnrfjdb.exec:\hnrfjdb.exe59⤵
- Executes dropped EXE
PID:1576 -
\??\c:\dtlxbxh.exec:\dtlxbxh.exe60⤵
- Executes dropped EXE
PID:1064 -
\??\c:\ljhbflj.exec:\ljhbflj.exe61⤵
- Executes dropped EXE
PID:852 -
\??\c:\ndtpx.exec:\ndtpx.exe62⤵
- Executes dropped EXE
PID:1524 -
\??\c:\pdhvxvv.exec:\pdhvxvv.exe63⤵
- Executes dropped EXE
PID:2260 -
\??\c:\lnxhdjp.exec:\lnxhdjp.exe64⤵
- Executes dropped EXE
PID:2736 -
\??\c:\jtfbjph.exec:\jtfbjph.exe65⤵
- Executes dropped EXE
PID:2932 -
\??\c:\dprjxhl.exec:\dprjxhl.exe66⤵PID:2116
-
\??\c:\xhdllxn.exec:\xhdllxn.exe67⤵PID:268
-
\??\c:\xxrpjp.exec:\xxrpjp.exe68⤵PID:432
-
\??\c:\rtntt.exec:\rtntt.exe69⤵PID:944
-
\??\c:\vphvdth.exec:\vphvdth.exe70⤵PID:1744
-
\??\c:\lxppr.exec:\lxppr.exe71⤵PID:1308
-
\??\c:\jbjxnj.exec:\jbjxnj.exe72⤵PID:1724
-
\??\c:\dflhblt.exec:\dflhblt.exe73⤵PID:1088
-
\??\c:\dpvpxl.exec:\dpvpxl.exe74⤵PID:620
-
\??\c:\vhdtrhf.exec:\vhdtrhf.exe75⤵PID:544
-
\??\c:\ftdlr.exec:\ftdlr.exe76⤵PID:368
-
\??\c:\tnfjl.exec:\tnfjl.exe77⤵PID:820
-
\??\c:\pxdlx.exec:\pxdlx.exe78⤵PID:1816
-
\??\c:\llbbhfn.exec:\llbbhfn.exe79⤵PID:1496
-
\??\c:\pbpbbfx.exec:\pbpbbfx.exe80⤵PID:1732
-
\??\c:\bbhlfnx.exec:\bbhlfnx.exe81⤵PID:1768
-
\??\c:\tdlptp.exec:\tdlptp.exe82⤵PID:3032
-
\??\c:\pfvrxvp.exec:\pfvrxvp.exe83⤵PID:2892
-
\??\c:\vtxxnht.exec:\vtxxnht.exe84⤵PID:1572
-
\??\c:\ndhrfp.exec:\ndhrfp.exe85⤵PID:2564
-
\??\c:\rdblpx.exec:\rdblpx.exe86⤵PID:2956
-
\??\c:\jxbbfd.exec:\jxbbfd.exe87⤵PID:2532
-
\??\c:\xtjhn.exec:\xtjhn.exe88⤵PID:2520
-
\??\c:\jnnfxd.exec:\jnnfxd.exe89⤵PID:2408
-
\??\c:\dhhvvj.exec:\dhhvvj.exe90⤵PID:2540
-
\??\c:\bnnpn.exec:\bnnpn.exe91⤵PID:1696
-
\??\c:\plblljd.exec:\plblljd.exe92⤵PID:2488
-
\??\c:\jfjvd.exec:\jfjvd.exe93⤵PID:2952
-
\??\c:\xvpnl.exec:\xvpnl.exe94⤵PID:2568
-
\??\c:\bxnnnxd.exec:\bxnnnxd.exe95⤵PID:2796
-
\??\c:\frxdh.exec:\frxdh.exe96⤵PID:772
-
\??\c:\rnjlvtd.exec:\rnjlvtd.exe97⤵PID:572
-
\??\c:\ltbndhh.exec:\ltbndhh.exe98⤵PID:1796
-
\??\c:\htrbx.exec:\htrbx.exe99⤵PID:2680
-
\??\c:\nxjhbp.exec:\nxjhbp.exe100⤵PID:1228
-
\??\c:\jftddtb.exec:\jftddtb.exe101⤵PID:3044
-
\??\c:\rffrnd.exec:\rffrnd.exe102⤵PID:1800
-
\??\c:\bvbvfh.exec:\bvbvfh.exe103⤵PID:1960
-
\??\c:\dpndj.exec:\dpndj.exe104⤵PID:2312
-
\??\c:\bbbtj.exec:\bbbtj.exe105⤵PID:2896
-
\??\c:\lvnnrll.exec:\lvnnrll.exe106⤵PID:924
-
\??\c:\phvpprx.exec:\phvpprx.exe107⤵PID:1688
-
\??\c:\vddfvbb.exec:\vddfvbb.exe108⤵PID:1680
-
\??\c:\nnnrhf.exec:\nnnrhf.exe109⤵PID:1396
-
\??\c:\hhxfl.exec:\hhxfl.exe110⤵PID:1524
-
\??\c:\fhrln.exec:\fhrln.exe111⤵PID:2228
-
\??\c:\xlvrv.exec:\xlvrv.exe112⤵PID:3000
-
\??\c:\bblljbn.exec:\bblljbn.exe113⤵PID:1188
-
\??\c:\dphrj.exec:\dphrj.exe114⤵PID:2116
-
\??\c:\pttvl.exec:\pttvl.exe115⤵PID:828
-
\??\c:\vrjjdp.exec:\vrjjdp.exe116⤵PID:432
-
\??\c:\vnnjnd.exec:\vnnjnd.exe117⤵PID:1008
-
\??\c:\tvvvdl.exec:\tvvvdl.exe118⤵PID:1868
-
\??\c:\hdlrp.exec:\hdlrp.exe119⤵PID:1084
-
\??\c:\bhphndf.exec:\bhphndf.exe120⤵PID:1096
-
\??\c:\jftbln.exec:\jftbln.exe121⤵PID:624
-
\??\c:\xljbnr.exec:\xljbnr.exe122⤵PID:620
-
\??\c:\lbbpb.exec:\lbbpb.exe123⤵PID:544
-
\??\c:\nfdxp.exec:\nfdxp.exe124⤵PID:2708
-
\??\c:\vlrprhl.exec:\vlrprhl.exe125⤵PID:1212
-
\??\c:\ttjdpbx.exec:\ttjdpbx.exe126⤵PID:1816
-
\??\c:\djfdndj.exec:\djfdndj.exe127⤵PID:1496
-
\??\c:\fjnvvrp.exec:\fjnvvrp.exe128⤵PID:2036
-
\??\c:\xpjxtrv.exec:\xpjxtrv.exe129⤵PID:2888
-
\??\c:\bbtdr.exec:\bbtdr.exe130⤵PID:2844
-
\??\c:\xltvnt.exec:\xltvnt.exe131⤵PID:2584
-
\??\c:\llthpx.exec:\llthpx.exe132⤵PID:2604
-
\??\c:\fvhrhb.exec:\fvhrhb.exe133⤵PID:2524
-
\??\c:\jhllnr.exec:\jhllnr.exe134⤵PID:2624
-
\??\c:\xlttbdj.exec:\xlttbdj.exe135⤵PID:2728
-
\??\c:\dlbpddp.exec:\dlbpddp.exe136⤵PID:2500
-
\??\c:\pfrdlx.exec:\pfrdlx.exe137⤵PID:2512
-
\??\c:\ltxxtrn.exec:\ltxxtrn.exe138⤵PID:2628
-
\??\c:\dxppfpt.exec:\dxppfpt.exe139⤵PID:1696
-
\??\c:\hbnxfxr.exec:\hbnxfxr.exe140⤵PID:2488
-
\??\c:\lflpxfb.exec:\lflpxfb.exe141⤵PID:2952
-
\??\c:\dpbpltj.exec:\dpbpltj.exe142⤵PID:1756
-
\??\c:\npvtbf.exec:\npvtbf.exe143⤵PID:1168
-
\??\c:\hhxbjjt.exec:\hhxbjjt.exe144⤵PID:2876
-
\??\c:\xhtbb.exec:\xhtbb.exe145⤵PID:1588
-
\??\c:\nddrrrn.exec:\nddrrrn.exe146⤵PID:1472
-
\??\c:\ljjvhj.exec:\ljjvhj.exe147⤵PID:2680
-
\??\c:\dhtllvt.exec:\dhtllvt.exe148⤵PID:1336
-
\??\c:\ddbjh.exec:\ddbjh.exe149⤵PID:2320
-
\??\c:\prxnhb.exec:\prxnhb.exe150⤵PID:784
-
\??\c:\nlrpfd.exec:\nlrpfd.exe151⤵PID:2100
-
\??\c:\vtvxf.exec:\vtvxf.exe152⤵PID:872
-
\??\c:\nbfnrhb.exec:\nbfnrhb.exe153⤵PID:2332
-
\??\c:\ttppvp.exec:\ttppvp.exe154⤵PID:1576
-
\??\c:\rnxljh.exec:\rnxljh.exe155⤵PID:2236
-
\??\c:\rdrtrh.exec:\rdrtrh.exe156⤵PID:1792
-
\??\c:\drftdd.exec:\drftdd.exe157⤵PID:852
-
\??\c:\rtxtpht.exec:\rtxtpht.exe158⤵PID:2060
-
\??\c:\tffvjt.exec:\tffvjt.exe159⤵PID:2928
-
\??\c:\tdrdnp.exec:\tdrdnp.exe160⤵PID:1784
-
\??\c:\jdlpvjt.exec:\jdlpvjt.exe161⤵PID:1752
-
\??\c:\nfpxbp.exec:\nfpxbp.exe162⤵PID:2916
-
\??\c:\blfjlln.exec:\blfjlln.exe163⤵PID:1140
-
\??\c:\xrxhd.exec:\xrxhd.exe164⤵PID:1544
-
\??\c:\bjjjdd.exec:\bjjjdd.exe165⤵PID:944
-
\??\c:\dppdjt.exec:\dppdjt.exe166⤵PID:1548
-
\??\c:\pllplfh.exec:\pllplfh.exe167⤵PID:2964
-
\??\c:\plpdjp.exec:\plpdjp.exe168⤵PID:1088
-
\??\c:\rjfxhvd.exec:\rjfxhvd.exe169⤵PID:948
-
\??\c:\vfxtp.exec:\vfxtp.exe170⤵PID:2004
-
\??\c:\fvbltfb.exec:\fvbltfb.exe171⤵PID:2032
-
\??\c:\fvhfvt.exec:\fvhfvt.exe172⤵PID:820
-
\??\c:\vxbbrhv.exec:\vxbbrhv.exe173⤵PID:2216
-
\??\c:\xjxvbd.exec:\xjxvbd.exe174⤵PID:876
-
\??\c:\rtbnh.exec:\rtbnh.exe175⤵PID:2780
-
\??\c:\ptndlf.exec:\ptndlf.exe176⤵PID:1768
-
\??\c:\nvhxn.exec:\nvhxn.exe177⤵PID:2832
-
\??\c:\vrnnfd.exec:\vrnnfd.exe178⤵PID:3036
-
\??\c:\jndnbl.exec:\jndnbl.exe179⤵PID:2844
-
\??\c:\hntbl.exec:\hntbl.exe180⤵PID:2584
-
\??\c:\tlplfp.exec:\tlplfp.exe181⤵PID:2604
-
\??\c:\tvvjvv.exec:\tvvjvv.exe182⤵PID:2380
-
\??\c:\xrbvb.exec:\xrbvb.exe183⤵PID:2624
-
\??\c:\tlxhvjt.exec:\tlxhvjt.exe184⤵PID:2728
-
\??\c:\lxxtpft.exec:\lxxtpft.exe185⤵PID:2500
-
\??\c:\rtvbfnp.exec:\rtvbfnp.exe186⤵PID:2548
-
\??\c:\pjrxd.exec:\pjrxd.exe187⤵PID:2628
-
\??\c:\blxdnxd.exec:\blxdnxd.exe188⤵PID:2392
-
\??\c:\nrbjrt.exec:\nrbjrt.exe189⤵PID:2340
-
\??\c:\dpjth.exec:\dpjth.exe190⤵PID:1620
-
\??\c:\vpxbfn.exec:\vpxbfn.exe191⤵PID:1500
-
\??\c:\phxplbj.exec:\phxplbj.exe192⤵PID:280
-
\??\c:\ntrxvnp.exec:\ntrxvnp.exe193⤵PID:2876
-
\??\c:\lvxvjd.exec:\lvxvjd.exe194⤵PID:2148
-
\??\c:\txndj.exec:\txndj.exe195⤵PID:2804
-
\??\c:\txdnd.exec:\txdnd.exe196⤵PID:2696
-
\??\c:\rrfjbbh.exec:\rrfjbbh.exe197⤵PID:1972
-
\??\c:\fdlljf.exec:\fdlljf.exe198⤵PID:2300
-
\??\c:\rtrjpr.exec:\rtrjpr.exe199⤵PID:1952
-
\??\c:\rfltt.exec:\rfltt.exe200⤵PID:1944
-
\??\c:\fpxxbh.exec:\fpxxbh.exe201⤵PID:1684
-
\??\c:\bjbvh.exec:\bjbvh.exe202⤵PID:608
-
\??\c:\bfnlv.exec:\bfnlv.exe203⤵PID:1688
-
\??\c:\bxrtj.exec:\bxrtj.exe204⤵PID:1396
-
\??\c:\vltdppt.exec:\vltdppt.exe205⤵PID:852
-
\??\c:\rnvfhp.exec:\rnvfhp.exe206⤵PID:2056
-
\??\c:\thlrfjv.exec:\thlrfjv.exe207⤵PID:1060
-
\??\c:\dnrvl.exec:\dnrvl.exe208⤵PID:3056
-
\??\c:\xphjxd.exec:\xphjxd.exe209⤵PID:268
-
\??\c:\dfjdr.exec:\dfjdr.exe210⤵PID:2916
-
\??\c:\pjbnrxv.exec:\pjbnrxv.exe211⤵PID:1528
-
\??\c:\xxpdnj.exec:\xxpdnj.exe212⤵PID:1544
-
\??\c:\nbbnb.exec:\nbbnb.exe213⤵PID:1308
-
\??\c:\xdlld.exec:\xdlld.exe214⤵PID:1072
-
\??\c:\rjrrd.exec:\rjrrd.exe215⤵PID:2104
-
\??\c:\fxxjh.exec:\fxxjh.exe216⤵PID:1088
-
\??\c:\xblrbt.exec:\xblrbt.exe217⤵PID:948
-
\??\c:\jjdhjhn.exec:\jjdhjhn.exe218⤵PID:748
-
\??\c:\hlhhtl.exec:\hlhhtl.exe219⤵PID:2032
-
\??\c:\rltjv.exec:\rltjv.exe220⤵PID:1812
-
\??\c:\vnvrvpl.exec:\vnvrvpl.exe221⤵PID:532
-
\??\c:\rnrttn.exec:\rnrttn.exe222⤵PID:1732
-
\??\c:\dxpxrnt.exec:\dxpxrnt.exe223⤵PID:1164
-
\??\c:\ltfvvv.exec:\ltfvvv.exe224⤵PID:1768
-
\??\c:\lbjvl.exec:\lbjvl.exe225⤵PID:2880
-
\??\c:\bnnrdnp.exec:\bnnrdnp.exe226⤵PID:2944
-
\??\c:\hhdhhn.exec:\hhdhhn.exe227⤵PID:2576
-
\??\c:\ljxtf.exec:\ljxtf.exe228⤵PID:2704
-
\??\c:\rrdphjl.exec:\rrdphjl.exe229⤵PID:2648
-
\??\c:\jlhfnt.exec:\jlhfnt.exe230⤵PID:2712
-
\??\c:\xvbvxt.exec:\xvbvxt.exe231⤵PID:2624
-
\??\c:\lfdjfl.exec:\lfdjfl.exe232⤵PID:2560
-
\??\c:\rthhd.exec:\rthhd.exe233⤵PID:2388
-
\??\c:\dnplbf.exec:\dnplbf.exe234⤵PID:2652
-
\??\c:\nvplfdp.exec:\nvplfdp.exe235⤵PID:2424
-
\??\c:\hhdrdn.exec:\hhdrdn.exe236⤵PID:2376
-
\??\c:\tvvjd.exec:\tvvjd.exe237⤵PID:2436
-
\??\c:\vdphr.exec:\vdphr.exe238⤵PID:1700
-
\??\c:\tddbxl.exec:\tddbxl.exe239⤵PID:1196
-
\??\c:\npxpxx.exec:\npxpxx.exe240⤵PID:556
-
\??\c:\lxhthjx.exec:\lxhthjx.exe241⤵PID:280
-
\??\c:\vtrrl.exec:\vtrrl.exe242⤵PID:2876