Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:09
Behavioral task
behavioral1
Sample
029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe
-
Size
191KB
-
MD5
029914de3b6fbd90144bb1287f886f20
-
SHA1
d18f363f208937df827f99c192398ee61a5c8664
-
SHA256
2e8d7512e73267199efc6c9db4cb8d89f687f292bb053d14206a0e9b2743502e
-
SHA512
217fd21325328f3a8f5a0f92b35cd5bd98016c7bdecde2afbafeccecffb073d36be646355af524021addc3817787b5ce38df2a71c0f2d66a820f894255083f1e
-
SSDEEP
3072:FhOmTsF93UYfwC6GIoutrVCfMoh52waAyiJ8mqtbfUVKty16hDsI/tSak:Fcm4FmowdHoS8fMoSVAHubPtyYxfPk
Malware Config
Signatures
-
Detect Blackmoon payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-7-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2504-11-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2032-20-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2580-30-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2708-55-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2592-63-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/932-106-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1036-141-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2384-159-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2176-288-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/876-309-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2020-322-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/680-396-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1804-409-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2412-430-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/940-416-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/752-388-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2104-470-0x0000000000220000-0x0000000000256000-memory.dmp family_blackmoon behavioral1/memory/2556-374-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2880-302-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1752-295-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2112-237-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/3028-195-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2220-169-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1792-150-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2264-133-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/564-89-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2892-80-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1532-484-0x00000000001B0000-0x00000000001E6000-memory.dmp family_blackmoon behavioral1/memory/2044-524-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/2684-634-0x0000000000440000-0x0000000000476000-memory.dmp family_blackmoon behavioral1/memory/1276-729-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1788-805-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1460-813-0x00000000001B0000-0x00000000001E6000-memory.dmp family_blackmoon behavioral1/memory/2876-927-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral1/memory/1728-1013-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\tldhjhr.exe family_berbew \??\c:\hflrh.exe family_berbew \??\c:\drbvvd.exe family_berbew C:\frjttd.exe family_berbew C:\nbjfh.exe family_berbew C:\dhxjdh.exe family_berbew \??\c:\rldljbn.exe family_berbew C:\dpnhvfn.exe family_berbew \??\c:\dvvfpp.exe family_berbew C:\bpbbl.exe family_berbew \??\c:\rjhbhn.exe family_berbew C:\nrlptnn.exe family_berbew \??\c:\ltjvr.exe family_berbew C:\ltvbv.exe family_berbew C:\vjdhdx.exe family_berbew \??\c:\drffhp.exe family_berbew C:\pttrrbn.exe family_berbew \??\c:\tnbxrf.exe family_berbew \??\c:\bhnvdrv.exe family_berbew C:\ltdbrr.exe family_berbew C:\ntjhjnd.exe family_berbew C:\jdfxprf.exe family_berbew C:\lbdvh.exe family_berbew C:\jlrbrbt.exe family_berbew C:\ntlhvtp.exe family_berbew C:\vnnjn.exe family_berbew C:\rvbxv.exe family_berbew C:\rfbvlxr.exe family_berbew \??\c:\vthrjxh.exe family_berbew \??\c:\brbtv.exe family_berbew \??\c:\nrvrvpb.exe family_berbew \??\c:\tntrf.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
tldhjhr.exedrbvvd.exehflrh.exefrjttd.exenbjfh.exetntrf.exedhxjdh.exerldljbn.exedpnhvfn.exedvvfpp.exebpbbl.exerjhbhn.exenrlptnn.exeltjvr.exeltvbv.exevjdhdx.exedrffhp.exenrvrvpb.exepttrrbn.exetnbxrf.exebrbtv.exebhnvdrv.exevthrjxh.exeltdbrr.exentjhjnd.exejdfxprf.exelbdvh.exejlrbrbt.exentlhvtp.exevnnjn.exervbxv.exerfbvlxr.exehldbbbx.exebvfvbrp.exedhjptl.exervdxx.exerxfjb.exehplvftl.exevthhnf.exefbnvfhx.exelhpvn.exehlrrphr.exehhfnj.exelbjffhx.exepvvndx.exetfntbvn.exejftvpfp.exehhrph.exepxvrjln.exeddlvp.exeplvhh.exebhvdhnn.exejrlbxt.exelvhff.exefhjtf.exevdjrx.exefllvh.exevhxrjhh.exexrbrflx.exepffrt.exentlbv.exetrnrlrb.exefvddlh.exetvbnd.exepid process 2504 tldhjhr.exe 2032 drbvvd.exe 2580 hflrh.exe 2672 frjttd.exe 2708 nbjfh.exe 2592 tntrf.exe 2444 dhxjdh.exe 2892 rldljbn.exe 564 dpnhvfn.exe 552 dvvfpp.exe 932 bpbbl.exe 1728 rjhbhn.exe 2484 nrlptnn.exe 2264 ltjvr.exe 1036 ltvbv.exe 1792 vjdhdx.exe 2384 drffhp.exe 2220 nrvrvpb.exe 2660 pttrrbn.exe 1460 tnbxrf.exe 3028 brbtv.exe 2168 bhnvdrv.exe 3024 vthrjxh.exe 2980 ltdbrr.exe 320 ntjhjnd.exe 2112 jdfxprf.exe 1156 lbdvh.exe 1376 jlrbrbt.exe 1476 ntlhvtp.exe 2784 vnnjn.exe 1164 rvbxv.exe 2176 rfbvlxr.exe 1752 hldbbbx.exe 2880 bvfvbrp.exe 876 dhjptl.exe 836 rvdxx.exe 2020 rxfjb.exe 2504 hplvftl.exe 2680 vthhnf.exe 1584 fbnvfhx.exe 2748 lhpvn.exe 2532 hlrrphr.exe 2704 hhfnj.exe 2696 lbjffhx.exe 2556 pvvndx.exe 2500 tfntbvn.exe 752 jftvpfp.exe 680 hhrph.exe 2408 pxvrjln.exe 1804 ddlvp.exe 940 plvhh.exe 1284 bhvdhnn.exe 2412 jrlbxt.exe 1568 lvhff.exe 1812 fhjtf.exe 1240 vdjrx.exe 1996 fllvh.exe 1520 vhxrjhh.exe 2104 xrbrflx.exe 2620 pffrt.exe 1532 ntlbv.exe 2404 trnrlrb.exe 2952 fvddlh.exe 2096 tvbnd.exe -
Processes:
resource yara_rule behavioral1/memory/2020-0-0x0000000000400000-0x0000000000436000-memory.dmp upx C:\tldhjhr.exe upx behavioral1/memory/2020-7-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2504-11-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2032-20-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2580-30-0x0000000000400000-0x0000000000436000-memory.dmp upx \??\c:\hflrh.exe upx \??\c:\drbvvd.exe upx behavioral1/memory/2672-37-0x0000000000400000-0x0000000000436000-memory.dmp upx C:\frjttd.exe upx C:\nbjfh.exe upx behavioral1/memory/2708-55-0x0000000000400000-0x0000000000436000-memory.dmp upx C:\dhxjdh.exe upx behavioral1/memory/2592-63-0x0000000000400000-0x0000000000436000-memory.dmp upx \??\c:\rldljbn.exe upx C:\dpnhvfn.exe upx \??\c:\dvvfpp.exe upx C:\bpbbl.exe upx \??\c:\rjhbhn.exe upx behavioral1/memory/932-106-0x0000000000400000-0x0000000000436000-memory.dmp upx C:\nrlptnn.exe upx \??\c:\ltjvr.exe upx C:\ltvbv.exe upx C:\vjdhdx.exe upx behavioral1/memory/1036-141-0x0000000000400000-0x0000000000436000-memory.dmp upx \??\c:\drffhp.exe upx behavioral1/memory/2384-159-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2220-161-0x0000000000400000-0x0000000000436000-memory.dmp upx C:\pttrrbn.exe upx \??\c:\tnbxrf.exe upx \??\c:\bhnvdrv.exe upx C:\ltdbrr.exe upx C:\ntjhjnd.exe upx C:\jdfxprf.exe upx C:\lbdvh.exe upx C:\jlrbrbt.exe upx C:\ntlhvtp.exe upx C:\vnnjn.exe upx C:\rvbxv.exe upx C:\rfbvlxr.exe upx behavioral1/memory/2176-288-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/876-309-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2020-322-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/680-389-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/680-396-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/1804-409-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2412-430-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2412-423-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/1240-443-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/940-416-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/1520-456-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/752-388-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2104-469-0x0000000000220000-0x0000000000256000-memory.dmp upx behavioral1/memory/2556-374-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2680-329-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2880-302-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/1752-295-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2112-237-0x0000000000400000-0x0000000000436000-memory.dmp upx \??\c:\vthrjxh.exe upx behavioral1/memory/3028-195-0x0000000000400000-0x0000000000436000-memory.dmp upx \??\c:\brbtv.exe upx behavioral1/memory/2220-169-0x0000000000400000-0x0000000000436000-memory.dmp upx \??\c:\nrvrvpb.exe upx behavioral1/memory/2384-152-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exetldhjhr.exedrbvvd.exehflrh.exefrjttd.exenbjfh.exetntrf.exedhxjdh.exerldljbn.exedpnhvfn.exedvvfpp.exebpbbl.exerjhbhn.exenrlptnn.exeltjvr.exeltvbv.exedescription pid process target process PID 2020 wrote to memory of 2504 2020 029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe hplvftl.exe PID 2020 wrote to memory of 2504 2020 029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe hplvftl.exe PID 2020 wrote to memory of 2504 2020 029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe hplvftl.exe PID 2020 wrote to memory of 2504 2020 029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe hplvftl.exe PID 2504 wrote to memory of 2032 2504 tldhjhr.exe drbvvd.exe PID 2504 wrote to memory of 2032 2504 tldhjhr.exe drbvvd.exe PID 2504 wrote to memory of 2032 2504 tldhjhr.exe drbvvd.exe PID 2504 wrote to memory of 2032 2504 tldhjhr.exe drbvvd.exe PID 2032 wrote to memory of 2580 2032 drbvvd.exe hflrh.exe PID 2032 wrote to memory of 2580 2032 drbvvd.exe hflrh.exe PID 2032 wrote to memory of 2580 2032 drbvvd.exe hflrh.exe PID 2032 wrote to memory of 2580 2032 drbvvd.exe hflrh.exe PID 2580 wrote to memory of 2672 2580 hflrh.exe frjttd.exe PID 2580 wrote to memory of 2672 2580 hflrh.exe frjttd.exe PID 2580 wrote to memory of 2672 2580 hflrh.exe frjttd.exe PID 2580 wrote to memory of 2672 2580 hflrh.exe frjttd.exe PID 2672 wrote to memory of 2708 2672 frjttd.exe nbjfh.exe PID 2672 wrote to memory of 2708 2672 frjttd.exe nbjfh.exe PID 2672 wrote to memory of 2708 2672 frjttd.exe nbjfh.exe PID 2672 wrote to memory of 2708 2672 frjttd.exe nbjfh.exe PID 2708 wrote to memory of 2592 2708 nbjfh.exe tntrf.exe PID 2708 wrote to memory of 2592 2708 nbjfh.exe tntrf.exe PID 2708 wrote to memory of 2592 2708 nbjfh.exe tntrf.exe PID 2708 wrote to memory of 2592 2708 nbjfh.exe tntrf.exe PID 2592 wrote to memory of 2444 2592 tntrf.exe dhxjdh.exe PID 2592 wrote to memory of 2444 2592 tntrf.exe dhxjdh.exe PID 2592 wrote to memory of 2444 2592 tntrf.exe dhxjdh.exe PID 2592 wrote to memory of 2444 2592 tntrf.exe dhxjdh.exe PID 2444 wrote to memory of 2892 2444 dhxjdh.exe rldljbn.exe PID 2444 wrote to memory of 2892 2444 dhxjdh.exe rldljbn.exe PID 2444 wrote to memory of 2892 2444 dhxjdh.exe rldljbn.exe PID 2444 wrote to memory of 2892 2444 dhxjdh.exe rldljbn.exe PID 2892 wrote to memory of 564 2892 rldljbn.exe dpnhvfn.exe PID 2892 wrote to memory of 564 2892 rldljbn.exe dpnhvfn.exe PID 2892 wrote to memory of 564 2892 rldljbn.exe dpnhvfn.exe PID 2892 wrote to memory of 564 2892 rldljbn.exe dpnhvfn.exe PID 564 wrote to memory of 552 564 dpnhvfn.exe dvvfpp.exe PID 564 wrote to memory of 552 564 dpnhvfn.exe dvvfpp.exe PID 564 wrote to memory of 552 564 dpnhvfn.exe dvvfpp.exe PID 564 wrote to memory of 552 564 dpnhvfn.exe dvvfpp.exe PID 552 wrote to memory of 932 552 dvvfpp.exe bpbbl.exe PID 552 wrote to memory of 932 552 dvvfpp.exe bpbbl.exe PID 552 wrote to memory of 932 552 dvvfpp.exe bpbbl.exe PID 552 wrote to memory of 932 552 dvvfpp.exe bpbbl.exe PID 932 wrote to memory of 1728 932 bpbbl.exe rjhbhn.exe PID 932 wrote to memory of 1728 932 bpbbl.exe rjhbhn.exe PID 932 wrote to memory of 1728 932 bpbbl.exe rjhbhn.exe PID 932 wrote to memory of 1728 932 bpbbl.exe rjhbhn.exe PID 1728 wrote to memory of 2484 1728 rjhbhn.exe nrlptnn.exe PID 1728 wrote to memory of 2484 1728 rjhbhn.exe nrlptnn.exe PID 1728 wrote to memory of 2484 1728 rjhbhn.exe nrlptnn.exe PID 1728 wrote to memory of 2484 1728 rjhbhn.exe nrlptnn.exe PID 2484 wrote to memory of 2264 2484 nrlptnn.exe ltjvr.exe PID 2484 wrote to memory of 2264 2484 nrlptnn.exe ltjvr.exe PID 2484 wrote to memory of 2264 2484 nrlptnn.exe ltjvr.exe PID 2484 wrote to memory of 2264 2484 nrlptnn.exe ltjvr.exe PID 2264 wrote to memory of 1036 2264 ltjvr.exe ltvbv.exe PID 2264 wrote to memory of 1036 2264 ltjvr.exe ltvbv.exe PID 2264 wrote to memory of 1036 2264 ltjvr.exe ltvbv.exe PID 2264 wrote to memory of 1036 2264 ltjvr.exe ltvbv.exe PID 1036 wrote to memory of 1792 1036 ltvbv.exe vjdhdx.exe PID 1036 wrote to memory of 1792 1036 ltvbv.exe vjdhdx.exe PID 1036 wrote to memory of 1792 1036 ltvbv.exe vjdhdx.exe PID 1036 wrote to memory of 1792 1036 ltvbv.exe vjdhdx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\029914de3b6fbd90144bb1287f886f20_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\tldhjhr.exec:\tldhjhr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\drbvvd.exec:\drbvvd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hflrh.exec:\hflrh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frjttd.exec:\frjttd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbjfh.exec:\nbjfh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tntrf.exec:\tntrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dhxjdh.exec:\dhxjdh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rldljbn.exec:\rldljbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpnhvfn.exec:\dpnhvfn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvvfpp.exec:\dvvfpp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bpbbl.exec:\bpbbl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rjhbhn.exec:\rjhbhn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nrlptnn.exec:\nrlptnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ltjvr.exec:\ltjvr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ltvbv.exec:\ltvbv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjdhdx.exec:\vjdhdx.exe17⤵
- Executes dropped EXE
-
\??\c:\drffhp.exec:\drffhp.exe18⤵
- Executes dropped EXE
-
\??\c:\nrvrvpb.exec:\nrvrvpb.exe19⤵
- Executes dropped EXE
-
\??\c:\pttrrbn.exec:\pttrrbn.exe20⤵
- Executes dropped EXE
-
\??\c:\tnbxrf.exec:\tnbxrf.exe21⤵
- Executes dropped EXE
-
\??\c:\brbtv.exec:\brbtv.exe22⤵
- Executes dropped EXE
-
\??\c:\bhnvdrv.exec:\bhnvdrv.exe23⤵
- Executes dropped EXE
-
\??\c:\vthrjxh.exec:\vthrjxh.exe24⤵
- Executes dropped EXE
-
\??\c:\ltdbrr.exec:\ltdbrr.exe25⤵
- Executes dropped EXE
-
\??\c:\ntjhjnd.exec:\ntjhjnd.exe26⤵
- Executes dropped EXE
-
\??\c:\jdfxprf.exec:\jdfxprf.exe27⤵
- Executes dropped EXE
-
\??\c:\lbdvh.exec:\lbdvh.exe28⤵
- Executes dropped EXE
-
\??\c:\jlrbrbt.exec:\jlrbrbt.exe29⤵
- Executes dropped EXE
-
\??\c:\ntlhvtp.exec:\ntlhvtp.exe30⤵
- Executes dropped EXE
-
\??\c:\vnnjn.exec:\vnnjn.exe31⤵
- Executes dropped EXE
-
\??\c:\rvbxv.exec:\rvbxv.exe32⤵
- Executes dropped EXE
-
\??\c:\rfbvlxr.exec:\rfbvlxr.exe33⤵
- Executes dropped EXE
-
\??\c:\hldbbbx.exec:\hldbbbx.exe34⤵
- Executes dropped EXE
-
\??\c:\bvfvbrp.exec:\bvfvbrp.exe35⤵
- Executes dropped EXE
-
\??\c:\dhjptl.exec:\dhjptl.exe36⤵
- Executes dropped EXE
-
\??\c:\rvdxx.exec:\rvdxx.exe37⤵
- Executes dropped EXE
-
\??\c:\rxfjb.exec:\rxfjb.exe38⤵
- Executes dropped EXE
-
\??\c:\hplvftl.exec:\hplvftl.exe39⤵
- Executes dropped EXE
-
\??\c:\vthhnf.exec:\vthhnf.exe40⤵
- Executes dropped EXE
-
\??\c:\fbnvfhx.exec:\fbnvfhx.exe41⤵
- Executes dropped EXE
-
\??\c:\lhpvn.exec:\lhpvn.exe42⤵
- Executes dropped EXE
-
\??\c:\hlrrphr.exec:\hlrrphr.exe43⤵
- Executes dropped EXE
-
\??\c:\hhfnj.exec:\hhfnj.exe44⤵
- Executes dropped EXE
-
\??\c:\lbjffhx.exec:\lbjffhx.exe45⤵
- Executes dropped EXE
-
\??\c:\pvvndx.exec:\pvvndx.exe46⤵
- Executes dropped EXE
-
\??\c:\tfntbvn.exec:\tfntbvn.exe47⤵
- Executes dropped EXE
-
\??\c:\jftvpfp.exec:\jftvpfp.exe48⤵
- Executes dropped EXE
-
\??\c:\hhrph.exec:\hhrph.exe49⤵
- Executes dropped EXE
-
\??\c:\pxvrjln.exec:\pxvrjln.exe50⤵
- Executes dropped EXE
-
\??\c:\ddlvp.exec:\ddlvp.exe51⤵
- Executes dropped EXE
-
\??\c:\plvhh.exec:\plvhh.exe52⤵
- Executes dropped EXE
-
\??\c:\bhvdhnn.exec:\bhvdhnn.exe53⤵
- Executes dropped EXE
-
\??\c:\jrlbxt.exec:\jrlbxt.exe54⤵
- Executes dropped EXE
-
\??\c:\lvhff.exec:\lvhff.exe55⤵
- Executes dropped EXE
-
\??\c:\fhjtf.exec:\fhjtf.exe56⤵
- Executes dropped EXE
-
\??\c:\vdjrx.exec:\vdjrx.exe57⤵
- Executes dropped EXE
-
\??\c:\fllvh.exec:\fllvh.exe58⤵
- Executes dropped EXE
-
\??\c:\vhxrjhh.exec:\vhxrjhh.exe59⤵
- Executes dropped EXE
-
\??\c:\xrbrflx.exec:\xrbrflx.exe60⤵
- Executes dropped EXE
-
\??\c:\pffrt.exec:\pffrt.exe61⤵
- Executes dropped EXE
-
\??\c:\ntlbv.exec:\ntlbv.exe62⤵
- Executes dropped EXE
-
\??\c:\trnrlrb.exec:\trnrlrb.exe63⤵
- Executes dropped EXE
-
\??\c:\fvddlh.exec:\fvddlh.exe64⤵
- Executes dropped EXE
-
\??\c:\tvbnd.exec:\tvbnd.exe65⤵
- Executes dropped EXE
-
\??\c:\dblrpvh.exec:\dblrpvh.exe66⤵
-
\??\c:\ftbhx.exec:\ftbhx.exe67⤵
-
\??\c:\bjtxf.exec:\bjtxf.exe68⤵
-
\??\c:\rrfdt.exec:\rrfdt.exe69⤵
-
\??\c:\xhtjhj.exec:\xhtjhj.exe70⤵
-
\??\c:\dnjlx.exec:\dnjlx.exe71⤵
-
\??\c:\tfpvd.exec:\tfpvd.exe72⤵
-
\??\c:\vlnndj.exec:\vlnndj.exe73⤵
-
\??\c:\ptblv.exec:\ptblv.exe74⤵
-
\??\c:\xbjfrb.exec:\xbjfrb.exe75⤵
-
\??\c:\ffrjf.exec:\ffrjf.exe76⤵
-
\??\c:\bbfthnl.exec:\bbfthnl.exe77⤵
-
\??\c:\tvnpffn.exec:\tvnpffn.exe78⤵
-
\??\c:\tjrrrrj.exec:\tjrrrrj.exe79⤵
-
\??\c:\jhhrppt.exec:\jhhrppt.exe80⤵
-
\??\c:\nhnjvt.exec:\nhnjvt.exe81⤵
-
\??\c:\dvrtrv.exec:\dvrtrv.exe82⤵
-
\??\c:\nbvnr.exec:\nbvnr.exe83⤵
-
\??\c:\nnjdltv.exec:\nnjdltv.exe84⤵
-
\??\c:\fvdxrjb.exec:\fvdxrjb.exe85⤵
-
\??\c:\pntdxd.exec:\pntdxd.exe86⤵
-
\??\c:\tnhxh.exec:\tnhxh.exe87⤵
-
\??\c:\nbdbhvd.exec:\nbdbhvd.exe88⤵
-
\??\c:\vthvptp.exec:\vthvptp.exe89⤵
-
\??\c:\hvjvr.exec:\hvjvr.exe90⤵
-
\??\c:\fvbddv.exec:\fvbddv.exe91⤵
-
\??\c:\nbtjl.exec:\nbtjl.exe92⤵
-
\??\c:\flftvv.exec:\flftvv.exe93⤵
-
\??\c:\nfdtd.exec:\nfdtd.exe94⤵
-
\??\c:\vhnhv.exec:\vhnhv.exe95⤵
-
\??\c:\vldth.exec:\vldth.exe96⤵
-
\??\c:\vflfll.exec:\vflfll.exe97⤵
-
\??\c:\nvltfxv.exec:\nvltfxv.exe98⤵
-
\??\c:\fhjpnt.exec:\fhjpnt.exe99⤵
-
\??\c:\lnrxl.exec:\lnrxl.exe100⤵
-
\??\c:\phjrxtb.exec:\phjrxtb.exe101⤵
-
\??\c:\jbbbf.exec:\jbbbf.exe102⤵
-
\??\c:\jxnbnb.exec:\jxnbnb.exe103⤵
-
\??\c:\dntjt.exec:\dntjt.exe104⤵
-
\??\c:\tnrtrth.exec:\tnrtrth.exe105⤵
-
\??\c:\fjnhhj.exec:\fjnhhj.exe106⤵
-
\??\c:\tdnrxnb.exec:\tdnrxnb.exe107⤵
-
\??\c:\xvvxfp.exec:\xvvxfp.exe108⤵
-
\??\c:\thpldtp.exec:\thpldtp.exe109⤵
-
\??\c:\lthhbv.exec:\lthhbv.exe110⤵
-
\??\c:\dljhpj.exec:\dljhpj.exe111⤵
-
\??\c:\vfttfvr.exec:\vfttfvr.exe112⤵
-
\??\c:\txpljpn.exec:\txpljpn.exe113⤵
-
\??\c:\lnlvlr.exec:\lnlvlr.exe114⤵
-
\??\c:\fppvp.exec:\fppvp.exe115⤵
-
\??\c:\hjfhvdh.exec:\hjfhvdh.exe116⤵
-
\??\c:\dxjtbhd.exec:\dxjtbhd.exe117⤵
-
\??\c:\jxbtrp.exec:\jxbtrp.exe118⤵
-
\??\c:\tjvbndl.exec:\tjvbndl.exe119⤵
-
\??\c:\rlbrlrn.exec:\rlbrlrn.exe120⤵
-
\??\c:\fjthppx.exec:\fjthppx.exe121⤵
-
\??\c:\jbdvpjx.exec:\jbdvpjx.exe122⤵
-
\??\c:\ddjvjp.exec:\ddjvjp.exe123⤵
-
\??\c:\lbrtpt.exec:\lbrtpt.exe124⤵
-
\??\c:\jtljhp.exec:\jtljhp.exe125⤵
-
\??\c:\hrvbj.exec:\hrvbj.exe126⤵
-
\??\c:\xnbblvx.exec:\xnbblvx.exe127⤵
-
\??\c:\tjbvh.exec:\tjbvh.exe128⤵
-
\??\c:\pbvphrb.exec:\pbvphrb.exe129⤵
-
\??\c:\vlvnhxd.exec:\vlvnhxd.exe130⤵
-
\??\c:\xdlhjt.exec:\xdlhjt.exe131⤵
-
\??\c:\dhdpd.exec:\dhdpd.exe132⤵
-
\??\c:\jdrlt.exec:\jdrlt.exe133⤵
-
\??\c:\xnfrtdv.exec:\xnfrtdv.exe134⤵
-
\??\c:\nljhvt.exec:\nljhvt.exe135⤵
-
\??\c:\llpbxt.exec:\llpbxt.exe136⤵
-
\??\c:\vxrrb.exec:\vxrrb.exe137⤵
-
\??\c:\xtxfb.exec:\xtxfb.exe138⤵
-
\??\c:\pdnvjr.exec:\pdnvjr.exe139⤵
-
\??\c:\tnnfvt.exec:\tnnfvt.exe140⤵
-
\??\c:\ptjpbf.exec:\ptjpbf.exe141⤵
-
\??\c:\lbrlj.exec:\lbrlj.exe142⤵
-
\??\c:\hdjjt.exec:\hdjjt.exe143⤵
-
\??\c:\jbhpjp.exec:\jbhpjp.exe144⤵
-
\??\c:\hpxdht.exec:\hpxdht.exe145⤵
-
\??\c:\hvvbddr.exec:\hvvbddr.exe146⤵
-
\??\c:\xnxlvh.exec:\xnxlvh.exe147⤵
-
\??\c:\fpxfxr.exec:\fpxfxr.exe148⤵
-
\??\c:\lblfx.exec:\lblfx.exe149⤵
-
\??\c:\ddrbj.exec:\ddrbj.exe150⤵
-
\??\c:\fnttp.exec:\fnttp.exe151⤵
-
\??\c:\vtnpnh.exec:\vtnpnh.exe152⤵
-
\??\c:\bpxpvhx.exec:\bpxpvhx.exe153⤵
-
\??\c:\xftrjf.exec:\xftrjf.exe154⤵
-
\??\c:\vlpjtv.exec:\vlpjtv.exe155⤵
-
\??\c:\lndvr.exec:\lndvr.exe156⤵
-
\??\c:\vhptdn.exec:\vhptdn.exe157⤵
-
\??\c:\vbfbthf.exec:\vbfbthf.exe158⤵
-
\??\c:\blvpnfn.exec:\blvpnfn.exe159⤵
-
\??\c:\bfltvnr.exec:\bfltvnr.exe160⤵
-
\??\c:\xnfxv.exec:\xnfxv.exe161⤵
-
\??\c:\hpjpf.exec:\hpjpf.exe162⤵
-
\??\c:\nbjhf.exec:\nbjhf.exe163⤵
-
\??\c:\ffttrn.exec:\ffttrn.exe164⤵
-
\??\c:\tnhnbrb.exec:\tnhnbrb.exe165⤵
-
\??\c:\nfltnrr.exec:\nfltnrr.exe166⤵
-
\??\c:\xlnvpn.exec:\xlnvpn.exe167⤵
-
\??\c:\hnjdt.exec:\hnjdt.exe168⤵
-
\??\c:\vbtxh.exec:\vbtxh.exe169⤵
-
\??\c:\xhldb.exec:\xhldb.exe170⤵
-
\??\c:\phjpp.exec:\phjpp.exe171⤵
-
\??\c:\flrfb.exec:\flrfb.exe172⤵
-
\??\c:\phrjvdh.exec:\phrjvdh.exe173⤵
-
\??\c:\pndtbf.exec:\pndtbf.exe174⤵
-
\??\c:\bfpndnh.exec:\bfpndnh.exe175⤵
-
\??\c:\ndltl.exec:\ndltl.exe176⤵
-
\??\c:\tndtnbh.exec:\tndtnbh.exe177⤵
-
\??\c:\xnpphf.exec:\xnpphf.exe178⤵
-
\??\c:\tdhvlx.exec:\tdhvlx.exe179⤵
-
\??\c:\jtvdhfp.exec:\jtvdhfp.exe180⤵
-
\??\c:\plvff.exec:\plvff.exe181⤵
-
\??\c:\dlplh.exec:\dlplh.exe182⤵
-
\??\c:\fnxxtfb.exec:\fnxxtfb.exe183⤵
-
\??\c:\dnlnr.exec:\dnlnr.exe184⤵
-
\??\c:\rnftnv.exec:\rnftnv.exe185⤵
-
\??\c:\ttpvh.exec:\ttpvh.exe186⤵
-
\??\c:\htdrdx.exec:\htdrdx.exe187⤵
-
\??\c:\frjrtj.exec:\frjrtj.exe188⤵
-
\??\c:\txthph.exec:\txthph.exe189⤵
-
\??\c:\lxnntrd.exec:\lxnntrd.exe190⤵
-
\??\c:\ndhpj.exec:\ndhpj.exe191⤵
-
\??\c:\rrxnrbp.exec:\rrxnrbp.exe192⤵
-
\??\c:\dllxf.exec:\dllxf.exe193⤵
-
\??\c:\lbnvl.exec:\lbnvl.exe194⤵
-
\??\c:\tlhrnvj.exec:\tlhrnvj.exe195⤵
-
\??\c:\pttvdd.exec:\pttvdd.exe196⤵
-
\??\c:\trtpdjr.exec:\trtpdjr.exe197⤵
-
\??\c:\ffrld.exec:\ffrld.exe198⤵
-
\??\c:\rtrnvrn.exec:\rtrnvrn.exe199⤵
-
\??\c:\xrntt.exec:\xrntt.exe200⤵
-
\??\c:\vdlhtt.exec:\vdlhtt.exe201⤵
-
\??\c:\vnlndfj.exec:\vnlndfj.exe202⤵
-
\??\c:\bnvtbnh.exec:\bnvtbnh.exe203⤵
-
\??\c:\vlbhtl.exec:\vlbhtl.exe204⤵
-
\??\c:\njftr.exec:\njftr.exe205⤵
-
\??\c:\tdhbnjn.exec:\tdhbnjn.exe206⤵
-
\??\c:\ljblnp.exec:\ljblnp.exe207⤵
-
\??\c:\nnlvhx.exec:\nnlvhx.exe208⤵
-
\??\c:\vdlhbrp.exec:\vdlhbrp.exe209⤵
-
\??\c:\nnlntl.exec:\nnlntl.exe210⤵
-
\??\c:\ttjfbvd.exec:\ttjfbvd.exe211⤵
-
\??\c:\txrjjx.exec:\txrjjx.exe212⤵
-
\??\c:\fbfjxd.exec:\fbfjxd.exe213⤵
-
\??\c:\jtjvjj.exec:\jtjvjj.exe214⤵
-
\??\c:\xvlnjld.exec:\xvlnjld.exe215⤵
-
\??\c:\rvnhrd.exec:\rvnhrd.exe216⤵
-
\??\c:\bxlfv.exec:\bxlfv.exe217⤵
-
\??\c:\jvlvlp.exec:\jvlvlp.exe218⤵
-
\??\c:\ffbvr.exec:\ffbvr.exe219⤵
-
\??\c:\fxrbh.exec:\fxrbh.exe220⤵
-
\??\c:\vjvfldf.exec:\vjvfldf.exe221⤵
-
\??\c:\ttxfxdb.exec:\ttxfxdb.exe222⤵
-
\??\c:\fdfpxtn.exec:\fdfpxtn.exe223⤵
-
\??\c:\lnxlt.exec:\lnxlt.exe224⤵
-
\??\c:\njhxpbt.exec:\njhxpbt.exe225⤵
-
\??\c:\vhftnl.exec:\vhftnl.exe226⤵
-
\??\c:\hrbnl.exec:\hrbnl.exe227⤵
-
\??\c:\xdbrvnt.exec:\xdbrvnt.exe228⤵
-
\??\c:\tddthhf.exec:\tddthhf.exe229⤵
-
\??\c:\rvdlnfn.exec:\rvdlnfn.exe230⤵
-
\??\c:\nbtdhb.exec:\nbtdhb.exe231⤵
-
\??\c:\blbpf.exec:\blbpf.exe232⤵
-
\??\c:\xndvnhr.exec:\xndvnhr.exe233⤵
-
\??\c:\vnhbvht.exec:\vnhbvht.exe234⤵
-
\??\c:\nxdvbhn.exec:\nxdvbhn.exe235⤵
-
\??\c:\djxblfr.exec:\djxblfr.exe236⤵
-
\??\c:\bttbfpp.exec:\bttbfpp.exe237⤵
-
\??\c:\flbnbt.exec:\flbnbt.exe238⤵
-
\??\c:\hljvj.exec:\hljvj.exe239⤵
-
\??\c:\tfnjtvl.exec:\tfnjtvl.exe240⤵
-
\??\c:\nnxhdp.exec:\nnxhdp.exe241⤵